Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
eaba418d88f02df6d7299db8d29972f7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaba418d88f02df6d7299db8d29972f7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaba418d88f02df6d7299db8d29972f7_JaffaCakes118.html
-
Size
108KB
-
MD5
eaba418d88f02df6d7299db8d29972f7
-
SHA1
85cb61010e791d59ffe055ccf16d27947f1e5bd2
-
SHA256
18baed5b5ea96201f10aa52d32cd6c39931b15496fac84b029f1a381e0b09510
-
SHA512
c655e830b9d4bfcf1b9d08abf8882fce14d7afe07b9e517cacd9b49373053276f8f0443380765ad5175835e9f20c523abfd6c7489b8a3b46c0157e37eac00f41
-
SSDEEP
1536:fXOrm46BlFcgo/tXe1/GYdLPciaw6E6e+nwXMfeogQIrCX0PhRffPckHXl3Tc/5U:69/tX0+2htFVssVDcPgU+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000b443195b76b5a5c8d599d46dca4e2dc813f1f45017fed9d868008cbf29e908fa000000000e80000000020000200000007a4be5595ee8efe381b9dd06d43c2b46daf9a024df4cc7694fa0936e93222831200000009b716b901318a655fa05a36ae4b3097ad6d2b3f5ec98a1472cb7f1b74b445ced40000000a6ead92da385987b3d8b133f0f9ff577ad3e64d2975c01e2296c5ca5fe6e044dc12d336c33fa97ba493dc3a15e2e687eabd83a12e66864c13562b35793c8be5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7000642b5a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{550C3731-764D-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2396 2420 iexplore.exe 30 PID 2420 wrote to memory of 2396 2420 iexplore.exe 30 PID 2420 wrote to memory of 2396 2420 iexplore.exe 30 PID 2420 wrote to memory of 2396 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaba418d88f02df6d7299db8d29972f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499da488793de5af20b8cceb24020f51
SHA1098f65175c82daab62bf1c2c433d09bdb1de49e1
SHA256cd60a7f0b8e803318095b16a73e0c5a1f00d3356f8752e95aca5766251076312
SHA5125e9654cb95679ff467bad27ddfedf48adf270bc42ff090ec0a5f7dc52ac67550debe5fa4e1bb955a3739fc50e13b5bab74f4dba8dcb3bdae3862bded5f5a097c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750f5fd3b008aa0781393b839fc2dc20
SHA1157649a13ef762a37eb6598e1d29b882dbc6b90e
SHA25666c1a8190acef8262cc46b1c3a6d03b319346a128ed2e5ee1f5a4d13f95e7d0d
SHA512315e8017d61da735fe4a40d646463202a00c470769c343a20bcc5a7d351e487c2837e5baa6e5b3cad0fd8d036ce7aeb526c75ca5d3ebccd589fe78b5b3f2a932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364b32677e046b68f9930817479d49e0
SHA190ad0b7101cd44b8ae156acd577b6aa643cb9881
SHA25608cd3d34b11a2398295efb5e2748b7f23fdcfd67871352ec53596343826e73ad
SHA5122a6b31917c6d88d0d5f1988723045a3770934cf06835b543ed603b999268193fd708515534f8e967792f5860ed12cc2da1f357617230eda0b7af59a3e0487f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f59b3db2b39f34badf2cade45dc42f
SHA1192f432984c4bbee40b232e097006f1ccec73403
SHA25659d35b4545ee3ee40dba3a4efaf7f9131ff6dd4dd53ac7f061243ef24dba96f1
SHA5120a16d155e01db9e8c772017800f15ed93621ac90a79603902adeb4dd050e1a1bcdcc46da8b4f9f156d37a19cc4d8c31e3bcd571638f6533c6ff6219d02826034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db67c605a27071cb100995346bca140
SHA111d0e01ac70bdd3b0a00400b80fe260e18050d49
SHA2563e3c4b452da80f5bd711b4cdee6c841d29dc3f034b8d01b96dc556dcf8072785
SHA5127d7bd8d64806bbbaeaf876a0004bcc54fe7ebce49695af6360d299f7709ecc42e910797a80e3066e35c1a35efd20969d27bc6b6e2912febbbaae745bb9646a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d776d5688b3df3003448125ebd9bdf6d
SHA1ade5ec72356e8c32e734958eb0599cf0d912242c
SHA256d00ce29480f53cc00f1f9d06eef35935bf5757c01a54815fb562f8d2842c185f
SHA5122cc0d5109e6eb0a1aaed7c019edbf17a5e78c4375d03e1abc9976f46182331f1adf6c6851b687c960aa7968159aaeeb73cba09f117e96feae0c0e6e71391e367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3083b908f476ecc0cfd4f38a82e4718
SHA1f898fe6e05f523c274ade34dc2ed72109486826c
SHA256ec30a5b9fa120a794efef03122af7bd144defe91fb3290fd6562379a806fd605
SHA5122488210005a2c703064bb29bf8c16e605bf279c357dab77579e876d97f71ec7cf2f3cc333eb8112ad09d0f67ba6bd8bf5dee062bfcd992584f0e5c51983dc758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d47ea69dad5ea0d15dc7e0e1e0db7d6
SHA1194cfaef2dad6792ad5d3130619d65821bfbe217
SHA2567bf0313ef562b9ec197a5b25565f44723b31e5e1f12042984bc79a1ebc2b4c1b
SHA5125c5b73182101bdedef4ac31a6e5cafb2ef088c9d0d355bd674a4fcaf4fbbd2276a22ea66c0c2e9456cd4d19cc460521bc52481d11d974349763546b85101365c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55112b33db8bfecccd8c7a201c3678f30
SHA1e33a5b49f96664c36456c40c760de25709316886
SHA256fecc183afb2573b4305c3d5d85a9dd948d418787d22a829b735d661e29c32f91
SHA5129967753fc56ba1c34a44d15dc7bf46291acaf92a7a1f9dcdd7b0d4b4f15fe8b4f8011f4bde533935741b5968ed7787b58b8f796f497bc91c4bfb0451bf9a8bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c537dd55c64cb371e75811b2c40cba
SHA188b2537e5148588d6a87c0a32f2f9b36a6c72f67
SHA256d8731b1e44a7c7af8ec903e671c26cfe6399d872764274a7503e6bd0bde89c1e
SHA5123c681e1f2f843d550ac4a9754c22eb7beeb1bff87f77c8173dd96a60250c81b0e05a163404713437db5ce2213ee32bee4476a3ffff80983a9c2ffe2a7884e4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2889c1aab1bf2c6e1873bae0ca0222
SHA153d70e79f8cf42c189384d61a88745aefd37ff2e
SHA256fd34dee9f0fc0e2bbf3220f17686a153f13a74dc51ecc48e92c5d412207efb4c
SHA512573f3561536e151ae8752e72771d5bd41ab61cbbb7fb763b8dae730accfbf7d4aaa634aa4c64f3889464c189f38f0da3eb9403db9b37ad2b9521eb3cc75036ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7f2eae3ac9df4ef695036a76e1f69e9
SHA14316ffeadc59579b45ffb33bdbbce12a3d194b20
SHA2569918f164368e220dcf37bc1ad6565f98c5eb975d9543a5466f90aaf02beccebd
SHA5123bf70e2d63d86516b94aa3d4a99397c301dba95603534b40b21f388a41d5c121d8eb021da8f423e078c25ccfaabfb632e392d51ec5242485687df43f9872f29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4114602444b9119b6347dfab1a0f4a
SHA1fc680dc51b095c9b82710ac1a67b2465f7e2cc2f
SHA256b2df241209cecb7e64c5dd786aea444fdbc5996423e1cbbaf8d0f0f7716f8610
SHA512a39d40f5ab57ce3f23c408b8a09c4b4b5bfc80e569db49f51fefac87eda2daf4fc9c45f7eb5e9c400420dcc795f8714fa26d68e3ebfd7509077227111a86bc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b2ac59e7a36b19e2e6e39908ed1c8a
SHA1e9ffd651f0dc408eb1599b681a1c631e2e0870c1
SHA25690892a9374c7bb1af86bc0676aafd055b367e5990a4b5ca08f4021fdc2202ce4
SHA5125c435496f06c06086a0bd3ff631d44c60daa7d22534e2db2f750884dec1fbe2e4934c87fe6c4041562651ed7f8d7430e6b5c9f74a3d3902f1a2175b291613ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8720c1501559ccd04cbb926995fdaf
SHA16995505a13f2a555bed3ed185bad1c0dec2de6e6
SHA256a839eae210fcbcf8be3143c1760dffeb669c2242d3e6963d9b315cc61eb2eed6
SHA5129bad356e687ebb113504b906670884aef0ef83148d9b4048d87d4be3d9030def6a3315640f02f6e005fa38f5df2d5e59f75d07a4fcb2e0708a10cd43ca125517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55586ceb5ddf6d3efeaa55754da847302
SHA1327f371ed84df8865d1c1e924eae648b6bd3596c
SHA2568d049dda60492a840b46772884c84a3ae8371f8263299ea74fe7016a82b4ca96
SHA5127906392b74d1f4fa3db83d31d1b400649066d19209c41b1d971540b47413b92dcc25f9082bafe5a851faf0457cf0c958592e87af378324da25e710fa53215eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb899516584387541d1c916c2fd3d4c
SHA15288154dbd4c2381b2f219f9582fb9964419b8d7
SHA25662b8f360c0b64d552e92743ce27c6e42b52fcf92d6219b66ecd77ff5162a752e
SHA512085714176c1599133d717d0404654189b5f521f0811a809e428e210ed4a86c4d2b9f12f328208ea31b2e831b06073b78534062b1d634d8e0ce9aa5dc6fdf2099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54080e682fdc1459cff5911404d69f996
SHA1c8b95a8390b5e4f9f104c7a9ae294ea481506bb5
SHA25654ae248ae3210968b842c6717ddfcc58517580b0c2f034620187f41322a2176f
SHA51297e1270fca0ca5ec39c35002948f398a97c4faafd93ddc372ec5784440b8b0da0d01b2a4902d49033d55c697ffb2850a26da1fff9142ce1f80ecae16517cd00c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b