Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
eac4f542a0f70845d77bcd890e960950_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac4f542a0f70845d77bcd890e960950_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac4f542a0f70845d77bcd890e960950_JaffaCakes118.html
-
Size
8KB
-
MD5
eac4f542a0f70845d77bcd890e960950
-
SHA1
fca227bd22b3a0ba1a524e73215ec16cd619d889
-
SHA256
571da6a8aa8288b30efb3e9b5ea7ea0f95f0d402f19daa606f73d926ba82cd1d
-
SHA512
6befaf13afd548b74892617bd59e0db05104bed70e9d69894f710f0824cdf5a66b03b5f61ebd64277d938e46a6e59bac697f53bc9afe448e32639041d2717ba3
-
SSDEEP
96:A2KUt4RbR+5Ak/jftfHSHB+cNlKf7cSdv7gAj4RbR+25JzEGcf6T4tJRDPGmNI:A5UeRd+hjlyHAcNM7nCRd+iE7RD5NI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000237b211b7ec6ceace95fa80cfd3ba61a5b7edbe035edfd517cc23e57e63e4a6a000000000e80000000020000200000004743dc0de35072ad76828d6108e349038418dd49feeafbe02590b7aa767933a820000000394bf5f0cde1933c379215eba74c3296d5bcabf667517a4d5cf4167ead50238240000000b0fbbf17a661c4d9a6a6e92613d5a9e497371b5e9099a48d006711746037c9add8353cb44744d8485a0549da974ed35a6acb6abde2b826d67467b2e3b9eacf82 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889575" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50404AD1-7651-11EF-869D-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000699dc88f7b1be6bd9e9ac8a41e323240f7fb81d473ef64cf7685fe92476cc8ed000000000e80000000020000200000007cc289cc3b24263d7a93a932d687ba635899341f7f68dccabc4377c69fecea8090000000b2598c6204eb682ceb58fdcc126cbd1b7fc979835a108baa8f8e002d06466c1878d92e2c6b6df8094bbeace1531184c3767cae5ace46eddfed6b79118c632d82adba9ad3bb03c1215220fc30176eb487defc088b25e66fda75bec123ef095549e233bea1516c9bcfa9dc21241648a259bbbd974b72f7e54e7d05eaefb20c0ed6d6e1184e79144e74d41be6438c4fa69a40000000c617f1adba8a0edb7735f7af8aa5ae2b8d8af9a9521e7f2c782c8240e85265cc79c1554ac9beb34517c8c8026030e532d7376af055a9192aeaa8652ea39dd3b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80841b275e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2164 3068 iexplore.exe 30 PID 3068 wrote to memory of 2164 3068 iexplore.exe 30 PID 3068 wrote to memory of 2164 3068 iexplore.exe 30 PID 3068 wrote to memory of 2164 3068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac4f542a0f70845d77bcd890e960950_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd4d3d23d5b9adc1ab7df7c8fbd2c58
SHA1dae6702a57fa89744172567cb811845cd8944e1f
SHA2565a9c848a32353c39f327e756d794e089bd8acdc960dc2b4c3987e310ea0f27c4
SHA51213e5dfbb8bdf99b305368eb41f33d88ea0f9e25cac50044015fc4564a65bf91b5f7deeff9e92a8d5f1251a9338cb05c9273da15335f6fea73a61009272e4bf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9568433b49973e8b114428663572501
SHA10b491cc59dd23313c2b5aa8d35e37d4cc7e3a27f
SHA2562ba26f570557c2685a8fd10cea3c67342674bd6b56063f4fbf189292829fdfbd
SHA512aee3af08c68fd9b947d9b0f0f27104cfbad9483d7533a6fbbae49d75f18241da44fc762d5756ff2dfd9ecce8c25f821361620ae7d63a9cc38e94a7c5912293f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e49b9e70805b4612c86c82f35ba49cb
SHA1321db9a09d5693291a51ddda5859dddc1db348b6
SHA256ad9cadd34d1e4a3093296981017cfc1fa6872f973817828169295a0a761cf52f
SHA51289086e41ed7d9b4cc03300441def025c79f6a265a457379dd44e28eae9c0207a1e86eec397dc3095f3261d73ffa3a6b7e860e7255b8a868c8e2312943165ea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904af27d8d91b463520fd4211aa21146
SHA1aec93dea1e82dd6de0339e653a642d96c12beda5
SHA2568217371a454f38d03ec353c70d1ecb148e600a804f6c0cf9d420fda5f46f4712
SHA5122dd4c6e5030dc5ac315021132872abceaffb2d55b3b842bec6b5e8a893871030b633494f56332aabee68ac35caf13f50821b53514909503cebb67e79fad6f1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b43ee7cdf2c9ef968fe2098c34b48d0
SHA14bc6e60c7865c6a091e21c47a0590d93e16dc507
SHA25653b061778d5b8838a37ffe0d7e6e042f44ace958404640967b7f20c3fa493f37
SHA512fe0bc63d4751bb119457d5a47d15755767e46596398ceb0f8663123cc222c726f295c58a9f15a87349952503298874ffd21d59cc0ec149c20371cefc9e431183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce0e42f31e571ec2ad3799f7e153b74
SHA11e8fe17a4ab74b1e3feed614395a2105cb5de0cd
SHA2564e4f1cf3a02ec4f5ca56e4222c365eae0d3d741c8d7761538de380c2654eadfe
SHA512edad56bd84f4caa7a0bcc21e0f8795dc123d88aaf4f58960c9c0ace1ead6dec25a7f603de64c56b010a0010da0a4410ef8dea254b6d86014236d27d0b0c01c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584472fe481c3a904e90c512daf373793
SHA1ac464a25256fc7e1586a0e7fd357c7fff5b28086
SHA2561387110ef40a4f257d98f614e1c26ebe15375332505ae552d5132283d0ff1f50
SHA512a890b6ca7c5897e105b6c33142cf552850d4d0015f14fe7dee6423e8a11cd80c84c38f129c9cdc37f21620af14962ef5f72c90490e2fb2ab9fa6d81da58d9ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9d5006304a3f67afa0cd04641e9729
SHA172c609be83f0a374b6b1177382e836e9b490b4d0
SHA2568e8c9d88f487f6914772a0e60f4b099382877d1a1c2841cd018dfdc0c2e94c14
SHA51291325a3249d3274e81d5d5fd17a24403db6572bfb8f3b4f4ad1d70c8be9b2ed4e97cee07d8a5072d9596f2b0902d7022c324173b1e929404d3a7c8a64dec9b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7fe87f24f0a27f622b4527e18a4cb9
SHA1356b2ab8f8f0c15a3204ac824022f85f76fed814
SHA256d7e850e6306331edf79a461a3358859375ddf366a53a1ed994cb75a53f87397c
SHA51230e07128f1fdd2a1a9aff886505437f7a7b2d72a8e431438af3270a168494feda9ce619b4d7917f15e73786494b8c678dd0f461891b27790aac7cf85d6e52568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e4aa6b90d7b76deeb580c8efb86b256
SHA17c5622d6396f21569beea639873f554dd3a1a056
SHA256d8eb02e4a0f0e1cf31d760611ddace9248e53377c1d20ff11b7a9e56a85822d7
SHA5121a9cc48f7080e553f76bc777af247b3ce53f9107075f2c8303036001e6f61293407ae0430ff0d08a3de7b981ef984683342df4be84c74b69a747d4aa7335ae1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dfdcc8ddb825d1b2958af3bcc92b171
SHA1274f62a08c1a752bd5f7fd28e19a605c68376eeb
SHA25624e57c060a946135db2dce5c32dc9c8ec87e677dbe1b20ed5d67447cc9dc2112
SHA5127d0b224814f8933ba38446e672548b1ce4ef165f4ffd012418f938526de5f70689f3266f2ad6cbd8f75f33fdb02002fbdf2761e7a78daa3345cb7a84bbbde7e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b