Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
eac8fd1fb26e58d87468c60a28987bd6_JaffaCakes118.gif
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac8fd1fb26e58d87468c60a28987bd6_JaffaCakes118.gif
Resource
win10v2004-20240802-en
General
-
Target
eac8fd1fb26e58d87468c60a28987bd6_JaffaCakes118.gif
-
Size
186KB
-
MD5
eac8fd1fb26e58d87468c60a28987bd6
-
SHA1
7083500089665a0538fdd831babe90a262476d59
-
SHA256
0796b8a8fbe65059b251075938db6f2fcfdf9572bc274b2cae07eac596fd808e
-
SHA512
34889b258d7b50ee4ca65d02ee22f478da29c44b4a7ecf0462e737201fb84a11d192d49db16f572ccc9ddcc4fbb46601229dc6a734640973e75df63e2e63103c
-
SSDEEP
3072:ft6ljYQ55dhNm3c1lyFmHMrsgcV+IpHqPxvRe5qVEB9HZ:ft6lc8hNSc1lyFmHMrsgcV+WqPxvRe55
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000c1a46e2592fb131da122ecab25676fc68e2c9566d729d763a160399a8c7319db000000000e800000000200002000000085c283065d97d682c85079451f750e0f1c5a09368de8c2bdbbee203ab779020d200000005ee8b0102e14e269e54eb0e98ac683891dd0459b86a3c9ff7b5ce5057a9fe24340000000612315a19f29abc88fbada1a45b17b559239be6712bd0553137e76b1e6c8771b2b683d9aaae073489ed1ea2b68d135706360eec21b5c9c8561f5a6d5136b0a18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04ff5935f0adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF7098F1-7652-11EF-98F1-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2984 1684 iexplore.exe 28 PID 1684 wrote to memory of 2984 1684 iexplore.exe 28 PID 1684 wrote to memory of 2984 1684 iexplore.exe 28 PID 1684 wrote to memory of 2984 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac8fd1fb26e58d87468c60a28987bd6_JaffaCakes118.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583640308b6164bc0f273b877a5b591d4
SHA1e4ccd1dd53014b5ac395fb61249ab99bac31dc2d
SHA256ae1357e49494b04536f550dc54943c90874fa6a103a819787d0e5af289ab2ef5
SHA5122d8b190d6e788ac9901fada65681b40412f47dcf819a9abf342e0606a25b4f761c72387947db83e1259c6c94191716afbbd6802537468ceb980e3e32e4e5f49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1091ed9fd5cf3f6b5e85f5c55fbf58a
SHA13546e5c40a5d310c1682f3f396b44f4ea2472272
SHA2565576c0fa304f6459a7bd339b688c91b864a778a3b535cc65dfdd174c3fff435b
SHA512f4bb0b40cbae0d066c5ec360c648bc0a74a9fefa3eca31ce602bb9c498a68d04f7b77dd3b55d2db58a638603446750e6af2593d1cc748e923bd48bf4ac3e3b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d55114ef3d375274eb3262c0ebe1e32
SHA12e877de1c4320d954b230f14404625e97f135d8a
SHA25631088855c797ecde57d4e1a1b0a4bb95294e9f7219d3bc01ff43b7c77cd83fe3
SHA51236fe9f7bd322ee5d7af3620afaab598275ef25d90699e8fa6ec51135ca0d62ebd5aca6bead2ccade95c6a37a65f49550884dbfaa0d1ecdb0d875a70e6f2a8c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0b59171c8fba89ad4a65c19b521909
SHA1e12dbba83ab49134a0ae580a4245e5387a612579
SHA25646e219458ba48f9dde65f614859c2e7062b6e2ff8438480e15efa6f8c1ae7ce4
SHA51292f5bb1b40d4f88cd0542da5402f356b87688404d13ee6243426f6efe2bec2d05faf848bc89f5a872e6fb10a752cc29ab3450961fb5a699f2c06b3562d773849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f07f76742d278014a914d333dd5779
SHA1655b86d7a5cd8a9ebbd8963f9264abb6890e39b4
SHA2560336768d433feb41f873522da9e46e20105bc9107039d680b13231b67cc9e6e1
SHA512f98c282e781d80aedd87f4b26932c6be3bc117c220d160f062895b4d38e0057d94f6da25505333fc4c225be7b81c398744be26a4b87070ed7dc0b16ed46c675b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f45e10990d583ce51a13b5f1c4ba168
SHA1f07d3a5e47fa8befcf9dff476f81d72cd3a5b82c
SHA256d398781b055dd0556cc6a0de57992a6ef93dd0bcce3ef1a8e37c5d211cd9ea65
SHA512e432487dc928702a74efa8bce8315d6c603232f1e4bb5dd32e947a493809ba0e6b10877e91b8db49eb14a498b70a899580dcf0ab153f609f6733d6dd69b7cac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b09680209824e821d51fd50a424a3a0
SHA1f1264de89442e1ec9c0b9286a0f2751c8e60127f
SHA25662e3fd204f5030e768861009d796ce26c8c354c435677e53967da7080b296a84
SHA51291398b6f7d90171defb78f8cc8dfbaa74f9a1dce98e0d0a970e0f5d296fe52a730030ccd494b2005eff695d952b60f7f93b59b4e2ea3d8fa64c88be521c3f5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577dafba3289752af4496f3da688341d7
SHA1f8ab8c27f4c0ba829237cc8c96e23bf43aa7568f
SHA25648eb37a96b3b2f593204e51b46b42f2c36b99412c142b2e5e44aa3cc66856f70
SHA512b8bb57c3616b5f69fdca42b923394c067a1dae50e518986f3df4303579da006f0112fdaeb1db27846d330941a31df0faf3c491dc9c4a957feedb2c8b9359e9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bdd9ed96af7f7052b9ff0ea95c66d2
SHA13d0f42f163e900942023299a87c2a6fc2a25606f
SHA256cb067e97f260e1bd30062b85a1149e65f575ecdeb1ca205a42dd3236b261d016
SHA5128113fd22d630d90f1a2e474d79d4c976bed0e20825d46b41a02bdeabaa701a56aa5aa84ff02b5f8747ae42dd4f0ea30d64005ecd7063ec1ee4d4ca22f78464dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d5eb9028809566c60f13905931794d
SHA17d1afb47a6fe847dd69ebe5971d97066e1115400
SHA256e8571a27b387e07400ec2408587789a095214e1ddf636f9d1c1f924ed590fd3d
SHA512c192a169d04cc1a1cdc41c2075e0f2e1fa36f3bed71e9f06d92bd10cd9eeb276c75a75ffae8ffeb23b185cd20e77f1287aa42dad46156c675c48ed7af9f8915c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2fdc4524a7b47c92a8a073f38964fa
SHA10d5e4435d2a5d81efc27c0666e6ad5090977b855
SHA2569e8995e7eb8534176172598e45b8e41e55516773283cc4c66a05f6ea15504274
SHA512e1ced271cce545fecda22b6d5888b52cf4a1ae0c7a83ce0ede4b0fc79898bf5d3f25e462bfb302af785f9d8881c5662be9c11877100622c18a42b5c6e567787e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e34d2550a7ac97a5479850d7036376
SHA18793578ce70e6fe54e43c27f8ab83e99b6114b14
SHA256f2cb89011a35d90aff879470eedca9548759a875e25080e7ef6b9fb0c6665a45
SHA5123d7bfb66ea0e0f3b2e4b8287f8044d5911eb1f93c6ebdf74e4fed1c4de85ed68b7e28142e3f4c93a1707a731f7eac74a0e4c5d29f05a509b42fa0ae65da78485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d21c8f073ea29ce5238faf1e1089a5c
SHA1b77b3297ee1557aac776d3afa632609a756b182b
SHA256ebd5989edf76e147978d6db4e6eb2afc88aa2d3618e8e657b9caf6aeeeed82c0
SHA5121369304303907c26eba45cb153a9ea6f4c2a3ced4cd4b959c28117809c69b9427967528e421e000a03225610c1f8e5fd5d524c43956c37535c0c369459b1d25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38bbab7fb6eae61a935fe3627d019f6
SHA16331a69dcebfa02cee038706a35b9ed241aaaf5a
SHA25667788623efe828cedc02dae7a5ec5aa475f3c63f167da11796e0c89ef58ece10
SHA5121fc093a37727b0acaf109dc09929e15df85fb9cefa8ed38687545ef397ebd81f61d8637a1705bf50f2b6625168519c6ae2ae34793fa343ae35998d27e7b454cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae91c3eae021cde6635fbb450117f325
SHA157ee7a37a0319fedb4accbb23bd6e1998673a345
SHA256583a2901906aaa1c085b281748efe6740db11e863bb736e25f3c1c3ec3c5e812
SHA512020bf84bb333617cc920ede13a93b7948caa1fd0e9b141d43e413b61ac4dc6381fffe52584198bc714e32d3a30a86642dea679116be7c65edf28c303cc49b268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0e8567af62ed645e59ce5490e04cd3
SHA1399abd7458c162e20168cf17f0d4abbe8ad4b8bf
SHA256d2a0eb039a4906eb8a3749889c2f98d93d509527d7f9ae108fa983a6199f8169
SHA51282e1a8ed18e641b3cf350150efeea1855d5fe07f1338f195715e314781c86ddfacd6828d80b975ae14a4f8cbdd40d3c9b795f438e0a35fcebab0759fb5094f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550dbcca20bbb61dbee3014b89c13ca4c
SHA1937f75aa7107d8a90e53b269fb6fcd1bbf405210
SHA256738fd0eda5722a2cbcdf4d571837db01be2a67f7f32b125deded0af180316b79
SHA512acdeab84b820add1934d1df5613646f997f235fdc707bbbf1726d0001f6a88a5b46f7ec1e16633a95b7173a9bbc0225ea969a26ea71f05bd0e553030607f386c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c3499d5bbbc1a82a2005462ee7d51e
SHA15be482ee8a786165a2dc0706417da1066b1a372a
SHA25609b6a787abf31386be2a6723d8e757fc5abe07534613e4509762c9a4e73d652f
SHA512289df7a8e9113110011dd8e73e730de6f261370d9349c57a374158ab189708cee51f8b2bcb12e60f1c73dae651ef455c0a1ba412d9658ee4409dc813bb4cad7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494ca0b3d5b93b4331783e4ff3c1c64d
SHA165364a80414a28c4a1389728e4a26c366385381b
SHA256871358408ee57beda4b16047ddd7b7aee0e277638269989f8da099211b2d8a67
SHA512a1754648e32c88c02a5f616863c57ece5547bc28a5062b2c5d9fcce9a5e65fce44d31a20017e555bd79af11a50938f71f05e81a25bb08efb8d9147de12a615ad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b