Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
eac60f8c9c52fefdb3fdbf89c090f001_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac60f8c9c52fefdb3fdbf89c090f001_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac60f8c9c52fefdb3fdbf89c090f001_JaffaCakes118.html
-
Size
68KB
-
MD5
eac60f8c9c52fefdb3fdbf89c090f001
-
SHA1
f2bb8136bd29fafb6d5e4c7687980366692ccaa6
-
SHA256
e9438fd7ec18ec0533331e2b259ee9f4e40e2da423b8986f9f8c04f902b5bb80
-
SHA512
55bff16b3b0acf714511b2cbf3a6ad4b331ab3ffdc6a356a035648275702ddeb238361825b5e4e271964d4550f8150dfa99b40d47a2b9636a26e654d7d2ca9fe
-
SSDEEP
768:JihXgcMiR3sI2PDDnX0g6MIJm1VoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:J2wIm1STcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000304814129e5ab4f75a6e0433db5695098f292f8ba405fc9c78de71f895e972cf000000000e80000000020000200000005631f0a7224b2789345b6b4e45e292bd85a4d48bda8af518f24e61e6ec7182c8200000007b99e259ab442509295de50e095442c2f0e7d779ebfcce961d392890883f090c4000000010edc08768b046c192b83ff52e40ea6866a7423cfab9f0fc328759fa1f5a78da94ccd8cfb4f65747e7b8336864f79ef7e70980979528d3aec950ef6ef8a45185 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFA0C401-7651-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1097d4845e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2848 2708 iexplore.exe 30 PID 2708 wrote to memory of 2848 2708 iexplore.exe 30 PID 2708 wrote to memory of 2848 2708 iexplore.exe 30 PID 2708 wrote to memory of 2848 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac60f8c9c52fefdb3fdbf89c090f001_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ec902d24b9c60fdd6ba877aa8be52b
SHA178794d989eab20ea9e327b6e025f2d383b7b03d7
SHA256918b44aa799a9c836b1ff0c09a719065bcdfc7442cb1727f1748bfca48d5727a
SHA5120fdcc2bcfe7d6d2aa7fc3c00d05406fee0f7fff316e0a27f09a6931b487ac3ff917ad54e135fd99ecf7ce83036c4952215017b85d931abea4925e75422ec734e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb2f887eab23f6d5483987da5954580
SHA164185d6ed14e66fe10c3814a02fe1e2d4bbb474a
SHA2569bf0bd94da4472d7225f758635514afabee93e14b8eb512b2e08651bd17bb1f2
SHA512995576d769d68aff9db3a17bc7be26285fb6a3196c156b69422f8052e5a736ef40e17b7f8a1528d2fde9ea098af2ddca4ad01af0061c894040c2d946cf32da72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c055fcff354eaf646e83d9778923eff
SHA17547c902087e70e3bd825e2aa62dc6f8dfd8e7e4
SHA2567b66352904f8d31d3a9a1afac95dcfa1e16aa338d4781583c13c9f0eaf70f718
SHA512d397989b682e8ccc457acc6a5857a9a117586bfa8da18030278470edaa7c8c8d0e9398b2c6d936adc49c9ccbc6913d461fe0701496f2ca0e91ff9c310ff245e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b4f356fd995d5e1b53305a181492b3
SHA1295e859ad65e8e7c2343f189e74c60afecb20647
SHA256b06f7c07ab98ac4dc4a96d83bfb98b2a1d010a79569cb8f88aee16a275d47c03
SHA512b6ae05a87808468400d9c11b681b08bd16a697e2bfa1b6364a37d49043ac828597d6ba3b56214d4edecf2c9cfc3902a9e30565f989637a4b9f9bbf1b857c1077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6dd01f33927068a141cb92f5ed8e7e4
SHA1c93111e51985829672e1058fa7e4a3e2036601c8
SHA256659a163f8c7cb2828bfa10ff5a3e076783c162fe676dba057ab47cad737dc826
SHA512f2e914f29f1b4d90e9642c6ae217968898fdd47f5d4fe13fa822ee96207fff4972f185824407b2e70dd935cc6094e4e36dc70ca2bdc47eddc1b1da1b9be476ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b530cbdffb578f29a31c2fd31eebac
SHA12ed204cbf60d2ec5515dbbfd9391f17cd35583b9
SHA256ac9536f0b76273f2f64cf8d22be63169e542922209dc7028dcbb29780c1d1fa0
SHA51242027aad09a43bf8d0895a60b0162a5e445e806806e390b5616b8d3ff841698d3545e438e60a1cf84ab5fa0f89d424a5dadac8a40ab511544711d69d316b2ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a72155d3cdb61cacb426805c9531246
SHA1f7cfdf1d46c29b2320b4f6bbaa6ce5bffd33bec8
SHA256c06d300dc94e46b9fadefc15f664d6565574cfd2a187e8711ae7eee97a0c9777
SHA5128f822c629b736f3b16b70a8dc5c3eacf2bff50ec7d8ed281484b8c4e530955c83f8569c8a4196ecb6d4d800fdf0f76c3e6b31c6bddbb49f0a5e910b8fcea3851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385ab1a3b92485c0a0c845432a63a555
SHA104863efbdfe78841fe31c592867c6b4479227c3f
SHA25608c1a555711d1852bbb7943029259ebf3e064b88f60ee885e0aab9f16d5387aa
SHA512cf2355d3b994bfc516cd149c521234c46740711ee17c0c9a05262012b48f6112c782acbf719ea0cb77807e08daa5803757947becf4575cdda36c5efb13d8273e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c1f67f9ff74be37293214d7ee3ac0f
SHA108f9e9354eba45143057daae9217cc9be87e13dd
SHA256c5c5ebc55ab9385d40c59099e40e0b5019d01639ff78b501020f0d2d0edb88ca
SHA51268633ce485e9371f52d0333928180469a9e6835c3f69edc70a7da8b76499d4d536096b3cd9d530f1f0ce916d5408738f129f3d89b895a6093fa1492f1fe12d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebef0dd6d5a3b6f036a23d226ecfeb43
SHA1a15eca03e5c9947ff24ad3f66c392c2051385dc4
SHA2563ede40f501607e0e3c755010b1f13976c80e2301a7a9e26d2aaa33a9a6a9b756
SHA512d2e5f8d17b9b4feb3267332cd4736982484e12697a85cc9d1f4117a7162cc17d58c0b83938470b455017705c3f18a9443614bccafae35636f38cf088418d986c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51445baf6e9e6ba668e8cf695d9cd4039
SHA1b4e8e9091b1bd5462b6398084942c0a02af2a88d
SHA256f5af36d1a64c151cbf7b2b67b6aca04eee547685a381483b841309bddd175a3f
SHA51217d11d09403cabb6263a4243324b3bb43db150bff8a7b036ae007d6d316cb8db373d177406b0d30075300545d2764a43e868875530120d2c1ee8c76eda46e57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef90c81a66b2f23c0324f57dc5cd897
SHA1ccde36e314dc3e7eb4d3ffe171cba0c721c19064
SHA256f54535073793bf23c94d991f5fac3de775581a18ce4e0b365e2828761479515a
SHA512b0ab55c3d53eb0f43aecb96351cf11bcc13424d25439856238b64015f6040c1ca659279ef84017c9ba4ee8c242ebe47cfd2e6fe4496e5da708dba8fd01453a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445c006f2d332d11260b8e1f32f4f396
SHA11ba51faa60f77dffa12e9b87d1c489e51e337b89
SHA256ac2473a54566369c4584967533d3e601ca377b47fa81364fa4241a2f1110b59b
SHA512e4aee9005b81129c7bf8c4264e116e73defa2f1b0e5b20f9cc3c9754c9e6c87f167861bfc6e468b329fd0ee8386264110cee7e8333fdd798ff3f5401360fb105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4dd4f8c42dab647d49dfd8b6c513ee
SHA1c650705057286a4dc6bf5068e8379a561243c3ee
SHA256a7072341ee6eda426d0d3537c8b95c31db8aa8baef43e23d8e44b82b418f480d
SHA512d84edc8635bed5e46fde1587041e117715f901edc6d69ee3e0df198aa45b394e83b2665bcef57b6f35e5ab07f9cc69c1e441e7f085c330500406a5227060802d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7897a9dcb9b5092f8b2027280de5693
SHA178da86af5d1eeb87bf2e7a5845b9ec5b41800b8a
SHA256285bc9811331a4d20bc497b472cbefdcd12acda622e99808f291aaa3a4e02b29
SHA51258bb510fe83577872d5dfc8255c420565099e8b6fba39e24e79f58c2ca22f44a637a48b5f551b289a0842e9c68f4cb7d6c4575cc43f3b1b64aaa6c9db3e01839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f8c96e88232acb7412e379d6893afa
SHA162d110d38dbaa25aa37adc40ae3ca67cf67a305c
SHA256e0ec7ee999286a95162c5311c1590d2c1f739f2b1486f5cc95578d6abf6fa9b0
SHA512b99fa53bbf2b33f4ec242eeb91a36b09e171c881f39a4bc34c6c33b44ac296912fce7a14ea608d6539f9ba5563fb46a89588aaa1b20248a9fa8c63ca156329b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc3276bf6a948dd99db031b9ef3334b
SHA19159e81479c4326b4830ba8e176e17e9b8a68eef
SHA2563968aac23528f811e0f396872831fdad756dec659fa9bc22f9a4df679ccf6d9a
SHA512eea9975dcca726fc286571535f1f9e76cb59dd4e38ca51f6aad49893ef52684e9997a0fe96db1da5e2391a96007a8207689b7d7205745dd07a72935246ac4bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c73f8920202499d6dc8fca57f5f344
SHA1d16bfab145f3bd1d33c6bb66cdd2f8e374394be5
SHA2560f5cbf80bbc47d589d9e17a9a781e7551ae60ab72570c3da7df194a935d6b69c
SHA5120df39815172df42d42af167d6abeca07e234dd8d7c8fc92873d9c7a7f9f160fa08172f34c76d9ee666b6ba9b1b8338d3217380ed247e56dddcf10afbca3cee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad863998bc569c3015458b2565a7852
SHA17539622b325609ea8506c0bc754a5d73b3517011
SHA2563d59f75cc29dd2ed209a202871969a5d5d6641a7597af4e61fb682870a8bb372
SHA512980688a4f2a06f96397e734fc42637154023a110fa5869a680bcd937d0c2846823318dc9880af6b56b431b2f602eeb697cfe98702d3c8518d00996060962d8bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b