Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac59cdc3311f478ac3d1efebacf6377_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac59cdc3311f478ac3d1efebacf6377_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac59cdc3311f478ac3d1efebacf6377_JaffaCakes118.html
-
Size
90KB
-
MD5
eac59cdc3311f478ac3d1efebacf6377
-
SHA1
a501ab54652bd0ed237bbe8b4d7220a584846b5a
-
SHA256
eca76d09cab815f1a7c62f4469e914a862a0a2f88b62b2b1f0db0b36dd99d27e
-
SHA512
fc93f495ead705cf4a39f8a9464e80ec518887b01e11f0cc61d3311faf0bbaf5e90f7b3141a7a81e2c9fd994c9d305529f5a63df5949d83872807b2aeab8527e
-
SSDEEP
768:jGkdZNvXC0KDyFlh4b6kkPVtSi4zdSqzWSujlfflGOzQUl2q8+9VL4kCuuQA2Bq:jGkdZNfC0KDyFlhArkCuuQA2M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000017f4c6a6d53839dc586130be34291eefdae7e68dfc5940c350d3841b0e0cde22000000000e8000000002000020000000f2833878a44c26c47c27d9c4b86799ce002eb6b6ed5a359497b1e2d7f1bfbd9c200000007cfd7145b92a321d89c78549e53b8ffefd560b73627708e82c6e08e653522bf4400000005b496e8dc2f7ab59640b586ee6c4e9c81dff671e603bcead87b4dfd8c1d1c02e8a998264cc2f9e67b861f4ecc55202b675c1286f442eba7941a411e15e1dbae3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889695" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{968A8E11-7651-11EF-BF4D-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ce416b5e0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1412 2060 iexplore.exe 30 PID 2060 wrote to memory of 1412 2060 iexplore.exe 30 PID 2060 wrote to memory of 1412 2060 iexplore.exe 30 PID 2060 wrote to memory of 1412 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac59cdc3311f478ac3d1efebacf6377_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e22fe75369d78135ca6cbb809333915
SHA15b5c6f2a9903fb62f42f92a31d4d700595db9ff4
SHA2565c11f3101b503ff5f4b373bed3fabf79e859c5a018aefa7def4d387df9d7ca77
SHA51262a74231234462d184f07d86b2536b75c3e94efe2cd2e524d00e6730989ca5d9477397177f460cdce3ce78fb019a99b4e5ad3c5e540886311aedc8c82c9d98b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666f36472e1fa2b038d858bfdebc792a
SHA1b2ef26089255e5da0d9a0eff2f8a9873f2b803df
SHA2569b355bb44aa7559d2e9a9fddf055143ca1bab6eb23a58536017721696f512270
SHA512837e971164d1958860fe64a7584f0b123ad900f8d6c2e123b6968b2417c64a70f61e84193ff3dbb6d581133ad25df3b4f858e4fcbe53333c0e69f4782e58b70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f190eea74767245ace26b3268073d1
SHA1f81d3eb129cd8229638cc009848576486b65a281
SHA256f26d653d79487ae9406a245a3b30d6da7cbd37194093b788de75d11478bbbc15
SHA51214887bd5e67b869f79fe996183d282cf66b510984201bcb942ebc7296a81659c8359e8134f694820f09edefa70bc4e2780ac6ad08c3887c59cf8e78640e39ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f396b7398f7903efcb337db5b0f19f
SHA17b217a7c85e5a53ec032ef53f8ff896275ea7043
SHA256a6291b9923e5f93fae784fa447375621bfff440a4f3714806abecad8d886c9e9
SHA512ef282aa5b9b0430ed04c8fbfd1ab4c5a1227f6fbfac5c408a702d057bb5c63d4e48840c66e3f0eec15463b67a468ea19a570ba964d0d6bef36efdce1d61c3965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510716a5ec02b01cb7b02c1e43cef2db8
SHA109ff71744f065e751ac1fc3484dd9fb047432220
SHA25670201fd8b6db43d52e4a84515c160c02a809d4a303c003dc7208bb3f66f36503
SHA512e74a5026405abb203d86737d59a4c1d0fc864afdd1017cc0c0169f853516d5c4bdc7c59fdbb4f1bd3c19ea6957aa91c91a309b27d6a831f31f85df3384edd7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56259a02ff64e97496623dedf9357edd1
SHA1243387b0fe8a7acac9edf2343c1ea68b961087a2
SHA25666e20c2a9038acf476bb2b0f71083ce7057bbf215f4d31a7daf33298b3a1f022
SHA512728f7c50dbe613a38c7a247bc882999ca9c82ccddbc6cef4e574b3b0a421ca865b423354931ea965245de2123a6b51b3c79c01052d0c399a58f3c998bb3c680a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400e8bdfda6194f2e4beb9bb3b74f68a
SHA15b485191a846b1c58242c0d7144de3163d130f55
SHA25646b93e4d4ae5b6b140baadc2dc4903502c3626005e53180de513947dcf8349e8
SHA51284efa780707dbf00d886aa00a6f158c3d6d154918b45e36e02201de3ac0cbf3702ba418542ed19a0a7e7f0e96f727bff30c5504f083dcde56ad96738d36f4b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a77bca8e06b8c283f964d150b2cc722
SHA131db421a8ce7ee9a09b60eb82b69785efa8c9f67
SHA25672a464df228d4279b3433afb24a2ce01c5fcac7054c5e79e8c509d85ed9d9c15
SHA512c93acb081fe4e7d5342e0c9f77b64de267fd94d70ecb3cde6a14c7dd4109cbb655eb33d39941322720b2c3ea1ca93c2dc5999915a447d19c8df0479e646d7b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af101bd308c8c9629f7c57cfd28dddb0
SHA1defbaa4ecfeb44f7c41454b5e573a5fa28fcd161
SHA256a2a31642c0c1097c318df8983fb9889e37ce30e6cfe1082d68927e4220919c02
SHA512af72bed9d94ea2e3abcd1bbd4582cbc5303b86da5a25a654cf74200116352093373b9e16e140343a4384d4f8fd3a65133a3faa4086e0070db8c1f17c5a7c636e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840ec100ab4b20e564c8718e811e6bb5
SHA1039d9b7ac4a046dd5e060227584200e843f612f5
SHA256c7525864286fc25fbdf10dd2ef01da01e898bfeb504e2428fb96a07420e66469
SHA512ff95128fd7533b7388abcbe5a4a4d3c6fc0de06e0690e367e964ec3e9ff7d022dcc9f5cefbf79b15f9320515fc807373c22f046a4e5e61c12d8c626925fc1317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffcc6d6ff6ed10e7a60fd28e323de722
SHA1b1cfb3568bc8ed7800d97948d15dc222e5388cc4
SHA25662fb7fe42f43dd6f79b60eb47fff46ea62dba76ca09906b4e9b5a1b083e896d7
SHA51233376bcf3da3bad2f90f2b7c831cc738913f4220c0bde045e2cc74bdcfcd77b0814235064d8833d0fbd01da0bd668a10f88deed714438ae31ed3a9fab2b0fdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a216953afff1e5e32ac7204809a590
SHA124192d0c6fc4e93c4c158dfa1bd2dc0d77ad770d
SHA256684706553a7afd469403cbe5badcffd88157076bca1d93e01cfa04f6f7035274
SHA512c73d035247f5fb4b20f0a05ed9b8662d2d4f8f8637543337e5f69efd51843f960f7eef634e4656fb9aa8c260369e824077f43090c09fa95048f4dcb1af92e9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcb3d2b55575950f15c1eb3eb004161
SHA188f86459c44e87092c2f9a1281cd9e6294cf2f7e
SHA2566cf19574db4a63f6b66cd2fef7eac20f461000b538a16270ac4634ca5c9d6829
SHA51276a3985e62ba14ee77dc61799182c06efc8229d4510323167e1cf13e473dd4fdf22ccd9a87dee3f60e3ed2e4079c6f0b1b58712418c35058067ec10dcd2bbbdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a68f0d9ba1f241773574b161800be9e
SHA19b36881f9f2ba4b030e2a4cfaecf172963938719
SHA256c7e4040f96ba9b7c989a0963fa327b81c4d7370861755e4ec502ac4b18742909
SHA5126ae0c16c3c96144d6458c4e5f90238747e9aad9951e6690844b5a91b08c6b5e0b081299066055840dbd53c53d80c054b0c8dff7c8df08454926596d206ad5ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea93675a3908ce554fcb247d84c59a15
SHA1d622362d4125ef3fc602dc7a1502b3fd277cd7af
SHA256bb8952a267249ea04abe26d42151ad01c39f106b567c3acf4638f3e3e938d6ce
SHA512edfe10ad8b362d84f9eab960af58f899c3c14cd2fa92b257d4817c7c8f7ef04935d5dc8b8172f10ffecbe0cd03a2d9ec8b180f402f13fa025dd00a4bd667ab27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611e8d76529cf479b564f30205212d67
SHA1e564577cc594f167c3a10aa6de35f76e8964195e
SHA2566b5919dd532bab6694c82229ae82b933c384a0f0ee792a7ae9fb19ae175d07d1
SHA512cb9bd08f40a7f40571ce79af45d18404ddcdd097611abedbb8f7b43b051e1c80c3b21c71d41e561eddbcb2e9d8d764326e943b6bad33d578e8b9538a2b6c9c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ea595544b0456fbd29469d63cb47a2
SHA1209ca80d85fad072e38ea6e5fdc7e71913783642
SHA25670ad1b619e04915c484d0c6c4dfa65f37c509ce11d8fcd2adbc56a7c5a375203
SHA5128abb13d002dc4fcdc7bbcc1e84ef94478f562485f6f42f2e86939e8efe36b3ed92113c3092c3938c6aa916333a123aae6da4a2eb70ff911c9f0ecff4562443da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55693563ac177648d29a611746c044c55
SHA11bba4808c8a2cb21d6fc7879ea54916165c6fc3a
SHA2568f790766581e1c4276032cd5e4fe5ddca97ed751ad747fa174152695a26caab7
SHA512d99cbc590d3fff2df592aabd4411b91a7adeef480c060920680020b99ccc9d161ed2abf4db798f902781228d866addd3eafc5c83899f65f804dd76c4b4b10098
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b