Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
eaca50a0e357d233e2d535b9bde2bf7b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaca50a0e357d233e2d535b9bde2bf7b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaca50a0e357d233e2d535b9bde2bf7b_JaffaCakes118.html
-
Size
1KB
-
MD5
eaca50a0e357d233e2d535b9bde2bf7b
-
SHA1
dafeac199505552586f7e9f41a62f1fd3b4b4881
-
SHA256
d550645cfa3e062d50330adfe6c9bb34a7e4c1626625659b8f609d47a04a0d97
-
SHA512
443a942911e6dc620ae573307bd532dda8020cc34c8c590adb6b3fefa7becdb64875f360d904b13559f8a8e075d1fa953141663f8dd1b09dc1c08736fbd5b5ee
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f9d54f3e24e9eefd3026774ed20ee8922d9242c1db076457faaa2fb3b6888fdd000000000e80000000020000200000008d5636094c9609c2cc0834667b5817c3ea692274c949f827192ee8054c197886200000005db7181c66db661146950a752cd9a5f6dd02c8fcff9a03488fdcf0f440d775e040000000c133dbd23f9d005c202d62d13b14ca41f436950f37e64ef424f5067e2d723922cc924c57cf3899984300536319412379bdb35f0216a6f0797cf904f170c9a7c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201dc114600adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D347D61-7653-11EF-B221-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2764 2236 iexplore.exe 30 PID 2236 wrote to memory of 2764 2236 iexplore.exe 30 PID 2236 wrote to memory of 2764 2236 iexplore.exe 30 PID 2236 wrote to memory of 2764 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaca50a0e357d233e2d535b9bde2bf7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663df6670d13768a397b9540df00a175
SHA193d7c954d58527c9e5e33433f1550b043615cb1f
SHA25636ceab76e5e1e6929d554a99028a979a3617bacba617d245c69232d2bf01f73d
SHA51226b3e5dae47617f7df7c1fc83fac5b7eab847a05939f470f659967064ff29b71e768e9799523071936bf38bfdcc82d36408b3603e72c5943f057f6457d389736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8020d1ea8c6c444532afa45cf7a1a9e
SHA1fc21206ce9c9e80144fcf465713ce832a819c6e3
SHA256b627afd1376a0f0208119b29c38e9eb04e00f118ca664ba9a49078205f1f4811
SHA51282bde4628bf6cf7600957ade8ab5bbe52589bbf1a80e44b7b0430cc3597c74bda6f43305e246dccc3a3f40ba4ffef00b78f65232b432c2857a214f661d0ffed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa95b79f85e5e43d11f4c2dc67e0efe
SHA198183e56c3ea50b8ba0f591dd5db658e83a01f34
SHA2567714e431a356546953117560bde8b094856c1fae2622c4351290a70cbc458bce
SHA5126e449ff718b8207a47ebfeba65e053600ef924e3cfabc2b7da3cc877b2410ba3750776e32a96d1e1704eb6890ed655489a5ed90e7d2b14531ab9cad8896c7281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a0c5440cfcbbecbebcbd1a121b4ab1
SHA1de117629a60eddab822af97c338ca9ebef758136
SHA2564b90f6414d1d46f2026ad70575e63e7114ee00b61789270907d1a674e90c1403
SHA512e2ca944fdd13c70b71d830e105b5a6e110ae06f285716aa8149b1548f3a825dfb23def5aecbd65c169061e88903c809ee67b2956e1d46fdf55c9f2c6e63a63ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb99f95fd0927520e8a77be26104b39
SHA1aeb150d50f57911578c514494d2793868be0a6ab
SHA25621a8adeaf654e6d28db5a16fa45257376037a200e47a6c24fc60a5a2a733bb7b
SHA512bc50e3cb491e47b37e2af6fe167d6e718154c11cdb9ddc533b834349532d3322c6d90335788fca1b8d5adee4b6a346b0931e3b32c86194ec3308c06bae67bdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a803cba1212e06557728840ac3b73cb
SHA136a73a67ce3e462b9f8b5dcde8b5e0ab010718b3
SHA256b5a34da15d4c3f2beb3240c2702d79b313ab5bad56984ac9fddc9ac5c5a018eb
SHA512111a85475ec9cd6cc0d21edb34983cb8896a7e654f32b09957317575c188750ec8529580f4c5d767665c1d8c5ed2c8c10ff72448a0a3a92f5ca02718e1753d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d599ee862353f277b3dbc541627276
SHA1b19f53aafb858ba8cded8fce44db109b1aa571e7
SHA2569b4873a1b2f55348bd54b6947e65dfde70908fa56b6f3c1940d9debd301dcac1
SHA512951533055d5853b570c08b8411b3384859a16f0702a3e1142a4584e2006c4d236bd6aed6075c04532b197e2509d2d214c2fae6d6c8e9b9527b5b251a6f8ead86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84113f86608ef619dd15db0215900ec
SHA1685408dc158b414392be881ee1bcf9b38a2277ff
SHA2569d5ae3f9d7d1c7e51bd43c6ef57372a5fddd3991ab2558062f92d510dfe8df41
SHA512a222c0f1debaf1de5fa28236470f14239dac6d9b3bf8971656b3d3e0b2e914b12d3185f4c979820ac6849083ba816a0b1c655e33ef8f646c741e4e3fbc2e2174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d43f50ffe2a2b181ea75624afc3b37
SHA1c4a43a8a2e55110cce5c523ee432bc5bf2a88bfe
SHA2567d4d9a312b159929cc8f89a1c2afacd022513d1fdab0a09da3e48d5919fd8627
SHA512b714577a3b751e8d1845ffc83b83daf0e77f456344e046e1aa371ac17a44668233c931eb53209cd5b2d3ea438c04ce95f117b6070fea395770c7a76f6c0d96a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5237191fa3aa27fe12ba26ef495736d9a
SHA10afa8744ed00cb56917bc826deff45213e755384
SHA2569a2f00976f9484aac54fea6d3a63c2bc21e0f31d13336d5ec904a9d2ee736dd2
SHA5126c6ccf45597be21b42347525d0ab46367f52f9bc7b0476e1fc7e9442c85006a5b5c56a53b28bb93a425596e558967d85e4ef5070be28657d38244a53f67ef16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e893eab95cbefa5f16c46d7c7555ad7
SHA16d52e74cfce14ef62cc7481bff026bd85a88e82b
SHA25664803aafb5968adcfd2f0c574048c81d3a3eae14ac3d068ba44eab615884774f
SHA512143b0f72e0bff11f65c78dc47f37f24a3aa548b937801a741efde05f1b53e79d846442b811be87867b9ae4bb69670b0f013f8aa6de67714a1f6690bf3dfe77de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474afe7f7cdf194b0e4b86d76a7b4c90
SHA1b1ebf602c1ca75e212700dfb5d498bc51345a056
SHA2561a485dd43df36ca03dfd92719a082a5a9b557a76879eb6d6a280a2fe55ee0d45
SHA512b96fdb0b5a4de018b261f78140a1d8566efec8ac0011cf389cac45d121b15050e9588edc8a4dbc7a9db063fa5ed8b72c263e8160594cc8d7c0002ac2d184c4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2423f2c3d7878fd958c5b3be2157f23
SHA1cc6645ab7da85b20e9695daa7e945cd917cd0323
SHA25673f7d2c51a2e47c51322e491454cf3f2a5f7a8ac41c8396ed9639029aced7ba7
SHA5127b73f438edf0a1e79dbe7d0ad6adcaeffe7ba584363b279a8f291835efa7a325752a6439be5702bb5cd758c15bbcb79cd826ad65bc5d71fc43056ad647bd6b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586fe86c3a82ea6ef64471e0f0828fceb
SHA1c636013177277467f5fbd33ecdfe1d6e79760df5
SHA2569c4e60819a612732046a095f271b40dd659f2ea0e91b50911a1b0cac03845c77
SHA512b1ef20667cb27fadb6c5677b20be7a705611a78ce41aa4dac7a961a2a482c52118a8b3557d0d8685bd911fbd5734462e9672cc8df1a20df64612d64086569b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502bbb44f5803413ccef66ef49a546d05
SHA1626cd2af8a6666b732d3bac77b84bdfc41321694
SHA2565a4f3bb561fdc635a347bc7369936a8e8eb5756c42c1011dc83a8c0cdd4d3fba
SHA512c051ef19f506ab20723985cae71de2dd0bb88a4f047ad1e7765245673ff4ca5a3e916375a8b2363e12b37aca12832adb3f489d353fe9a7dd797ff73ade8b002f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72ae660c0d77d2388bb12b4f386feb5
SHA13a2c4683e5a985fce3106082b0ace83ad7adf90e
SHA25640dd1aaf5d64a3068225722d5c9c0b2d143f7e4b43fa78047a7bed882dacd12a
SHA51282631212d0cf6388b7abac40d5b3e51b77b4feeb21fd7396a59288d77e72d9cc44b96843e1377e79d896dbd97310ded7ff2aaf3a7c804abd92bf2fb5da8c105d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58515e0359827b383fb01a01512cc627c
SHA175de082ce724778a5e88b37efacdc70274426a8b
SHA256af2893cc917f601e082b26b544caece6957c800dbe4c981ecfcc9ba4015b2bb0
SHA512070811842de43b77d300d238744e661cf88f6062adfe347e3b9408988ca52d9ed69764650bceb1c1f77f216fdacdd4c7fc75fd2c4462eaec93c0ddcfc809b0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e318ee5b1d15d233878c35bd5d6728
SHA1bed0812945f58412c39025e56164035193e232a5
SHA25607b7da9ffb885f961f256d27bc15988158c8b3649bcbb1ef0212030d64ef690a
SHA512e4dfd0d4548ea1d16dd4772a7aa678bf5dc28b1f37487b8f279eaa70efdd122aa5105992610bdcd7c3d5d2c24d9f02306e5b24236fb1c6e84dd0c4c25c276e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d478c9df2079b113f6552dd73f155bd1
SHA1e3cb9004a7e120ece76a91cb478c92c39a3c4b9b
SHA256fa032298d5b9ffee4f4b2b97061817311c78969b76499db610b2f9d2a49471f0
SHA5120ccb9be431c45bd31873a12d3c3ebb250f271a3047fe94a274c7959e810ed43dac3a231ac5c8e629036799b4b04da2914a193100c09fdeba80536f80011843c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc45724260d5ea14edfcfb37c8bec13b
SHA1744fc8aca567f97cca7d604a93d1563591db7594
SHA256a662d6bdcec38686a31f4c5899f66601f0e8f71923495ee0b980a2a709472e66
SHA51226765453aae10c93796b26de1fd5ee2c1fb457afbae2a692ba3c0ca0a614efaf7858be4fa9132e2ee0efb0cac7f223fbfcd811610f0456a890191796336a392e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b