Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
eac6d211b2e7c39ec5d46960353543b0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac6d211b2e7c39ec5d46960353543b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac6d211b2e7c39ec5d46960353543b0_JaffaCakes118.html
-
Size
723B
-
MD5
eac6d211b2e7c39ec5d46960353543b0
-
SHA1
0490ba633c1112e3419bad7c1a7116768fe493cf
-
SHA256
7afb6048dcbe9862d51b0954be2fdb30844e22ffe33a41dc7f36868dfa1fe308
-
SHA512
3824e6ce9acfc193143a7ff619956abf51b39e6a5268eaa9a20e5bd130cb6772b21067f4e11e69256f875446f29524711a1b4a78e15e59e1702f27471bf13e2b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000d59c1c8c208d7e69b0070bcc64f8410750af744912d090a7370be76aec9e783000000000e8000000002000020000000567fd538630bddbc62185adb441d17b92bcdae94f5406af997fb7984fb683019200000003f0d9ead0e6a573ad8caa54c1d5d74fb64fb595840f4d5c7190ba03e24d80bdc400000005ca65fc70803983fcd83103c599cdc6cc46850ac68ee8ac210440d40c03dbdf6118726eef18fb0b54d4dec3d18001aa5a2448845bcd1bb4e59ede50075868b09 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889860" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA25AB81-7651-11EF-B594-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307217bf5e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1324 2400 iexplore.exe 28 PID 2400 wrote to memory of 1324 2400 iexplore.exe 28 PID 2400 wrote to memory of 1324 2400 iexplore.exe 28 PID 2400 wrote to memory of 1324 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac6d211b2e7c39ec5d46960353543b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56a812640af04baf96f5c99d191d3aa
SHA112c9642ec52f2d84e9c106418b40506520d7978b
SHA2561f9384336fc053a75c0079ad4bddc73e028ce324159ed63f50cf5a46fe64020e
SHA512e65b582735311f0b4f1ccffac6e9e37b1caf5f387f0e351f00130d28a4a66ee126bc355f17c060ca6c5d3e020c3bbad06231051f7041d6ff9fcd197bbbf5150d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b15c6d6ea17c4ee26c81e3abbcb2663
SHA19146c623497da90490dea6211d5b341bf4796dac
SHA2568e4c9242c811d6b25a84bca95ac7044921f2338aa613010031bb40b4d587030f
SHA51263d3cc9a3092aa04c6a8c8616091c6b807d0c2ec99967fbf8e470488f9f0e52f72cc26cecde6b2b25babde6cb6ec8c3eaa5c80cfb7619db09946b37f5c5d8f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524638fe9f355c325d99636d6794118b7
SHA1b5da489f3f155eea0d2d574d74c430567df3d774
SHA256aae2459d318fa95a46dd349f5b7fc9dc94847dfc068fd4febaa32eb46579843b
SHA51257ca247883e2990abfcc8a4dc5e04373366dfccb583be13a601cea19d89550713d40c8a248ef10164ff7784a345bf2858e08f6bce70884a0828e8f1af4d77f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70d6e3aa27aa8bac2de05f327d02525
SHA12dfccdf8b67acad5aba1b51c3bcadc739278252b
SHA256a770764db9e35c84dfee7bb5d78bd2fb5365293a22701f96b0f137c1e3982bc9
SHA512dfa4abf7d331c85062575e3f81ccc7ea39808330bd7c54535616d5620a04daed929a46f737f8d1bd784013684a913f1c95bccec92efcbcc632a4aa996b55861c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fe5b0ae77ead6d0de952f98cbae212
SHA1b2642e3a9d53c493bffbc2eb74f744e0f92c3f8b
SHA256e3a4c7427f411f1810a98c7fa8fdbd8a38fe31cee81e91de0f7ce44197ab5fa6
SHA5126daca3b68605412bf4c390a0d34967c8606d0d3955fda2c6f63aeafc2001d9ef00fa87a7b59060b74c1612587bf4ab62fd726630e31343386d2a4057ddb3501d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54557c264079d0bd2b3a7740beed61530
SHA18758f978281fd2109249019a41d2dd640ef23e2c
SHA256b6d99de8f4076a538b49c9eb44f8349594c2d5d2f067a3d2da7f5586196fa495
SHA512aaf15e981076cd081892bee3abc2724b8fd58830c4a6654c908efb099ce2c24fa4b72079f60af4d1b16a48839ae13acce37e8c01befea01b691061da7aa1a607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f621e3563677ee5cb131fe56592a164
SHA10f4259be7ba1a0555a23153e8e4a5fdaceb7e7c2
SHA2564828fec888d91aa51cb74a7ac7997d32292ae607366abff0a108fefc5a179f3d
SHA512ef5a278d47665fc7462851d434a55967ed0ce3a53125530ec13eb403b730ec4e536d49808472992d4ca76e5f1f6465f9518a32359ef3bea85583c52af145c308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52060040b1a03ceb64b4fa4f2c6af689b
SHA1eb8bbb23952989a5843dc05d7d448f0b3ae7d400
SHA256b6dd173ab21bfa845596f996c8f8dc6d7ff1e2fed90cb6eccf7d81aca21a7c52
SHA5122ede81777285480fbdc40a01e24602d9cdda4b8eced9e02a88200acdcafdec84c7d6ad7b180cbcf84ec1360a31ad34ec47f3a3d75ce3fd8e1d63b39a774fdb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c049bd8210b937dfac63b8cd97582e
SHA150f502994eaecf066f755efcede75b0945f9f0a7
SHA2567b201fd37df951f3c826810d033f88a1601f30d4d9c27a1e15de29fc8393e50f
SHA512067376c9d4c5160dadd4e61dd093415ff6b5e4bd5d66574b21c975c0c7363f6db862186e70f36f6ada4334dddc05f081a87464455fb80bcc7bf4afb6404940a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59940969d47417847770dd1d713f8beb9
SHA1c26cdae13ee24cc9135f8b1156dcbaa2ffb09ab1
SHA256ff824a2d80b59249ebf2035a6b6f25d5f38530f7c719f201625fe50317f819fd
SHA512febcd0ea9c96e0b44a88040e986fa783b85ba464fe2d936bec2a0dcf68e1718de72a9b04ae3dec643d21370ec17fe0ba0904614a00e9218cb28adb95a72ab4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2539b4d9f14bd2b889ccc49d46a1f2
SHA1353cb6e160bcca9542914dc22dba89deae77d3cf
SHA2563eca455c15dd116f54896ece4ac84ffd5ad9489fb620788b754a35a38a189819
SHA512141d77e80b48f673702923d6759581aff5dc180855884628f7c3ee0df84da7c4e4d9eccb8ec81e4d04906766a5ca249ab912949f1df1cbdea0417d88fc9d598d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f607978d9eb750ddd4ae05d0496fc8
SHA17c458666fe90deeb605756788cd9c29b0e239b99
SHA2569863428e4bb9724904701d03baace2ca9fa761db90f34705d4bdff90e4ff6f09
SHA5120b85024a758cf60a1556715439bbc5c5c3ca3468c417ad8eef915b59f3c2f29ca971104750dd6afafdc967caed484b018e448714c9de39011021b2071b39dc6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527eb07785e9aa4e722382f7af1593a5b
SHA1b16ac94c55e20c245056888a5a9377e325587d13
SHA256db118e54dde7e82292905c88c527a34f08f18a2c9a4297529b26a564da472410
SHA51216bf8a71eef11a29fac9123ce1182a6b627c65e0b24d93b85332bd4461f3d98be23e1afffbd781134b4a096ada9443914b44e3ea0990c72d8b45c42faaf6a03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a1ed2aabe914aeeff28ba32323aa4e1
SHA15a258142dbc89ca8e36424c5912eda4dfa76eafb
SHA2566e55383037e11dc318b29d3461f3e7b1c048dd4cc42a391575308e8ae9b0649f
SHA512f16169fb3fbe9875206e5a67f880f9f4815ae3dbf1cc29cff373537f2348394f8e3d2d0d0be884bbedae81a2e630eb4ffa3b81f3772c69c82be00aebcc108dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474b31eda321f499c552ad43e65be731
SHA190cffb67649ef72a08174b443fa800bc074e1276
SHA2563d55f635cef1fb39bbd0de1429e5b31aa0ee6c4c89268bf6f3021a076f2ffb99
SHA512e4006efbc77908066c09c534039cf48f31abb7c166789c983eaaf9759c5160bf3a493a0d7fec270ed980b1ca52fcfbd7301bdd1d1e563c0967c4b332befa1d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1be1a5c3c17570a23a82304fbcf90b
SHA1f408efbbefbc230754a44943f8a7d23164300ad9
SHA256828ddf7b82e29f86d84f2cbc98338cc1a944ce188ea6d9a0706c24bd95aa387f
SHA512b994aa8b22b067ce2133209261d5ab360c2bc6d6050ef0a7149f51b5231f9a783f52143d639548d5f166c4ebf681327208167f89b72db678f30325f821b8d36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e52d16b2d87f907fa8a66bb56e85f63
SHA18d2ec4f62bcb6698a27f23377e9f00706bc374d9
SHA2562e2876f272d966d84c8d7da86d4ce7cf4441169b798a9097a214188ccf006c9f
SHA5128c113dd415dddfaeed0fcf0929536f785451a52148306ab150e0c8cbeaa29193df2078c2b7fe9b4f1b3f2b91b9cc4a92592b262836daffe544afbc8aa951365d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d434d534b6ce6a0d804dc5d464e8e8fb
SHA17fa11c792d913004b46744b397775f30417be31f
SHA256be477356a0074b6c7235130ecc2b3008e7f63fbbf25bed285a55b8fc9c01237f
SHA512d5c6e2725931a966fb1651f7a66e83a63a88ca7a99eae510fcf24c194973355d380508b330e773971126e777e318b9fb34213d5e58c18c26f84fee7e95bed8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c474d9235c35d8eda5c2e5e5a8c9449
SHA122e86f265bcb057cf5a752191d1bb18516ee96e9
SHA256ce521dd177bc2b84febf0271e7007e2d2803688f7e4b54b15583a78929436ace
SHA5123af2a5d5bc2b1e7df07d7ba365887f9f4a6d743d26bcf11e172278c3b6fef10ce7404c5d1ed2800ed9435d30a48780c52aac102bec508edfa3004687445b919a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b