Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
eab85ad68a6996c9dc6bb23cf9056172_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab85ad68a6996c9dc6bb23cf9056172_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab85ad68a6996c9dc6bb23cf9056172_JaffaCakes118.html
-
Size
9KB
-
MD5
eab85ad68a6996c9dc6bb23cf9056172
-
SHA1
3f04e8359c364d46e667219c9a3484f38d76af06
-
SHA256
daebfa7874bbf8891d0da3f4fb3643eb9bf457b90f5732fce7598a0fff0d9f61
-
SHA512
7374c3e12798eb4bab3427aaedf0871fd26a57a8696a05d002150f092e2de35159dc8b9d24c2ec37bd986d05bab96cb8dec4048d23ea0c5ab90175cd910aaaf6
-
SSDEEP
192:aHst3Oefcfdma1CMcFL397NdcAGRoOQiP8G:3fclma1CvFL397TcAmoOnh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003e09fc90f40a241bef29c68c484ae5f5bda39dab162631da425202245a28f5b6000000000e80000000020000200000008e1f294cb95a809acc7d894b81346fe8b189079685737c395e593b77277ac809200000006b86b87ab841054b3a6a13f15dba5febf58e2e7a057a540552baf8d6338e3b4a400000007aa813b9c0934498592b8667419185c371d23219a516ac7b4808154f108639fbdf230e555ac828f6ef5d85e96a819ac108caead2a592854c6e276e76942fd155 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887592" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e093ec86590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B24B7381-764C-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1652 1636 iexplore.exe 28 PID 1636 wrote to memory of 1652 1636 iexplore.exe 28 PID 1636 wrote to memory of 1652 1636 iexplore.exe 28 PID 1636 wrote to memory of 1652 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab85ad68a6996c9dc6bb23cf9056172_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518bf147b7a6cc06662c6bbc66a00564a
SHA1e779693a0683da926aab3fb17a5cefdd781a8f24
SHA256594b1ec82520d88f61bb21637d4adb40efdbb0710d04ce8144d07171ababcc74
SHA512de398b0ca1f1d5fa07daf751e17bb0a3318be874109bdacb8416e9845643ceb01503a1c49df3fcb932344cc415b6620ba99712a7bfe12b582e43527751eef99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805d71a5dfa574d0062d59205941a875
SHA1901d3129660d2d9111c4a5614aee43e5ba79910e
SHA256a91483031383b66c3b48f6019b9fcc4eb3519e0ae0d0f9febdb4ebadf25a2c1a
SHA512f0188d1eca46129080aac53060fb998ba240c31f0dd7ab45f6dc99e1c8bb2909103d48ecd76e873f04ac4898c39a8ec984c294f80fb10a15330c0814ed65c33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b02a7e5407e846e35d5f882cbdf3cc6
SHA1bf795403a380b92f8d8820580c8191cf7c4795c1
SHA2565e66cf0f979972d7923b90db23dc61b36928bb3b35c31f797f3c91a7888989ce
SHA5123c630dc228b56b51eb9a77c655b5e8988e7a3b1bec829b0df55bd1c1d8d36567e66f74c2786377e90b3665451ed066e6ae99c7d3d507d183ec0e3d27b6765591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53745b06a222b147fa8908572c8aaf7aa
SHA1355beb87d2219d5163afbba7c82b39b2a2f1aa6b
SHA2561c308002698e6a86a1e9d83a405a80cffba2b2cbbcd02304f5df89e4c860a058
SHA512f54b73123828f8bbb6380a43916fe0de3f218cf56290e218777cd0d044475936ba99c5df72bd319d0711b6a937b75e99186233764aa7e2221f676bbe5a6d2f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcde25d0dd52a05dc41cff426ac07678
SHA164104c1d24e76eab608bf82e1a08b20578c6e9e4
SHA256fb7460a2d9425c2f97c92d31dd2b80ad09284f197fc688dd7f390c493f8c4151
SHA512ab67f24ef33cd6f2c21fd5ce31df71e30086ec486d9058a2d200fbc678bf1f5fad3dd4623f0a15829b6869293500d9d4edf01c695d282a68ef98dbb8959404a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83a4f6c7bee18d61bd34e931ef9d230
SHA1cb168100930c5836deefe5ed95997680c5db4cd4
SHA256847cafdd13c62b2bae7633b2c88f3d4aee0f68a5edda202e3afa7fb9c3489fdc
SHA51246bdb670db7f67a48003e0b7647948f99f3545ba4b2df3f342c20e08caafbcf519c8dc8f7c52c4eb8ef42076c8ebf8c9ce75a8d125a16179e2d8ad2f4b168e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7a96194803019a6c4067fe2c39c31a
SHA1bdad7437291618283306c14613a1c01a32daeada
SHA25631bf4f8a0950d1462c0722f59d9900117dec6c6742065c7237ad6ac4d933cb6b
SHA51270883d8f014a8625e2612988c162af396d3755a3919e5325ad65ae5e49d22fbb1efa60d36325dbfe18189f3ac8e9b49035e497b00ac03c8d04cd9d8ec0168909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb5d90361ddd7d91fe82c1d2d6e4caa
SHA135dffc98a88361f09df02007b12f079619c62d32
SHA256e529498af648049d0b2cef986caa721cf8590cffdc500ec6f364d4d81989be18
SHA5121f5d81bd5407391cc501afcf753c4c08598561f0a321214b87e2ca4d4409f66e65c36be546e1fed20ab6a8216138ac2e942bf7071a113f513c3e4ad4d62c327c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75e09ce394676fad0c28d5391c364cc
SHA1111f097e656db8ed76b16b5c52fc0468787d1970
SHA25690dc3d8b4d19f1cb2a8e05e69727ba9c6f1fa140c2032386eaad290b130520a7
SHA512d76d1dc4eb53d8614248b0d45b3ad8d32bb8ed852591cc179559dd8f911e59641647192af4a84f5a665f9540e087519c0819b5bfb22008031d3060d60818c992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622b585e39e345f7ab5196a75c5e0216
SHA128239bccb3918547320bded61b9409a5b4722783
SHA256b4d7585307f1fdac8dda1685429844724157a715a8571ca952743171dc098f6e
SHA51261a7a88585c8741ae2d93f3f9c528da1d38f2840bba74a1fc1995e887365968c056ac305bf06830607c7f0a1845980e1dac30e9e33aab40fb31da1ecab677ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7be04eeecdca60c5b59f29f56090fb8
SHA125e2fb3358c876f074417eea065d292d2146be2e
SHA2567ef7f63e9b3aa73d5020381505121f8fa000c30d5240456fda1e1f97b4aff25c
SHA5124c98a2b4054f313598646e5d32b799c4623b1f6a04de5d856df4bdbeb04a63a5f04a52681550b08042c412b4968d819015330a8c11c82bb3163c01a528473288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e61a70cffeaec913e43b42fc4812fe2
SHA18bc58583e63132b011db76a1b5d2318cd2e64e90
SHA25653f7baa5946ebdfa54486f63c1274d19d5fa2e9c833a3f9870be278f091e20c0
SHA51234fd5e0151015d22096e6f06635bf99303c1d72ca084fae588d1234080a826409fbc4da9503ccf5cae9f2bcf2c4e6185aad3742a2289babd86c1560537aa270c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae43c3a8b27e6491b91297f357d186f
SHA1cef7c6796c8fcd55acd245abac2ce4af72ed3589
SHA256d9b01cd8a02d0b4f634c8fdf4baa53aa43e4c0b1263f5f3809e35495204cbf05
SHA5124aed21c1bf4db5a4880911f65f2cc4990b4448e34bcb7a2b84ca16e735e2173402682960708d48bb65c5801694d3be6a639839c6085cd9511c33694dcd06a43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58adc77f2bad41184933b775ab7218b8d
SHA17db8f01679a2cd6a6cc4eeb34c0976e6da941a3d
SHA2562c24ce709487ba9ede1dd1158262b5f2674133cb14f8498535e22bde886bc126
SHA512cd6fd98b4c727c10fe1e6c0af99c19d8e6b69e27b4c668411b8b2ffeb0366a96b5bb798f6494feb4075eb2db76638533fcb4109e6b42cbb3f02e762879342c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5affa32f80223eb38182b94ec56aa3880
SHA1ef77f3ebf81daf596c9907b265cfdf8a617b9189
SHA256e2f4e9037da772e21e30501602972607c560670b4d5ae0ab1ff3e1c1a49d9d53
SHA512a0f2dad8c500cf5f54c2f225cc10094ed67dbc0db397269ffaedfbfeec4d3f9b655666df2e7f36e620887fd829e38d385f7015bea41e9f112eac308988d02703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a54d80c133fa4f461997a35d760a273
SHA109c73e77a543c763561cf492eb2860a84a235bdd
SHA256de0231f027604d1ad66f40de375d25083890c15fefd0286855fd25db5ff77ba8
SHA51255e446ab5ba846a1fea4fd8472bc0fba87d645d67369423065ab73e8e59931818721120ce8e14fe023be6521275d6036bbde253ee2a7379ea1dbb3be2372b951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e902f1c38ec1f72e5d5e0034786cb142
SHA1bd4070f1d170c32a518ff4ae348895e8c546c272
SHA256e8810f45c177f9b872e4e31216c53241284000bd0666a3637371ff9d9076e305
SHA51259df8ff31bd7deafe3510c59f7a73a44ddececeaa1790264590f45e9be78af64226e120455e25eaeae3c4069e7803ee198b48ae01a9b5144b86a58512d870f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e425af4c89926fb259f0c767e3a903c
SHA1ad6a91f98b55cf9ec18214220ae23c06c256651d
SHA2566488c442c4255eec7a83dd72272880cd3720e5c5fcc3c21fcbbb0857c72f73a4
SHA51265b2939f2163fe2f04a470b95f8226260978f466c1ec7c7c622d4fe5608aa728d2dbcc2c3ffcaf7960646268e871b06a1abef2679d84e5e59055cccc65cc59ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3eae007d4a49a7c9777b0cd242187a
SHA1a08e37b92fbcb91c4c9a042b3688f4272a258225
SHA256d0525132385dc0c2bc99aaabb05201658bb410a1bbffc1916d57a99f80e2831c
SHA512650fb835c1aa13efd555034745ca08997ab3defaaf5d85b4767241616ef0a907ddb5c4b872225f89dbffa477beae3e48ed6717396c7e9d6039cdf5c62ec2010a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b