Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
eac974643effa5f815000ff9794428e7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac974643effa5f815000ff9794428e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac974643effa5f815000ff9794428e7_JaffaCakes118.html
-
Size
35KB
-
MD5
eac974643effa5f815000ff9794428e7
-
SHA1
415b5b03f56177f4d476e66f5a6cf71a98583272
-
SHA256
376998018de1639691ea4c7ec87cb33520b932b999d57ba428440c7989a93619
-
SHA512
adbdd966d657fdfb70722cfca2676956287f109988a6d3f57942b04cd63c7cf8d1c17830d0af4eecd87bb3e25e8f01ba6ba6db802b8d0ee46231cab6922ed453
-
SSDEEP
768:zwx/MDTH7T88hAR+ZPXVE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T/uJxF6lJtxU6l+:Q/rbJxNV4u0Sx/x8JK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30fc47c25f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000edd23651d2a193668dffc21caebc9481675d6d8ea058f5df7b0ad7d3dc08cfb2000000000e80000000020000200000005d6b1b77cff110981b790a87828b90db67fd3774358f621882dd8f9cc9cd821820000000fc13e7a6a23673a30bd35dd05bd1e899478b54975f1e6976194bc7c6638c5c8340000000a923e692cf37b2749885c083bcb85ec1faf54be251b02635a65f46ecf0d06dbe5c1c4c8cff69e47376340b7288275a3ec28cfac9599b82951a9d23c3a265287c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA52DE71-7652-11EF-848B-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30 PID 2300 wrote to memory of 2644 2300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac974643effa5f815000ff9794428e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519dcbb9f3da8ecf4438bc9bf1cd229a7
SHA18b125d82b6d1fa171b04acddacd07ad6a61a9d99
SHA2563fe570764df16c146a95d0198989f6dbfda3bc30d1867b3524df36eab9743189
SHA512b9408d5894d7e710e265f3f76bf0bfab16b36d571d55e504883d354dea7ccbac8d5b971c13f82af1e6b7245fdd1f412024947214b1780ffb70c9ffedf5952f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5ccde8eaa2827be090ad6f6201d02c
SHA15250d599ea7362778218eaafaea4aa209d581574
SHA2564b023e8afa970dcbb2d48b3f29611bbca077369f744a9165cb5cad123230bb71
SHA512cd114f44d2d79c99729ad62a46272bb9b434b6c52d2c7cf7b5b7454cc226360c143d8ce23fe1e19f984a59c61cca905b303b6369c268e3492c551cefa71ef51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52f7c012f5b1dfadbce55aa0e57d2df
SHA1124e5648c7f3bc07738eec57b3365004f676fa16
SHA256c47a51b55d40306011a4713ed2bfede2de891858be9a1fc11690ec066fe4df5f
SHA5121260f9d28f51963d9e35de44da7a7c35f2d4ab9baeb9cb604479571abb6f87810a570a09472466c94e29ce1d6603c24272d28cdd1e25a5c6d0c33e2ea043129e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece60d55ef56763567afc617bb6ed54a
SHA11ebe118fa2bd4a5573c2db7cb837b61456f2aa6b
SHA256ae389a230d9bba67019cf81a817857fcd1a856f35ed765bf4df23a5cc2c42ab4
SHA5128b635d249485e4caaa9f39c1c99ca529320e023519a9df80729c7421e5000ecff936eafbab54a3952d588a04a0ed887a381c5484672240ac1de87986e742fa4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55374bd85b7fce80e7729f5196b07349f
SHA1644f4a3b75b811c48cadd65dc24ec927f5deecd3
SHA2566fac275dbc557384100ba3937741ec7cf52a857216238fc9ea1fa90a4935ac74
SHA5125806488deb2ae8500335ca5d1c599db3cdd8645b2ae8bae24811dbd5e195c0fa5c3d0e14d44f484eafd49808bfcb398963bc86077db6262529799f8361bd123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9976776c67d1383e3a4b44bffac3bd
SHA1f63456e894c6f923fbb3bbc0bbf703460897339d
SHA2565c66545dbb6976626c0d58d3145d63ddebb694a02f9cc8dec408257889ff9445
SHA512842ff7e3bc03af804e38177d718df28c30e47c5bc505148e20c26eecb22d856d2098a997d0fb0f3673cb8885fb104db5d3731ed7da083a1299df6ab7a9e90c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a4ef998e7fce687d389772fde22246
SHA1c1899eec988543f23bece14907c02945800f1ee7
SHA25665a42478337ee584fd45c9efea04aecc0385fe0266e5c2f6a7677a5e9f0bc26c
SHA512b950261353f37d73a0b1ce7ac81ac0275212610c7578b1de869fc8e639c37b169403b02eb664a6dc77db6558991fe5ed1c4832dc13873f2a68ef7fc338582f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ec49f170cab09f08c6e3671c411ac7
SHA18d2e40f386674b44f290434f4ab194bafbcf2dfa
SHA256320f0abc79af9707c668badb15d71a412e3607559681782d8b37079d15d4c0da
SHA51240ba9e1423977e5fb3623707aa6489d5e1d08f09af69626d62a54b5b0094e8a12ecc1c6b724911db0d08e9b42ab6e06968e988774d26d1eaecce534461b45482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770b2a3ab76d3fd97db76b9f97390cbf
SHA13b9456c4e1afa14b1f9c465367a5834ac7e4940d
SHA256bb8e4edc77599fdf62cf41511b52565329bd363aa05be85967f846b9b6eacb6f
SHA512e9d5a61df2ab0b955073684fee88c80d110cd06bcf2fe246192e5e99278000d82f5fc44943da31606404e5b34398d2a785cedf87df2376de09a082b4b8081b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ca23170ce029fde64a3263e4f5c403
SHA124d34d9528798cea81f453825835f92c3709efec
SHA2567fad8af3f3a1279314c657626f871510629e3b488ff5ba1758ece3f0a0b1b6bf
SHA512373fb5fa9f61ae515b35822b580fb4ba1fe6e8de3cec6966545210fba177d5b726610eb7e188c80130428c8a43880e3dbdde71fd3d6a3904eca9d2497a53a5fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7594850cbab24a8e5401897c73bc47f
SHA11e2c7aefb325ca3511e5cd0506bb5776736e8994
SHA2568c2f8c8d631883226a0abe7da5a8bb6a3476f3f39dfa066b1da78e5b597e900d
SHA512a6841b3f2134a1ee5d5d0dd8a1b094eebe72a63fdd369b1c669b131bd0f20799eb7375900b23ef586810cef8dcbe050ec38aaf4cbcae62ad1c7883c776d12a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907615c6139b37349509f4df6dd13092
SHA1d2d5c9e42cbf1d659e60ce48c72ffd7cb8b75858
SHA256f1dd7c85ce0312ad112bc1049d314388dad85de92b8e27dd4be5a910f6171ce7
SHA5129ab40045217a180c867fcf9eb056c0106aaf0b8afa3d26c3a9f2a2fd125e5188c68c98dabbb99fb5d3a11572daa98a0b89f302df60aaf721da42b35b31663e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e438bef149a6d919a99b76f7faf155
SHA13c6fc0ae2f5cd38901d9877ba3786240ff7b4e25
SHA25632cc57cfcda216844152eace806c8153cd818afba65ee4bcdac777017e53237d
SHA512819c319bb38d62a22410b298d520e4876e4eda5482584ca29de69311ae6d14695ca148d142553f42917f9771ccde73cc485eff38a7b8799672f1877fd392311d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723c1d21080df9a97a40981d59189938
SHA1ed6baf20cc1ca57e90a540bfbe6a42755eb5afb7
SHA256c9155abd18997c4d43900258466e9f5357b383cfd2a1e327c7a385019215e98c
SHA5128411f29259e909ff81f1fd5dabff89ec9deeb8575d88dc83900740522c02702002692c19a0e300b5e838ee11eab883ff8bab922af3daf2a1dd2a3a3fe1e872d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccb0f6a86c44f084d64acc018383879
SHA1f138746b437819f9ffda5437aa1a377868b5c4db
SHA256fe1897330ab85fc8f56cee4f77f26fffe2c8a332b34c26d2fcd763a79e257813
SHA51264026963738c76f54c300945d200f59ef8597321cb0126272ad353f53e102f74a0d1b8ec0d9b46b0a6bb4675595aab9a171d1a388d36bb2d69b76d8fe4d1ba06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738f9400dc1af0be545122b7cd8f90fc
SHA15d337614a6d6c7ef46f053de264c4f635496ebd6
SHA2569916037ad7beab81d2f1875c6a1e6d04b10e501983ec3d43c1d9ec725dcbcb2b
SHA512ac681c285157dea941cfe677f18db711f20cdde60019f5462c10ee05e889aeaa6ae1e85f904c90cf7c033e87d4e8c8ba44e0c4e5acbbce84448588f62aa77f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74dec8a658f8e019e492fceb1a09553
SHA1aa3bd788ef1bda4985aab87827e58db7307e617b
SHA2566dfff90a62c42e70171db9ad6d12242973e10aa44446f58e16134bd8189447f7
SHA512efed292994e708bb17bc46a4272f2cc929f2afb9455c1b203b3f229abdfc43f2907c3ec56971d3c05e9ad19b641ed85e647443fc352d4d285133180e926c9b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23ea9bc1a0b217812b668d94e45f76a
SHA11f357142de30f418109f5b79b6da97326f9586b0
SHA25650ee8c9c4793033f131e6fbca183ec823d81036919017e5adce0c8aebcd48a48
SHA512042284b26c4f811f0c229b1dbc5686e0e271a362e54944bf4bea28a9467b61aa63c3358aaa251f57235c58c90b48f471ba1b84d3cb7e30a3ee15dcf5c24e431e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\6128162e0ab80b6aaefd01d25ec9fefe[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b