Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
eac57e32e3defd157d4459e63007bbee_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac57e32e3defd157d4459e63007bbee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac57e32e3defd157d4459e63007bbee_JaffaCakes118.html
-
Size
4KB
-
MD5
eac57e32e3defd157d4459e63007bbee
-
SHA1
42df2c1c38b1d985a15a4fd372ad15aa76f6f16b
-
SHA256
068475702c566bd8294892791ed954d1439c94bbb12122f1d181c8fc904ccaa9
-
SHA512
16886449f062b27d471c8caf7efa163026f831663b4d7659a45bcd8d4c34df4087008cf6db87ac21f11f756999c6fa0478006b7ac51ab00cd3a5f2df59747e62
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8opMZIyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c7995b5e0adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889667" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{871A7F81-7651-11EF-8AE7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000016092a1a716f5abc1d6e9a580d5f5cf62c8fa4add578a0c969342cb4d1ed45bd000000000e80000000020000200000006e1bdf57ea54bb864f7b81850083c997ed0549fa671ecaa2719bf0f6357ab82220000000a6498668ec80a885ed0eab61353f4047fa61829b036b4e7d16b00d4082c8b9714000000060f2c17c83101b63133fb59d4efeec4b0d3b48763b7247bc3f93093e5cb6a68da6fae93be16c0f3202b2ada5e90222bf18e8df462240cda1d8026c3b371181ba iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2784 1988 iexplore.exe 30 PID 1988 wrote to memory of 2784 1988 iexplore.exe 30 PID 1988 wrote to memory of 2784 1988 iexplore.exe 30 PID 1988 wrote to memory of 2784 1988 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac57e32e3defd157d4459e63007bbee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770adf649f7ba6e5affa87ab9696f250
SHA1cc7f0c1e8cf6b76edb4fa6b3f094c4f9f1fd124a
SHA256827e92f25eaef27537ee7dcb9ca94cf1cf491ed84e8cb0f2db6a4cf130783e04
SHA512685075235f652aeec667d7461f3ad032e532f7cff03ae8eeb429a07af3fd2e583119f3613e178b4b98431d104a89b5837debaa7bfa0c3b076ef1c08161c2bb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b72053eaacb6d7fdf4df634e6bbe3c
SHA155fb79eab41075adf452fb7d592553a17b39fec7
SHA2562ac1f75d57d9ceee85642622330cca7be4a970730a11c1fd31a2fc079d3c6d3b
SHA512e5fd0d728b47418d7283df28c94e1d1943d15d6a72a3f3e5e6392ecdbfd0216432987ce315ec9e61d10770fa9ff60f990664447d180e640dbe6f4895065b7cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd8b887bbd8e76b69d6b794b9a7f0455
SHA1cb27b579e7ed5f41956bfe0268407824f5843ae8
SHA25650a22629936f3445305b1a0d1f4d30c6faa912d52e492783f2c6967bf6b662f1
SHA512d7e182b796d3ffca21d64d79e47b762c6339871870e3e19ebac07db5bd8f04317a583168062b8cd5b41bf3fbd0ebd294a668d9252324e2172157f2bf83536dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5693a80057979d7e33813b911dbee6a46
SHA1e63d096bb59c8456b7568230639ded5c0db03069
SHA256616e9e431c6c97363ab6d7c8cf2739e93d58c85fe8129b9809737f7f26dd78e7
SHA51282ad7cab4b04105fe087abd1400b117b5d3fcbfc2fd6170192b9db98521850beab993f6440a783b1463825f703c02e89cc4be67fa15bf15cb2e6e8abef7c8087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322fd8e797ce7854349b99d2b9121572
SHA13026e28a5e664b3726f7079c076aab015298b67b
SHA256286a09a6243b008818bd974bfdd8a219a281ed3409756be95b8dccb306bbb7a0
SHA5128c4bc7176783a3b0e9ab8548fd5bd83af36e2e0f839b2fd3a1d7fa0b1bd640c219d2e1ac5341e70b53fc0a55d6896dc97ddeba7022d2b52426d72ea084779f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d4bdd889ff0665e453907efcd80a20
SHA125c7ef86941852f7fbf4e40aaf2ac24a49282617
SHA25618a36619e7c9cc445e0056e56e21f5d8dfa21b49f7bfe420d054c649e90f4837
SHA5120fdae9424fb61fb32cdecc8dc76499568cef33959a403446f8be7cf54172784715e07d42e98b98c5ead6fcc8775a37d40f1926f88cb535305c8cadd7f000c513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8542d9401d86f07600b854d88099ec
SHA103039e1a37145f0d3e2f57c569f6a6a01b4d7d59
SHA256be8d2627beaa717f40c6d0c209294ff704e3f7329006438b14f8756530422726
SHA5122f79fd2da0e7dcd0ef5f76b9f0fe751a2151f83307d3a25f4e2b925cad5aff864db62a948b8652b67aa01360b7b29a3875a84ccb1d474c961aeb03c59b0af39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516bfa548a565f81daffcbc49de919a3c
SHA1e5cbe8e8edb548072f4cb651c03c7a9ea0eaf509
SHA256355613528f0f7c6c2a12a3955e363266f5978d2372711a17b9842d8ba4bf72b9
SHA512218d614b340c1351d89d9608d1862134160992f3128b818e3b4e5ad6218386a5ecd29268a5e740a4dda1d54d9ff4fc3b23d47110bb635de3d2b2ed9552d9b7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503353e196dff22e0181edd9aad32e20a
SHA172187725b22c1b05e40ac432bf3c474ae5feef4d
SHA2560e07242a05edbdb7acc406921a288056512087f576b3955bb69c9f4fa74876a0
SHA512cb85e1eed8f0cbb77493e581de6f188ad2953b7edadbbacd1aaeeb8cffea3fb1beea344b6b3b7b509fc4a1a090c1eb3a1b7e582f587a37d5a9430991c46d1a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6212d58f155fcb5c54cee2673c5b300
SHA112a8a5939ef7908275cbd514df5f661c7c6d9b87
SHA2563183de9502ee3cf8853201a1f8d7c6ecee86aa242d2e7b8736ee56641c6f84d0
SHA512c9d2ec570119c5376a9beef6fcd801f6ce8387b86cf1268f4fa86916e80f6a7997e05abe1b4bf6043f151e593bad12cf780b2eb9a94db82caed18d5670b25061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8efade1c3762238c18857ade9a21807
SHA15e66e2a5e9ab7c27cc3fde01c28197bd84030f67
SHA2569e3e408e413d15803eb86c5a1534862cb08d42e55aacdde880587f22ff19c7fb
SHA512194ede1c483226d637e371157b9d06f342c0c378e5f68a611c84a69a088f1c02b6f50bca67d8a37073a4ed3fc523a27c4b3333c32fae8c7a0e6e386db1b8eb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb60654908e24f364f9fb536feedcbcf
SHA1911b7d9aa0c250bb289a7a755a616435391a4d2b
SHA256850757721baeaf9c72e14cb4e1ffe04602c90804e7efbcaad04bbb89eaf8b4a3
SHA51215358ba692d59d83c3c793b69b90aa12c2f3153e3a8db3a1a1b0cee3e15c1fe49262c0033aa4ee08069fe3ea30ea01d2c4c11c40bcba1bc0eaf7a415afd6c7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f58d48fedbda2a65955b7bb6a9ccf8
SHA15d70e5a168687cef85fd67776956f70394719584
SHA25694ec37816dfc80124b61806c7aa6a0b98734904c0c338410d431f3915c1f7259
SHA512b82d87522e5c5b51033da321f99a39894f2a7434b13ab9162a2f5866864684aee144e45e7987a70b542f05464f5ea318ec21905a889f5e2cd773414308e6a8d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97cb6ec175018b725072a1fe433826d
SHA16fab3ffd307e8fe4d5108c7615ee13a092822505
SHA256d53b31e1890ad46aa851948ccbec29cd2c1e5f42e4ebc21bd831df55cc547592
SHA51275161f3ae62adb561e3c53efcc65e052cba9dbb806c3d7cdb5b000284cdb1f03c7d7ef9f093595bd66b38cb1c75ecb0edf8d0e97160dbd6ffd4d404cc1ce4ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba43a49b2f6548233ce71b44c162b951
SHA1a43a9c76f390fdde92756479788db123ba9fe720
SHA25638e9ac712fdb4f7bea0944b74da9e704b46fcbc1194efdd9934a9c0f106925f3
SHA51291a1c2fa941290445290cac2cde27c498ec5f038ae13419f553000108d68b6b823101c1b30c300a79c2f7adfae3c31a0b4adf5d362d3728b0368a78d14103597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557db7dfb2ab7b3689c971f9115ffb52d
SHA1af2dfdb7ae712a743f6cf7c2c93b6fad75f118c4
SHA2568b10e60af39aecae0378352f8ecd20ee18a019230481ba24099171b900026877
SHA51237ce5f4cc7783b89152e18384d72f59b4dcbc14e8234a47d4f2451080e8145ef390b0dde71bfd480e16f62432330094eb83d173c090695bcf4daa2685db504fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1d7e86fb719e1b65ae52e5c8d77b53
SHA13b724aa38edcb7a51de26f8b007b4a110f5d9db8
SHA2564c4266c11f5c505f7449f35f06178fe2bac40c3c41258a0a91bc0778226e10b1
SHA5123134dab4064becbcef751de19d3c7d80f8d86a2dcb48dba16d5815d3326416477a36167f6479c4e333f90e7145101a307e5107b2956f1c61bd8466b8fc0483ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a71ccb41438a82080093a6e90948a5
SHA1ea42b01fc50d64254e6446feb1c2dbf4fe31faea
SHA25677303ba3f0874f165d51703df488428aa83b2b1e873a6723ecc7793795bdfd42
SHA51285285c23510b0a1727d3f9624345d9f118db911dfbeb3ca3d4a5a232b2780307ff96c71612d16bc40afe4a5ec0a15a1fb4bdb629931fb3b9b6c4a527012cda60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544b77f0a6f5d233483576e550c158b9
SHA18aba07dc6777999e3d0e1ac201c89a5e68eb0c54
SHA2567d3dd8fc460fb77d598a6043fd921a49972d0df66c1b16a4fcdb2d6f1454242d
SHA512654de613d9f9692ade474e00a4dd5eee84c48e54652d54bec23d35106e1185f609c8c957efb01bf194ed06118c80f86695b3382eaae314013f6a63c6e8077ff6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b