Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html
-
Size
6KB
-
MD5
eabb1ea476be37a3ce5d62fafb66f3dd
-
SHA1
0e0370794103d4bbc879313ccaa1db6a6a408f8c
-
SHA256
182b19bdfa39e89e9b2fccbe2383f4950b130fb81fbcca8980eb18408d4a6669
-
SHA512
f99adda54163f470f62601b1e0b91ca378e64ee8ef893c52ca60652b8062750d0579441e57c2e948c088882069e664dcdd58d85a6f51faed073a37a54db38848
-
SSDEEP
96:uzVs+ux7XgLLY1k9o84d12ef7CSTUEl/6/NcEZ7ru7f:csz7XgAYS/b4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887958" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30545c795a0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BDCDE91-764D-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000089a46f04985e318046eb88b5fddc6255e9eb293de280391c1edf304270c5b4b9000000000e80000000020000200000008f248f0dc9f648bd619838829937c029ddea5bbbeb104267d291aac8a0f7784220000000bc0e633d40b41befc436cd05aeec43fc145ee3047113ba679739caffc2ad74ef40000000d68d681cadebe9fb5a98bb876cc10d7139e08e4bfad56d2f7b4e6602271d70ff4acea5f88163853f085c659dad162c1de0cbd49e6d08185ae4e8218299ac0fa4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2356 1688 iexplore.exe 28 PID 1688 wrote to memory of 2356 1688 iexplore.exe 28 PID 1688 wrote to memory of 2356 1688 iexplore.exe 28 PID 1688 wrote to memory of 2356 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabb1ea476be37a3ce5d62fafb66f3dd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cf8291ed17bcba00169770872e2be3
SHA1238f8a2e7e34851dba9e6606f7bdcee1ebcc6eca
SHA256e6098ffbd0f386686388d888f08ca8d86b6499e71b171ad76a7e11b7877875be
SHA5124d1b72d63a7f3469f9ee3ec13a5890a1f0a3d46332f0327ccee3640fd570001e436ed3e281e7988fddb1ad4ea7ea88978b9b49d09ad24079b338f237b43a86c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e6abd8033878ebe26a6edb0c983d56
SHA120c0c549db9abd9a6bf11ebc5bd15e1a9ee4e25f
SHA256bd60da03b04ee41916e95011d76fe94a7b8efa6de384b03e234862fb2aa9bbc6
SHA512a11040f71e942c13adbbc973d0f9c80f51450250466b574b99fb002ef773066b54467bd91e87b03c359ecb3d01522ae16d6975697fe21923e7c8b85fead9ad1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d000510e115fd08e85bc23d0d8b2cfef
SHA1dbe6753862fc972ccf5b19ca7d499890a3832352
SHA2569a88942d33462c74ac225ed0e4338325beecf6364e9e4152f134bd70248ca134
SHA51273781ef90cb6ec79266c4d3689c00b6d84c3b3b1c793f2baea3e155a6d4aab6a2d7b70f7e16958c7085c69cdf90d687b48d06be9ffb0092350af3398bb7468b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf7c71078df3adf5d2ec3f417b0f7d8
SHA1da52d5e028d514afa687abf99eea631c6fdea8dc
SHA256352dba4d472586bb257c47510e86889b4f8641fd95b206615a3b7241a7b231ad
SHA512069d6966c960feb820d0d73ab611d251941aabbd4c61512520b5f252027761593c6e549eb330639989161bbf57c1263d991bf63e7833a0e64794391c0e4a5959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506b64f518868b3a5dd2f7bb9b555c9ba
SHA125ac2f1311341cb52fd2812ef11126b3e102ac2c
SHA2569a85f72745a7f6ff83ff9c958ccdbdfed5a6f737059ff223eea0a79eac5f7bf1
SHA5129ad0a6d014b076d12e11331271e22437dabc7c4f0e539e8f3deba13fa20c4cbea9b4f2e850463454230369ac5cf24ca4d91216f44f2516a821ce76f554f76d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db16400ba5288d97a839714711906ff
SHA19de67d605d8d621d0b42f6ce839e130737c7d20e
SHA256b60a02f093d54c20428010cc4810e0ba93651a7a4f700032e4c36cf49cac6026
SHA51211fdf8b8ad0f55706103193f2757de641ae15c8fc279ac7ce039e3593c8020963002a709a7ca3d5ebb39e011159c00fd33eaad22b31401c2e0d40b056c896df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452ef157a2727b7372835fdd43f5b79d
SHA138d96592339f972f547c5013778525cb1f4f8ca3
SHA25601cd6fa8cefc8ac79380984a243d7b9ade06ee197f18844d053d40a4b51fc1f3
SHA5125b634696375e5e0547cf06b2965eb96a4aa166407e250ad93016430f1f245edb102ab15583c66ab2eec1ccf243575b9665155cc59818adcdfa4b16d6e7ecc12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74f582fb38bda262b5916b1da4a0b60
SHA15f92c74ab9d226f6d32b1651a0c597944233bf1e
SHA256ba6f1c52b8d2952d05ee6db8c16f047225462ed921c623d45d34180a89bc5420
SHA5124ca7fcc0e991afb8dc4154c72e7a4bbc13cd8733bc8b5b65192bd582ae03cd53af9978330726c0c4b9098b4946024eca65dc7b6d42b4982ec40dfc438043f2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406b7bc9a179ad5478eeaec1a16463f5
SHA140626e04ff9ed7b94e56350b5c14098ffa78d803
SHA256565a8bdafac8384f617045480fe20b639e504f6535a1dba2de05769073a5bf01
SHA5123fa065c0d27e06a95aa399a8458fda74f0a1938e7e7f27140aaf549465d3cb3e49eda87b6617f8f199413e91fa14e14736f8e3ffedaa42ad1971cf5f5cfb0bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e6e9ccd67692bc63477b9cea2823e4
SHA11d488dd2f1c50365796489652246328620c8c7f4
SHA256404492f3c42bec086bb9bdbe396c1680014f10bc45d98f07e8eedb8fbfa9187e
SHA5127f16c66e7f4393d3d11ac94c3b7bd2c107ff2f433f87cab9a6b8a5736ddc2dc19031e35a5ff5db30fcb8ddc77648e393fbb54a456fa40808f4656e34b627900e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5588b3f0b4037663001bb17448eedd8dc
SHA1a6f0520bd3ac5e36b0bb5f09ebd44c0390b788cb
SHA256c2a074cf076a850a0d2454da9e11374cd01bbecacd8db5be7eafe4c9b783b652
SHA512945d61c1911ff1dd5e26ca1eee1c92d756e75375136adbc153579938eccc2b2fe2f8080962555625378a85a3739582801e8ea7d9d1a79a5bc8224127e27fdc53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bda97efd629ba372a75a4c7471a972
SHA117eab489ababa57e886238808ed7da649701a731
SHA256704b3da1b4233990454a5b0d8799d1240d63ae5281d89828713b67ffd7358605
SHA5121dc0c09292de437a1776a8470a41d8f926e1813f92c43b0ca56dff1ea4aae95eda2b52989855a72963f3768e56d40fe25bf63b1cbd3b563693249bac2f0aabfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a305035c7d88486bf35cdd5e181343f
SHA12067fa5f2d420ca220286f1ba4e981576fb4d3bd
SHA256f84ba1fba465013f062612f6361d8c2df89cb6fe4df54a0a1b8c7a153dca2bf9
SHA5129cfa77551e9e156c61c793d9e7781b18f316749e7c6e51c80bd0af2148216b419dc4e1524e0a047288957759c6cdfcaa4bdd257e9c3e30e950463914c41eade5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec263a27d7869b10f8e78abba377d90
SHA133b9cf53a6f91683600e07f88b3b634ba74554d3
SHA256d068f93ab15a6c01ef048e3ea2e0cb25f272c680c5481d439a629f7a8f216ae2
SHA512699901b8722a3a0d79dcbc01d1ecc6473e893f95b242174a6560fba925c8fd0d3918cb7988df2c895c1bdd75e341711b287afbd83ae4dfe5b0cdf6dbf50711c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c256c9bcb8dc0cf68b0b1be9b1eab212
SHA1d2cea174010957af85e34d609de9f7f9a0319673
SHA2563af70668f965bdaabb92d05b13289f90bf533462286f60ad4ad30569b8f22400
SHA51273360b9ab613a9fa9d32d0f485185a9880bdccdfec3f0f25bcfd687aa7fd0f2c3fa253795ccda0713cc1f77672cd5a766f0e1fadceed2088ad44b0e86676e93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c0f98c995744d29e5a44557214e74d
SHA135fe5ebdba33aca9f997c6c1235c6f4eeea43b50
SHA256a09b05c5ef7a67c3d5f3fcacebcd18bd5b412bb87e5170624c0fefcda4a54c66
SHA512575d639b59209c882655f43e788988c54a3e5b4d832d46de0435cdb05cad333c58df0b1b64aed389c2edddd3d928f94b09ea48aee96475239a792382e5aaf4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec71a2241740430e3514f086e78fa915
SHA12f2ce04c3a55282ac1a9fa7cb9ab6f5d15999155
SHA256f30b3969acbe032517cb278e1fd8877ca06abc33063b09878be56fbfb2d13826
SHA512164fe500af9606400e661a4534a3dfee247975519b5357767f21447beae88bee6295627750c76b6c123bda30b1eda5d999768a086c13d0443ff51dfcb9ed286c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6631d0b0d29a68d3e993f500b7182d
SHA13c3612fc071527cb4d4ccce20c9fd908e7675843
SHA2563d8f2001753f5a28d74c66dc49202a65494a18e54ac0308afbcafa1075015781
SHA51280d5f07475f18c86c9061f82b23d97e6273b5d03e1821640065e150c00d04a8a615c18327ae4bbd9efe46d9e25ba9499e2c959bd317b6b2c2fc3e625081ecfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c32411275a208c70a41ee8dc2912c5
SHA197b8cb70d0e189965513a961f8bdbe4d357662a2
SHA25661fb426f29c429da4b290093f8b3d7e26f4df503b3b7241ffdb244f9bacf3774
SHA51218e34a3c27fc3527d7edb1800b4162de889ec28bf9575964896b23fe537f781cb8ed7f58b059c574701150953809c4c9eaeb3c11474c8ef7dbb766e33d78fe93
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b