Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
eab86c7563005d49983d868497b1b3d6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab86c7563005d49983d868497b1b3d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab86c7563005d49983d868497b1b3d6_JaffaCakes118.html
-
Size
3KB
-
MD5
eab86c7563005d49983d868497b1b3d6
-
SHA1
e2feb46ef575b858687f8b9000bc53f221843419
-
SHA256
1bb8c2b179504868249faf8dcfe5415ec8af844a5a1f38f3157a6684be8ff67e
-
SHA512
e1c85a60f3b0838e2472fa7417a061049e0e261407f0eeb2516d77e4cb33b7bdb8c7da7e619b2eb3c5c9f18e0e1773ce0f489fbd76c2a9f8786ed3569b4cab5c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B70FD191-764C-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08a34a6590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002212c5fb62e93af4c2441c97f5d2cbbae1aed656b583c0b4a632c8ec453866e4000000000e8000000002000020000000659c35b2b6a5f02bd01ecfe1564575a00c2b4a87d814db5d4a5f88d81ce6d88320000000f735067a277b8b71753e6a50c96919b7a5f0f2b753d0ce42e156bdebdcb3da0340000000598e3496abd06b82ad9e344e12afe37265319fe39f3e9cc92af23f00d4814baf2b26c25e2aeabaad5eac487a1f3a144f1735024a36a81bc1edb5899cdf38871c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2132 2064 iexplore.exe 30 PID 2064 wrote to memory of 2132 2064 iexplore.exe 30 PID 2064 wrote to memory of 2132 2064 iexplore.exe 30 PID 2064 wrote to memory of 2132 2064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab86c7563005d49983d868497b1b3d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94832cad12dff47ff3fb9da99aeb187
SHA1fefba4d2d621e893962c2d7fb4fc383ca4d844d5
SHA25621b195020d614ee479f27a6b8b733ab2dc484b74d40855263bb1deaaf60f498a
SHA512b9aa5a7cb104be69e4fdb70dbe55e29e2695e3558d6b2f033c7ecf319dcc0cd912958b7e69a0b43c977e25cf059407e3f4b733c16180b6312721dbe3c08b0e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b63d26f4d324762074118cbea44795
SHA1884ec275ca816cdec164c3e9f8bbb31dd4f55489
SHA256b7793b1ccd4c7401e232d2222a9daafb9e2be97bb149ebcbe490208e05865f2b
SHA512793ca846b69ca72f77c19d50cc71c28eee0a2bfe07264de137752271add99f8167d7e081f375f907fd5925be62c7d27cb3ca9b69c450726568eab6d1b9f7286b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507546890a44c87a9dd69fa7ef99ef50
SHA1120ac253c3530d21d472dcff0b8c8518a5982093
SHA25644a3ec90acbbe9fef257c9e1aae44e3aa1ffc60bd406e625578ac933a5bc9b28
SHA512198e6ecf3304b8d824b1badf53612f71065c102bdc4fcbcb95a8b5a2d38c70327a172e64c12f33752669e9de91c0b0fce02fa3812581560ed81233ff91108003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568074639b19edd3703e453e4f01aa39e
SHA133098ad780244632f3aeca8fd9df4049c79187ea
SHA256cf42326d03ce8a5a65b1a2e5dabd721cea06fa27d23fe391ff0167582bfe17df
SHA51259bc3a218d6e057387734dcbcb88fa0f2a91d53d32bb5830941885d30686ec6b76cfd8b505376ab9aca021f03270e5bc6bf3c63c762ce9e047e97e66f93088aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12b06837a0d8764656ef7037a218db3
SHA1ee8e397e69bc62e61516a5ca3107c893c41a4aa2
SHA256d3fda1ef50f12e9db7e27b447e9098defc136a687e551abd842d188764ffe177
SHA512cb630108bfb3f0f3661624ef74fb7b1a5048911a88e05bed2b85d0bb7b4aae9d9be661d8258cc4ea0cca7b7152c0e71ef2c9630c9be233985fc69720ad25f9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582817097bcbf0c413396ad59adc7bf4b
SHA10aba1c62d72d50fbebf1aaa0698555fb5a59e961
SHA25673dad718b2a3802c77a98b3025f5a0f19ed2b0e406deb53b81847b1f8fafa106
SHA512eddf37394ece48320b25a581574a9a9dd28d41229b1b341490b5071eff23bee44a652ca224696c6d963905996ba3a5f6a9aeb226c1ecbcc503c8d5a34c9e5fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548ff19b5d19aecbbb598c85cb2b00ab
SHA17474a54c496e235d98d89fdf4aed78b93d994a7c
SHA256e37cb74276cd143da374710979e7c5e55f7cfeb1b080d7e58432e6677c9732d6
SHA512c39f2273a4dd2406c7c2ed5b0193e2b03919fb6d6f7d367c33c403c6e7bf6b8abfe4425eb00ef90e4f2834961d02c86f6ca3f7d1bdbe1e3dbb66fe117518c896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2c18ffbe6d578148dcb8edc78646a8
SHA1de18af280c219e5b5616f980646acbfcb44e4940
SHA256eab26ef5eedafaf694fd418d81b00dbcba723a13f3d8daab8acbca901bfb7aaf
SHA512c69bbfdb0de6fb0868d27381530d1ec65ab0fca71729c08ee55aabf0c59b873bdb9216fb1b4674fe58410667b90d0565f2103eb0c2059b0d82c1c60c87e3abdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d49b23bd47520d129597fb6606f7c8c
SHA18fd47db73bd81eaa4ed8cf5360d67f1a5d69695f
SHA256bc4e161c143c46e53e215a1757fe8cb197b8d943fa01e2020d9b784865dbb186
SHA512109ec9b5d53570840fd491c2c4b743fc39d6e251f48185ad5aa695b6f2470797b8625a099e17f4d767a20d3ce3908295419987383bcf25d69f40ce3b35d95b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca870d079e3ac743b8659f2c495c891
SHA189f78f548bbccc63bdde54b52709cf7fce8aa2db
SHA256f66d58d100da609927012e4c8fa6d77afffccd86c4b791f1340169f13d7efaeb
SHA51249adcf0ffb86302969a499b5436a1a6af6e6bafa86db84340e467610c9d5fff322f127e81be53442c011e817b16e5c0d229e51ec33d39ad614db4f3e38495e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508f4b6ec998e97d9091fc40071ff3f5
SHA10c892816a1e3d3daed74689251e1e6b5b47e3ecf
SHA25643b8bb86cdff169f2b5a37f730ce6011e308b5377ce988f522055409d3757e5e
SHA5124a64a83c32530969a116f9d6f6245f6be33978d7c91f236422179a4a11210c46e5c8fe99160ab5bd33276aea76e191d37619d4383d8d2040f237e4073bae0783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f0469ad681eb07aa3b5cc76d961b41
SHA1780ff7b8486431aa3c29a420a2a109fcd414d44f
SHA25656d11b5d74e91786b934e2dffd303fade25fe63a39f27f94cd0ed4c4573df98d
SHA5128dd8a4a6448b3a6b69580bb4950fcc5179f5e9b1b68f085ae59f4e334711d55a711678bd2ec8b1718c16a931fd806090bffd17d99ba7862e6b1fa1919e25878f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690d27f4d1a5d772723ae3efd77c64d3
SHA17e8f629882131c163e4d80059db1eba724b1eb94
SHA2561a81d9533a421f72b491db289519b4e7c0426f1ffcbab732daaa960ef4c59f39
SHA512e7da24e70cc06e6edfb4791315f2af118a4c8e230e83ddafb1a090a84e5177325a57b17a41d769fd5f48b38ea231bc274cc0539345ba99e9299575fad6ed85d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513acc2036850df4b6e6c593997ba0c25
SHA1f95525f6906933418b9fbe8b90531ef8abef8292
SHA256820fd01d5f9bdddd57d38e69ec8c5c5d5aca402de5827fe127f9976597de225e
SHA51242ea77a8bff957fc86d9034c001e1ffe0c00132fc63c102c570b20807c59bb0d8ecd0a417458bb13f08e8d5e2c1f3511d35c4c0bb8110c8a4982fb14ae626752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6df37f9913aa4b998adfdb0254b1d72
SHA1587551b1dba6682e9c38b8e0f5ba37c3eaa3727d
SHA2561d083a14067578b57ae2c664c340194f90d467a5138a53330ff85e3667f2ece4
SHA51299401d05cda5dcf87947df533b0206b548a13e4e2c89cc78f6ffdcbdc5a247a104b20123251e342563b3bcabb0ce1988667e5f4c32f1ca55916ede0ddfb284f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559af80f3a309344d153adf3c4b7a97b3
SHA1169bc4a5a03d2e6f0453c868743181a5fb65bb28
SHA2564ace159359b9ccde671f2304b621dd207e51c6738a0001f2e676a065226075e6
SHA512ca88557709574227257ee34aff9f8777d4eb0306361221d441c0ce244ff5ddb20d4430dec28e1d3c110e2a635fde3eaf517d84a662626c2cb5726319636fc1d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565318ae44a5163c0702de29cfd70734e
SHA1671acf01167f47b2570b83281a5999ee5de7281a
SHA25606aed6220c261b1c4ca9cba9fd4f4b9cad2ab61978f210f67a547dae73eeacdd
SHA512c1115e5faa423461f505ea632ebf4af25037bc1d4017219cd85eab4062282aef3776e4188c1a76ed763a78d94a12826da20edd5ab72bbaeea6dec5c33ed639c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c09b0d98a0713241f97ef9e1b6f989c
SHA1e956c6156ed447794e1d451092407b6c8c05a74a
SHA256601090681f5814098686b4cfcec49f9f640a111709fa98e35f784303bfe7f3c3
SHA5124a6172eb13b8af6238e2f49d1fd81007b7c66fa04bcbb65bedb9adc9e1d5d520d7a9e1726b2340d6fd728a580f8ea3420ab150bfdb08f7d3d191fad4fe260eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2624a46fe88f88b634445fbdedad74e
SHA1294b446884573b7209e1dd0080e8db08671ca61b
SHA25696aefddcb32945d5e076c7c94851cd659e6918194929c34be6c804845f01831c
SHA51206e6d9ab34f0ba941e38de743b24fc5bb5c3015da6187bdcbc587924ffe357f06bb58cb9d62c3107eaba23732dfde07e449ae552b148cd01ec9fb1909146361a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b