Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
eaba6d2eed05d46fa6c00bca6cfb0628_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaba6d2eed05d46fa6c00bca6cfb0628_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaba6d2eed05d46fa6c00bca6cfb0628_JaffaCakes118.html
-
Size
34KB
-
MD5
eaba6d2eed05d46fa6c00bca6cfb0628
-
SHA1
fa598ccb458283c4d6e630632d678b47f75525ac
-
SHA256
e343d84ebed2844ae191af6b7d0faccbd26cbd41a5cf48f5920b0fbf6b4daf72
-
SHA512
011c1b0100446eac7b89a5aae88977da523e9135de13a970c0294984778c558f1602102b1f9c8aebb8a0d9b0810c037211980284d774f01bf548785a84861fd1
-
SSDEEP
192:uWnnb5ngbyLnQjxn5Q/ynQie5Nn7nQOkEnt2EnQTbnBnQXXCXAQw26k5195+Z6m+:MQ/xU2w12JhGTRTpzHOs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f17e5a7ee4806a9d4318b4405c7919a4377123ac5a4396c2750a13597696dc45000000000e800000000200002000000034a576dcd158a8a2d7bca18ee1bf1642d9dcb80b87956307d92786250077d07e20000000a7f0061bf7addbcf3bfca1d52b82b304711a74e67d59fd4af6ccfbed62404143400000001bbba11c1f3b20e10acb3112ce320e1a0ab65db7592740e2048374fce58c1ad3bea2b8cebe41f7115bd12395baa04e9c73d3bb9f64090214a9af3b3b2b41487e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906c94375a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887890" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{622EAC41-764D-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2164 2052 iexplore.exe 29 PID 2052 wrote to memory of 2164 2052 iexplore.exe 29 PID 2052 wrote to memory of 2164 2052 iexplore.exe 29 PID 2052 wrote to memory of 2164 2052 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaba6d2eed05d46fa6c00bca6cfb0628_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b90857711827438678d0e245198f20
SHA1987b217c3e13acad56d4919eaa6ec5dc3530b0b4
SHA256c921ed55693ec2eab06f8b3c3d38dd049141f09810191b2001881f137b5ab0d5
SHA51271cbfe3cd0e44112530a8fe1acf75df8cfc4beb682c5d837e479cbd315963c5724bfeb2d29ce68f0dde12ce31686e3ba519386ed9014647aae08d22fabd52c1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd072cdae3bad5a4494f6a6b1fd5c5b4
SHA1b33ffbd08d6ccb106ec27cbb20cddef556d3f88d
SHA25687ffb7ce6e0ef8562c00577870773a6d47857e0603888d1bc424316237cea7ed
SHA512ee6097c260595117c5f527d4d576c81a0954cb45394fd4581f16669753cdb572328eca562fd1af532c492d7b2c0c39b31fa9293e6433df049d7e5f1830cdba55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba16c958117568206e67c5be5662c5b
SHA17741db5e87b7580c3fad0fc74068bd674761a6cb
SHA25610073e7770bfd663c42ac157cfb4dcb8f42492763796e2bc3f9b0a3e2c384421
SHA5125fac4729b19229a60afe08c7dbca10804db77db5ef7a48a2cce5bd9bf0dc98a06213d995cbce2bf8b39a21afa37bee8b6b14278a11a4fdbdc47d662923b0bb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235bab4043b1e3c34384fd99373eee05
SHA1b9a81f5b5822e6fe83a3425e12f5abf7a658f32a
SHA25614d5ea878d2d03710033b9fddb46c404a9e189f1ebf570ba151371cc02d3877d
SHA5123197cb551ea45d13b775d6786d826d1c1962f85864fc3c1016a56bd42dfb0d2c45b57a27613b13f6de1a5506174e06e0f8cace51d86ac0128ac5c632b156586f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54595703f851fd2663232bbd0742ea1c4
SHA11d6cadfebb028ab88cc01a5981a3e9eec2f2be20
SHA25626f10001f12caacad3f23f02fd4c9a9b3b64b69daa8eb43431c3cea6f32d1824
SHA512d13ef34f4fe9f09d1ca48a479b049a6c633c59f4afbe30a80327d2e046fb20d58428994abe03de8903ab4c135df27610c3b6b99a795425b30e0e72d7f49fd533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c88bf6c8317653672d31dd1e3da7e01
SHA115f0d830a6c5c370fd8f7d9b9a97129f69d4749e
SHA256d30a8ba8c992586e2115dc59769507e8856b6add26e5c6a4ab50629281c837b0
SHA5122702793d28ae4d9e8d0310336bc6d5a02d3d02aef780cf069e3c2c26eefa41084e6b1c27f5f83491879f3e8a4b941971ade9aa37e0c095b6a5c57885a5379e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59958ea7cc1545f3616168d9d697ff610
SHA1e19526283064763eb7609b80037d0c64d9037c51
SHA2565ffbf5bb508498af59a9569b434d961967e1eae2fced565c646b3707ef6933bc
SHA512810529aedf7ef9c6ac062ed24d5dc3098f3416fd9619ca8a4283269ffb83ce49a1dd69eb76268bdd7d5fef4e30b010f9794bc990b0c3586b9ca97e25994fac5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54def2e2f1195629c4f5a3d2f85a80098
SHA1c89ede7601352f862505cb196326cbfea3026b11
SHA25668b8da32621c0df036433dc4aed40549206eb7f83b46ba9f294c592a11c9131c
SHA51291e13bdb38511544d028be0ae99b47cc187269876544f45dcd376f2e4cc9cd3d88d2051b0f278c69bfab524db8ac769c40ad29a3b1b63e34ae0c66d9b0d3b2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae16122620e58828731cdc352da02bb3
SHA19f09662ea5ea3d50e07731ead3a60e4d583edb38
SHA256b94fe076c954c863d60d5ef0e8844f0f03588b49cb3b6d50c96b75a1cc510744
SHA5122b443cbb3baae3bd13f8fa2e0e2ac14118f9996bd482e4230cbf6af0c63e7124bbd73ac348f802556d9be29b2aecf3f7d0568346c348ed37edd52eda0245115e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d9ed9de6689fcbf49a22cef8e54080
SHA1bc627a5f6bd21b735677ddde7bb01f6d1d86d143
SHA256ebc5fec085dd7b04aeb5385812406931847b9ad484117ba3ecaeeb80c25e73d5
SHA512f932a44dc7ed6a1672b22e6718f85be0f1e97d01b65bd899d1b2c8ca3117f9a4005dcb55174ef269737f8ac9a32bc8c733e2a7824c882d79c06bfad238bdab51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9db59301bb60f30e1ccbab58995ded6
SHA165f4b3476ff79a19164f9bb1501a0905302c68e4
SHA256762ff49da4bf763d52d794df8b785ee14c26369852779c3d7813b6af880ba9ea
SHA512a9fc5ae29dd0bd45a114bb5686e5b5570b365d8c5f1a1e78dd66b5098974957f6d89ce8f0e6e7293f9750f92adbca8858e589ab663f29d252ccf9e0bc1269d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b5d0a17e8065e2b6d26118f532a38e
SHA13886fb5ff35f60a9ac7d565f78e2128b1808284e
SHA2567207ee75ada46ce2c59a76ac18aa64d44aa6712c544bb243526b2e725e7570b6
SHA512da491a41c374db32c18604a5e117a14ff9f4b5d5724fe1b032430b53f2bb6127de377697baf54b18a15a8e3dc05d6e2295a19529adda4b11243ae9977a64afe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b0ec13bac8f1e0a3edb2513f0b7524
SHA1234e88e0f8f01c84b1013a3b17673c2d38ad7771
SHA2566114a4c1897189f600c9d2de53c20d77fa3216fe77164a65980a0b3bf4a4d829
SHA51266ec18999b2118b8f07a06b4936ba04edce64edb5c8c26eafa87c0c5bcb16b1f0878f456b8449142d373bc97d8c7351764faad0d0054fe104c67115317a6283b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb70113d51b28c63bea06de14d457e5
SHA1cf72f7972d77d8ee1433d571029b5e5ae5699edc
SHA25619889a8fa776728aeef0b645ae3a63d25b45075ff073171631109b39cf6a8a7d
SHA5122cb3e0ab15e090c112fed3d7efdd4dc35ea703f0060e67848dd188dd2766c57c91100ada0fd91d3bf9045520a5ec51e5739a2bc9867dfaa1ec15eed882e97214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb5a82029bea03795ec6a27f0c38bd1
SHA1d4e5dbd2942422ad4a9094c7b75ab792d7312dc1
SHA256667cd9dacee41783be72925affa25717270b8dee27ed60262a3438e495e2233b
SHA512e8294335314699ce3c0e076d37cd243e64b80cdf5a6bf1486a98d6cde19c077906a7a4063cba5e8fadfffa60b9ab12e74816e16ed6800fcc7652a2653f22ded0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2281fac6faff225e473627156e95be
SHA199e03511a350f50cbf01923c362c79fc90eb9f7c
SHA25681704f4e879ca26f3629bd7e0cd64bae52643096bf3950c05fe8af4f184354e8
SHA5124ca273f053ddb47cde4d26b01d75c333c72ee5922be5e82c310dc53f3688f488864894bed5609a533c383cb14cc5c8c899d747c059517ee3165817fbe48f09ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f54184608c1ebd4e1c34b99a0331c27
SHA16d42cbf9029e48e5433586462581b8319c14d8b7
SHA256d45c40307b4caa6cfabda1d544e901db1368f4b5a9f471eeaf04f59fcbfb5377
SHA51236429d1c61bf24df08da6eb77c58c11805c8dac01ac0ca404d00486a04063e4af4bad1755bb62d745ee7f525a6a9f27fd90c4b67c6d07fd694b2d7773c359307
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b