Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
eab94e1a5d1b8d695fff6f22905d132a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab94e1a5d1b8d695fff6f22905d132a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab94e1a5d1b8d695fff6f22905d132a_JaffaCakes118.html
-
Size
4KB
-
MD5
eab94e1a5d1b8d695fff6f22905d132a
-
SHA1
f027f2ea25b7dfee8380db0da968580ea3c5e86d
-
SHA256
e8bdadd6597d95e0b32935934a69313370c9b41d8d158a380562aec7632783eb
-
SHA512
fe8f0887372b17fe4a43855da57c00b1d6f6033526c2bced2399d54c2d3fda9010cb5e629dd4aeb0a908d51c8aadf63a4c1d42b28cb6147a091d2170bcab6fe1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ohwDjd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007a43588e1e4432d0ffbbbf0b2c240c28024ea30187788ffc5167047763c3727d000000000e8000000002000020000000ced08a15babdb67489d9e2f2a1539acf8ec437664220cb8753874070228849b2200000006b8733987294d933fa4d3b322eeb86c08c4bb6ce6695c3da14d56d2966fc05d3400000004c087b32b4988f0b003c76f0e397a9ed6a8ddfb3e14f99b56807d5bdfbf43cfa8c9574934e3e772217b4425cde39d5403bd7ce378764528cecbb886e8150d59c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887739" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004ddadd590adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09530DA1-764D-11EF-928D-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2108 2472 iexplore.exe 30 PID 2472 wrote to memory of 2108 2472 iexplore.exe 30 PID 2472 wrote to memory of 2108 2472 iexplore.exe 30 PID 2472 wrote to memory of 2108 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab94e1a5d1b8d695fff6f22905d132a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b290e2bdb933ac3185133f8356957d53
SHA15641d6787c0e96f86322552edcaff7d1393c8785
SHA2560184ec9bcfd2453a98daf48dbf5d5c9b094ab1ae22ecd159f5a4cb6e2e96c4c2
SHA512ae214456009c95c170b20bd7a9daf9cbc01b275a108415698cf1e482c6e337c7b8f091e3317b48aaa66d25b3744bb4b47e6008a007ced63c323a4cba7611cad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d6f546234577ab09e5e3ab97f84826
SHA1e09c5b387aca46f9cd00ee5cc69abd80a77a5cb0
SHA256c33b874df9cea8f26073460ee12ea33b0ba4362c71c8da89f80f84d92673bfa1
SHA5123a1272df61c3ddbeea9062324acb114e28a3d71b808edcd33c8fd67dd8a505b49e6257a007bce4b4957bbe9cd556591039971a76292d8e2b692afced09a4e567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eacce2a66bb86ea384fc2aa18f2541a8
SHA1e96f7652324f76c183aac4b27149c7720ed5e0a1
SHA2564686ab01e8ab4f64c8818243c6d564fe135c121dc292e3e46476debebb15a6ce
SHA512bad5f88e4468a0cf97c9acaf16549ab7f5fa1d9c850bbc8d0175883b381c5c1925807c1334d9ad2462899a85e894f0fb4b4ca8546784f57d3c2cd8e3a0c65132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d64d364f670799aa96fabc676ab6a78
SHA1af1035c242c724a085ddcf1dd68b6752090b6e5c
SHA25645a27a7e93545cb1fd25674d77db049675ed2d8505a95b29702116141c63c59d
SHA5124285c14c7356015dc327025161c02b60ccbf608c830b4df4e18cc5a148479316cb113a9f93ff1d0a105e69e517d3c398f633beff65f8357f6ae65e2da1d0dd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ebce3f008b61f7b6661c6ab346ff511
SHA1e8eb1eb9d61cc9f40b9d256d6edd087d398cef56
SHA256ca2d322383536e12900dacef85f89f72e8c07633eb933697707518a7eb001a97
SHA5126d363a5b0e2fe41168b88b027c27b5664d735a783d6c04b7b04846368d2d0e4d6ddd933d3a8fae0af985956564b13d5f3058534b5209220859fd361facda14ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7de5efaeafcf596cc8851123530caac
SHA1492151b856df98fb47c79aa347bf4764d9bb4d29
SHA2561154c6374fedac798692070c5c8a5cdb949b4245721b84fe7f95d09c650e6d3c
SHA5129b9d15751a54f73ab37660f7d4b8a1a7c0e7e3a1e400f74dd40c0cf9e84ff1b68bfd25259fc6161aa080c8fc64aafc70d441f04db7f0c0d929993985ae48810b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a357eb1e44f9f53aa19c6881fe4d7a2f
SHA14ec796f1ef159bab538142002d8a976efe76996c
SHA256d1ccdffe125d0fef465d5210f9e843f907ffa25177bcf41404059d8c2d3ff6ac
SHA512b18b42efcd8eabb288ca0ec2ae97e306766673bfd97bac6809a791666c820e163371e5447432955fc4414f37a8f204bfcd88dde2bfe57bf83f2382c73140d374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577978abf3667a3485ec9c6211af08a71
SHA18d9baec3096166d8189e7bfcd799701aaf860540
SHA25610fb527e7ace66e26709b8fbb20538b053810bbe7e340046f4aeb2359f5e9264
SHA5125227979392e768df48d65015aefb00f335436fd23ee7eed1b1ad9569dad551e8bcb05b74d99880c2a38455a3d1612436a4dd710b7e0cf0f7383d7911a00f7a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1065f62a60a79028febcba587e942f
SHA106239726a4536a4fb813b161d173a8afb91a548d
SHA256b2ea680ce75ab1ade258630a9e0ba5ec6dbcf494177011ab5b7b42a9db8b90db
SHA5123551eb6504382bdf60e2d5c63a8e2e9450c17f34c14d531e533dc79f5b34dfcfdc7747352ee5a1eb93852846cff6a3e9c24b864216ad345728ff1c7798b31bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478883ee1388862b740d35349af7c53c
SHA149dd0ff6ab53221d65db600d6f037398554f11c0
SHA25617fd411db6fd1c3204f4b7ff19c5ebf2fd0a49b86d6757e392cc4778ac66f30e
SHA5129bb93d164ca6d04bf7db74a8de7cee17692acb5b804be030c3e32739e037e7dcaad16b86187101e1d6aeaf8a62672a789f93e121487594a53008d32538d54354
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626ff2bfe09d3152d8d226fcc03f15ec
SHA144e0bda060262064b9c93f50389108020aa28161
SHA2566fe64cd65a8575edb2b52f10b65ce63ae54967831e1d297d3ed8f6aed29a4767
SHA51242a4d90d9fb9eb536a48325c87b2b6f89526be28527fc7a6564084ce04b459d276e9b85f638fb16d9a40ea1dd097f949fe477eb00a942d7c5a2a00f2e4697c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bf1e1efbb5f2375630a46e73928261
SHA1daaa83bd023c7311f85478ebe504a8e3573fc623
SHA2569d74b19dcfa623f66299ebca0aae361d3c1601adff8f56d5b4bbd40758ab1624
SHA5124a123ac1c3ce5049b808ab82fa61d9bc50ecf58ae6c617de2208dce836d3ad87637241fb7e33ff3b73902bbfd40562bb0a0e1e919e7ec888d47c157755024479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cf094f1949de1b3f8db624a4499818
SHA142340c592e5c46e1c5a9ad0db64c39d985f7d8dd
SHA2566dc5726186f54ab11e8603a0495d01c697327a7f414d936a47c208aea430ff3d
SHA512597593b2ea10ee4a24e44653fed05ff09070854b857d67790d02ce77ba02c56f20ea60059a049be6400e8bb891231199c1647ce58622058b36b8b1010eee0522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5800a44987a0b909e0b5080331ed2ec91
SHA180ec390d67c46d995837a916a24bb0a670f7ec9f
SHA256af28d89875a696f836f0f3bf80dd04fb2f9c64bf2e8b6fcb8d7e49b6d0342435
SHA512a0c540a3e32dfbeed1a9af36f6dba9f18f08c286fae7e57a46891846e780f203691c987cca16a69ac17c163ad9b7c9b78c58d6172168391acd3d00313db917d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a624af7186bbca29c23d5e8ab34a91c
SHA1c8b9ffe794b553722a78fddc97cd028bc403aec4
SHA2566ae38f9d769d992bdf8623a4504a39c2768786059c4ef08069da7e79be023e9a
SHA51288cf4d545d059bd5dff1341f3db6bf9d5e674adfb5475993c88473e21b93fae210313c908775ef638bc618a7ce9423fcdd01dc57e2ae641da07b57bfd20437be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99f75a1d566161800454535c2134815
SHA1f1b9bca20acdab1b618cdffa02ee0313bef0c279
SHA256a3ecdd50ffa5b98317906996d70ae848bbb0ebed98c4c52e5b7eb455da4cb1a3
SHA512cfa6233254ac3bd1e4406ac533bd9ebdf4e338232bc471c7eae5d748d17aa86a1c1b565546c4dba038ae8710548ac994faeeb1d8cf28dbb622ad08e5eb639f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b53d16ac11f1dba25cb9f84eb1f1d4
SHA1d123374a5d86b14574840179ebe700bf7f0a6197
SHA256df2075d3d7b453a7c205c0875174bdb80ea174e66785b01199be9f3e5ec9f2a3
SHA512e9a5d4aca266a1edc34a4972fea895da38178ae8442a99ef52952045c676efbaa6fe99195f77e4d677660d6152e2adbce8b5d170c8808e92222c3c95f1ed7639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ae6ea64eaa557678023a11e291191e
SHA15787d343df3b758cfdd719f4541d6dcd72539ad8
SHA256753b918390e528761e20f9ba9988f4aa58febe0f4a216eb94f8153305048454e
SHA5126d92c595ed86fa69d5bab19bdba92e3907e75a4783fefe8beb8f6667b8741f9043ec04ad579141d4cf7a7af9d1721e6cbaf47a530692cb4dd57164ec7a66cbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c02fb985e4c30d893a104d685187be
SHA14a2eee767a9f86928a35f05d84cbc4cffafab1a4
SHA256ef76206a756e4fe1276a344d1d9a9817fdcb46e3852d07e6cc762b2ea4a0e83a
SHA51282b7e65e7a61bae0a01826254017d5f0523ebf19daf9f972dbcf70490b44b295dc14349924c06dbc4d3b263d17f00776e1e47d28c7760264ec1052c2fa924905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f00037495ea70a9ac2371e6949a436
SHA12327afb03e59046ca704e0b5b503e95f1750ae44
SHA256aa5a60935640e3aaffdcf0e5298bfb4b291e70ed77834e17fef912348a2838f7
SHA512176203776d64a0fa3b5f859f03d081db258515eb05aa916a8e23564c6a1d05a62ed05bffdf9fd0dcc9f58adf2ba2e45aec0d5211613c9faf7dbef6fa57430bce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b