Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
eab85d53cdfb0368caf26642e5add6d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab85d53cdfb0368caf26642e5add6d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab85d53cdfb0368caf26642e5add6d6_JaffaCakes118.html
-
Size
968B
-
MD5
eab85d53cdfb0368caf26642e5add6d6
-
SHA1
e2f4e24ede955d4499721f3e6345cff7c75f6a7d
-
SHA256
a37bc1671c3578d2db6f541b4b53b2b86c9bab493916af1daa3e74d45ac0eee8
-
SHA512
650645526400294f792239ba488acb24a00004324221e8448f9e2f14a207291972a4a63c17c3c3e539cf39ac90f8e76e92ce098b3234aa8dadf89f82001c09d1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4172B01-764C-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000000a1470c9b63eb1008433fee657529925e984ae704ea1e49efa6ee93b8d74ec7f000000000e8000000002000020000000398200762bb1cd2f63aaeb2f32f19b9458020d4a369fb9b601cb70ef7868df8c2000000018af21110d61605436404c6371da33c0f9c8a3f452b31db46668f3b2a3851afa40000000e5bdcdbb56bdd348bae1ccfabd3c8ac6cfa080e1579ce983196acec261cc23dfe6c27aee013b7e9f8e62d60f07676fa1ea7c3f03e120d42526ebb467c89d6bcd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d589011b3663161a510c3158c0f613e51ac3e99ccb333b562521d1a5f1fbf096000000000e8000000002000020000000e0bba607a692a6d1b0453546591e4c3499410d331de7e57ea999d9b8dd53959e90000000fd6f0e12478651e7a0f928ee9f07ae7279c044ce30f26df869391d729db537a77082ca687fdda6d5508bc1a61a943d58ef0e01dda2f5b81eefba48b26149ab2ea76baab8caa8bc919aa182db33987bd810c6c05bb55fdee69a97dd1e9cf05ad310bbdaa4a52fea4a8621c54b930fc552f603df54bfd4b64d7036a1dcc1014e79e7072e161ce70ac0259ff0dee61a9c6d40000000879fb124d32dd2b8e35debb04b97a0f5667ffef2992118a5b5d2c4626d8bcfdca8ad33d0beb8ada9859a173b4ab178aa6feca8f96178487320b1b41f46810dc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a79988590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2128 2396 iexplore.exe 30 PID 2396 wrote to memory of 2128 2396 iexplore.exe 30 PID 2396 wrote to memory of 2128 2396 iexplore.exe 30 PID 2396 wrote to memory of 2128 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab85d53cdfb0368caf26642e5add6d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc7bd4ccbaca4b6ba5b81f1381e3a957
SHA177466b6389013dd3fa47d6b93b1256eac8a37214
SHA25664aa376822531d0bc54fcd89732e7bf9cdf9c8ad835e54a846095dae80e1ff20
SHA5129f681c0c40fbf735d779b61f1472d9170e3f1486ee36f9cc86c4175396b7d41cd2d457f351c6dd64d7db7cb4ba11b245fcf95e8727903c2be618fc3a2d7eddd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d03942dfeacd9b258f7d547d88b8f4
SHA19432edf76a8872dfa2ae40da58d1923844aca1df
SHA2566b63402aada70a63d68ead84de3a76752cebd353f936886ab77aaf64ddb59620
SHA5128cbd4a067a96ff8f7455b0e125df0f654a59af5892819a690126ed6412af9211314bff0774c075cf1cd4bcf990ad81c9a30839856dd471c94acfbec3a1b6d47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691c3133fd244315c65f25cd02b40cbd
SHA1d50963696e0a2e4699e8a3d13d36f874561f50f4
SHA2565aa2eeacc39375ca222a57941a5e33f6ad278230045aef9011b9c29ebe610e48
SHA51269a11ff6e920519303e3cd4a061bd0b1567ff083bfeeca83632151176bbcf727c28e8d908d15aafea48656ebdf9d023abe5946897296ce6874a084458b491d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b57b6c861ddb4293303146862126634
SHA10c9d46c96b4efb7c40c379e8c3966a93108ff91f
SHA256c7362f6b35756c227d05a639d31d268822fd3b31cc39e8a54d6f46d9fa6c93ad
SHA5125b89a99dfe597a995c89f481f02afe08da923bd650002dcfd7efb85742bda3258b6ca0b880dd60217d3a01b50ad4d02c2cc083a1ea1cc9b0f4972665b0ee333e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452441e5a7521fde59573e3ec972edb8
SHA17f3fae337f6d9ea207f66352cbc300577355de3f
SHA25685d2d40c438f0b24ac8ccd283cd24a8bc39bd4773045ec32fdc61b1b1914b3f1
SHA512017d8fc49069b1147b8eb52b24accd7ba8c382996d1ad186a5876f8262bf2d9f3116201a117138739d27123436a3c85d1fe49257c89570354cec8fddad79e17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55258b94910299afe1c78352eab301bd0
SHA1189b1dcce8c28eb8628800fd6306eeb48203f727
SHA25602d3cfb8ea4a842c5ab4be7ab7be276aaf5151ad3530231a5965507506e82070
SHA5125c9fe27fae1d8e9dd8053857b5612a67e86df867226a84ab5dce513affc150889277d16a1bc8bc9c575c33a31b33f2ae13851044da68fe6ab500a23bd373e5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64a9bc9c82cace71d8bca34b09ad3ed
SHA1bad17ef58e2027420aba2e651111a5cf241363d3
SHA2565224bec780d0f031cd55a60d1ecbbe2a5c2121a30bf1ea5dd540fe709afb7f96
SHA512686cd3150e0fa271ec4a5b5a6636b1e15114a7f6b73257603dcd4c9f69475e445828158d162c09d14ba37dbfb3fe90236a300e0746fbd6c291050abe4578d754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176681b74ec84dc4eb62554828020a09
SHA19512212c1afb29e7c6f0478166b102ffe55c46f7
SHA25652ac0bb7d26eee5755b3acb1b59be97eeaf20505b740b19de002b3ce0b57f607
SHA5124ff58cd9ad6a16bebe9f7e03ac8c6484fabfa772196aff73a620602986705e46f9c52d8bd1d5e3ab2bf2c64770241572651999b41b1fae8e831339e8168e4f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872387de7dc4dcd3fd59b3b7d9f5063e
SHA13928c173c02e40e761006bb3b22dee2d1cca484e
SHA256cd6d82e60787e5be4550872803afcc8170d97451bf6e67cf73d71fea8fe566f4
SHA5123b3ab5f891f384b2c7635b123ae92a3853cc1d1db04abfc6e420940c7983de8661943124355005bb9a0ff7d192d81c861a777bab0d25ca270885eb0d4043bc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9affbea0fabcf0f1168a2e9da7d071
SHA1e00a73a0a02b1fd1dd0d2dc07e69a1e71e35ef7e
SHA256607f0993cbc5c01c07ffd443a9d43f5bb6c026060caed23293a9ab97daa86335
SHA5129598f77bf9e504b4acf04225eea4d2c7b3a36e8e04e6637c7d86b6c416d80c034a64ac6b760fc2252e16b1be420b07288fd9aa4f6fcbd201356b5eeb6c4c2043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595eff1e01fae31b9eefc34dc7d2c7176
SHA1e0d20aabce898270d979cb04102eb57eaa200ad2
SHA25652e60d0d0cf3c0d9903065f28fb5a5aa29a1e95f1635eed878318f32117689d1
SHA51249099521b41c81566a5c6bd9b7e145314ab64b31f09836f1892b82f3d5bf4905e1e15ddbd4aeb258e3cf7b65107014e37ba874327227655dce702398e2278b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e6fcbe5308deaa91f5753994a995fc6
SHA10a0fefd1fac9d4a1d4f1e1629127b73f7b20f3b2
SHA2563bbcaf10fbec303ce9073c1c18d405c6cb2d3ff104a395f33406d45a127234e2
SHA512dab9d7859bbb9876aa0970e5c3c4a08b3de375481605929f98c0e83647b493dbc32e0bdccbbb6b7085c7b9a0eaf132576c72ac3842d3c2f53a315ec9b08d45cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc2a656dd5598a749be565f623a6637
SHA1417d800f88c32e6f50860ef751c454261d92165d
SHA2568e2110deb6d390acfa7d923cf5324b7c017fc9f50e7ada5f4966f8bd53b572cf
SHA5122dd15820dff7f5af69a8964b224f304f51c22c68085266091e1954233a11c5f20db982445c7d307ae4840f04bf3c9bad5f1a4fa0e2bebc74bc3dc02e7f6d8c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be3e6e3e0074bd699fbde29b6b69af6
SHA1228636fe029823d7afccf0b37031e8a1d12bc5e0
SHA2560f62fa0d17fc51cdf5ca150ab423995d811b37493d09684a9fe1539b348f86e7
SHA512f7f1477e1115b3f639c70c6fae6bce69c984fdbce06654613e8abae84d62d91cc5a0a094a74b26782c713a5ffa013d1acb3c75a1d5c8127cbf7899e0e2bf373d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1543daf52136a9be85a65e6e96826e
SHA13a0361858e2345f4cd5de1c8c6294e69f983fc27
SHA256450961c7648f93a8fed27aced2b12209500c1cba2b3eee8f5d7678b8488e4dc0
SHA512711bc4bd837330f41a0e38c4f1f2cdfe6a85d59a0007fa8e4bfac78eac5a048058ed70500f3b06826ef9315c29a486c7dbb9a5b35c06b05920b59b12c52dcdcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84e688aa7390ae94c90a4960a63f8e5
SHA1a39639ef522e9d6bf81cd9c59d6f4254ef1b97c6
SHA25655fc4d4d886d3a63350a53f58b50dc91cedf88c4cd7664e8ad52c556b5642371
SHA51258473d74c24c3abafcc488c6c8c5a45ff881e2a834dfd316f7bcf7b336d43e309574476fd8df53831165cdadd78cd32a2b12d6fd96213677e24f20bebe8f1c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4636b878e3d05d12cd1fe6436a30aec
SHA1802c055c2c083f004bea8d174ee750a209060c08
SHA256e1c4dd6ed48d79f6924502c3fc2f5a8b17cfc5721d9eb80253ed262f525ecf6f
SHA512a100f0d1b62a459757e802a159d7e186ffff9593c1a5fe2b458d34156bca826460ea0c4cdad8d8af3f2c0b91189006c34a8a4c1302b03f6df3c119df45092593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eee90a81dd544467826c4e716f095214
SHA122c288b8d0108139af0cba28fdb58a5de3a939ce
SHA256d4a31ac203f3d27da039cd245bf652e716b101226b4d9c2a7ef685b7ff199173
SHA512a99fc5d1f4003b3e74b4141286383e5a96be24f15095dda0ab1ebc03c5f35fd6fca931b5677a11263c6b33eda6e9efe195ad24046c1aefb82bf2f24737b0b08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b85dd4b28af28da823ec5c2d31d57c
SHA11dcce066c6609399b6d0a9adc0548898cdea49d2
SHA256f2c4d3dfde12c52f85e233a50d74d127801549d73dd7cba0756f985782dc57c6
SHA5125ca364c7af2549c8d16bc7ae6fd00a60f9a5c571f1596755cfaef6129fd26b4f931a581078f169737c1c5f0bc34f6ee0f75e85f0d6380cb4d6d5155feb0dca2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b