Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
eac91796b80702b2d973928bb5b57256_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac91796b80702b2d973928bb5b57256_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac91796b80702b2d973928bb5b57256_JaffaCakes118.html
-
Size
218KB
-
MD5
eac91796b80702b2d973928bb5b57256
-
SHA1
a6e128a6c1474e59e4da8eb5b8f12deec2c5f418
-
SHA256
3523c1d713435c12adc07d00905baea63ac28f5256b7b093f5cdcfa50fb7eb9f
-
SHA512
6420b5a4b41e9b0fc7745105add73a45306e929367c5d364bde6bd05bfa5d082b15d155dab79f6b845a353eeb7adb914b0fe87385f532a311abb8d1291aa45f0
-
SSDEEP
3072:SzjK7nPvaK2y6CyfkMY+BES09JXAnyrZalI+YQ:Sy7nBZ6HsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000078f3c28456ee03437d0a62b3d69655bb33dc20aed81a73b4f0f1bee83134c85f000000000e8000000002000020000000aaefb9f1ef8eca6df39dddb1cf261bb9282521e60e2a9c16316ab9ff6a5c014a2000000057175605e8f3587c5a6555ac7164767dd261a534bfa44e4c0cde29c2201c6b62400000001380b31afd240d55689441ea09eec0347246259c34114e141c5e0b35c0134790c439b6dafd05c8033191db2224d6fbc8dbf6e684a0bba7a8e88350fee87f5e07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ebdadb5f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C431C2B1-7652-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2248 2756 iexplore.exe 30 PID 2756 wrote to memory of 2248 2756 iexplore.exe 30 PID 2756 wrote to memory of 2248 2756 iexplore.exe 30 PID 2756 wrote to memory of 2248 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac91796b80702b2d973928bb5b57256_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc0a0377b840063a818846bb0580a3d
SHA1fce8e658d64e80f8003c3a3d2ea2b747df95e70c
SHA256c3ad6e30c263944afc6dac3107bb964d47c67f041f9049ba05067dd5dc3a8fcb
SHA5124395feb9d1354d9c983a97b7d1ce28552406add6504443d3f67b4122937b99d4d06d4ff0bd9b7974ceb65f3658996eec7449a4ad9d6bf29739fbffead15370c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551494489bbc3fdb88d6b439415820708
SHA1c0153a8bd2ce893d591c10130497a69303479393
SHA256576f98429baef1780e5b4136bda6f8e3bb25498cbadaef32bdcbc88e24fd5fb3
SHA512106be61922fc1972fdeba82804748359f0cfc9b56c204b5b9a6e511e32c04e2dd731de0d731be94325482681b25050a7896a843df74c5ba022a95ad79b93d4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba613c9eb3070ff4fd70a37cdd3aba5
SHA1a2f48e30b4f190ce5006425e3f683cc7e348e5cf
SHA25674cf7bb8de6d5f799602306512b7433628a76c07b542ed058d6f9c1a4caf657f
SHA512cbecefc3816930cd7fd71dac4b644e57a23fe4c34d4a32955552226cbbd2cdba36fbd5abc83874e99919c272d41899290b6a12721dca4e59196ddf6b15527b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e75140e0e24947e570027f3e5cc3dcf
SHA124502de244345c65750c9770873db6037723479c
SHA256290015d051bd20f2df1e41a1d18b404b4240f5a4b0c5503722233e6eced686c7
SHA512dd0ad7be7f2fb7a1341b86265afdcb94bb67b48957741764c924346c6d97dd3a95a758c22a71ca2ed6dbec6a51b625ec93b08c7ab785d472c5c34af3647dcd86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686e09eee614d1772c2eb7f781e715b3
SHA1c7764a61067dbd429ab33fdd91fa922eb6b815b3
SHA2567f46684df60b1221c25681ea6804ca98b97005e050984e08a8b68076b1893f89
SHA512b25e8e94f94a0ee45f6c805ca9d3ce5c56dcebd960cd91cbf02f22b8a6f18b6c5f7b4f81e5c8d97e261bbd50069214443dc2c64ca14ff48eb0e8f056b6ba12cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58972731641900ca7517b79ecf4fa22db
SHA14e3f7813fa18edbeac6698acc4053e1f0f904abe
SHA25685235111ed1ce2e03f3fdd3ede082a68c025f34c7c1aaea290560af47ee8b728
SHA51218518fd6ff74749db0e26f79387515826605726f0ae4fa5e32567589fa9d9e2413bf48edb9ad17241b300fc880ed5329e27a48c9543a35edf292fc352409adf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb678140e368c0847c7a6fc277d4988
SHA14c925313d4875f100dccb1d5b5c9e6caeaaa0ec2
SHA256a14bda20b139892f8398daffda905b8850ba60c776e7553762bf532d3ad65b5e
SHA512c57ae22907618c934f3112a9d843916d7a8815ea56f357296435472a633b3b40647f3acb5f608bfdc01f7d6c18b4fd1982283f773bf240aa803b9dae71672fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882653f9176f05e1d1db37150d742f60
SHA1e1a1632b329b8b9c2ce313e312fd5d32d3a3aae1
SHA256e1755c1dbc7a12e013bc2b9a0398eab3f962b8344a9a1ce5ec585a3b68bd6841
SHA5127f1b62699bd94490322c770018d374f020960f6b9086dd2bddfd6b7e20085e464a3e4c904c12664a3f0210f05d5e31908d59bbab875620901e9ca7ab11ab42ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb17f3b16aaeb33d4ec70cd1cb880566
SHA196a2da7243feffd64da7368cae3298d44d28ea6c
SHA2564740a4aa31ee7373f67570e09a3a56d1b9c5100c6b5100f074593889fb319518
SHA512d88532cca41b3ee202e04c7ffd2c63e64cc5a9d238740dbe19dd42fb469adfaa4fade4bbf2d5f278b2d0568e2b49bd96cfebbdd653b015a5bdcdd8bd4f20c77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50542bd4d375ad3a9010b9dcaa2dc785c
SHA14cad455ae927d1e9bbd4ee89e52f83ba5d670965
SHA25648d160ea1166ae8cd159c23d30cfafbaee17d3479aab0965a4409ac315ab8440
SHA512aba0b99ffc090aecc8bb67e9e437633ecb292c60c3c368b60aaef71731050e1941dc2fc2c7d664940e471d2a860847ac9958f0eab622e9c056957f7c0dee8ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e210137c5a37630bd36a2689bd8823
SHA12554b895b95dbc63ec6227f35710b33f67f8d4bd
SHA2568dc6b193969bb0073369122feffa17f06e6831165b0a4a3ee2eef01e01aec29b
SHA51224415456b0dcf839f8f9b56406e24bc7fafde43bb6369dab94def588bb32e442c1b9b629eae17af6bc564996f1ab768cf5c0f1e0bcd1c454e408b8e760fbdbad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c3bd63593b4c278bf029ad557439c4
SHA1081605aaf9fa08ac2edce1e586fbf714297abafb
SHA256e44a984bdbc8fc2b66d0cfb0ded4105c382b5bae15df4c0c2140d1c5b517a69d
SHA5125d70ad791ca82d7d6fb4c590902ca62b48a312506b9d07a88b4a40cdd6d21425d025c758bd13e9454be4ea1e045d554a477d24d7ca6f4f32dc99b6582da23c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7e75640f0248236603994d62601452
SHA132291ee7aa8945a7fac34f859881fd492e82ab3e
SHA256b982fd885b53bc825329c0838e1349e4ce8344ac717c8e4956df4c729a72650b
SHA512c42bd9e4fd1f591385e1b9b0d510f5acc3c32795a940f117f9f495254244917394c07a1fe417f05d2b2895dc1b4f5ca97172a911997a547daa2536c399cff8a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab273955798ea42277309160d34d8cc
SHA1698579fd59a3c7db2f599c61551661dcf58e592f
SHA2564dcf114f91fe882a3fb7c312bffc96e7b110fd7a1bc09678d2d73b41e0949d41
SHA5122cf2a75c9aa4072994f14575b7f430fc99a6872c35a16c86ffb1a5ef2b3162b5450b1e2171dabeed2b6c7575dc66fbb40cbd243c0de8e5f0c3a42fc87b20a6ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d02047c293c7277f4e535aca8d59520
SHA1c0fa8defe2dcc56a253828873e5f01cca6198c39
SHA2560793b711d220b8a3ca8eec1ac6bdf53f2e474b7d21c650acf50d3c9fcd3a35c3
SHA5129030b03a17bc18b658c9cf4dcf844e9906aba64aeb2ae8b7bb051c874aa0b69c2240df71e1b43970996b12b2c94528bbffd30e86cdab99a1edbde2328ad7f45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2fc8abc22827f44dc7a6efa7ef9bb3
SHA17d5269d768168858564ccca493b591f8a9e062e1
SHA2564f30cf68ec9e64dcc6aa5eed95591d62ee693dc3639664bb5c980adfc9f75824
SHA5129493d917953b092279f1ff3763c5b26995cc393251b5ebe8bddca9c39932bceaf5660bb50c6f06672223a8099539770312327603539ef8fc27d977ba203969b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b