Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
eabd8ce565dea3a6949f18477eba2550_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabd8ce565dea3a6949f18477eba2550_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabd8ce565dea3a6949f18477eba2550_JaffaCakes118.html
-
Size
70KB
-
MD5
eabd8ce565dea3a6949f18477eba2550
-
SHA1
45b364efa0d33e37a1caf65f783e839491f40ea0
-
SHA256
3f0c94dedd81fb4339ec4ae432d7ac20d93889cfc4c8f0ef55753776d2f91c3a
-
SHA512
b9b82c3da8bac1b6fc78f82079eba2af244aef3ea329e63625ab4408752566f2a9003a6a77ebdbb2d6d486337c1fd6c95ed4c5e094980a70d702fc2ebc998deb
-
SSDEEP
768:JifgcMWR3sI2PDDnd0g6c4W7ggoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:J/A+g9TTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{660C4EC1-764E-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1036b03a5b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000042ed807cf1943698456e0c9ea7a9726b3b1860c71d2c876d55ba715feebb44e2000000000e800000000200002000000000b1b2129786ecd44afa6815a57158f568761b1f7dc70484efc5c2ef1fb94580200000002b68fc95e30d040a6088a193f506639ad55ba11b018d17d46010e3195729bfc040000000f1a46c044c0ad1fa161b36b38ec9cb26fbd8d584c04b3f19edf8942b876d69b06c76f44adf0d23a00a169ed0cd5a80505dbc4de21f5248aaa44cd38a85911482 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2752 2316 iexplore.exe 30 PID 2316 wrote to memory of 2752 2316 iexplore.exe 30 PID 2316 wrote to memory of 2752 2316 iexplore.exe 30 PID 2316 wrote to memory of 2752 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabd8ce565dea3a6949f18477eba2550_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53832c5205400d1ef621b169ce60cf6ff
SHA18bf802bc70913f37b40c43db061419bc940b4d02
SHA256e537543efdf5c7093b8a0539628a1710f59383611a6809213adbf5e4ac2f0cbf
SHA51297f955f4d2e692701075126b7ac030b8c4ac78cca69ee3a1180e47c18a7d986e0fdcf409c350373d4188ca1eba80c011dc8eca2c6730b6cd1088da743f78b0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280bd11d9819f537847f854799e5f436
SHA1b9649d514bae83cdb0b11d0841a53e168ce44744
SHA2568663a8490c4bd9bc6414dbcecc4172bd7270cba04ede4fee3c7e45e075998ac6
SHA5125ad62455d1c43daf81803f1b655f56c60d7b1514d4ecad5d59b5dec0b8956dfe52e4b7415aced266a9c63ddf15d145bbe815c59d0722ed71e2a6b27153fab2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52096134f3d3d9ff5faeab6c83629ac31
SHA111335aa82c186f23a73c7fe425ac132b92fae4ac
SHA25630f32d0957b61febcce49437d4accae094a81cd3cc7d6953e061686033dc6750
SHA512758c20d9bebc82eb807376798873455a662340b9e81830a436fc4f8e44f789f8443158883feb35beb9bd542f30400049c98aaa1a6172af699a0613fd7492a6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f33051460754b31911c6f0dab5939ff
SHA1ccca34ae56cac80d726eed6bebed648cb9c8da3b
SHA2560555701a406f91323a2582e1817c9d55068f653da80befedc3f7578fb6076656
SHA5120028ffc954bc34b42e2e6249f0e4fb8fb97c4b1cfc8370194517ed4e831408259769eb1a70f0a7c6f117e13f0147991ca29bd6ae81396ab617167c4af5b65c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531648ba92b8b1d9af0fad6c58ba59726
SHA1d27b1fef8d4725aa4cc0ec29ea770a8364d631d0
SHA256ba5f162a90f0bf2de744a9f09c54e2ee6c4d5a35d39a6a013a24cd1d985c0c17
SHA512cd6d4423b998f41970d79b16cbc755c5fbbda07cbfe531fb569281b67f2ecdd382c5d4b2d5a5b44138c99ebb630941882aacd0909f8ac7afc5d298f48ad92a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d9991e6dffbe8ac0cd8e73370341f9
SHA12cf35ec6262195e85d99cd587e9ad9b5aa204f2d
SHA256b90c4d5fa4378a5ddc6f319735b53ad67d9e15ea5680f0ed57ca71cedc2f534f
SHA512ea9e40ca57e1736097332910c29f23c27528b073da07b0b9048d6498c74c6bb1a086f9157d6344486b7955cd2d44194c39672c68eb50ee7994307b0631e80f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f33fc64450a8a3184a212fca6164d8
SHA16bd024a57dd5df74518d77c10f02cfb7eeab315d
SHA25641e54498f1482908293ec79fea471110aab03eeba7c0f37c1c2f355a1ddd5f34
SHA5123152e54da1913d5bc345c64fd4a3208add5814d12d3c2154e858d1fe6534a7e17286fd3a4a3f8d0996d0f03fbf8a7196ea4d0d08e0e83eba95060990366cc214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531da9c2ef8679ef7f312486dcae643db
SHA1b8cd8d86f5c8a82292e40af9754875c83665aa46
SHA256c973449820e21bf8042f97cbb05a62e4c7bad6185d016447d56b1b85d541c5b0
SHA51287fee0cf8a21ff6b64ae36108252e41ad5c4503690483a9e2391f5ed8d5609b160c45cf6d9e1a8e75c9cf1cd128c7eb93aeeb418d75722f0a8dbad7139333821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedbeaf013eb63b57cc79a8d5654defc
SHA1c7d1777f2888867f495c1eaf5d18f4b296fe489a
SHA256f5db01097d4c95e2ea5bb70eed1cdf19e6fd17c7347b5f5be7844a25ba654bc3
SHA512e275a7cc52a368bb41c9a327a6107c3da38d82db22e86388433ea5aa0f1cb851b7ed9c2045f00e092c890df8e019d89fcc2eb98a88677487e62a8ad601485067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52af4855c5b842d506222422389c095
SHA1fb1af90d4e6826234b84d034f81a861d6842d1d8
SHA2567ac8d7a729c0e78911c120601c4e9d93781190501971a3dbfb15faf4803017cd
SHA512c88358117e2713b29d96796bef9596c33bbac794ee9322ed6a084a6a96e2255b39d49b72cf9e69b4990ce84087db8fe8fb3c326d6eccc97aa0a4a0a8396852a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b87865db101e8e3bde4368fa2f47975
SHA19895e952150add0f008191e96611cb350667ccf7
SHA2565fbf76ad9b3a60515ea8a9227745a66c025a7c4e50cda0b05fe904957744b5ec
SHA51292aee6c52f87865b69a406c8a263eb2a2e3b21626206d77e063e50c9238616b457b832063031f68163f207ec2acd745e9f0ae166dbf270ecdc1c268553838246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70a73b957ff17990e283de24ace9e3d
SHA100c36db45a21239c238ae2304915a0d8d2de1ffb
SHA2566250e7f21e4cc661c241830ad8f8d424790a62d34b0c18b6af64efcc963ba06d
SHA5123044a33c9d24c689fb5d9759f1e9ccbd1f37c8bad58fd6c51579335928d8c04a4416c711395a3a61c775d9f4352bcd3ce984844b91faa068444c0f1ad93978e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a0be360ca4d163ee819773b533f0ca
SHA1e615dbf3a4f617c682f546df6ee14b9a4013e5c5
SHA256cee29f946a86a09eb45df614cf7f6562897a58543db539df63d3bfc24dac7f16
SHA5127e146ac2c34d1971d9f035bc7d2cfb3f18c1e24bee1e02c4d8e5fbbdd5cc9e97249d8c548557e8dc5194ba1b73cecb4f5f50704d188e05e168c6dabb702acd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b5a7ceee1667f962bb5d91510fc758
SHA13bd8e75b01a8ff11aae32b3b58df7286d5199296
SHA256ff9d05aa3b6030934023e114d76b44790a7341f25023499e4c6be2a4e724404b
SHA5128fe1beca2f8d709655090371361d3f87a4d00b11aa28bd78ac92b261905d6332585ee7de202eb788102be3a6e8276c31aefb273689d7c0eff5082471efade071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530caae1574e6b53e1db7d4b01a0d32f1
SHA139dad31baa14800a6f83e15a7445f946da00231c
SHA25659b62a73cf16d1c3e1aebf6cae579da709d4116aad4b961b6eb3f7064f37a6fe
SHA51297b3b82b92f7df5fff4298f4c2f76230ba932b3ce67032d8cd03ba663ad45c6a4e624ff3640d0b6b47a0ec47b9415170f1ddd7c26993428fef0a4f4e7d3e6476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f26a16f89e315b7d75f19fe9b9af35
SHA16830535e47012e30e95c5d9a11fd60814c7dd344
SHA256260c39e1f1b47b382c2c3723b3213db5895a190686f53a863d26e11c2c699248
SHA512f2ab0aa4753f3ffcb1cdd56b37d60499f45a367efda536db61471d8eacce95f85d518e5af27c7a8b782890e7f9ec9e729f1abd909f28d6af684392b4c594a953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa2f9e98db3338d71021ed92602b7a2
SHA118439e93fbd597aecaad90504e236531b7b9f3a9
SHA256b24bbc46afb9358faa63a94aa4de9f2625fd8c9d9f7b3e14336d2032c12ad572
SHA51260a54b42fae39ef841d028fca61668df4f1b05727a1d89e7d9e087a7f7379c9d6b9026ebd3cf187cc5aec12535aa6567063c3597002a7fe0246b8cbaef9e44af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21a821adec373565371e6cc978e671c
SHA1b44704034e0c0e4e0d3099a53db86ed252412a73
SHA2569ca5269bd9b577f5c921b2d0393268885056e7bf0a110f08ac6812ca4f323dab
SHA512622699439bcbac1160a0614f43fad65f0c611145842abb195e9062db158123b4e133eca2ac18b827045c6d049ce5b6fee97344ce364875c94c517bcb4016e82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54517aa50f02f29795f56d0b6e8af8d9b
SHA191578dfb58b67da4992961107eb03fcac16dee5c
SHA256dc189eb5152c2a9c2548a94e5524decce8ecb44213b95dd05370974592485382
SHA5128bf5400b8e623c4c91c673d7ce2eb89e5a0435ac19b87c19e359bd2a3be470c58a0fc3e7df4cd6131086bf9e5129a4fa7ce463755bf528679a18a1bd7bf9adc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b