Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
eac8ee4b23276489d3ba66aad6bec8f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac8ee4b23276489d3ba66aad6bec8f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac8ee4b23276489d3ba66aad6bec8f1_JaffaCakes118.html
-
Size
7KB
-
MD5
eac8ee4b23276489d3ba66aad6bec8f1
-
SHA1
d9c583e1269327ce267ffb8ff525c9628d27c127
-
SHA256
97da86ac4cb12c321a1e1e620f4e414811d663937e152d1f28e0009ccee24d4a
-
SHA512
2f067b8b612e14ea3ad4a02b416133da7b5e453fc2a3a0f4b30c4cf09361037b60313a66d998f5d5348f98a9839641d771a0839cf271da5081f4a82f30c42f9d
-
SSDEEP
96:uzVs+ux7jHLLY1k9o84d12ef7CSTUazfAWRKxcEZ7ru7f:csz7jHAYS/axb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000063566205f17ba724a6c14b4a81e62ba26a9518afcc1e6a30123ccf1386bf65c3000000000e8000000002000020000000f0431d26f32ad273d3e04d957d77ee86b99f28376bcbbca186def1cb079ab2b22000000079605738197f02afee8e49758a0ce43d715b499adabf84d0891aff93090042b140000000b35f582d66a5f4a3e82142bfe059066a50adb5e4e0ed90c416581b4681c6c9a2a6229ed8c2f7ebdefd2e9249b94e245ef5e23dbc863c8850c1ac404173677fd7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBDA7211-7652-11EF-8778-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606dce905f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1448 iexplore.exe 1448 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2864 1448 iexplore.exe 30 PID 1448 wrote to memory of 2864 1448 iexplore.exe 30 PID 1448 wrote to memory of 2864 1448 iexplore.exe 30 PID 1448 wrote to memory of 2864 1448 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac8ee4b23276489d3ba66aad6bec8f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553ce37ec7eac0920f28f93a5b1723a7
SHA100b6848626d8f37b76f5202a5264f1f29449452e
SHA2566dee78141fa2fbeba210408f5009fb0c516692959ecdcc6c0a76b979ff109a32
SHA512953366552eb34682046a82fd0b93c6b45ea5d6f2bfba94b0d0704375693b25718c63fe9383b456b8f48ee32bfee1391de25e794bc6c968819eda55a90f51d280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527bd138c82a7e5ae9ab9a2776b4d45c6
SHA10e9b2430ee0f771d3582d5a60007fbbd6ff69ec6
SHA256cc126fe1c819494a25ce97ae148df3052a5976b33aa2c9e2f36e3f554bdde49c
SHA512faa031d0e2456e629eafe81736149fa27ba93e3fc34b9013a376ae01681b90b1d982db7afdd15cdbaa56bee33452a331c6d8aad3087c1ff47f79509edc9507b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c322aca75b871810f178abfe9c7038
SHA117971268e3ea48bcb6a7230f42897cf468567bae
SHA256f295db0ffab424a10766b32feb8114d94c43d3169d7ceaac4b014cbf54d584ed
SHA51281bde7e2824d82e63f38a7f25194949d3f92fb57944c70659ac4ab8f78a4038da1a06a1b04b0e79360c9900be351b8eccbcca01176bf70e1a1878ae7a2952ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1bdfde52fd3af6107d375e0118bdf16
SHA147d82d06b83b2d93d2e96be728fac5c9b01b023a
SHA256989f3e9870e8580f5ec809ff543faf03d5f3af5861cf745060108d744ce7443c
SHA512a8f008db2e1b147a649d22319eaedc99f16d0b76bd82271c0c80e6977832459f992a8d1e78433031642728b81477f9c68772837a8d93b2321d6ead93767b5767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0c35037b226951f575959583926962
SHA19cd2fb59b012e2c0eba516ceb4e8ac91c1966766
SHA256780457a852c860f189367d692a6a23287cb14fb6d0410e405f71e397ed0b1cd4
SHA512d517f9135bad7f8cd6bcfdbea024ff754344b05cca988d80a3058f8934339b73c91f2707e79245ee97ac825d9b688c91785852b5a360c8a2bcc3f443e6aa8787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593956f3d27a7e6b783652cc282b6203b
SHA1a483ba0adffd5a41313a11c7aa6dbd7c7e97c46b
SHA25620599496a58ae5d96bc88f6274f38bbfaf6ad2e14e9c3c995b2883ec0cfe4bad
SHA51207204fe34cf502aa7ea97c98719c84941438b80dcb37c604924bef529a6f6238963cdaa70603d4594969a7f332f2074efc6f73ec4c9a0c5346e7f242d794c261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301b57ad762e790adbddf3f4e5c11eed
SHA17d63c90102df13fdf7cd624373515a6aa610798e
SHA25665396cd33d892b40d7ee2c6ba6713d8f145e9dcc505ba26308530a5a4829e123
SHA5129278a4cd8ea9ba77288ac073edbbe3174b7b33bd19b3b0d90a4f1f95957f477401ce3529292fb9fbb91240a22dd7417e811bc4b4ab1984ba9792b7ecc1f8440c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493640e6d96d8d4d7b3ae721791905ad
SHA11ee2bbf0c0e3177a6fae65ea28f513b1de6fcaf1
SHA25616d5e41aff5655a51c1e095fe2917556ebb147729c934b4e59ddccb8ef5622c3
SHA512e98af3e2fa3eaff667eaaeb123272e13ffbfa9a4c354273ecc67568f68d86ae189cef94fa425a5131ff81c99a26fab1f70d61bfb0d09526df7fe859de1920e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6135bc5df8cba52db7c25734a1b3a9
SHA17be6f438ff03ab850cf5d9fa26b51d97f6b80e33
SHA2568d453bf5eb12579a01aa7594ac70ea7f578368be890e1b7530132315461c77ca
SHA5123931721d415efc7b7f729e5009d7e2b37e8c83a6b09f6685a0de82093b75204bb9258190d3c95aff23d7600c1a320f46b3d6810b6edb5f2ffad360d37c8c1cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b9875797909ca9ce55fb57e35050a8
SHA1c7e8a5e014cb21b3ffc51bcdc18ca53c8341d6ec
SHA25697198a02cc5c97404706d054d2d4280e814112314b01178be2cae7e7caa1c72f
SHA512d5d6003ccbc6bc8688cf616c0e7177f083450d17fd32a9002f56319ec1873a4bb49055bbe3e4bf2176cfda9fb99a859de8e5f829b4fc15767a5a66808a0e5dc9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b