Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
eabc68291031bc285ad7b79b6f9e7759_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabc68291031bc285ad7b79b6f9e7759_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabc68291031bc285ad7b79b6f9e7759_JaffaCakes118.html
-
Size
68KB
-
MD5
eabc68291031bc285ad7b79b6f9e7759
-
SHA1
d35fa73c0d0b3e82aac488f79b69fcb295b6064f
-
SHA256
6a049551133dab1dded009f6ff0c99a268166372ce44e0b5b3dae51e6ea5c1f9
-
SHA512
89e1d634f0cb11789dc2b62986baa643a8342fe260cef6a3cbd17b7bbf0220b660675bb45798346d77ab2059d64bf50a09c46e6032eaec435012b1d9113f0dd2
-
SSDEEP
768:JiZgcMsSZ8tN99OIsEkEEQBtdt1daoT2fQCZkoTnMdtbBnfBgN8/oygcRWQFVGyW:JvWXT6Pec0tbrga6crNnz8PJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d921eb5a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888187" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b7ecbef36653bf14421180b7fa620fc2155fff6c4dbabf5783ece339b9795073000000000e8000000002000020000000b3b08ebbd845ea3dcd850f3771d4fe8f85b3add665ef0d8f66c7cfdca5f4f03120000000c44e04aaedc3fe192276dbf4515422c5982d7afd2f0e2fceb6e3703b05f4db7640000000e89658bebb7fec9672a04197e770dd9bbaa5371275d59b5e4b3885e131b73bcaf7796a5368e2e45e32033e812ae5e4e29942fa802d1130caa7dd99e7b8a7e814 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14F8D081-764E-11EF-BDF2-7E918DD97D05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1128 iexplore.exe 1128 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1276 1128 iexplore.exe 31 PID 1128 wrote to memory of 1276 1128 iexplore.exe 31 PID 1128 wrote to memory of 1276 1128 iexplore.exe 31 PID 1128 wrote to memory of 1276 1128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabc68291031bc285ad7b79b6f9e7759_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7e2c0974dd458dc4ea19599c60481e
SHA1294becc43980f69790ed4b6d328cfc62525cc279
SHA256742e31c4158fd5e0bb5add8a5d06aa5d01910f7e5ca3d464cecc7c1f8021f8c6
SHA512fc31803fb7eed47e7265795c1c219fd542ea792c29aadd7ed12353b401cc59bc22b093ea2a887df5d60ebb9f127631c3d753585a92546d2a14cf9add85da6b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc14dcf8edba9e17456b1f83b75f1c4
SHA16a728a7a2b79ded541821332ed3641e75a4dbc7b
SHA2564c44c9f41d2053a694456f8d9b2f6c3ef72e5493cf91ff4f5414d3006a7a7622
SHA512b39ca05f4b23b69e72cda3f6553f0894427d8462b78986ad4f4d08d978839de475dfadd1dbfb9b7a026aa1f6e56a671d43d74bcfbaba653afc0a67a781689dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a371a4702ec4d5691e31f5e4ba98c9c0
SHA1766ce93f2fcf4691061b7cfaf9cc262daa43227e
SHA256602fc3a7b0b1a1e13d7d9f3da1a0d04d7d69d9a515b04b35e0cc79833ce40994
SHA5124e0405acccda4fa49c7f4ac11da6c51ca62c95dd851b4fe4e1746439f7238ed8ee5da2ea57c06ecb7aed3b8830df511aef2043c093e7ac573ee1ebb2451903f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516929774b8a9a29dafff9afcf7455517
SHA1fb3d9ccde8813379d1f8b32ffbf1e0113a822496
SHA2561a2388487cb001960defed40d900ae66cf624ae1a3731a80f6f899d45472d228
SHA5126d186ef38e6e88b01149afdaa6c6c900d74a7c42f60e364e12cd376be05d6ce51adece8a5722f1de9fdd4b0aa0a6202348fe9e4d1d538c71e6c3727362f7cd79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa352e631c0bd68ee8818270c81dc0a
SHA1626d26bbc1bba4233b150ad9f78a43fa9bc35b77
SHA256ecaaa6cad4b84b70f552de214ed60175146f21982a21388e10c987d334fa2301
SHA512d1b5c3359e2760cd809b6204886b42cd88de838a4cd1e3cdbe945bef55b5ab6bdf6bfe249db747823ea2660217ac30fd80bf5630d68af882b5fff8dab6266168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48cefb1af6cc87522ef74694be33ef4
SHA163f41af62296d774f7988b80ca15e58d5dbf01ce
SHA2569509366ba2e81a3ddb66f513f0c120d867e0fca88ac447f6981b5597fba919b1
SHA512fe23942f601c695ab03dbeb6168a60c8ac896ce85156659ccc568931d8b8880b4892e6f342c63d3acb09329e52fc3a1c9078ba8bd5584443bb70af8d17e71a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1d2b81bbae0bed9c799346e65a3ad6
SHA19535179bd7a4157ac22e7848e222fa2af6ecb1bf
SHA2561dae4be3ca534d9b1fbc01e0148d1d034ddf9650648af55cd32e79b6445d0667
SHA512ff8c25b62ceb2a6b6d8ba03bf0a088d4caf3f95b9c44bef355f22a03f6f12104dfea6ccef7a2f7ebc1349fd8d99855c73d1383adad028a9eaed4e853f1f8825b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52073884417dd82567eb54dd9bc70274f
SHA118459d9e657aed880f2cc9addaefb9dbe2aa7270
SHA25691e096cb32d5bec40acf7834b82dffa9a9bfdfed8a2aca973ffb36a60d667d83
SHA5129bb2a298687c1406ac01a90e1d38dd0de81e6540ff801cf5ac89b6dbea7ef19e93587bf781d65094c4a2897cee0a521ed653122e4c207a7e5b173f384f10f78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626f888523112fb2da9e6c9af99298f7
SHA1e0b3110e596b8a90d35f5bfe3fac9c25f609f13f
SHA256743cad6a5254d7e5e1b19ff2071eb5223508cfd91b53fa0d9e66f617e1ec5cd7
SHA5125fa4347b4c9be475017d5e2ea5963cc911bc608ff4f57dc6e1e45d61f4a621bba5e0738bd68000d11da00f08e6d910a54ea939a7ca4e73f07afada311dd0bed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf70a7036a86745529278aa4fd3f6370
SHA18ea255f85ef3fa835e91bf19093ed0241d28169b
SHA256e6bba29756d1ada4beede574b0be2e3a49fee23111af9456b09ba40f5429d1f1
SHA512329722343abd8b7292a41da54b9eb54c896a7ff3d5e7537b607f3d196b312a7f08cf994755d9b694d81f58311a5762242bc10856edf4415a63161833bcb62e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baedb739aee3df916aa74e751a162846
SHA1516f5681cdf44131c1044cb9e6e561e892a631d4
SHA25637ca80b00baa1635f93cb2e77c45aa981a900aad36be04fe63abd110c16ce5c8
SHA51255609c5f1f8423ea97df9a0a339b02524ccd50b7bc8b89584497dbde5ca07b1b8d7293d79fb7e5cb276e54235f0229bb426f12e5e5280147e090890d73349a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cf7eefb0e8b29607096648c0fd2ecf
SHA14574140b3f8b4370ee50639bd1bbe4854920cacf
SHA256c9d81be259f6b21aae52c1ae1ef46a9d97860703bfd10d531019fe4fba5aa8e6
SHA51210a294494f02c38633b095bc38366109a807f540d9f738946b990455ab1b3cfec67c7f2d3f6ac64ff4900c89b88c7d01592bfb1d0010b6b7419a0b487cee6677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529aa68de25215a05f56b4b8086982822
SHA1641c7c5cc7c3386fec706fb90ecec156a39cb4e2
SHA25697c3962fad9ed60a92c64dd19449e8123b74e62a12fa9118c76535b550d13098
SHA51278105b218d638fb6841b8cc562d2cd598f402ce893856e64087b25bb38110deaa1daee42ae9104b6a7cefe47449f6b3e8d9282b6da67788a92138dec5a3f8bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550844745eb193e92db4ab469e4443cf
SHA176e72e042bb075cfcb199d50e87531137addb1b0
SHA256026a21e54f6c83866ad721ea8b777c344347fc8959cd105a2d09fb00da13489b
SHA512a9b8a4d2fe2f486e55f464e34752813f7dee001c6012b7e6c20391717c4a5d7ab0f53be7a67ed79cadc06ae642fc038eb039729e439b36e37cf374af4cdc88ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530caf1411fab4a336173518ff1b4ee88
SHA1726b7f86933eaf2726dce3d5f5bb87a346f50fb3
SHA256abb33b61d985dde705be905cc70bbe838031bfcbb558d2a7019a2058622ec5ba
SHA5123892a40e041ae2fc90b7c78ec58f7b6c865957656c2739351319e4f6e37075e7e0307a828ca09277b118d8e626d94c55a8894335ef7db1e98a587599d4849b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ecab5ce918ad66299c5995e8e33f72c
SHA1aca62154a9f0fbd1a65f8ce7aee9090774dc2b36
SHA256ac2a15c770d02d6c8c602dd9def87a69ef4b0d129236653567e5f65c3a42c437
SHA512c80cd4b2d862701365e8cccdb735b4b3a773bcb1fc181572adc816f95890844f862dea41324963de35f3eb770bde6eba5cd2cb81bf4dff7176110a3974399a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717f277fccab8788c80f4ffc145537d1
SHA13bd715b4162e416ee2c2d45cf8270ca43c793b02
SHA256029bdf1f3583b23e7168a159a5030401046aefe1581504a17c973aced31c5be0
SHA51229c71fad7823bbb3d8096be3946621b5723799aa6a441129db49e8018767ddcab9419d9ce69d8331473bfb22241a6b576915dabd4c290631b8ebcfa94fbf4332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbecfdef190c786d621111e1d6c8fabb
SHA15c18c260779d2cb258ae07cdf564ab24c760061a
SHA256a0a29a232751b73424a64a03ed4bc74008871c27ceaf0daa31fb462b8c257f96
SHA512919ecf02db96d4bebf06c46feb492c1a1762ab1bf9552bed1db13a2530dca6a11f1abb136ac7cd57bd401908234b711e290097eb0a69ebfd29c1cd02f09e2e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5eb73c07c34bb452633123181e3798
SHA1e927d266af68d475ff40827ba2b336c3c0f3d766
SHA25652c59f86761eb022f3757574bfa36f23aa7db78a3fe65ca8e579b0541c4f4411
SHA5123dec3009199df6567d376d5d7c840ebfaa978d5012dbeebde77dc5711a0dc24df13dbe5ce109d703d6f6b30a86c4fe5a2504bcc2517e637d2d3377a37e77ee24
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b