Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
eab8adbc68ff1a52c684ce57343ec502_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab8adbc68ff1a52c684ce57343ec502_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab8adbc68ff1a52c684ce57343ec502_JaffaCakes118.html
-
Size
681KB
-
MD5
eab8adbc68ff1a52c684ce57343ec502
-
SHA1
64430ada01afb17d2db0a6b519d20a077db55355
-
SHA256
b5da5bd027e939896e499b5cb9db1fd139f392c283c71aec9a3e67b1dd06f18a
-
SHA512
53ddcaa4d688312924b3086627587f650c635f19a1ee545ca635e82684f9a5b3cdd3eb8351af4997bff405064be3bc419bba9898b1860fda9e17ad682a345d12
-
SSDEEP
12288:HI0uk6VPuBk/wqagbCf77gczOAsnhbUoRQi:HINk6VPIk/wqagbaIUoRQi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407840a3590adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC874D51-764C-11EF-81B8-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000faee37fe99df493aac2681a8a5b0429b374f28656d70d1ea9e20e34d5bbc156f000000000e8000000002000020000000c0df0b232755e50275c7cda2504dcb023897fc28829af710f97ba66551732f57200000005839257d72c7c377852d5b6217554e234fe89a246b327641df13b738a5c0fef140000000fa44c3df7ffedf5e46a67ca58342669a0513641c429dd686823c427a326d5cc47a19a2fbaf866c043377ec528710fe12552b1be0f4d0522794e1646712ea4e6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887636" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 1244 IEXPLORE.EXE 1244 IEXPLORE.EXE 1244 IEXPLORE.EXE 1244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 1244 2696 iexplore.exe 30 PID 2696 wrote to memory of 1244 2696 iexplore.exe 30 PID 2696 wrote to memory of 1244 2696 iexplore.exe 30 PID 2696 wrote to memory of 1244 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab8adbc68ff1a52c684ce57343ec502_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5423b66f01b7507f51687ab6b1fbe8d
SHA1f53e062c5fabb46747f78682b013b2683b5d2490
SHA2563c9e707b79ca43d51179e022a10ff0bd8a64cf1313b41d3a58ca26b8896ad22b
SHA512c0f44cb1acf9b67414498cf7125c1e4fbc8a0a9b2ed7e11cbf443a2ab6dc491c2d1d9e2f36fee22b3b9082a15bc10f269be8b43e1c7f0eecbdadf37140f9e70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56829a5276a75b87a275d3b3ff5c55024
SHA1e3697050c03bd03ee5c40eea263646cfcc0523f7
SHA2564ff863bbfa054f3f037335d38d9c2f032f41ccb0074f03950b7df7cf7218d808
SHA5125e10f6869229b323a85f746375123c14c3b132fbc37394ca6acfda850c48543534be4d129f90a922644ba7cb9f4ff2643799c85cd4e46e96d42b0932fcf34b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9879744b1527f791d35f6c17656af0
SHA150369a6ff1495d110a8da823e32fafc6c87585eb
SHA2565ed4a67f3cf98241108be252f2459fc13ad3121ae4c9ea2fb794a2b00cd97877
SHA51264e0d9f03ed78a259ac875dcbe927ba21de212c21e04a8de847a893652f418ad25d83cb48b57b91dbc039d48f4b2e19b3b035d71284363424e000dcfb194fc79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c295bdaec108bef0bc6cd045acdf692
SHA1da4235b8fe3f4c4f76d2fff56225126a0dc37112
SHA2561d57fc02f1cd087d095887b37e9322a050299ecc50b8171e15dca9f4fd22d7dc
SHA512c1afaaf0d9b757e368864f51b8ab7a2cfcab9ce106a66569bb56384ec24e0b5f45841c94e7f90f23eb3d02ec624b033a5e9c8ee271990e93d7a8ec872a9474e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51722a82d2337fd2e0ce27e0f14500c42
SHA1fc7afce18af88c0b6c31c1c578e2ab02c185ac72
SHA256e6ebbe0776b2ece671247169e752dba56a858cbf1bb2920f114a87ef72205f70
SHA5128c7d3d918d574c8f151c0ce18913e57349d7793c1067bfeb6cbfac8bfd7d9ad7596ea962df6da027d841fa6a94dfd0e4cca1dec9299646c43e4070c2f00e230b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d83ff9d4c640bf5d4955e3a9ebfd2f
SHA1283a5778793c54eb62360c39f1597a5b5a3c5092
SHA256233729c6c371f065940f76caba7e5117f5dd99fb59ce0202f197d968d2c6fac7
SHA512f11d6adfff7ccf8cd2237fe0b2f4e578bbf3677671ef5d3b29b5a5e67fd2a67c5d5990954639e80e0ecbbbf8c43f83202fc00c2c80e46368c86f43049f3dad40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd536cfe33fe25b7a97b5c1596246c8b
SHA1d75c2158e7959ea94da2b34ff415be16a0838c05
SHA256cc5f610775e755a03350abed21c46dfc261449fc97c334de8326bd6653085b0f
SHA512fc746a390748f9b70fac05b4a34d3fd300689fd1ee6c419a450a682e881228680c4c49caa1859967fb24ba940feb0b8bec1bf096d40e6afbbfb3d56d2afc4dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516fdf903d8bfc6844886ee64b3140606
SHA1e2138bae91fd382d1c7b4364a1b70dab6b472286
SHA256204b41fc8a7e2bf8fcfaa2d3c115d36066c46af182ae77696e8b413e11b6aac8
SHA512736e2db3bcc0f70c33a18eaf759a7ace753e7435f96ffc271d59644a4ade750584648028f536c54ae3c997742de796223d27c230112ae18e9043dcc9b8c8f5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ee32d19d146011d531148c85a45aec
SHA1eeeb1d3fd01b878fec05428fa9adee25d34a4fdc
SHA2567bc4e4c4c1745f02faf46511f417bc260e62286e540b2019b96b114e06bcfd24
SHA51279542d2ecb642a3cf25a84c161173003497948cfa098e0a89a4bff5ca09de0a65b4be786d600baaa401ec9a21f927271ad959eb024c164104796ebdc819cf3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14299d4e6f3ae6228bfdb103c236ded
SHA1bff664f1ee4829dc29f2d792afb20187fd41916f
SHA256d3c63be5147ea1d76c1837e87525e4169149c40ba1bff402de5dfd5efff1d272
SHA5120a99e096925ac935e9daefe2d1147d833266cfdc5c9f1577e6485110eeb5477a6f6f297d5a2a4e887402b19565b749a09d4926b0a7103e4eaa6d5e736676e0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bb0bab817eb77cdb0f5e08b73b429f
SHA121c136185ea4a8167920d64dfd18ff2e4a01d39b
SHA256ce9f9a1b76955e0f4ded8f4aec8286a35602c5dc2c0672c0605baed771855bba
SHA5127db543dc58eaff1d4034b6077bbb5398df0bdc6427a95162f3292a9e68da14b12a34c8454aaf7e7f0ca805c8fb16abbc9278e8738bbbeb58fe9395bef42c2248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54258f0aa9f40c13840653adf53395f
SHA192cbd7a75c3a0739460663d51e0c5a5b49e09593
SHA2564db2b0def85608a17912031beed8489f5e26e853a434cd6e35c18cb13b7ec53f
SHA51220d4eabd48867b24eb5827a880ae486856e876dcba305e16f6006f30e34af063b27455564f36b73eb89ef4f813046548ebf7f6b366012893448b219ba830983e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d13612479d71ec320005c008b7ae19
SHA1bb1c4348ce2675db8c1b1610e012ac0cd26d2d2f
SHA256fce1b036faff29f058d87b9174e6c706f67ce56d248301d807536830a65a1dec
SHA51225b320bd98566b9ba931a9f7eb960e51181f2120d3daaae668ccb75e838c2478ff81e9c3d7a3fc300cbb2d1357dfedb51c9478a8856ad738dde12330059b9cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec4053175acbbb3f4f4e9c6809f47a5
SHA12f8eb5dbb0da48a3c488290f6bc0c8dd93137942
SHA2565a21872a237ffab7cff2e878fedf8405cc5f8dfbbac46d2e2f9b0d694cd17885
SHA5127a27056e7e34580248389c5e5ad99dadd780ee77569531c3316e98baa14bdd563774690ddffb889a537b3346d800a4da37c2c03c6efac4686d10f70625908d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c5d4f3bec793303c5e717b3c61b8ed
SHA1b463040c575deeeb92d419752896462613ea6c9f
SHA256385d055ff75d6c0c5dcf654a5f652c8b9e1edde6c661162dc67cf32e3a9063c6
SHA5124cbf092fa51d0fd32163f1231ea315b6e30cc66bb320a8a94ababfb03621b87bb48ccdc9135207751a669d9d855a00227591f9b9fad507d0b3a407f511ad6fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c4b397d17a02f812554c63d952a9f5
SHA16c84139a044caffa6be86fdfc6a6049b6d211b62
SHA256557de9d5d5995562ea3ad71e19091322e53a9fd29e026848e2ccd78b7b8d1f40
SHA51277e1cef4edb2229d430da99b6d404162cd0d0f9f15654dcfcfbc51cf6c2ddc95bfdf0a5b96668f27aa5efcadee470c7fc8ea494d9dea7cfd35a974c68175b808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52739da723499431e99097a774c2ad4a7
SHA1bd1c530069fadc56460f1de55ec6f5da3e0ef7e7
SHA2560a3be532979c1a04c8e6dc6d5e0d085bf624f15b7913a33d1807305067f2e5e1
SHA5126734ebf05ec858d3a50cb5a44406c43ca7db5a5ec2d3f8390ea070dce9ba4742629879695b70e7fa0cbc8b8dea8514c6a06eba0f2f6031d0e6e546c9002f3f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7579371d54f7d6889d379b80bd2c5e4
SHA14cac66d34b7943313e6645c71e8cc923aed36903
SHA256325cee4d4b09396d622349412abdcf151b95ba4e29dfc1fd26df93b357e50ef9
SHA512bd4779f7af728edf34e3e89ec6346023137f824d8abdbc80438098aa8206498155feb467be22b45ec725fe51e1f4c16a854c80ecaec8a3ec7189d0c93dd75555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4a1000d4fd6450f408591418f166fd
SHA189c634f3ae642404ac4a8c8758ae04ad32150ee4
SHA256a81d266e31be637703f430d19a5d1dd5e05718861b1208b2d3ad499ed88d2180
SHA512e68672509c2d2d0782836cc3a054acc3452ca60393576eda5ee407ef7e986fe88b03769f77b0635dc6116a47971751bbebc48b6fc1cfa28d3aeef243f461e8c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b