Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
eac699975fe01c94b7a774be4b9f9d27_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac699975fe01c94b7a774be4b9f9d27_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac699975fe01c94b7a774be4b9f9d27_JaffaCakes118.html
-
Size
519KB
-
MD5
eac699975fe01c94b7a774be4b9f9d27
-
SHA1
c0528be2d27901eec0d13f4932a97c388b6b5bdd
-
SHA256
15c7e027c5121b979aa710047d806c1c19ee6666ec4aba4a363f3bdb981f7344
-
SHA512
2c6df38f0eb99fbe7ddc69aca5df61ce0c79bd7e88128637a16c78dc1ee8a32e897bfbacc8b24ad437557879ed07bb829a4e854782253d45408269e2dfb35d68
-
SSDEEP
6144:snsMYod+X3oI+YReJOSsMYod+X3oI+YReJOssMYod+X3oI+YReJOm:Q5d+X3SJOQ5d+X3SJOa5d+X3SJOm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fd72b45e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFE98391-7651-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000033d9953ee4d6848e76925566b8558af85c2b0ccc6597dacc65d23b703c8f8369000000000e800000000200002000000089ec765ef20840974c9b1fa355a5e477a6bf47af6f9864dff5d3c61b0d41bf022000000015de81de5b7a5d6326d6a8937f74ec420560cafe684f45acedf64d901d4e53e0400000002d4552ff9adb59b02d41dae0f9e6b310281aab29c10d69fc3ef7eb87f80deb289c13c92820fabfea9854e3d2149eb905de1e07a1c5d9bc6290a4176a65f147f5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889817" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31 PID 2316 wrote to memory of 2148 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac699975fe01c94b7a774be4b9f9d27_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d1e7dbb3378c0991fc802d45a0537a
SHA1fd7d684c2885806ef4d6fb0b3bfd3cb817a6c683
SHA2564cdaf2b242436248ba2f7a0912945551d2ecd7ad10c7df6236957d8f1f56d8e4
SHA512af3373efec5209c37c7019ce697de94b3adb4dd502cf1f61ff38fa4e88ef6c62b63c18ab4a7b1f1ce224138a25d1ec0908bb19d72895c6d8fcbc5ac9478c2367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b2a417cb1515d8e5f9becd2a2dedeb
SHA195a922559b56fc4c0327fa983bb19960fd61ff52
SHA256f20d8074f8993acb9479ecef33f4c2e71d20193769f91bf2a3a9f36ed83be541
SHA512f4abcc64a0127740418ea6cc3c64fa317e2de399dbfb954e17d25b278b3988e844232740bd6d831cf4a0be71085089305679e7b4f417847e3dbfbb8eeb10f0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a80d214e87841bf74c29137fa0ede85
SHA1eec0c605531199d09411a0a2c928be84fd0f2566
SHA256a77455ac555a6bca35f1b37e8affabc9f44af2c028d5f2a16bc47aba54415f0a
SHA512a3442f1db2f9c20eb8e814d553c887dca2225064cb1bf1e9f2776170f8be2bbaa35f2a10633363d90e066dd91193ba52bd15c4784dc9e7b389807d00c61576f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e8a9d913dd75b5c0c1195a4ad803d1
SHA1d098435fb2a56dd151bd84d39bcc7c21994d0f0a
SHA256ceb45eac331b51cbaa322555f684c50ed6cf7f69fe1e6d7eb108c465e35efecb
SHA5127e873a372f5e8e75af105c27fe1116f506416154291928d6c9ac4622572feef562c30f9f659c692a553f8add03c296ddd861ea500854762bb3cee0fc20032ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53822fc71db9b0d8831e41185b93b52d4
SHA14199c7946d30bc490470a2ad4702dfd0c8fa6f31
SHA2566399772e9beb5f63d9db2930952aa057300b7e216c826dc1c265563972a33cdc
SHA5125ee3572df274eb2a07c96bdf5ac0927aceb5a0f5b2f44c7a237b55e20996e1fdaadbac56342d97ce604d86340a21753d108ccd467877b0eb3b9550bd8eab62c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85a89565a46a0eafc1f836fe0c6a80f
SHA104041cf126518ae9e31e0a75e66c872da8b9c9fa
SHA256912f6cde5d326b505f9c963fb9ab9d1fdc350a07bd082d345ef62b053a194cd3
SHA5126579af0a626d3523273f913f606e953b44227e6c5379098976616e539d74347d645fe60b307e0defe8b4b1155f9010444e0595d45e1511a04cbe55335b8a3140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d51eea0b88cf1aaf13c02cac050607
SHA1c9787f864e89f97ffc505cc8cfed9aaa0c1991aa
SHA256a7c6c91a203edf3bdb47f6bf0ff1b952943879faddc4a482ce201076ee93121f
SHA512c20af24249b30754853b0737f78e75ffa7d302dc1b1cee4af0df9ca362a374acb7f2c02cf1276ea6e43ffa09e7e2717b30421256cf04e81c9bb420c8549d9674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a0a5965197b8ff1391bced61646bfd
SHA18563cbf2a2a62d56ca5ce8f3185c3aef745e095c
SHA2569b7b621f25b1e9541439a92b70917158223f9c968b2c822fcb7ca3f3039db1e2
SHA5124c080fd9fdb35d9cc3ae9ce5f2f444da1454761ae53433ab4ee5024aaeb401597ae0f753c562f53b76ecc4db82d9f1ade36cf11eec8a1fb5d4e93506faff973b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51a83a0d004b84edec2b8b47d427332
SHA122b2f340e538a34acafad524ae2c7e3a5e56dd15
SHA25685bb20896cc3677c0b42ec8995483ad1ddef024020fd3317c51ec088904993e7
SHA5125c7123ea315fb1aed84be292f847f8892df854b2c031afb42c54927538cfeba2bded67ea67dd339e47844bb2609312f0a2c45a097581d98b0c2b91c4e898c9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c847f9e1ff122ee26afc8d06516444f
SHA15ad900936524f067746f769afced599379a25ea2
SHA256fc31211add38500d7a7dc3241634263fb89024e5433bc7ce6ad1b5595fd522a6
SHA51217c4ede8ef86bf0ecdc7a15c724814ce51578340ac863a630226e11d8745b461538762db77c8ab117f1ecc5639224f504011239ce9e62d13071bed8c37600cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57433ef22bc8974b4be1a6d8f713f9b11
SHA1c2ce1c50fed5a8e9f28ba71fb650494a1298e389
SHA256c12739b2e7f5aba766252df35237325672562ac903b481caa5f45d6448437a34
SHA512b8a715b7ea92743aa9b868e0b97177932f010f1d1e3a42e361a26e6ffd8ef865ad2f7047ecde3837c69eddf8dd2e9934180727f26fc4b25a6e3f0957fab3f716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aad11b301d18d1e2991527ecbb63a53
SHA125df0ba74df4d77bc494ac24446ae356d7456235
SHA256176ad0be4223e96d567c76b6cf5f704425cd65e3fea5a3004258110c7d308a23
SHA51211548ada40f86bea783d9c65864972ccf7a6eb5a186c70ee621080018e666c3f0a308533f5208236f7b1941b141f5e90c38517b841a556cb6eff52e3a0b56213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bd627bf462a9a3d8df83de2044d217
SHA1152087e65b2287b9e134654188e102590219cc2c
SHA25630d0fd8e1501558b36bb21e7373a77c802b7c1a0262b881dddf20cd7d6d4652c
SHA512393377d5e835e9a4e3b0004680bfded5680a06260a06244f1e29f55c5a130a8c996be07a90ef095539ff43b0ea97968eddb2592b8d982ee610e18b43172cebf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad44e7fbf169f268238d5f8b5503180e
SHA14a825634b173b983aa100d3f1b3ee0a9f2b81bb1
SHA2562826252e75412b7e6e512216a6f518e8fb7a8b60c70fea0f4f29ea9229e23b07
SHA512eba1955e53e4e001bdb8c2ec3f213a621d3cef3a2b5b99995c0f2c3c49c8694e23589c04e9282ccb85ee8fe780d277643bd5e5c698e364fa0eb263d65b70fc54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcba73005e609c0e18145951aa0ab938
SHA15366a6e8e9e191e511127add0ddc9d1a12ce4371
SHA256bc2c99647bd282349bb017a4d646582f91f373c9a57a846095034b3de42e6740
SHA5122d4ab167d2496bf611f119096cc239bfbdd3f5cb3eaf8d2edc29c5290794fc65e67916a5f7f71ca840020f43ee355a44545f2c46845ab594d17154450ad241ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f476170815f4b701c6880c120434c7
SHA1d0abba0dde2bc3e7f68978214379090e2b35e1c2
SHA25649f886c16467e607021ac423e41929f788414d777abc92e580f0b75620568b7d
SHA512c2b73c836e815903888bc4978071d92727f3f84ffba438dba150d383406b87db2b323e67f76c97f216e9a719949cbfbdf6b1219f2eb386be75cff5bf7819befd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc212de6393d800c294e66696ac29387
SHA1931470f90a33cc9a549a0ded4289f1231a89f69c
SHA256c3389dba20bf8af8041305b9b78c59866bce39533e40670c20265d8bead074f7
SHA512cf01241b54d294092725adcdf27916addcd02160b4c75aa52b310c5d5c09576656927c19bdb61bcdb7f8b0e3c9addb82bafc13e78a5760c4287c75ecdf0b6176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de0ebeea99f1314a8b1dee1805cae72f
SHA1ccc6fb25ec48dcabb97fe20ef7ac8859610623c3
SHA2560ae28ae792fdb422a415346b0093824e68a7a52eb9fd4c86947705109b97ea1a
SHA512ba385f5b54bb2a3af16cccba68521a2bded32ca9d7b788e34dca80675a796fa321ef2c7f3caa44d5ad25f949b69817b554f4964c0d73e7be435e6525b864ac4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257b224b9373f6e06602b95307a323b1
SHA19a4f27fc71963be2ef34007233b90c84602285e5
SHA2568875b707f6a40b5f148826184538ebd323f1bf4786fa1608dda28ac5493579e0
SHA512b8d1dca3da72b780cdfd426a48b0862fd14288cf745614d8326a5a76b785dd3b5194a81eb5509ccfd7f2a2b31f77fc68853b769676f417f5513230897c7a5631
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b