Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
eabb4ddf5337c0f709918cfd3ec14314_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabb4ddf5337c0f709918cfd3ec14314_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabb4ddf5337c0f709918cfd3ec14314_JaffaCakes118.html
-
Size
1KB
-
MD5
eabb4ddf5337c0f709918cfd3ec14314
-
SHA1
d4d930110eb35fcf597fe9c4bd7a951d06749cf8
-
SHA256
d201d71750657ad770d7ba44a194830afb4374ea1770f132382785ae3b8c3bc0
-
SHA512
5eb2d8ad003fc682f12a7bb5de1adb089ccf48fa0696491c60582564191f7d8675f65c9b86dbdf5ddf9fa0b097a4594ae3f3c142654d781bacc7452ac3db25a8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e944ff5610b2d643f013b65c55db6a923539507a845cec967c29265e059858ac000000000e8000000002000020000000e5aab140ffc3ecece6168bd28a9a05ea57b437727e3f4618cc3f6d5f67f87a7220000000f7be1a1ab6fd644fad38e3d2689fac167741f29b9f652981f69fec86d0d7e91b40000000995f212fc7084eaffe45352d54a500b8a25ee66460d0b9d261e3d9a6bd561f0756a68f9b98cdc67883019934ba88e539411398e34b3238862addba9b54023e8a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dbf6785a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A15BBCF1-764D-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2668 2280 iexplore.exe 30 PID 2280 wrote to memory of 2668 2280 iexplore.exe 30 PID 2280 wrote to memory of 2668 2280 iexplore.exe 30 PID 2280 wrote to memory of 2668 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabb4ddf5337c0f709918cfd3ec14314_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214ba8e9be6806393e1c422afc14d866
SHA11e70347da4d4abacc7c4a19dbecdb7d04a319ffc
SHA25623cfb275d63311cdf5258c55a83d04a9683a4d3f9e668d1778a1b5bf2f9c6ef2
SHA512ea778d976941190641d4e834f3b7572dff2c94cabc5c212087677393172d186d93ac9874456a0ba313a80764489499581133a3814440b7e25eecb98787c0d206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e311831e837dd6c4591b2363886750f6
SHA1dd3e5b2aa7df24a6ef8dbcf497c4fbc24361526d
SHA25651dda1c7257f35419bfeeb53f15d41e1e08245552590637dd57704794337418c
SHA51222328c3ad74776553c6d4b789fbd6e0bfb64e39545dce91bbc9af79036cb5bc99d23c3bf10f55b06aa0ef127c913dcdf939454c6a79f8aaa44edf0fc61a4c14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5012024fec1cec770a2aba54492a9ff03
SHA114ad026b73ecfa9615b3f6031e4c83c1e8aa5203
SHA256ea75fd541834e354d4a64f533a4488598b2a148f675b1fadc7ac6498c9e1d9a8
SHA512761f5bc9afccfae76c6bc6a3703f69f1d64899c1ba9b92afcf2c43ec925925db0d2799e4666ae41bdb576a14dbe9a69f0fc14a0139cd90d704f4b8122dfdaef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b076036f0bbe0a18def2580903dbc8
SHA1f8851a8f918e2c7dd75ab9ef2971ca1ff341b1f6
SHA256835da1b0b2285d52e152f63a3b2648101e31fc71831c8495756c61011594ccfc
SHA5120e94d847f9fc370f02b89dc4704998c7a589ef822e35ebd08ea0fc722c45d1504917518787acb975c54c33b2214ea8f288c5e6c905a72420501a373ec47fef05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560705123301861e97d6f7cd55162759b
SHA1dcc3a55dd9e1e6d4de4c78f7fc5e5c309e12c2f4
SHA2568e8f72c3047807adc6b2bc61961942c13bdc63353a8f85a6e8d7997765c4694c
SHA5123e994cec9d1fd76a531829e42624e1efc6185b609e846af74596b6cf6a1d3780dfc909844854ea3cc45a61796467d87ffb4a36049a9d1c609c2593c1adf40f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc2388bc27629fae4ad6ba6994c801a
SHA15a2e5553e4e0be94c8554c17b48206ad8b1dd43f
SHA2561da54c2a855e298b463f0fec09f4cd301e96df28a05e0c574d8a14f473761f3a
SHA512e7788013496996e1be265e29d0056eea0ad9d917ae74e1502af35500be8a170ea58d087bbf8e94e84fb6b2c2121c33e074de5540b2ded601ab4ae1b6e1cf1ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503cbbbca7b50cd13743c791439dd22e3
SHA1c37189eb2b90e501b91c14875fba8b7cbea6ae3c
SHA256be785072d544e906526de9c2117caa813b2277e24d5ffdc59e7d4db6040e1222
SHA512cde945293193d62d83244fcad6fcdb82a6d06aa337dc2fcd8239490502ab126282d0e566786abd0c5ad8c7771d9807351bd68b0d6a8e92ab841ca471e6babdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c273ab7eed9572553e0749e174dae2
SHA1edcbb14daa285912bda709347f95f8ce7cf27d7e
SHA256d221cde6b6e24724f606ea4f586e98dc0b1c0d3f4317bd697c10b098708abe24
SHA51259e2187f89d029ac4693be7b06c399aecf73e7e22543bdfd0bca7da7d4540b360c34882ebc2d97c9f7bb7fcbbe33643b0976a6571cd7f4cb7d0ecc88707bc650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a73d7a80ec30a562c67b616afed95fa
SHA170486a6073cb30cb92b290731904424b15d9f3aa
SHA256d8f4fd76514de1382e5367b98f29c7917541d2478761eba22c93b1d7a53dd657
SHA512f2f6bfeaa5b43926106a0b87e40327c8fecb1b1aacf306fc1d77be6cdccc02b142bac47635192101177c9d225c1f6f74812eae09a8bedab4275bd0b97258c601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad44c675c5ff7ef65846abb998b87676
SHA1ec0ef252ba7842de3c5934fbd0256595b782b0f1
SHA2561763a57b028c7e1e18b5aab11e3b646103be215442e5a5cf758a95da89d75f46
SHA51250da0b24e2191d889d4510760d37bbd431fe0d61ad44326d5147a7d99db228ae610ca94c8aa7f829d7b9a2a5fe0b51cb6e5b48543f40c5d5ef4dcc69b48f506f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570babb01a20db73b1089a744e920512d
SHA1160f06aacdfafd1ee7dae4c4cfb5bf509e1d317a
SHA2564dd34b64332a71eaf164dfad07fc273f60273790b26d2f39760750ef3b382275
SHA5123776798c5abbbc35f2880873624d6d01ae504b6513d555e301bc7392e4359d1c4be5c78d879b1e7da616136a50d39119f95f23e6865f2ef9f92eb7e0d976f3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4bc46f39804deb77c18f57c4831a641
SHA1bb8bbaddf037e1895de64e978c52e83d2cb90daf
SHA25619c66f5584010e55857998959a335e4608a8423661e62ccaf3e0d7050c0d81c9
SHA51206ee9299cfd5240603bfc23b5ab9820fb290a05aafa788cfa8c9286211cbaf0d5dab8fa9a6d19d6f4488d6fafac39973d09d67ef419d60f0ad4026f5a9a4f50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c73623393ae9ab7440b849d3468e7db
SHA13fea57f3fd55605d9395bb87dfc7b77b02ca5f69
SHA256c4c028509fbd50fafa2a5cd8331f700a9b0a081566eed1538b103c464b511aa6
SHA512dec00fafdb9dd9bc9b47f03ccdfe14bc61794359cae6d36043207c44db9c525e9fc273f09886b6762139bf9becd9287d63fde97ed943e9449fecca080f6511b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c87a6a30ce4cf80c694541996be98e
SHA11842b7fc24810096de2d5970f9fd62c1a241d87c
SHA256e8d776773bf920c22729ddbc93a8712e4ff76b8144da8fefead1d4be0962d187
SHA5121bf95bab7056163d47c142e37c6d7a09acb0e751244f12f1a9b5f0a5d5ee9d16142dc3734d055f55184589ec05a9feeb4280d4f72e97e03d7dcdbca602d78cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a07d538ae14b7eff0939c5e95478f3
SHA16734d809db9a288ffbb21149b5e5b6d9447d3eba
SHA2569035d2f3122a8e37cc8848afdb75adfa8d784711fcba02821f6390f9d02b36fe
SHA512ea22beb778262e3749cea45581141efac55deafac87f5da48d8e24c4156e51d601106188a57444be8b9eee3ea2c467cf2dcad7a5459d36e3d94b7c7d193f3706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114674226fbf381d50feb0631e7f6c3b
SHA1fabc031cdfcb2a2425ca7d469e0c32c5584dee80
SHA2560d87fa5fec6acb69d9adedfca106e8c1cb307a7aa09f77a6f39ebdb2f2d2a345
SHA5121b5a17f6eb99f45165b072e3fc6fee83ca6fafd90d68a1854ec7a87ec2f2cd7a1cb48305ce83c3dd62d2d243ae2f62da51d61dd0f158ec2573cd34324f4d121c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea25dea9130b6c4162850034d80f7ceb
SHA1df192a93d6d4dc582be0d84319dde4655da0e6ca
SHA256406fbfb49147e4be2398c3be6ab39c2e29470072048f198ffb12468215e66b8b
SHA5129f78b1a7c758cfdb5b8b3949b2c48112ef020ff8544b7cfae374a1132cda765cf47c5163f3f5725730176c13a292eff3ee8fb9f24151f2b47f1e4c7c213296a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8489e51654cd9c2c6daf9b9b87b9b3b
SHA1287afa35be5dd5480f09b163fbd2c484c588f7e9
SHA256b49f3738711d0eb044104831f05bc1f38a4e2a6c352458f8701a4c170cb2945e
SHA512e3ae36667a5308ce84bd417f9c68b3aa8753e7401226f98409b658aec2ad064133022f0e8c56b8573ddb1b84190f9ff42cc48f49ddd62051c03af460552b8a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e88378981e701effbd65f8134051dcb
SHA10da89d6b45a300c7f013cea920468bb94e8a2b0e
SHA256c47b25fc910d3e7d420d9fc3dd50181471c5f4afd14a1974d662186a4a9eac0d
SHA512c75730e7e999aab542824093eadadce49390e2a6e903435ff48fb4dae1b59ea15846ee592bb0f0a7b4078467aa9b9e5fed029b8fce09adb23a69a5182f7badc4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b