Analysis
-
max time kernel
138s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
eab98fafad22d4149a5060647206225e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab98fafad22d4149a5060647206225e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab98fafad22d4149a5060647206225e_JaffaCakes118.html
-
Size
214KB
-
MD5
eab98fafad22d4149a5060647206225e
-
SHA1
7698ca19e8ef4ddbd2ecbd8b8c0de5cde16e6ea0
-
SHA256
76efbb26fa1223bb218b5f3c11ab1c7d74be0ac23b501386d0b0d86bc6635428
-
SHA512
e0a295b0b1ca89ca2d94b6ef981a9ee1da6616b4b21d4087a5a5d5131256dbe45cfcef8ec941e0ed0639c623223f0a1c01c9a4e8634c713334f85c6464535ec9
-
SSDEEP
3072:lrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ6:5z9VxLY7iAVLTBQJl6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a32a365a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c930972b75478159c2757369c4127067726f56288188c1bb2d10e144803fe4c3000000000e800000000200002000000095a89c4d79f9ee89f79e7a166a041f0098aa1f26e36f00392595574fbe723a1420000000db8cbe6fdaa8e4f2fe1665aeb6a579b2e1bd568c7f0e84d870569076949906df400000008d60a4aede61dcae02bb4d106fcce2618bc05976d847e311dbb8ac9323dbfc39cf02fd0c693e6e3c2f773147c875e6d9a6ae129183aaeb69f61374616b2165a7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{213900F1-764D-11EF-9A35-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887779" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2372 2096 iexplore.exe 30 PID 2096 wrote to memory of 2372 2096 iexplore.exe 30 PID 2096 wrote to memory of 2372 2096 iexplore.exe 30 PID 2096 wrote to memory of 2372 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab98fafad22d4149a5060647206225e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebe9906e6817d9ba204415b0900b1dd
SHA1b667cf6cdf4b4f8abfd730ab85ea581f7d622817
SHA25602d0e0c5d3424fcb187a321749ae9d800c2ac5860100f8d92fb29eb08cd7e426
SHA512eeac9f44bc0b8eb7f70f91f0f03c5dc802a60e74438569ea6e5e8a43a9684a881fb6e443cb28b49d8371cc3f92d614b40b2fbe142698df48c7585602c587fca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536865ee8f1be27e375083cfb9951fcc
SHA15e6febc6879c91937897985f6c48f624bbb94f7c
SHA25676d96bec417792ba5720e4151101b5c5dc7836f52791dd5cc89d2a171bc71a9b
SHA5128d31d8cf82d2330a7cc79cfd33dc569a159af7072c9ca322c4fcec35d50ff00a60cf5a0011b09631cff8d5e022cacf3ecf05a24328c6db6f0d7c3407533170cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6418487134b6f7586f5a892e76b653
SHA1ce2ef7cbf89f2d82b6309c225b86d07ce8110644
SHA2568c8da8a6a14aaef03ef10b8321561a667e92d1fd5b0dd4d5b2720644a549ad0b
SHA5128c8f8569f2785210c3981fc3b714f2dff019e80a7c76f3c042ed217eb4f9d3534ee4aa2feb55da9a1f6228dca406152420f84ab5ece26241df415524c1186aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7f895072dd9fe3bfacd61d15d36b41
SHA1c7f4bddeab954db0bca577e598e0e195c0d3db26
SHA256195e9cb59bb027730be2a93822747e2545573a3fe0b21069b1b1b1faae7e0c80
SHA51295c14687cf9677babd42742f6aada11d1ae5bb38528eff872e9a4cdd792ee8a8be99200d080d3e9e629cf4ee23a7995a543a473b180a7f3280a705c8f227944f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022f9caf3b0485ee7133bc6df51dba8c
SHA10c76782ee727f2577707bc289fb7933c965e69f8
SHA256589bbf3500342f73d42951a4b09bb94496485b83bcc6daf6f2fff464d565751e
SHA512eacb50e70a3d526c82042dc027613f9c68a10b58df3cfe79081ec96e2f73bc9bd6f670cb543bccaaa0720db6759ec7f26f98d8d5ba2332053a8ee6551f61c9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7839829f5d04a8fcb269e93f8803bd6
SHA18f22b781a66a933905c3fef6e180a3bb3667cddb
SHA25607b5fbdf72574c814eb0d6c347365cfe873f22e3b808dd6f647954e91576d554
SHA51295490d9d3354abe63a470c2bf0991e3414ecb183aa08bb0f2e555541d82b635a8a8e12c38c2f7e02e6d19071fa1b518f4a22e5868212d98579b72b77a97c98c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bae05011c341e19af84300b1a020b8
SHA190901992c632376704d2a1a698ecf52b14b44fa6
SHA256284ecaecdf8f7f29177dd771a1f6fa098a8a7fc12ddf1fd1a9a791b05cb169c5
SHA512ca9144abbe267988754def9af97436ba96daafb928bdd5a25560e43f406b0de8014a9b390f6f08a0b17f67cc57d5298b1209165ef8797e0a2d4987f846d996c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5233fae977da0a7cc54df774babd5a6
SHA17473e6fb433e4aab237564d93a02b68122e3527d
SHA2562815431b14ce7627db1cbb3e9d0cf6929ea71319c48b2597e0198082f9605b76
SHA51234fb1c91fc8f2300299fea1b3308f0445001d9d63ec4e2ed105c96e323c278475a91e22ae4cd612456961981a2b44160ac0929360125ddbed142a132685e52d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712820c2b3c73a1c7054f9a015b1f757
SHA1bafa600cd009b8635c35da6699baa6d9046ed2e5
SHA25642b2c0fc0d5516bd0bd9e83e18d9c8394ea67d5e5494a9ebc772a30c6610202c
SHA5128a2be20a649696352dddd7e345f769fea84d8f98d78406dd9f37b8f07ca57af17de7273d6d15f67c5a6be78072e0be306115fb8b6d9eda14d70014c933e3b1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91448f33fe24c4d7a2f169d87abb315
SHA13914fa02f4cfb1c70078478565ddb9b7dbcf08ca
SHA256a4e34652bdb4c589ddb24d3d7dc2007b7714b0e7e31866e880fe62e136ccf7d5
SHA512d15d2f9fc57d9cb193a97e2fd932e4761fba075d94699194d8224346f845e7e1cf0fa06a90c02141fff5c9fb59d507c86a49a1c41f694a0aa55651f620be9f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e06e11f3abcbaa89124cef27f1b65d7
SHA19488aa32cf927d105161a47e57946a28a720bec9
SHA256c0d7c086a2b846c68191e7827f566100bee0b0b332fd2c2365487df0d4dec695
SHA5121093d3f12602f2036deefe302ca858091179148e203dabe8891200544db95685629ed0eb6c67fdf7c99218a6061c7692a854a9a9640353740b3d37042421dfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b068a499d6756fe399c90029d82413aa
SHA1969e707ce76c34ae80799e913c2b4e1b75ec0adf
SHA256f5684e2873927ada1260170705dc54cda036cf2a23e31533e9363043e79e39fa
SHA512a129566c383442269776f67d19ab16ae4f840e3951177b858ba54ee9566db25853549113ecfd8f60a8c8dbb9647ed40a9e1268b010d930af5451a52de1331837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51751b823ede8026bfb66d58fcdce8888
SHA1937172f2271f7ace764e5e2f9936d26bed0a9ee7
SHA256220fec7f2a4249a5ffe70a1dbbfe206f23025a3982296ef97b7923d03b050dc8
SHA5129cbca032a24105c5e45f23278a9943a2d8593e7237b4587e112db77f1b2904fbb6bbd0ab7d87009206e725dc30504fca9355c70096b15cfebe8854c8609a017d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ed2c8fe18c09fb43a02cff49aec43a
SHA1d598c2fe02cfd9c740b2a5afb827c0d5e509f1ae
SHA2563dc72f06aaa5ca5f83c9e7be9146fb9b1d513b4ef616c6d2ba2582f668f77ed0
SHA5126d5c2323a1d9b5de09bbc85d3403bd7925d100eb8c312b64a287011652a275b0b45f44d7510283f427350346f53626d2231be80665477d2bbb8dca9af28d9c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14d1f2aa14414e0804cf94fab93cfd2
SHA1b717fbdd50ddf9ca09c99c08751f389fd31fb577
SHA25637f861bf3e8cabeda7cba79aa41bdc67f31a403fba201bcf5ebb84ebd41508b0
SHA51283d1de10d9aa0a16d845a952aa653b9960e970df703473e75c24788a77c371d3489ba228cdeadb349e0a6b0a358b03ba3aefcef6e36d4d249bf8073c18f1485c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfeb766015e89ef44af282dfff765175
SHA133614088ae1a39d38e27e5b6a7f54078443f507c
SHA256ba0cf4845104e30035d59a2675667460b2c9e52c3a7f495b0f7a925e3bec7309
SHA512df14fe854401f4b2d117bdb2f604493342896f53f5238b51e454dfc1929e883d3a4df84082edada3290449d1bed96f2f4df3c2ea9645562ab2031b554d1e73d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89f5eb2b39ffdfc2cc6d62a214dd63b
SHA197d7484ee15f9f77fb7515bf01e2a57a404552e2
SHA25671e608596726a937589fcd18477dce7504e9cfc4a8185f3749da1f9f53fee388
SHA512182bf27326e6cb955532873cda0c58a318581aa916e2af95283176c3753497324e91477c2cdf998eb21c31dffcdac762e55f79dabe044cfe8d3e6c300eac22c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa473a394ff8bd35d0d2db5fb4e059da
SHA17bec54fd6185b9e6fbded4a67b9494efb3b9727d
SHA256949b489e7523d4ae2709b6fbffab987b37923251c6e7bcdee6a6418048704f80
SHA5127e2390bc6cd713b113c866ec0395dedfeda43224b6359bd3069fc74890788a9628b5055d844231daf1e68fdb0fc9a64438e0cd9084c35ceb335fce329ed9e0c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b