Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:43
Static task
static1
Behavioral task
behavioral1
Sample
eac86d85858c9e11987e06f3940bd7ee_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eac86d85858c9e11987e06f3940bd7ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac86d85858c9e11987e06f3940bd7ee_JaffaCakes118.html
-
Size
985B
-
MD5
eac86d85858c9e11987e06f3940bd7ee
-
SHA1
29bfa278cf74e325ac64b2f2f539649da23cfc65
-
SHA256
8db3eaf1c9211db0463d40c177a23688fb8acccda2fca498435725e5771c739f
-
SHA512
38c26baf9522b3218b9eca35eef47dc3e511a87f8967ed366a89d4d10f9bae3840a8f6d6f4da40191e7d08c0cb55439ad5f5117a26494eadb6f5736f01bdcbb8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{892D9361-7652-11EF-8B6F-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000030c54a90a19d37b696693502409903b971c51602b2eab6ce7ba05698b0c9ca81000000000e80000000020000200000007f321b11afb0692b08a3bcc69a514a0ac428451121bb3531e8e992232e5b7e54200000001f417eb61f6d4e641c5bd607f7a44c1d78cdc0d5f66c007a727cc5578f004ed1400000006fc78309168b831e56dc97007a6ae553e3c6d0190690f72683a4dbe298d024f48ae6370d06c8340a0458dfad8070df7568d37471770a2b41e1cdcc05a226df21 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01fca5d5f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890101" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2824 2460 iexplore.exe 31 PID 2460 wrote to memory of 2824 2460 iexplore.exe 31 PID 2460 wrote to memory of 2824 2460 iexplore.exe 31 PID 2460 wrote to memory of 2824 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac86d85858c9e11987e06f3940bd7ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50adf304c3fd5fff2228d9c37fa921a66
SHA1cd2750f45dfe24074b228b11402fc5c55eaa20cd
SHA256716fa9c8be5ffa13c51d828409f7da7181daf0b838eb8d23538ddf8ca36048a4
SHA5120b6a0cef8f562c3cc67ac5164bf52bb6eb83aad441ffdf3817cb90fb6fb931fec1b9a99784d696edb66fd6b34869d3e651aab258322b3574f7bdc4b3cbea4bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592b5663834c3f2e16acfe8564131c73c
SHA1743595e1bcb950da6c3be6e3c2754666e1998e0e
SHA256f266822585c1407ad4c96a38b2123828e709ee2564ba32f8edafd3508f87aa4e
SHA51253265a68760b1e9073596ac075d8f1eb7d6b778d6a38af6c0d45b14562ce9850cd3fd1730280a9a5ef57bb32a6ff380dc9283d08bf289aa5ec64757e28496b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f7df19a5c10372fc6c0100dd4107f8
SHA10de5d7b4cdb32535311d249302625a761eaf37e8
SHA256b1d2dd52c9e219bfc1d913821559554e4ba857ecfff89852c469a615f1777260
SHA512813af28227fe2a3692e9d9d3fec3e94162fccc3a69542572895f5a3f5c1d5643238e67104d3057519e7ecfbc8c3d772195df22a94822dd616f2b3ec586dd4bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c003e567c2801afd0d2801b88649ff
SHA16630009adf26210be0b06c7e21180e5f1a90a466
SHA256b86d18665298abcd65341e2d176af6509e2f16bcf6fc4bbd8d598fc091cd0ce7
SHA512f8a0331bbbe10a5e528a29e88ece3b0ec383448c024edc6ba54e00bc5c38850b36fe0b5a2db77e67ab2f29f45a6ec524df3f4f2d5725193042c3f35353fa1280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9eee20792ee821992f068a4a879e161
SHA1685009f51cbc53f94703a5c7fc2ac40423e5a999
SHA256ec5e9f52908798c1882ac86fbd6d7f088290955775e914a8229f2a4201db9c46
SHA51265387c4890a1c6c3af99aa65f032a211fd88255a24ab396f495e59470a46d053f2d85b930434ee7cef8268c747889e9887cbd62b701e8458f2ab8da30faa0a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ecf894d6793f08a1873d883d8f23d3b
SHA184978927687d58e7ff5239ffe75093aa59ecb507
SHA2560159f4e4fdf3d3ebb9ff246a7ecd287075126f148a80acfb2aefd2848b2ffca3
SHA512571ea2299f808ccfb82530cffb7444e40481debccc29530c75e8d3d5f78494a31335539adbd4ea357d28133cf12d68c4d063500d19cbd5b5fe01626d0c7b64f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500af12fc7389d65f2a2387accc322867
SHA1a59b9953f7bcb22fffe279151b70c98e1f2dcb20
SHA256390d890944de151106cbab3bd1b4aaeb664f30632fb3d6e63249ca0f9deed723
SHA51247072f413e07ac3d52f225b2b642be41ad55db64230b7778d5aabfe1f7eee7817f55a9ae3aebc7870bbcc3c6e5f5e638f1fd053448bf4f538d387432649be433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba5a611d31dd9e6c01434c2a565120f
SHA1a9a3ba0849300ebd7bbe666ecd3cf103ba512bd5
SHA25686ba9efadbda1fd2a0655f5e3e46f3c561b75b545573ae1ba870cec1ce335387
SHA512121d1668906194d6ca5a4377ee7cbb9c78fff0c0eef4af92c31ed9507a3f190853e08fc97319c3cbb5d84075ed75fd284ee2df8a95d3ded7a8ef3ef49512b3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1b8a4b1b7dfa827e6955612cd10d69
SHA1014b9319b91312f137aab50618e0d2fb0c43a38c
SHA256158fb2c051526366d67323ab766490d169471445faff27c6f8ec5083e60bd40e
SHA51233a4b981ed942af03fa04804472672b91080f673da1166fd36f57d0e2e78e9890a7f92cfe6be0488953bb148ef4b464f28548849ea2d4a049f78e9e23395ed14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be258e6f6a030616eed895746b33ed1
SHA14e5eb493dd281f5150cb27a511fb67ee7bc4b8aa
SHA2566923b87252263d8e0a7801dd3cb5a29ba7788a7b81c0f27376567f54cd724c11
SHA512968bccd8761199424fc61f96b59fed8391df0e2dbf7c8990467f1456875786049f22881d8600cf157b595737aeb111c437e56667621070755d825d517c153f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56376a21f8a357b81a65194baf4017343
SHA13f61c186e53a33cd317ed3606e46977482ab2cb2
SHA2561fb5ac5add36df1b2614798beae723ead5b5b8aeb1d7d8ef5c08153273406899
SHA5125297622ccab07a2d3868778a27b1d814170c5728903328399077728defbf2fab7d53f1a85e01293b7e57be7bda6af7f3263e3a2181fb38d8f28a7f58cee7cf3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f53406d2027514d7947e3b985cbdc58
SHA1e628701e8e4e53ee6192b6ec4c19835716079ddc
SHA256517f5443f7871c55c6584a0bb5e7b321cff440f70e49a370306656983bb3ea5e
SHA512c757597ad8af2a8ba76f2bcfd56d536d3f82f873450a2bccbf109e2b635f3a1a207db934f0ab0788d30e0cdaae6a2cfa5602e16579d68efa909ba12524ba5e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56caef0383b7e4ee715bf60f82bcf9e23
SHA1fa8800cf090848b283a0a89ed8feb91897973d2f
SHA25620407ba95105c53e5fe63837eac4d516b5f8ed4fe6ab1157c92ec89f12466af7
SHA5124248a91b41c5d671c71c3235ce8bdd64e6531c3c049171d0bf9ecf619654603cfd43c2692c1ce3a0f6de0d4071dcbd86d3dd314e635c57ebd7b7c130bf8689b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a79e5177a32dcf8bca319d0baa2fa06f
SHA1b3b83b2374a803817f6372cb81494cd9f420ab18
SHA2560a7229888bb0291d18a254be42b61fa1094cce12a405463be84305e9d97fdd46
SHA5129e4866e7de6e8fa290b1cf771237640e4b7dbcc544944a183e15893a3bf20c8d34604260f1603efbf133cf7caff2613422b893c1a76ccb1d324bef14239a1704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed5c157be3c3884fda96ca1248b52ae
SHA1029d3f0cef55bea730889128a5e409b90ef91972
SHA256cbde7a19e0741642b8de43860e7412019425ff39d3146803fc89622197c65fc0
SHA512e1030c0d925baa5fc66820eac79cc1675ed9ca4283c6d3a1503cf285ff9492631a56b9d91ce67994e412fd586f1dfed6c2b72a9066a15361b6d82aae7ef1b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c10fb07c28e4db697b50c7fc8ed47bc
SHA19e71728f45d297522f8c8212b9fe545d179a88d1
SHA2567453a9080a8767b77042f0479571931f4a81273c6836d5e7ae7808c016aeed14
SHA51243688cbc80cb22d470860fe5322cb215942be77d307964cdc7a170aec7163f2e919bf8e76ab464dcaa2ab6999a5c79c1fdeebe23308cef654ba7903f6df14b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03d13044edb3587bb52ca303205c103
SHA190483fd4bcc2cde60f0cb4a7d2bbe9df637321a4
SHA256d4b4a0226a3c20d1680207b4047b93c4fd890783cbb41b3fe3fbd3e0c3e1d350
SHA512c3328ae4e347a69d9f314d8500be73a3d394613a5af4841d4062749b283c5a19c9015fa9e75b7945f91891db842af5f2e99387760496a7d82280e8a96e1324b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b792ac2298281db6d2c5c53d5ff0a9
SHA1456b985043914718ec50f23fe51f5e9da78b14d5
SHA2566a61231c0271f58d0ae288dfe637ec249820ddfcb81246b37f4741c64467cea7
SHA512a71a60ada6f3b9c6ab34d90e96f736da5812c62a1ed63382df4f629473010adb2e3a3e9d543f7bab4a58c028df892330aa0b8d7a26991fa5bc13279394ea76da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac3c27e86d46cd980fc62011a86c3b6
SHA13d28892b6283e928cd7872588538680d289313ff
SHA2566d380331e5928403b5eec35f7b6670dc329b54db7a1845a90e2415a9c2e82bc6
SHA5126e92fdf6a66aeaeeaa3dd66490bc58470bcb503fe98c602c6046bfedad081fa5d5e409ca2650721f4767a6cbf911dff59a63aaf8735667bb8c886a951ad5ba66
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b