Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
eac6e1d336943e6f3ae0eb8fa9cd5f7f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac6e1d336943e6f3ae0eb8fa9cd5f7f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac6e1d336943e6f3ae0eb8fa9cd5f7f_JaffaCakes118.html
-
Size
21KB
-
MD5
eac6e1d336943e6f3ae0eb8fa9cd5f7f
-
SHA1
33aa23c1e851a33209efafe914acbe82859e16d3
-
SHA256
79ca65e4c8156959e3662d27380e4b9b2be6bb1e72eb07068ac95dd64dd73802
-
SHA512
5ff28cc60fd8d43791b44028086d437259c0c0ec496b6d086502794fb1da2c5ec9f2ec2c2a4cbb8c24aa50011e0343e6d10d4b2dbcdd29f95a4940b9b377fb75
-
SSDEEP
384:ziXKhg0TUVBD8cq3RxK0IiVImEfP4ycbp5i9zVcr0DJZTOUuf:zikTUgcq3nK0jVImGP4yl1LJZTOUw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889880" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709f43da5e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d2bd3eb95ae503bd247af8f49f39413b57a4f6f8c5948a44123bc45d82f4cb76000000000e80000000020000200000008fae4af2e56a5404a316ab0c38a1627280409138b6150474326d38e767fecccf200000009a5b93839562ff8094f41c7eb94c48730d83bb52d312c9e78c88983ee2868d9640000000405f35e81a81598e0f1ea6840e84dd8bf92c6025e4b4e24b682e6ee28695d3f645bec7b9bf97ac974a9fe2038d16178158885d2fb2681e903618102eddba18ab iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04D88FC1-7652-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE 1392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30 PID 2992 wrote to memory of 1392 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac6e1d336943e6f3ae0eb8fa9cd5f7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e723594cfcf78b622110dc05b2f7c59
SHA102e93df07db07f0730411788bcc5c591ac364169
SHA256734f022cf8f9abae89bbde83e3277bce0554c9bf92787d092061d9ecfdaa6897
SHA5127657a702297b710349e523b4d88ccaf015e6c222a38181cb177d690bc0f996ad6ff9e41998fe04730b46ff2a8865407491ecbceab2aa0d7bb942939a3b53e1d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2b5e2def7500a364fa180dc144c6f6
SHA1ab53100090a497be38914a50da946e55f956a9ad
SHA256f5cfa296bf27372ce5a5f926cee8daff9cebce7a5846c602b4cfa0b08e83fc00
SHA5122730f2c76d2bd59e504776ab289f850f98e714c7e824ef6ef6961a7cc03b3a767241513039c3c48cdf782f5a729aa8522825b3c44605c5014ae0d41fb86d54c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e514260be553b9473620db609583e7
SHA1807930353acc3706e9f1feaca40accf0e118de79
SHA256b6a9a9ad3c7af0dc3402ff900ed87cfccecc0ad707fd192306f15da295955dca
SHA5122d6561bad50afd5bfca116487914ddab1227e7925cd2da19c869589b2cfbc25272ab870016bc51fb4c832fb9fc4df1ffba40d66c808c9457b70f4607226df6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557436f88a7ef742276c150b12f589910
SHA1877144c025395be4389af4eefebb1957d26c696c
SHA2561d212b3ddbc7979b8665853d829544eedde9b9444ef6d7b9d4362873e00dc289
SHA512dee0d5d06a4d7fca6ccd116d4d198721bd6ee96940ccb57426ff09060e69af59ce3cef66aa637b78e1c7ed775bf7dc3df65ab84760dd595c7a1484a8b3843cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5917a83bbe5463ddb5c6020416eb30206
SHA11865424c7de8099e0bb600abea44ce498f9a22c4
SHA2569f4e933fc1931dcad73816bff7e2c942cf0f16e6c824891801a165e71faeafd9
SHA512c8f674b8ad5039478eaca4e6bd19231085e81c5ee703fef501b95f8fc83b96d96d9f8630562a10daffabe7ca5cf7e2721975203ebd796703de5fb37994c561c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532209c98a6b69e9ba20fe6f394242387
SHA1ef23235b2439aacac1007c4fa1da556b017527a7
SHA25618985f04e2b4ab5fa2d5804156cb30882e2d9c1d18103ce0478043aaa913c349
SHA51223714856642893b8f6d7c498d162df134b410bc461108407de26305904d7940f21385f5cfb47f59b12aa6135d68f8a3c7f739974df94c2b85749abb6f17b33bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51598b1cf6bd1a37e67fcaf6a758a78c5
SHA1838a62d2452e616ba45ecf981c652f679217ff10
SHA2563f1e5ef129763eb33f8bc2d2cf344c9420cd0284ec31742b84678187dfe9af51
SHA512db0234f0c7f206bd5318cc0f03a7bc3c07027b51a2ecf2ab6c17d331fbdf36f70e739d4d2ab020fa49c32a13faee7d269c34b52dace3045b29a41ae281c58639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c5a4fecb382948f13df765a7c10aee
SHA16d9fb26915b60741b960487354eee32ecd090cd2
SHA25609a60d4c3680f6f93a7015133c58c732cca2da59e105e282504826a886d77b1b
SHA51286738c7e3b34333607dc9537cc3bc48398d9c40aa75c3750633d84a6ebef4848fdce11344877634eeac080e6402403d03d4ab27074f2d26f7a4b439669128d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5fbad5be8af38e782283c70a5674b38
SHA14dbc867bb2f3cb7c8ef2ba00a13c7177679ff7db
SHA256fad037af17d55c3ff3bece672302c459160d3fdf5d6c63bfc3f7bafe0afa9c60
SHA512398aa4b26d6eef4772d6870ed1424a450421795ce759aed3fdde27f576233eb41b3281e4ffa78a80f724d3b8a4a4586ce6a04e65e2eadbfe736bad926558e158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d498f32025c363a471eb4cc28187364a
SHA1715912d69eb53a570e0eada169f4d9efe18cfcc4
SHA256bfd0d6260dc2a18c519f1d5bbecea2ab7ef1bdabdfdfa4453b92d5211523aa28
SHA51276e4e5f0fea8fc74897cd4f79f4a6166b696ae0d2d850ccfcbd7c8e197843b8d66a8d7780e42b68fee4d9f3ab00fb8a3ee0c85ea922ebb5f6150d4e94b8afc39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476188442783055bd3680586a3ffcc80
SHA169aa56e1bfa5ce47d1a544d84d2b8183594a0d07
SHA256b31991f2760c5100bd92d0b24fc5aa4e8f4c43626fbfcf42d33b1edae6b9c4b1
SHA5124656efe86339c28d077506703d57aecd2f6159c5412d149503273ed2e0f1beb94479882444cc147b4f9b67266b2c7fc8e275132d6eac2aaf275914d799e2c8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c40c4b9e9411741877bd370a334a37
SHA16ba928a1fa3ae845a92bd5ffbe3541c7a6a29245
SHA256a27a2741e96b450a486b2345f30454b6cfec8ed144310836da4ebdfc648536b9
SHA512974792c15bd519b984e8787bf33cdf7e8b40f592194263d6e852ffc993f802977f712a3f4b9a35318a963022e46bd636c772970878a177a5601ec9d57981f466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480db06658d07a187de7215093aa7b9f
SHA1c13bf46c37dfd72aff89a7715d46b25d2c48a4df
SHA2562f88ce455cb84839174d729ddbd73bb1e0dc4593776647aece02d29d26c4bd82
SHA512d82cde07fa6d5935e78718630fe47ad49273761f9625d4d8e747ee4969abb5f7fcb7e8b59b889f11142c89ce369682ad8a3d52520b1a737ba063253ff077fce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a85a388c5315f6914ec8a7727063fc
SHA133d2b44cccd815b7f17e92278ce2ed822c5f7c57
SHA256ba50b10edbffe2b76926555fdaddfd5febd86b1d3cc12405770bbcd2ec5c0bd7
SHA512e6586d8180eb6c0344e2c80622a424eed298ef128a1948e07a895f888417ca0ca3ea722e4eac88d31e04b380a2463fbab9cf918d0c421fb04359f88f7d20f325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6228965ff3bed0d27e2bef8e2aa4ab4
SHA156f0987a14b5b67b2ed7d59f668880050e25e278
SHA256045e06b4143061ab3ac47b0c81b5dd2a6b49d1430664f57159c516621df1740f
SHA51241d06d424851b92f0ca6a57763ff72a33778b2ec3886a013ef94a6e1c6463b6a940c30244139d56768e2632553b5081ccee291f7f00bdcaea50e664fc266a125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8149906d02da5142553a90092ae5dc9
SHA1b167a51f4867d3f2febcbefe4ff116bd503eaccf
SHA256dd086b9d18f97c20db4d8fcb847d880e77e8130e3335db20d22564df4c20a9d7
SHA51250f480b2e8b9af10ddcc4081042ac45253fffd211804e7d5772aca30c430a69e5c0e33fcd1c08a3c3cc60f424fb3ccda42ccb0baec1c01f6e4779beff29fdb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75a6ff2451dc6f81e6e6ce74d9edfd4
SHA11cc773ff0813a88ad84c444f750817a2b76103ac
SHA25602c0d40b2b08481624ca3c12318acff01661572351497f048fe3772ea046d2b3
SHA512e4fb1878a15c80d100d4fe71beb7c0112fb5a7d23e8a629ecc1dc21ea5bf4aba85edf51b7739b0cb2d443a577260cd33f1e028f73b2573d4489e049dfcb196b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c61ab4f2214a76f0a2145217358509
SHA144dfdb6cf8f747633a373ba8fe0baca079bcbfc5
SHA256fd5317f2c863941cdafc046b936068f9828cbeafe1f7e4ebf97c683b81d3f422
SHA512d053b5ad855730868e7daf59f7dcdad5939819e65f02a4b3766a57ed8c29331687754f407594ea1b551c2659e1f704b6ea03cfd7b46727d58076af16ec5a8f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa8ebd16c8c3e162cb0cd8e543fa65d
SHA112c4ef6ccc975edfbc53ca3f24a09787461343e0
SHA256f528204e861c5cb86fe67edf9ecae6bbb270aad1a6a099493ba68f8e2d234693
SHA512e80d5284dc29c68c70695192e8b5102558e030b15c4042cc314ffe17839a0121d7bcfcf4fe8277c9f620811e2198c1826d565ea569e74a3d14b849745eae26a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b