Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
eac7eaaeb46e7e94d5a924e7764c4b3b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac7eaaeb46e7e94d5a924e7764c4b3b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac7eaaeb46e7e94d5a924e7764c4b3b_JaffaCakes118.html
-
Size
27KB
-
MD5
eac7eaaeb46e7e94d5a924e7764c4b3b
-
SHA1
e81e3bf651a3640649b9599b786bca6858cc4bfa
-
SHA256
f840a1dde31aeaa6667f4b7933f3166cc2ba4363291889b49f021758fe140162
-
SHA512
d16b9b1cd9d614ae96c693cd0f00c92ff1e566214490d556a0d8d3ba2345de03a9acc4077ca3a65ecd73b27e8ccb4de6fece7ea73fbab14b6e477581cc8e3526
-
SSDEEP
384:S8gMc9EuQSTsZh0/eaEbw5LVM0L7eLgyCi/LLEhVe2e6eBeeOeneUvejR3LA/OLm:SGciaTsZh02XbWPPe2e6ekeOene2e8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890033" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60A97991-7652-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000006dc0fcf62b4ff0bb8375602dab95696d12f49523f6ccf10fe206b5bac7ae4c1000000000e8000000002000020000000b9711f513926b5ca3fa038d12a5b3da4a6de7054c7b229bb62b36572390ba9ed20000000fb68529eead2a7b7478ca4114d7f70b4e8441aad31b506854f8c11547e7e3c5d400000009e72f9138a1160264ab7cd8fa4d3617913083a8f1d2922c37d37905ce57a9ab0ffd078c213484c0da9f160e893fae2ebebe9368f55b6353232de41101d83a051 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004de54f5f0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2528 2384 iexplore.exe 30 PID 2384 wrote to memory of 2528 2384 iexplore.exe 30 PID 2384 wrote to memory of 2528 2384 iexplore.exe 30 PID 2384 wrote to memory of 2528 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac7eaaeb46e7e94d5a924e7764c4b3b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe27b78fb65dfed642e190f23508216
SHA18b32ea4fee50a104b7e0a1338454dbc7552f68d7
SHA2562b84402e5b8efc54849d90f99911348626be4ee9413509b849dde981c5f7d303
SHA5121db87a4d8a4d4890b081e34a4ee5e84c2b119f0ea18b36627320a5a044148b9d55a944e1eee62395ca52c3130357188e353e26a66330d6582ce7fd12e899313b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256e7eb38496fe4ea1a36e46586e13a5
SHA17af8c4ce7e4375e6ecbecd77fa5e85c4c795bbbe
SHA256ee87c1b49c251c3e10c727be34b17771ef92e1f295de3c1a2eed16dfff905e58
SHA5121fc5e50aed6663af267e17cd496d0ea8e5254bba3dbc86b7aafb9acd0c371a3337dc9bf96a68de006204a3b2f66f31807b457a9b84f8e38005f4257c77e40d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b894c778abfb6efc893e00b4a0ae39d
SHA1354172e01c59d689d735e56de2b4651a547d0a91
SHA2564b1576ea6dc405df0fbf19f6222829463b1945a0ef4a81f8ca2de13c3344cb3a
SHA5125565a4727be36d729f67c363591ad967b048729dd445461d237c5da77c7f51b3a384383e7c4f1d94513c59ab2f984bc837b61a15425b87b52440503ec29e140b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288261361b92348fac9c34db6be9cb23
SHA12f708b39fdeba18c0eb3b79d346b8a8578508a05
SHA25601593d43a291c7921b40fd4bfbed6f1ca131a3028bbef7b88b401b75efb9fbc5
SHA512a00c63f84b2cc2a4a9277efe74b2ca5f14c30131a0c16ebe78e3caf1d4d9589fe669408cafe41874ee26241b2d64ad28c4c024610854f4ec33ffba73e76a6abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806e5735959450bb24101608669f1a0d
SHA1e89e7f353eb0e7ce21c63428b4d3f854dbfb7894
SHA2569649508160b8a073e9b883a11c3d8f04901b4fd0801ffc3dec4a67d462cc8edb
SHA512f64d70d06b3f729b44025386a168827069b24e3710154467cea6007845ddae8ef7527c00255726f56fb686ab660002b31cdc9cef23cfe7a1ddeb25476ed18f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8880b1b52a5c0d45011dc34b7f5369
SHA17cf4cbfe937c610469f45cf2f220eaa6e4860ba0
SHA25647fcd5f3d25e4a2097817963bcf5030f90e982c377e81f811607e3e13ae018d2
SHA5123521a580cc9b0278aea20a6168667c9d30574ae24ccfab97e933c61367cee9d3ee8ee94a53a52b1916f0eb449bd0f6851227212a258a483eeaba23bc9477a94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c200ab36de4e5e65098452a2a0b915
SHA158909d34db7cead056f2bff3ea3a39f6c32d8607
SHA25698369b6c366ad80408fd638b2884126c024de9ffccb717d94c0c06422537d294
SHA512922592746312994be6b0a48031960d588b1d9b365a918c75aeb9deac49ad24044247537756bd69c11fd20cfb3b14e75f590849b2f6f6f8e72b5fe9efb79db670
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a93caacfc1b192db889afd60f9ea36
SHA10a7d04907fb106710bbfae3be8fa22acc1b2832b
SHA25680e4646dd014445a78a9bddbd914eb6fa898b627b611c85e858f07c705d10f34
SHA512398722ea020b38f6ea8005b2db7ba08f21aeeed0519338e2082dde499a30be9be8cb97309e370381d47d9a385744598aadb303fe44040d27b9bc1e25fd650a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8c9a17048b220d6508669bcfef0d33
SHA11669fe2a870dfb8bb418c5352728c16e79b7161a
SHA256208cff11dffdd03e926dd673ca37c2d7a85b4e34073524516a2a0c698e593b6a
SHA51221866fa46b35687ea037064dd52def5d666f8ec34038f1bd5a313a8b6c18a7e4d0bc87170951c114702651525bc015e075c8a8263053826e73816e9631966e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce50fd1a38477c2d4973df71325144d
SHA1a072c52d5af0b7ef74dce1a9e07ec466afee1965
SHA2566cffda843715e9e85c22dd67ab40fda8a216690706bc392c9d2df51bf3fbcae5
SHA512e02227e14ac8a28f7d28261ca21d975a1b9f73b543f30de94224984a8949760ff940a18cd19ba6af11ebea1b13656b015881fba42ada08df417fec76b03dd5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece22eea7f5fafd9fc9a615508d62710
SHA1b93cb74db92dd20b6af1ac71efdbc9e190c74054
SHA256b2227591f855365748da233ffd267ac4aea1d3b9a50e42a0f10c7ca51c8404a2
SHA5123f11b4c1bfdc4c3fffe028885120ab7f257e56e12f8f093577921ed0276b475302cd9ef4d4a1beff3adf6e81dc69288548aefaa232517c33a427202f97863f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbdb2d6b440c76c33b98a1a1e59b992
SHA172fa479f1cb8fe61a0c02b9a7994e82bc71a26ee
SHA2562cf31de2d571f401440314f0d9db2d71fc69f9e6873a99291ede3878f9d89cfd
SHA512de952b25d0353242f9322601ccbf472dbb7aae046989d72740a2865283a029a74c642917c2ab564971f070a8f392cdb9ea6fd64e993a2dfc485f488e6d0a9e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6612b3482b8b13ee1a71fb36235caf
SHA13e5187be6bed3d4bb8e47c4352a668eca5c4e6d2
SHA256a6d0aef85905e0490f2c473cdc53552ee1696eb78b9cdc2b5bc1b3b0bd159abb
SHA51238b7fd903a33ece4b9c436cbd0ff1039b3f24c36f848006b1b47d087ac9b6a7a372a562c278f5067899134a5a016b2af04a62feb97dccea66ed27aabedbbb599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51084088dfd4749edb048d3e8f0327d29
SHA13712ef5557318d4b1d83ea3b4a6f03f96422fbc2
SHA2569311d9f165662ede9d25376da4846e2d18a04223dbbe50a0f19969f34ce7ca8e
SHA51278d1e368b4bc6e16136fa938fafa3d537b93bbdf9e1be9e9d7d2e8a497e03fcd14e1b47b3e09d0085a104252afed88abfd89bd7aa91dc10fb4d9767446273b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e357100e4f1adb6e707a4112da50cf
SHA1ebb31525567ec06d9f32d5bab64b58954e74665c
SHA256e8ff7b8b09af28b10b77717cf68068366a78466980bb5d5ac21261c1203376fc
SHA51280232f7f42f4b90f065c6b94d584dbbc30f2f0d75ef667439f3841dd739ecdd7c5741f3530f3bbadd4305b40c3c12ab578e839c563a85e803b1113c072527cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad1260c590d3934e175af15d3a6c9dc
SHA17b6b21ec7a37d33e621299c299d3db18f275dcd7
SHA256ade3874d05cbdf33eaa7651a80bf16d01bd709e986fd4034a2d8b7e9a36f8c5e
SHA5122c4ae7dd28887d7f7d98e0aabcb997a1247950cd72ead7c45c0c674d3884b47ba3f06f115aaf34c162664aef323e65a2f087726a6db0234ce8a17442786e2fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54572d170a670e3cf11fc58259fae083f
SHA10e37ca8cc43ec330ae8dbbc6c6af892e37960560
SHA256e5a58803d90b8e5994b1d09bbc84b3ba9f569d96abcfe88311f7bcb11b36004f
SHA5126f581404b1afcac1962a6ecabeea31c70d5850ef6eab66c633bac86a9a567197fe85dd2ad502fd0df6fc626530fea8b172468254415563673d375ab79b8a3086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a4ab332c629e00ef4f006b194c83b0
SHA10070326db11ac14fe4b7dcfd9d1c9d9cb74ee4ff
SHA2563a8a11bb25712f83d60032c0a5ed27fb9bf0704733fa80430ce8292955e911e5
SHA51268d5fafe8db30e3b7650dd454f81d0bbbb98c4543abd183dc6e1da08bd3592b9927f1669519d853b23911abadbbeb3ab57d517499862e06f0c4804200d0abece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e5921ab9d2085b00f77e0f576be8a9
SHA1021eea45d9301dd48273fd3d539a7f294a4e0691
SHA2564e7ba47392414801c4103a9a59fb8bcf7b0262db60d71cf4d3cc81af9d64978b
SHA512e002e85e8f2998ba9aa77f0fe7e7f814dc758df3fa842ccd2cfa6acf72431ea000463adf947422329218b9af9e0857ed1df0d0583234746c38fbe1fbf600fd6f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b