Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html
-
Size
19KB
-
MD5
eabbc72f5dc681e30782edbd12d8ad6f
-
SHA1
3c409b15ce0e3736983540055346c8f8c52ad333
-
SHA256
3b97c624ef52341d956bceb390c5832b6e911556477283d6fa0b2b65bf4a056b
-
SHA512
69ee60bb1b16680bf3fd1e6757ce0bfff94a86b9b81f6d668a92e01f2ac24177df6f41819c799ebfc9b60cfca9ef0f90eb9b872539414cfbc8b3be86aa061a26
-
SSDEEP
384:zibKhgESEVBD8c7MZQ3RjJkKzBemLxXucfIk99heTzVc9Hy:zi4SEgc7N3wvmQOIk9SPqS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD6AB301-764D-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000622782dea867cb70813523b9f81f356a1a2dcfbe8d2d1c17454ebf9055084d2e000000000e8000000002000020000000d8619401ba7d298887f1a180897e4e6c6333e87dd3d70672d3ed6e764480c81820000000e0944331d37dbd9211e067fab4e4251e06e62a115017c5148f1ce2d422526f4740000000bb2d302545998ec332137c459fc0e2b81ad70778a6a6bd994d2abb2d9c0992e4fcea64dec54f54f7eaa0d19cd4f52ff49856234dfa3151cc40474682c555e81a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000001c120002d81488188e227b8032995535c78e889b958208da1167c85a928b9951000000000e8000000002000020000000ad6344950a644d02fa458d983455d43b80a333b56e3b7ba0a53a937471a371459000000018018138dc97d0f22f297a8bce8b9715f786a8542d6031ae258c380b827c891102f2774b7f294ca58a1e2e91e5ecd02bdd41d0fa06ef3ae5ec21b9f4431b45c0dd859484179511754efac526481d5da848752a87842afaa843149c2bcbc5bb9769f20aa175c873e8ba01bc1198f4ffd1f581cc3fd600ad43adfef928615e0131612b3e18fab346e7628aa31a179b4383400000004e1f98f865ebc25524e5f1e1fa22b300d8dd942e782d0c239f02f6057f569a6872237f346eb828c9e890f592a819b55d6b3ecb49e91b91fac711206aa972f354 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888067" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e99ba35a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2276 2260 iexplore.exe 30 PID 2260 wrote to memory of 2276 2260 iexplore.exe 30 PID 2260 wrote to memory of 2276 2260 iexplore.exe 30 PID 2260 wrote to memory of 2276 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabbc72f5dc681e30782edbd12d8ad6f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d996e17ab5325789072cd120e6b12c
SHA1302d40f0cedf8f42b99fcfd119ee8dbbca353a5d
SHA256e2901ed5c32b8eb1646e64f0425dcd5a93b10eefd826548a0221491979b2b462
SHA512d41b2291b8e15d1bfc414e8fa4d6d3fd0896974efb147f38f5969890efaeee29323a91162e9bcc53b69c2a051378db3c9c86c02d3067641fc4bc507ae9184806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e411a05178020e69973a87b104f30c3d
SHA1620ba6f1bf5110ed8788327bc4078dc325bcc656
SHA256c8541d4845e634b467d413a4d84f4a835bd4f05f317a7258ad42289a58977806
SHA5126e634287965c3962e46d9a9be02b69a6fb8ea4de5aaa2921699bcf10b94d6baf75c4dd65f05e1dfe77bfb57fd86dbe3fb6459e0df16f43ba916c6a23721af9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5681e4ed398e97d9ec1494cee8e139f67
SHA14fe50a029ea35baead074a816dbe95fd7f29fb37
SHA256e5811ade5ed790715161b0fec44b8869899acdf6c2d3ae364790338be94db1ec
SHA5122e6eedaf929aabe764ac646645a4cfe208ccf9a685e7e172be51ed78cce295a5818f34aece03f543219cf293838fa38e7ba4e90c21d693a50e6ed68abd20e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55282ac86fdcdb479234071bf91d35b98
SHA127ae659beef768a1d666c54f2815a8f723c3fa03
SHA2566337286d141c11ec617a1c9570485a0c304e899bbf23a185302f432a462d8f5e
SHA51249911b1cf2f645e40f2715ba849d75ffe19e6fe31715c0729313b0de0f5de72b8e2de1c12229c2ba1f8874a3816aca7d625e620883c48500ced70bb1dd20c6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330a9f80451a0116290c222d6b9839d4
SHA13b4d5269ffff97a8d71803346d799533f26da815
SHA25683184d3b5ebb7f41a3375b2dfe1495d5891182afebab5289c975dbfaf2a54a02
SHA512415aae6ff6518091b7b6f6e7f50c728aad352122ddad04133836f6a5f491c1cc04ac47924cca8b6e84bfc97e0dc966ff9717e28eb134c444f7f6c46e8beb8f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae122ac5d60fe1b8531a95a9144c99a3
SHA1836d822d35164f9e25fe0aaa9da9ffe43bce7cb2
SHA2563ba88dad846ab6bd5faf563987e5a548c558a8526c818dc5eb37fc4061002e35
SHA5124962ade69ff3067f7fbaa9fc9c8ec0e925283ef59572430e3bd7b8f68a2e4d849f38c4eaac4ae25b3bd679b25b14f946413d6e1467fccf7d9f3777612a157795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3dfb2c67735286764fed5aa2f78544
SHA11c68706f32a7a64fa0a592dba278b102e02e9dbc
SHA2562a119cfb81f4cc0c0302a52cf2da390c797af30b6e3310c98b53e9b6f1249716
SHA512ab3aaff6a8b170f2c4413794cf6cf77f8c0d9d46d2d2017d9b83e63d928c5817a0f587636cbcf32b8212ccc13c30c02cd047f6350c01c9bc389ee843181ff135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b897d1ac665a13a5b560987b14b6eb3
SHA158ff1f37bb542d3791500bfd4ef699dbef92d4eb
SHA25603878ecaf132a57ac1eec562684475c48419cd41f158a8a6edfea892572e1487
SHA512a04f8206f545bbd50fabe082be896ab53483f348215187606aafaa978aabc5433f5b94777e5b9c14c162f62e5b9c55eccc973f70bed7efdb4a2c90e01cd3d62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586b6edc631fc4e5f103c3952abffeb4
SHA126ca42493a5dd1c9cff5f1029aae346a18f96133
SHA256e62f4dcaf86f2bef74ae921ad8200fc7ac87644d134e302fedd6b0eb0ae7661a
SHA5121d30b7f2e9d99bce7da1058d14a72ac8127ae009db4ee7b81550ac1ed824f67f6916db0e0e3ae3600c26a5486e89e354ef2a069413e2382c18bb75601e78fefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bad5f7872b63b6be8a55783185e214c
SHA11bd4101e2a5ee43220d07ce111f39ecd7948ee05
SHA2564542554a3965220908718c379397df5f96695203a0cca1c04bfc19cb10009360
SHA51228e637ba60e656a8fe9ffe813d46cbcef78bf38b24fef46a624e6f8727f555d450ac9b11c9711139446f5e692b352e00cd73e62b8751fd890603815fffe30918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a09ccbc7d03767ee0fcd55a55de5dfb
SHA18211fe6df3668d00ddc4103f517e9434a1bb4707
SHA2566059969c24d67046643a4175ce44705d22ffe5f1c14c9ad76d91d23907d47b66
SHA512ca45c5bf1f4833159b9134d5ae572e59bd2efa4e2b11705e0e9e9b5756df25853d746055975f0223d5aa760a98adb3e27fff54a72cf1d6a4ea5e2e2486b64692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d738505ed914c939ffb1a3b8f66a73
SHA12a00c56e499772a1db7455cc59c66868d8cae48b
SHA25606419d10608b9fa710120b95f2d64f00fde24240867893ac0f74de7a83e42977
SHA512950e561063856bbf85828503ffd75b72ab8ea01749474c1967f16056b8e350be9a80747ad5fcc070c84d8c7c3a35b437c07688373d0e51c8ef9d1b9dbff46823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a56683a937a73da597b0135820a900
SHA179af0598f38fd33730ee50bf42f8202c6ef45f3b
SHA256cbbd2a69116c2d929913ebebaeb2c403fead19049af26ea386d6ccf0aa81693b
SHA51222160276584ebe1296b6c06f70e0e1b223066ff0c3b9d2cf59007eb503808579731dd90ebc707118c4f3a1a62e9e00000dab4fbae124488673b0c227296ef605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898cac9a1bab9b341ad38347e9129a19
SHA1459f3344dd0ae8ff3ba4023f2ee8597885012853
SHA25637e7b8297e598333525f52d491294b5d7f6fe0a545cc22ad6494889a1d9f6047
SHA512b0f3a8dc7daa9c185e0cf3f4cb33f3e47e06bcd1de8f1e6e4aa0f1de5e132f2ad93183269fc53bfa918a0fcefd274db56c1e201528cf7c27ae5a6ed12b23b2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910a3783b8b9e9ee420d29c26b736833
SHA16b38a7d2ef8e826c94d31b2efc209d47d2bfb014
SHA2561fd73a3842784709676556ed75a3732bb9b04af3003a153b5147b4c04d0680c3
SHA5123ab3c010060eec05781f9677b463e868f15945c934ac85d6a2404ddeca1d2c1841fbae9784efa19cf5a84687723635508e5e0cea4f9ba6ad2089546a7f25a9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa8a49ce61a1f34a1e0170e24f78894
SHA10e7f35bcc3274e19262b8f2f2d05f34aa86fcf14
SHA25671fc327bae5fed1c0b3e2d1d20be56f066f30fdde49885018e4a1771f9eabc9c
SHA5124500693347c9ce379aff75d285b1a4989dd158a980b10736ac6c6e4450c869d12f03ace85c3efe38b451d364a51f57fa683726fe99e5bfe6432718177577d1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be47dfd9170fd6331de14a86beac2f1f
SHA1fbd3bfa64664279e57a6b4b4d07dffac3ccea3dc
SHA2567ad5679fa56abba9c68f26c85a47d16d8e3fe332f2216c94cf539a416779283b
SHA512f2821511cc75fee0c3ccc011cdd49fb85ac578e32811e3f6e1fb74da09b40021bceda839b2dce0e34d88837a022b13424ba6522c01b9218eb9159562d97c006b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1fc337d5e5526d54eec5b287585c68
SHA1db6773a7b260c5e5a8f63b1ad97e7315f582f59b
SHA256bda3f200b7a814e3fe0c1eac52b652a592ed52c6a1c4bb0aa07bbcf298da6f3b
SHA51252a64c7ea49aca441022b93546fef7747256c79ffec86ba7c62f99137bdf9c9336285702b02d423468f8acbcd6913b588a2cd311663bb2670f775950ce55f418
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b