Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
eac6e254ed3ff6b0c0cf96bf7cfbd1a4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac6e254ed3ff6b0c0cf96bf7cfbd1a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac6e254ed3ff6b0c0cf96bf7cfbd1a4_JaffaCakes118.html
-
Size
33KB
-
MD5
eac6e254ed3ff6b0c0cf96bf7cfbd1a4
-
SHA1
fd273e66b8b3e4543b20d6d7d03f8ef17baf8dc0
-
SHA256
10ae0eacea2790a98b07e3996d89ec11e75c35dd74ef5a70a0b18b16e530b259
-
SHA512
cb73ada54f25fd4d6301df6d54b0fcbb94bc7c151e528ac90013a7bf55d4644372124e37ad428dca16fd013d754250e56b356cc80af81bde83897c73ce5ab296
-
SSDEEP
768:oNjo6woy2ZzC0CNCCCXCUjNbTytpmFEffIgFk6:oNjo6woy2lVojm/QWFEnXv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05780411-7652-11EF-A073-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000077b5afa7c27f23445b5140dc404f0a57247fe1932ae0c82cab3572d7a4ea0070000000000e8000000002000020000000b2441a3f4caad5562860290c68609138f21f57180f4d73f8c65a04a462fb55af20000000d8a8373d96767e5fbe301e506d990a34ceb127db7ae2dc022e5e2e09a6ccef7840000000ce09c32c55fc68f907dd87d43c3522d244dda5fc5d9cdf14462ea7e086b3054f92f0526d153e818ac9f507c477e1c072e73cac2c59833ed167414d2f10952902 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889880" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303238de5e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2228 3052 iexplore.exe 30 PID 3052 wrote to memory of 2228 3052 iexplore.exe 30 PID 3052 wrote to memory of 2228 3052 iexplore.exe 30 PID 3052 wrote to memory of 2228 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac6e254ed3ff6b0c0cf96bf7cfbd1a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37708c84956cfef174042fbf5730eff
SHA13cbc5a5d520b1fb34e330e733902aef6be7eccd2
SHA256f6e6924ed7b00382fe9bc90f1eeb678cd2f6d8e698d92d768a5f53c119dab5b3
SHA512cc54e9442a37d259f2eccdc91bbacf079333da7bd5a0371761f7d632b0fdbf340586e9c0ecb42687a0896621fede4c277da3a1fc7483a4e432adb76f523d3e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e58e7e9595f43731ce4a78bce6de3d3
SHA155d3a1f58fa2f374ab0e436f367550cd8ccc8255
SHA256b0ebceaa43dae4c4f6b6159c960e59a1837aed40b63a7e873f019a80a5aabe41
SHA512631b926df4fdc031f8c6c83d3d95b8e9c6caae1cdd9a70d2266f0b68ad62cd00720cc173f36adb67d3477fd896cdb511f54bb04108532bde7bbdbc2124c36be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd21802c7e4244d8650ea2e85c9f950
SHA17b5d3cc7887f2f6f7fd9e95578138db3c80795ca
SHA256c416e632c84f5be5b4926589b9c9dc8280dca8c738d231666131a571abd1ed77
SHA51284e3c78f0b513a1b2fc6ee2a20689c5d45f46dbfbc7264db36302ac1e8f1687fc7a775f6c85983ceb8ce0797ab6593b018fa68c6cf2e8843c2cd492d7313c145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b20c265ffc893cf843e8d3098a751ca
SHA1a7d5f48e1eedfdf903fe388d44890b7b568e7040
SHA25665d29f56c74fa8b5c9609bd985320948e56d2ab0af7c0457e2c297b02cb6e93b
SHA512640e9dcde00c2d461c0f88d816035bae00cd52a7e7428fef966437fe9ba71587f8b7fdf786cf1b64d513ba9d61707f7d4b23a3391b6d5af606c6637be7a10603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54041a5fd0e050d9649560d293ae6e738
SHA1efe2c72b71953576475f36652edddfb90af6827e
SHA256bec2dce1ffe719fa89bd2e6921f64ce641aebbb033c0a22de640acd0f2755e28
SHA512bc6fddf4c222c8f4702b5861e9f5feed34ffda391fbd53ca869c6ba772d70955de24e6b7b3904bd1fe965b8f0edd4e7b63f821bc10c7ca83a46ede623c37e1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58739dc78e33cf5e6bfa9e17cff4f18bd
SHA16edbcb1402863fde7632732c1a78cd281a8baeea
SHA256c1868e1f25f626db30cbefa6cffd3a269d069cf7f94f2bf1ad3cda9b511af64a
SHA512c42d5c80b38b042efed58dc7c9fb020f0c96465c1a75b22d30e968da7d33c47bed5eb8213943b13a91d9b1edcf82f4a080622f7bd2c246879ca1db9c0b5816a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1b57f17cc97ca0cb2fd1aee86a68e2
SHA12f70d1036d04c4bfb37fe5af4f8d32d14e4c390b
SHA256248aa0c13bcf1f275ca6ed99c7e9ac65cfb24ac465342b91c81b8ba4a6cb2863
SHA512b28d37c51954c7c57c2e254a311820c90baf618e0fafe96efca3268ed8f482e9a715de6906550a0685af84e2a289ec57ec49cab00c3c406cbcb5ea0b625bbfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d8b801f157ec9e5447088b57489686
SHA117d6d90610cdcccae69550b20e1df8f541cb100a
SHA2562f61cfb9b27c20e65f3602d846daf79ba8715333f2652c9621735e388529c3e4
SHA512d26cc71de195d94cd6e9161eb88ed59331af786523c34ad61c8f6adba94df8f343fc38a59ebebff1dd8aca19b178cc98ba6172169bfe023a1aaee72cc703932a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c4b34ec32defc40f022bc4b705391e
SHA11bddeabf1e6bcb14b866465e09d49e270b9fa21f
SHA2562cae559597798084b00f19b958305ab861a2de61645ae6ac71e75944d7c8dd5f
SHA512076b274b25cc9c5708b1d1b6863ee4275584c13062a83a165c5dc4a6550aa84237a6aa50203dd7c3dfe09e94c6e7a3e314ca0146707175f329821bae4f7b154d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500387b6669510737f2d61a5ea6a6bfd3
SHA1300ad0b7253ed194efa505bac94ba17f632a2961
SHA256da28bda4c396663b3fc241645eba6de302376f4557f035bd677090dbb36a4a88
SHA512524a76d231c1f56e21624f6e49e044d1f4e5c89fda990f1c9e08e26587b1de5a9f4b66e8147951472150fbb69080d42860c3d9047a82cf23c40692f6d445963c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e423e44faefa5736014682a6fef723f
SHA1dc0bd27f1fab79bb5859f978ff4e3cfcdcfa2e85
SHA2562120804fc92ea243d1aaab91fddba4c44891cc4a6c3cc6b1101db61cb296d52c
SHA512b9aacf26f7f795895d1dc1a43b12e3d1781cd08228340d2db4170abb00528bcc00c5841e47db9739cf7a2fbddfcafbe4b7c6cd0eee8b6b2f6b4f3f216bbdeb09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52854477805e2ca1172d62b70d263e263
SHA14b05efef808b4957bd0514f8807881be4a504d2c
SHA25656b55849de70e783bba527069ecf7a4713dd3b6467e71d5c3e4dd5cd501a9e61
SHA51245dc101d85e67f723520c431dfb5829051175e108091f12036b9c276934bdc48f80bbe4b0a47517b80249d67f38426f068bb187154a2e98a652df67ecf13aa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da0df9fab4588864012ea8737e03775
SHA11bb17654cb9a5d491351abd3715df54e5909cdc3
SHA2567496a93580ab12f0c5662a4b9d1924dd8b0e2b1453c368d140e42215bfa7986e
SHA512c61a65d3c52fb103855ef5ae95655d8e47daab6aa3300a6a9baffd11d8f26508ff7d6e1e221453be8ebc75b6bd385111456270f57d09fd0d31def4ae90b05c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ddb7a3067d53e0f49fa7219c416109
SHA1e42d80ac657409577a6badfa0edff6728457bd75
SHA256a18e95b6fa250b6efd693811bfa885babb49f2f7268161b5d9528778a5032a39
SHA51264151ef0442cdd34f242479ea38b8ba5b7867a921e98e90fa6850b4828454522dc64c538637192ea77bfb0d1f48ec31a1111c2e8dd8d72728ae1cf9017911a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548df86c2d35241a95442bfe29344faa7
SHA116ce5f6ed66b44cef58055f0862c50c0e6aedee2
SHA2568aeda6fa592f395c57fd4a2a4c72e5f112f8eb2f00ed0fbd3710674c24a08e70
SHA51291590dc9822be79d78d58b511c167d15266d5c537997324cc23939910141fb4e3660d6718c2cf5a10fc89c9a86900d160e9bd78ed2a1ad722871dcfaeb79bc61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54673da821335b9f7537eb884f5f6889d
SHA1a93e211262790a7ecdd53194822356643d241ba4
SHA256ba868658e525dfaac63e1e265f7feb92c18c5ce93e8a5b20ce75cfc8c3fbb411
SHA512eef594d1214deb069b975a7afd1f7184e937989417513745df9ee8f030bcf142e19bcfbb731a9215b77ca40e84bbff4f2141df0f98186734b7e1b85e46e9a5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fa4280a118e5a433bb3a23a722e3fb
SHA18b0ec782f85e58549b6ad2a181d7989b92333590
SHA256e7a4ca75bfc4b9515160bc4cce7915bac0e28aa0149ccdb302c8e075f25f8c02
SHA512038e1c5ed7103faee340e3054605fc68b83a1336eeb8d127e5004a84a2c37ea0ae2ec73f090900043d8e98db7b6e1391a5cee4ff505f5c2bf1df6aeb43912168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e6fe7e3dca9ae01e20a7f3655ad414
SHA14e00ff71a44ef2863ca6c8e0a752725a395ef207
SHA2565bf47adbbfb254cb91ac1b7cfd3384c98a14fedb0a4e1ef96a0f54ee4b4584ed
SHA5122d6b687fb93935252720e0bdb8c8fb55d25898ac9cb145e7929e14d9b411cd05070a9229627088f4538e6bc134df7235164ed33d75a436239a5334080b02ba6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f8a0e06587a87a9614059f8ee0e625
SHA1303bf44b3d72c59f4f4ebf2a5e2930f5eaf16b30
SHA256b891710cac3078c4bf640f7030ef7054c854b4f3333f9185b4d096d1bb8f5f32
SHA5125a5c27c16dc85212a229b6bf40a463c6cc6a61e703e76a84451c55ac0342cf7807e3329ec774f648747bda454e0459686c81345e9846b9441be8e5ca0c866cec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b