Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
eabd50472d61f5f60602bac81cca5a06_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabd50472d61f5f60602bac81cca5a06_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabd50472d61f5f60602bac81cca5a06_JaffaCakes118.html
-
Size
6KB
-
MD5
eabd50472d61f5f60602bac81cca5a06
-
SHA1
1869c188363d05b8292b8de68e1575f6a70b4ac7
-
SHA256
34cfe7eac856655ceea4eb93e5038b624dcd3f95d665f56fe01a274506752b7d
-
SHA512
62d0b9032a56b1f09afd36f1d2aa73e7c31a414f8805d3e6de5ced16380ddd4c809ba57a0b8b6a70a2197ddc8ae632ccca34bbe1738df5d5cbeee1ae45c17fc0
-
SSDEEP
192:m9iqZOrjjUL4ogsQ1Vgrc0ddZdRdhdudIdvdAdId3adXdCdVdGdLdmd6dndwdldt:KcUYWNy2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60129D31-764E-11EF-949F-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000474e2693dd712f56b58933e5a32f97551cc0939c22af00e16c8044b0e9df4ee000000000e80000000020000200000000ae538448f79d9ca8a8e0173975e4fbcdb732ef71a1e44b612d36dcbf1d86972200000008ff86c90d49c8f4b389a3689c0d278249133bc8033b52882212c07c3ea777bdc40000000151d88bce64ddadb283d2068050710020d969410274ec81bcb2bdfbfd406d44332d5a291d6e26d7eb110e7fe5c9898eacb360ffe8692b9f25890d95c9626d3ee iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06f88345b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2828 2072 iexplore.exe 31 PID 2072 wrote to memory of 2828 2072 iexplore.exe 31 PID 2072 wrote to memory of 2828 2072 iexplore.exe 31 PID 2072 wrote to memory of 2828 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabd50472d61f5f60602bac81cca5a06_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f86b9444cae00276603ed651bc9ed1
SHA1755a492fc30fba67a5b07bcb3976749131134b95
SHA2563c829df955814280b956da035bcdb7125465253129a9b325a05b47361cc1c343
SHA512ec5acb6e7be4d41fe664e199531e86b47775e3206300cf17312460cf04ba2a5284308c8448d58a3512ff0c097550f7fe8ead11ecef9c0703927fbdf44868935e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b42e0398ff73940823a9d53c8786ca
SHA11e54b4c624e080e0fe6378ac0b37bcdc7a56052d
SHA25651e2c27ab221aaf8a1cc884516e7a3db9d23cea634dd62e105f287988681e32a
SHA512e3e666054bd7ad612726508a6001584049a445222b1d938a09a2e679dc558dab36a473e431072fe128ce24c98baf917bb37db381249d51505e817b728eb31d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b50a3e6438c5167eb5d103da9a68d6
SHA10d71fb5b4593c33ea4c8ecdbedbe580c58901223
SHA2567125d26cf373cd488d142770cabe82d67702d06f1a0aecbde3ee7c310372458b
SHA5129dcb42e2b65109ec1551ba25202ede231d6a22dc7c91d9603ac1d182820bf8ac734575c4c729b14e19dfbf7a793a48220e3f155585a5ddb9190c90edea12d9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df16e5cd2586c79436b12349dd0680fe
SHA1fc41443ef025481d2f32685d8735263fdf5b9b5c
SHA256bebd29eb05e109886296813e0e47e64fd1fc69bc02e815f0f6572ac5b3270e13
SHA51216f7a3c2299b1afc20a58e80e4a8eb617d26ddb5701562e18a01395420ce18f691329ce804bf4eb90823cef1851c3b2f0c5ee437142ccdc4675afcf5d02981d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cadfa2ab8cf5278737e51ebcbf0d8a
SHA170db57e9d9b05144363b780e8ce11967661fbd0e
SHA25639d2c5a961c5a823b2f0af2700fdffe5eae68bdaee83c47a3158db08f0b7741c
SHA512ab0b9a11633fe95d65775e8e308945da54abc34926d92850c6cad486c0efc633b5f7c6d0d249925b5de8116e1a7320ab021b063118e906d787fb06784fdec394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47eb55b3bb41d57005da36c10cef4e1
SHA151db634d8b5e98b4e26da56306c4e58c86e9b57a
SHA256a787e169f54afc62cc5a6c45de85069f97911366f5144ef343e52fbc87668d08
SHA5128c215b23420ce11fae51733195db2f76b651813e13cad3d0986ec7cd74bb31796231fbfdf3f6d78b93fdf08b1c230543a38b2bae2505880852ef99338069930c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e48a9f9fac6c3c8ca7bc396213d072
SHA10c020699f1eb01b670473fd2f4c5f9d6b5edba7e
SHA256d66e9adce11a74467d4536b3e1cb66f47e0006cd8b6f2d150ee4d674e5899477
SHA5124992944e7a281b0fcaf1ed6cb75f9c90f808daa96ddb921562bd35ea008dd75831d9a06ec91d09a85f89c283248a2d9addecdb2482e22df3ed8d4ea8e8d8e3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3568a9ea68f8a3b1a3f24f833e85bb7
SHA18ad4a3f3ec3795a09e194d8799d3fb688646efda
SHA256771fef109dc489d532861dc37e4f04ada0304e0177bcf2237f569aca11d57cb0
SHA51279c892637ceb3e9a3eab2c7c1af7a2047d6ab9ff6556fe73e863894e3250ebc71dafcce0a307b4d742e0308d525627bf1abe80fc7867081caea7a9d4d5c5727d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6cfb6b624d23b5118078d33482e6dab
SHA160fbe2c22898b9c86e91c0eb0ffce9f09a881e35
SHA2569d3d11a0bf979945bab12691311724af10d8a61c72da6af6905c1c7e384bdf6d
SHA512c0b231a7376365909f2138affd147e451f48fc5496d742ce5c76f041c23715e135885b846202e154597b41ffe61c15678e109e2e9b7a2c22028139da5b66ff4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db6d0cccbb127a47ad2bbe90e0dce47
SHA1a1de04387ad8f859e8f681ce75c35eeec6a6fe9d
SHA2562c53390477b5199284fa072900cf823fbdda87bd131f6eeb715e78c8af50bd4d
SHA5120e62661f601aabd6c20721c147cbe5aed9613b5b7dd2672fb05b95cb51e6d39431f6542ffcad016255821afba3762e504f95a7b4a0da6c2aad82312523ad99cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc6c7f195eaed54bf5ded881787eb3e
SHA1bdabc0a2dab2f7ad1c62adbf646064a9045fc0d3
SHA2562aa63ec3a83a939966416e5331d412470188c3adfd138fbab7c70a84c7241736
SHA512f3a3a75f3f55d5b24bc6a374b20f064c0b7a56ba7448f409bf360ef471246c612d56999cf8806d3b800a3c7518f3f6e019ed4f7aaffff98db60647ab4f0ef0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cc8495714cac66e87961c8640e5ead
SHA113c5689ed6872f440a251f63851b405a5c3f8c67
SHA25689a0b3e0fb1937257536e50700e98e8245835bc61f38aed62222f356eca884d7
SHA512218b10dbea652025ef2f58ce4bbb5b028c86b700fdb52d88b33180c3f8b1bf3c6d3faea14e8e9eadce79e7eff339e63a9962f0cc5d8b9746a91e4a26e995859b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a83223862f5d92a09a88cbf7e542d4
SHA1db88d09c4192d1dc8566671651b08232782c1bdf
SHA2569fd3378c16d6faa7d9396e773477cb2ebf3394e837b7b330bed152a6aaf55c5e
SHA512a8908f5d2543d4c29ff294a6834833ef406c5f001b1bb18a149e3356143e28c54dcb2eb72df5626dd65144e7c60b7f8a1af61297ebf7c41f1653ebcc99c2364c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c749d6a049eb629bd658d1be0d507c7
SHA146ec5b0def5feb3d5f93520c99e63d44b8fb993e
SHA2564d2aebc01daa18f90285284eb53f22db23340534b1ad727b4eeceb533ed6e8a4
SHA5120feac6efcda6fd5c3a0c78403a229a0b85f951b2d3e0c7e176061220b0e1669ea3dec301c10749229271fabe5e4cf96e417a4fedfc4fb5cde6a1fdbe284df799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b0d59c07b842c5920ca3344d4c256f
SHA1fec747bc8b5238e607c78c1ac9b859c2e51208f2
SHA2568aa5d1fb8d261ccbd4688d73c199e20d69728476a89822197498c9a2e6cefc29
SHA512ebe59b0c9e67e7238dcd84ba1848029b2f3881e8db40cac70d9a3c07d2bbfcf387c7771a17225643ed30463278ba9cc0e5ddbe0007d776feba36d9c1fa7810d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58690a72af1764e28dd1bb88d873f62ec
SHA13228c4f807dd8284ff9f78aebf4af725d1b80805
SHA256af730e3055c712c5e0c15e0a0d373211b363cbfc2264e095ca5df2e0f668102a
SHA512f139e62cce31f87264f1744203e80de75c4b680ba34417436970ea6e1fa854ad282ca324463c957d7a49d63adb879c41e2247650b5213e087c484ad1b9f049f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be794153c9712de61f5532def0216d8
SHA1ff36f59807b476bfdd5cb65746e5e41d11e17554
SHA2561c943f4c2693be1cc34b9336a3f5c8e84ed86b402311aeb419ff049aee44688c
SHA5128b1503041f4bfdaa167a274222f45ddc81ac9ce3e6e8842f64f03db893ed1ae4561cceca0c91eab9616a5df3ad18a093db6823c9adebf6e67824d1fee7103676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c25168d1642212646dfd88ed895a5ab
SHA148d786a124bb941226b5ffad8d87b2569309d901
SHA256489e527ef994160c87255e0a67a35f9bb3c5b48c1654ae217875b8a523ece71f
SHA512c349975f5f7d848d1875fa739d7beba311625a202167f1e91a4d544839615cee6153af5679071257f216e69d82c134dc9f44c14b5b64dcc66e1515f2b47bf268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65378543c5e9df5d144dd97a884d0e7
SHA141efea04f3d9feb474387bec64dd07793d7aa416
SHA2566f3ed63ae8cf50e5e0494cebfe226339384fc7b75368516115e4676c36b10d60
SHA512d5de90e7937442e29c28a3287a5cd43d5ca9a8eacd79b8917a198d20fbf598e03bbb2427febf7f66e8e7a3bab787b7b488b4f798fc957f1c6ac600940fffa034
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b