Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
eac47bdc5375fcef8a5412b5a81fdf08_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eac47bdc5375fcef8a5412b5a81fdf08_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac47bdc5375fcef8a5412b5a81fdf08_JaffaCakes118.html
-
Size
9KB
-
MD5
eac47bdc5375fcef8a5412b5a81fdf08
-
SHA1
321e1bc539f3fcf9b72d180bf91e16269af71da6
-
SHA256
9b6edfbebe862569b33afc134f80c9f90f6d9a2bfef96fcd7337803110dcb84c
-
SHA512
693210fa5eae2c8c14d38da6d6e7b1502405addeefabc25663479115644aa09a80c7414bf0d369529a23bcc2d27555508f3c3bb4c1bddbd508031caddaec1cd4
-
SSDEEP
192:FaIOfeAMRyibWytUGtRkxHKbAFsl7/3j2wWhKi39b:FazfRo9BrRk5KbA6/TraKu9b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ff07ba4d199d0031a353480cea3d85441c0b9f5449d0a262c5d5e126ef6552eb000000000e800000000200002000000094401fdc380f8b0d259b031c555dd5fcdcff7b056c80439f503de265c82f6ea620000000d19538dc53e99afd287aedb7517f0a7e7ce1b92de041282eff863ceb7821c4d940000000e82d4c6f92b9b4bda301cb851dc0ce1f52c49317babbeca4f3ee0cee171c2d79572dba7256cc278e856ef996560fc0f3070147cb7ea81979a40bf3301cb69382 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{239C11D1-7651-11EF-91DA-667598992E52} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0028a5fc5d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1928 1196 iexplore.exe 30 PID 1196 wrote to memory of 1928 1196 iexplore.exe 30 PID 1196 wrote to memory of 1928 1196 iexplore.exe 30 PID 1196 wrote to memory of 1928 1196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac47bdc5375fcef8a5412b5a81fdf08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9923bac3cc20580cbebbe4f25c7f0c8
SHA1231be896aef20b2d16b4e6c18c44980f0865b998
SHA256a084cf0067d7f8035e84f0736f90358c545e7763847a27f04d1a2ff3a8948e3b
SHA512070dcb74ca834e1028761f8b3b360a62ff2fd019823da8dace3c34a5c9380a3d392fbc4975451146f4cf3e7d787bb86cd7415dbc487dc50c3c79868ac0dc00d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf796538bf0192b53cf330461bd17628
SHA18626bdd8ba8d1183f0b03433fd29f10b97d07731
SHA256ba489aa5b7c97933416576b0a68a4d606688854bed8dd183867127612dff8173
SHA51283e9d19dcf533f2adea508f4e896b2a53312d3da4a30653dc3eb389160dd8efa4bfbdabc21b923da13e733cb2c5f56addc63bbd609e1c3b4ace809b4f8cbae80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512783452029ad42fc7e57179c3394049
SHA10b99fe769db97a37ceeebeaef766fe7f86f96aa4
SHA25649e29b9c03b81f36417f116ef46eb9642c7a5e449e9766005fbaa25b2e9329c3
SHA5120d6c0d5b3dd07c957d45287f2ca30077a114bdc25fd39bbd029abb7c7804604fa0b1d23f0d1dda35eb7da4d0740ae144175e3b6a230a85d441cb6754326f56b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57baaaceadfc24b52ca67a38dad395af6
SHA11054d1e1b2490ec7818ddd467237ba71459f7fc8
SHA256dc7bf977039982cbbeb6032be3774582471900e960cc911c66f35e57b5644c47
SHA5123e6baff0083b16716744b2228fc71462dba1c0d8195870c2c448dd5ea4016ea72386f4b72a2f5d25e5da8dbbebb7a87b4bc9127b2534fec8bed1b355b071b31e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f36b07de1b1192a486f24cc1423704b
SHA1a9837f53565cd5342e9b512e5e9bb5ba45a60db8
SHA256418a321e4eefb76fbaf4ce587ff8c609e2580bd441985bb9945dab03802affd6
SHA512699d3c27bc83430d072da61a91ca4b2af34aa737463b82057581cbd9e3ccd09611215d596ceb3bdea7d1c8ca1afbe7c114f6a98b9a9f20657de56619da0eae18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca89527ca306ad935be21d3736fc623d
SHA194d3247e715c07e858c0f01065b39681ffbe6781
SHA25644e0ac01f2b4b2cc3296ff0aaa29c04733c81cabd5ed03b60e2ec68b4616d2ac
SHA512d1da421d3d7cafb0634da28f0a3f0223215ffe040a12c5e32ac44b6ee38b95638e5f751a0b14eedfed2627e1c79916bea3ef0443b7cae7a5e6e3448d51f7c64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5023eed0c1f40e2c2fe027a6dfa383e
SHA16b3d7721f46e6314e825d083e383893e1b4b14e9
SHA2560030f5a17d4c86e685625f1e7f7ce3a23028813d59910200537e7d02afa80179
SHA51200f6dec1e79152b5c677f79ff62b43245ea288aa35736179aea6a87f4ef175213bdfb0588db3d4373de81cc153aa90374124109c5b603cc885094c1673dda7ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73b7507466ac77f17b9a17372c3b0aa
SHA1da0a659d590fa4b86e249182be86daf227be7d83
SHA256646ea5d3ab7529f85cad8375fdd4e7757b7a49ae69e22a84e7a0e62f61275d9d
SHA5125d9ca199ee75b64c84ce580cbdd37fa27d3df227d0a4a1dfc763e202caa0066966b47a33cf78ca60a409bf9752e41e208f26d8ac54034b8cd4a037df81f0d998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db55603368e2684baaa0c706c37be7ae
SHA18bea20a26db3308afca1055e8b879d7b2bdab3b3
SHA2564bf01fcc57bf046f15ab8efbd60f00a2b617f4ca8367eb45f2801f490f20d6a3
SHA51217c4f04841a21fc7b0ca0e479e0b01d6c33a2cd48ac46d83acf539e3970407e12b039d58058cc698f2fe49fc28619adbb10756faa546426ce3913949e78cff04
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b