Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
eabdcca5ea6bec7209f38f71c388b3cc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabdcca5ea6bec7209f38f71c388b3cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabdcca5ea6bec7209f38f71c388b3cc_JaffaCakes118.html
-
Size
8KB
-
MD5
eabdcca5ea6bec7209f38f71c388b3cc
-
SHA1
80381457ad4ca2722955f381bf6d98f0a6828d77
-
SHA256
fc0e5953d781bd7d8834128347e4b0750ba7a7813a9e00d6f9cb41818ffb6221
-
SHA512
e1dceb382477f89e6d7d1a8776570a463540e2098355a8e40986c7b8bc8db61ddea0d36fe63552bde0ecd8dd04148a00ed96842c250fdcd3c6eb42bb2897b673
-
SSDEEP
192:SIDfiG+KLF/sbF3jc00En7qVYDCbii/2VYax7TR9PAlzLQ42GWGkP:SI7iG+ctcqWueXfP8zLrWlP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F93E421-764E-11EF-A1D0-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fe780e49280728ba9b4a7ff86feb191e9e83d9a4e0547203b1a8f4dedaf490c1000000000e8000000002000020000000e356e5a6c102b0b7ba85764db85199ccc631f11a5d4ef1e3e1d664bc14e0a057200000000da44c66acdfb382b84c71a36091446c6da330ad5796e70276f25788b605eae94000000082688ee135b4a9375158366948ce0dee752314d729e3949e1f20b333e9a7fab8baeb8244a0ce0c5e201edc94fb6eacfcef2f9c8935925d1b8943b926943c0570 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f596555b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2892 2700 iexplore.exe 30 PID 2700 wrote to memory of 2892 2700 iexplore.exe 30 PID 2700 wrote to memory of 2892 2700 iexplore.exe 30 PID 2700 wrote to memory of 2892 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabdcca5ea6bec7209f38f71c388b3cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b65382d7b4232b50046476f863f986
SHA1fc7da364edb2ac2bbc1017b7485034665701e2f8
SHA25675841f4af1cad84482c444a42838eeaf367392b3ce697f3fa8aaadabd94c4ebf
SHA512a38079b283e1087fab496ff2999deb439ee26f6e2953ce5f069460e2472a3fa301753d4e9432e9d909e5fe348cd8074ae9bd1f4acd27b2c9e668c19391ce5ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58892a40ba9eb57d48e696b8df3db47ef
SHA19443e0c3c50cb08ffd78ce090cddda58723788a3
SHA2561579228c022c3b24b52c4f117b705e759e2a23137a9a2facbf745533018243e4
SHA512b6b0e33d66c8f6bb3c724d50f6ae9d6faa526b3aaeeb6ede567348ae8ce6493ec572e45c0bce07c17d10566c390a6570cb882fe07d02a1b539b51bebdaa1e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb82f09102c15f6ef0b208b348d65f09
SHA149e935f7c3222f5fbd9cf4fdd10e1a904b2da755
SHA256766e18846aea6a36b4d765edca73c242aed5b3a465cb234d5ea8639a117944d8
SHA512d747c301463cd707c7c51429008e8bc0fd4514e6fa77e81774c2476cc1ae06ca6650cec44ad526b60659ac3282ca38177691d1dda1dd532fe0aa9ded98ceed4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da140383e29b513a219b6332f4f0418
SHA1f415e221f6dc253b12de9900c8a6ec20f42f6f0b
SHA256cc58754361d54ee79ef1859db884525abb6333ed3091852f01e993799322bc82
SHA5127b35fdc156514f30afbca5687f0e81614b81eccf0599c8cabd72218d1be3e3678b6334c33fbf3d341fbb166c253739eab101aa1315372b7c6b3dfea6359718ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2c6e88ed51cdb58492778ab735d322
SHA1d438cdac8bc5df2951969b4208f697b5ad9d982c
SHA2569357ad619df93dfd97cb82d7c6d0d7dec4e26711e0186b4b10c7788b94728647
SHA512ee8d229eaf136f1dfc8ac510d76ff2eef15181fef74c84850c877fcd20f4c92a353c113413b1e9f69003e3fadeb9359cfe9bec25c42512a7271486b500bfc8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04f644de1548e301dd8a7ce0423276d
SHA15598fb96d08b9199cce85bbc7db68d90ca50d143
SHA25682d82cc29b5fa53e02ca1d9c929eeed32adbe03544d2357eec1f2cf35fd8dc99
SHA5126d7aa21e7f4e59ba31b61d18533225917b408d88739f887c2f1633ba3132ef33de728d23bd2b9ef79cf8a682d9a08b13a358b4d9d90806ccf3f639b71094dfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02a362b25866da094ce1f587163393a
SHA1161f049870922b389ad8d119148623c8569ebc9f
SHA256d5eaf7aca7abd328ea20e4c3656bd7dc6fad8d465be97678e11507c89147b0e3
SHA5129ceb924bd4566ba4d8404690df714899e9cb6cfc69e6905b082ee0f054500a24c5a7221d86f97f0b1e09d23a7c4ac18d1e373d3fa893c631e2ccc9df2e4363bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d926c08819220be526b353da80e5520
SHA12a1653efb0b2b7517dfca4489d0e7b1ca74b3566
SHA2561175618379e7ae1fd0b7b92a43299d789031d424740fbe86cf426368f8627478
SHA5123ccabe5a1ae963eeebde2a862d4c1cfb233f472f4d0320823219ed210eb7ba0277a76e035c9173c851dc4e35f1df705c2bea921e77a4c9881ce699b686eff0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da994a43ee634541053b17a72184ac0
SHA10a6da2b26a701691bb4f9a2f72c55e6e3323fd4c
SHA25635b5d5cbe2531757834ef115ca719d85dd9af9e7267e4a148d4169656b1621b8
SHA5127257cc448d2856a4ca9c58a204dbfbae91ab899fc9dc249ff47735105d68c3c61ff26853e16b38c4ab88f48f5fe9a10f2ea3ea098c69d2346b9b1ff5ffb99263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f35e4fc924a0e3a7e64c708a1f33874
SHA1271f6000a5107e8e90b19c3f980e0a3325cc9f9b
SHA256d57a3ab69b4d66f647dfabd132976ad5decbba7833fb4f856b5e380619aa4f12
SHA5123352b118f8e8f6635213cdbbbccf1de334b0f8bcc5bfee428748012381dea20f0980f97f6a6a5771fb9037a274a15611145c96ffaca6b6d41203e7b4818d4d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd4d1ca028f8aa889bdae30d39ffd130
SHA12b1d941e0b0d3182504992e1854d2d015f44f34a
SHA2565f22e9448559d772646b334a1728a66ae1ce4930d737ee200ee4de4463a8d6e1
SHA51280937e0d013e86756481b127bad548a0cf69ad02b0e466d061b9bd3566dc3b79da7ac894d111d71f19af5545ffa3b0607bdb4d870b4aedfa5e64b4f13e557954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574454717f94560917fb2d8de2cf9516b
SHA1a37e59093c2e30f65d8e0a3e6b3b8bd534ad90b4
SHA2568c7a4dd54d5c7eb840ee4b37d6e7f5bec1d9b79c2367ca1ba6712f83ce7d7624
SHA51240623f5895d95348365ff2fd25fdb60d04139ec0bdc44f2541a082de9a567e12d5b5f0d3254e91ce6a3155681160a9115b089c0b281d1db30948d1b289c595b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d29637cef8d5760ea2db363e64f128
SHA1f07cbba045287a7696b5d1e46484c8564927c942
SHA256c5f7df3fd9a1abbdac72d65c3e581ff704ecfbf3e993146b79d7ab5bb00e4023
SHA512c77063905875e1064ea810966af1d296ab271f93b4a1679703f8e48320823bdc8df3b8c58557f602d8f1fc71b431a981739f38abb3f994030836cff2187f81ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536470a67ad60ea1c7b4b7a80aefbc7c9
SHA15065e68f42ab9a4dbee12f0c6a17debc36154912
SHA25636a67130bf3ebf4b778404a1e66c5d6776e6dcd3a8e232d52b15cabe2689e659
SHA512a59958f083683618c0536efe808ea556f56c656924531bbc82f1ae0df90dff7b3c1681e4c7622ac4e14dcba5e63319a59c99d596128a64f574c72b97ae60a355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224d49f3e7602bf7a96ea5901c4b9095
SHA15a6a77116345631cc46802f08bb34a9bd1258626
SHA256f0d066d669abd3d35783be93210608d24a5b2cc24df01fe05791bd133d68b656
SHA512050d5283fc71897af9f203219121cdd66168bd3e5236bfbdefefaa52119ab0ab0fda159e3e5e98bd84a7dc93af4e3b0c38cf409012519413d4768943072654dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547d7fc6ede1a96c375a502d690525a6
SHA1a055a31349155062c6138f2bc7f0063664117666
SHA2568d97d09c07a8f5d9906afbe03bb534daae7b3f3e0f0320ddea1ed6f32a35b6b3
SHA5121d5b785f9a23aa705eb4ea50e70d789287d54a1402e6e6702e61dd075b49e281086deb49430b021485981643678798420565058145e5d62b899d376b0420d143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6333f4fd3c49519ea1f364b2c9591d
SHA101c84cd8742f3988b5c8588ffd57577889c21c35
SHA25683c722d7c2d2222140b621f5a348d9227e654f9d1517bd9b95e51d2fdf2390f9
SHA5126b04e217baa7d998cfc56eb2133f7077ee643bbddcb37e09e80d83fd693f96994b91d12a18739c28447abfa57eb291c64785b0280a930a6716bfdae22a0bac75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad4251aab3e4d625c61949796f544ce
SHA12ebe545838d1eac25fb8276cbbd6cc4d1d5e01ea
SHA256e345c94fd9ff51eff7811ee519991e0566b193f9d47bf8fbe67b30dbedb789fe
SHA512f3e8ee14e1afe00c28f4c08935805b1c4ee55fe794f73200c31b2181b12c5424aa7ab188deeab94848798435abc5fd04a0800091dbd83cd1b508920c06b6e501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e14d6d4ab2a2a88bf28a24c829ee46
SHA17f77f543953d110428d0476aeceb32c2f1938a86
SHA25692f690a3b0d2751e5ebf784701127bede26b91957bfddfa7f530dd8e52892736
SHA5121163f459b88db355651efe675989bbb5f6d89f362b93cc48d7d9d5251a4c4b3177d1341de99046cf0373fda56445d9e850592fdce91308d5ee43e86418804d85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b