Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
eab93afb967cf9e94afb4558ab0203fd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab93afb967cf9e94afb4558ab0203fd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab93afb967cf9e94afb4558ab0203fd_JaffaCakes118.html
-
Size
78KB
-
MD5
eab93afb967cf9e94afb4558ab0203fd
-
SHA1
93a2d053a2d07111268e603b1def49da46376040
-
SHA256
97c5aa553b15f3fe5e912f6c3a13ab8ae77d3e2f7d06e167a31fc067f888c65a
-
SHA512
0783f2ad9f3f720dae68a857de25358ff4738ddbc0f2410620e34e1dea5fd325bd26f68cbddf293db1619dd2e8c83190ec8881c196069fcfb611fcc9f2de1093
-
SSDEEP
1536:SmSA0zOn+3nZAFC0zZ2wQzR+kpFbN711cX:SmSu+3qFCHTzRjFbNB1cX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3E16611-764C-11EF-B525-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50173dca590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000001a3ad586eb2a2246ed7c2ed1aeeecc258feb25735663fbfdc5986d1f9caf9217000000000e8000000002000020000000cae9855a6918534e001a8991ce4d4a101157b7a9a79d4cae58055ffdb1974851200000005c42dd69ea2a536f253705c918d891b3490f0d64c1ace0b41384474b16a8153c40000000e07f106f09806bf01c02067b77d597751c943c59a737fcfd9b4b1f855cbc690d621a977d8c5790785ce822c06e3255b8bc972c5358ececacfad9ed20b2a4ed5b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887702" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1568 2080 iexplore.exe 30 PID 2080 wrote to memory of 1568 2080 iexplore.exe 30 PID 2080 wrote to memory of 1568 2080 iexplore.exe 30 PID 2080 wrote to memory of 1568 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab93afb967cf9e94afb4558ab0203fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad39b6f5e8c54c8acf5076c05db860ed
SHA1ae59e4063b81f7263a9870c450ae5e7b4909c0e9
SHA256851b5d8057873721f2c78526a1b5ba56f8103d5cad5c7413bd783be6079d1095
SHA512270d0f102efc80ca01c6e139eb8f6a68977635989aa34573dc591f39cde2bc0e090068571715084bcd8621514de93af429e312f7b18e8777626f231bbfbe974c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577de3cfd35da1c4978015e187ad431c1
SHA18a40c49f19ce0e1616584c0917fc39cde3463f9f
SHA25613f5508df3af594b66d3786dabe3cb9e8311228c6269031c7dd389ca5fd6ed4a
SHA5128830ea4c9243ca23ad58c3277e0e1f7c771af7f1eeee704149e3363e516d37668eb9e06c9c301e8163f41d7c98f95f1bdb3439b6b9afe2ceba672686bd9ab0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068f7f9dfba671d5f96c031205c0d208
SHA18079f5edc80f2aab3a785e5edc8e924978e5728d
SHA2566501e49e25df93d8f54a494940b2a94df812731c8f5f971462a47644a7ed0cb3
SHA512cd50a8acd1c41871302f55f5127e08e75785cf1aaf28f0c37f6a0266386f7820eed2e76fccb1360dbf9d2eb5353212737bb809a1d09adc54d0e47429df76a2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f1f4464db2c0e11a45ee44478ee81d
SHA19ba9bbe0d7048307d35a03ec3bd155c744a8a4bd
SHA2564570c2cd27b16489917e176b0c531bf7c23c43ff5329e56ab02334c88756f86c
SHA5127ce54a6ad916f3713c9e4fab8c2858acecb323f9fd131d6813364dc97d40d963ae535e047774c7b85b30f72bd6a7009613a0c33eece6e6a39233eac8d31b2afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945d7ca43391ccbc0eba4c723735f29b
SHA16cabe61389a6e34b14d683be6581ae81201412e7
SHA25638b5f0bcf15c171b75a96531e437e8ed8417b859bf2fd1121209221d1dd59cc9
SHA5126751faf4d61d0bd5897e658124aa900ceb593452756738cb45108a91279a238dd84d2941ebe8f90831adcd044455f382f0958f0ee3519feb82356f22a6f60819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6b0fd5b4661e148ff9cb19e8fc3769
SHA11c82d52ff0740ced81528478ef736dc3e18df33e
SHA256282e090d694ff6121828286567fef5d53acc900a30a09ee1a9be682a78e34071
SHA512008f4d425f44dcccd9b4f5cac4b9f37631cdf7ec401044e4402126d67ba2b03c1cce17fa732e84fb740339045094ea94e25cbac352ada80b263929bacdfe3823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5014d7995a78cb3a933fa97c191eca672
SHA1fb4add2ac97c7e638aa1aa8c446b839d70908d67
SHA256886c311b1b5cd98544366b2924d725f42810ee2f1c8bc152b7376875d067985e
SHA5123bb4084eb4017214d5e9df441ed54cbaeaca79c484e3ff5e70ab13b04fffc825ce81f6bb5fd716ac964acf772646f271a974291e286cff06d68a98e2793c61ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c59d186897b739f1e2d2830ea88abaf
SHA1e968ac1f696fdb129ccb486553545611ba580c73
SHA2566d2f5a5cbc24f2979090091b57937d3ab65cf07b8f8ba3da2713dbbeda5358e1
SHA512671036abb63b0131407dd24d0f5f0b705353363c1d93807d3730a2a61ccdb14b667e3cd9e7c51ad1df78d269cf3890c39992b47c75183cc9db7bc5723d5148b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0c2ce597fa63a250bb94898bfef3c2
SHA1b7358db57d87be6194b6d8ab24b10befcde524e2
SHA256f54150f5a5b20aaf8e024620ea8f4712e24939492e5fd2c7b804ce69504f4b5d
SHA512a96772201bc2d1140f8349c72591efc9c76551a80dd23b5c4624cd6ab5bb60f57e6094fa82c5d070f981151849282ee77bf29931693c83640976baf8282ed5b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b26a86874aa77e62d4ba8f82b718d7
SHA15f80df2642559aeef7f99d173a77b7aae4e3b179
SHA25670bd0d003b6f3bd9cdd25b89006db79946de4165a91f62492417f8eed56ae431
SHA5128f4b67b29d76e75a713067a7e473779b08a0701d560fd910ec342622c5c3b06dc33daeb5b3f70bd368d9a8b8741c9acd891a7aef3a33e3ba8938d2ca9952ee47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fdf2f818d20ba16f59089bd9eece4a7
SHA1dd437e3aa99ac8c033592487ac6d65f2a5fd1a1d
SHA256999f33ba43b80879523ea4e19d8d2185cdfdc5b3df1aacba0981d4218caaf115
SHA5120c384bcf28a3b421a749b6a34a49bd9164363424c2306930fbe0e06b543b7f72885473e9573217c3af9a8b54b236d250937d495f12afd05715340453d22c76fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11da3cf2fe1e7293981aa2e64abd469
SHA1806335b7e58b67940716798948ebcbb62397d935
SHA256cc973a6814b6085f795451223e0e69fd08219051538a26948a8e04e9271e64ba
SHA5129e1e74ff137cc7a2e880e4213bf0153ed6755fc8c67354d69a5cae6bcd328b41f95153ca5f82c6774f42f6e9e0ed226cc5974b30ea607ea159f75ebd368322a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6af1285975379b7d39a4a92635ab69
SHA1a4263927f51e8eb73d0223831ab18050defd5ba2
SHA2567e7ee34113b9ac63e530f5b7b4195618b7d4d6ae920c01cd3586be2ec007439a
SHA5127b16e29aa781b89d319e1769a13435ea5ced060226ee6278c8ed1f46e8792088c35c85570c5920232118b7bdd2c3a831005772d162ba778b28b0f1c9fce8d9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add02d0827f8628fe6e041db03d54f50
SHA14fd7aa48a01ca2f17724ff02a4a1d7acfa875074
SHA256ce4573ab03cd41d149496b99d54061123299770c0ac8a106be2f4618ad503072
SHA51268f0bdd218b32505f8d25b355cfc7a613bc4ad1bc10d523ac2c2bb24a6c5d14c9a8dc180c0d341a9a402f7367436bae58021e19b1f65597ac201f09b42aba980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b15f631fb26b26cba15b881020c8565
SHA13df983ff2c2eb95cc06ea4f8fcb38fea3a0af872
SHA25650ab1e3b72304fdf5a44ebe24f0f6fb7661749ebddb11c12595f6b98b4694e96
SHA512bf82a76f7400414c477297a3cbe867092e68a3a5e049b1f60c657f3e42ef2b025e42e032f537c2acd4be396e7ab9330a2ae1cabe0b837091055f097e91445087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a9b0d7a5d720085b01dbd07ecbb20a
SHA16568667263e5768c5e043004bba2ef08978ce1ef
SHA25644cc6ec4db2d790e2f25279a691dbac98fdc1c09a8784437685827a012137625
SHA51247a893184fe6abbdb2a54cad87cbb2e4855294a63d721635f4dc52e61fe71d92afd24e6b7bd9e68c8bdadec802795c89241760f9dbef9bb4c237a874e49d2c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8b38137a0b4726414dba3b555f6adf
SHA18ba2a797ced38d3de5506fd2d14ad070f1c84243
SHA2564e31afd312840e02713c22aa7ec9764a6ab7685eaf1ac844e19760ebd70faf19
SHA512f026df42170428cd450221a8297efa0ef0ef920391ca8ea37d7d752e3b8892fcfcc80e14d2c81a90382511b4131e7a4a6a2893b9876c59445c32f07de4aa86e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563bad61758d99df1b8822a2bed6e958d
SHA175941bbed3cfa2846b59b4ee159d061e9f1a73fa
SHA2566ade452eb5e0a3cc01facb16253a2871cc42d43d0bee60e92e10e0229cf40aa6
SHA512a9c3f85cb65b267aab194d8e39614196ba6d3039b2ece73fd510fd3a68cdc76e3078022826ad60d8414f167a67b510266ca4d5b0d8da19e8f4a93c9c7b38cb0b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b