Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
eaca0e7cdfdda2d9385c3dea11ee5dd2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaca0e7cdfdda2d9385c3dea11ee5dd2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaca0e7cdfdda2d9385c3dea11ee5dd2_JaffaCakes118.html
-
Size
56KB
-
MD5
eaca0e7cdfdda2d9385c3dea11ee5dd2
-
SHA1
e2520bfb7b02992fadda6c4fbdb15aff937b7b4f
-
SHA256
5a90377732282cb48e3cacd00b93d345897d0bb5c8a5ea36793cb21f70788944
-
SHA512
7a3f96b530c66a86976287345e13b4c0d6ae5f8bbc83daf6722729f06c13d8a5d77ac3bf6ad0115d90827d5ccb387800caf9fb49cb0b5f35fd3fa516e62dbd87
-
SSDEEP
768:Zcd9QZBC7mOdMgHpC5I9nC4b0obKVi/HUWTPd:gQZBCCOdr0IxCI1x/vTPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FFA4811-7653-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009567b6ca7d8bf3a218ddc5cb5bb78fa6dcb16aa6693184caddde88a799089cd8000000000e8000000002000020000000e6db9a8d2d4ace7599efd5d6331e172b803bf2c1b28d409813a55473ff4c39b32000000039938e8140cf6d30d9684acec245cc210c8bdf2410b87e55aea8eda0b9f399a7400000009aa445fe8de7e00bcdfc89c9e5247c8353de3440ac859a2bb950fad898f5ceb6b4ec75167af91ffe5d28db3219d794f830758a640bca6a8a20696f278c47130b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009ffff65f0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2544 2052 iexplore.exe 28 PID 2052 wrote to memory of 2544 2052 iexplore.exe 28 PID 2052 wrote to memory of 2544 2052 iexplore.exe 28 PID 2052 wrote to memory of 2544 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaca0e7cdfdda2d9385c3dea11ee5dd2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb8f7d5e00103cdda3b863ea0f4d2fdb
SHA1c540be96ec53003d711109cec46e0bd5584c3a2a
SHA256b71ca466146acc91a42ed05e6349f5cd9b3465a08a6bed796e8951f96f0ecf25
SHA51264dd0f8721be1a4c92a3b96c6c485c4c3c591a6249404f38d3b348973752e639f3c334a7addf682809eabedf4475a0080655daba3a86d33dbbf88337549bbacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b951823a9ea821e2b99a9e65ec0f45
SHA11fe2ff241a4dc45b219f0b0deb2fb9061ba82b35
SHA256135fd90e7cd2e114b78324457b7dca6425e0248faef4c5db7573aa2805310057
SHA512c3da3c63905ef8564744e78a9ad380aea91f47274075704191d86c395e9ef222345d447ad45189d17f3b42fd66b1984feed4a55eed00e76e9e018b4ee60204f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59820ed848c392d86548ee7c647bcedfa
SHA19082967f95efb521d98a18ed6fff9a5a8bac1f51
SHA256af693ffb8a4ee6691129ca779947bb098848bf5ad93eb0430b33c191701e32c0
SHA5129eca0631374d090c56b79be7436a7c549c181abb03a11faf91c8c291f6dbbaa68050c4221de4fcf92b47ca4bb680aa74bfa884fb9d2313324a9ec81ff4f881c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b50b2f91b33eca67931e4ac7f823198
SHA1c0aaced7643ccef54c7225afa605f168472459dc
SHA2566cb5af342c01e2ef8bf193e2b185bef278a537f77d07cc63cad380953dfa2607
SHA5128cc160fbc6a15b5e5296d091b68e9d7fc27ced662aa0424bcad7646ce694a4a53901503b0f73b08f08de3352460bac4669f86451fdab32c207ed9e5826227821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985480e3c759133b8b7a5dde94d33441
SHA13fa6ae8886e3e85d97ad53100a4d4799284bf1b0
SHA2563b4385f8f9e1223f9a3383c9df5d3e468c27d53db9c5c4a9a17b797c414c56f2
SHA51298ba36917f08b5954592816e79b8ef8d5a7651f4cf8c627c4f1504ac7211923093d58edd2090884af3a2cb35bd7a3b8582c22e29c9deb5907f07c111199f76b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254806c471db4876ed4adf0c1574bd93
SHA1dc27954d5171d58c6b5783237b469bb27d6cf8e4
SHA256c7d196842bda3f0adfea96ea5ec8e585421927274e2d521b79740d218430cd72
SHA5129b3db349bf34564809c4cb000c4d40d394a6af03ae999d68dfc0896367a472386abaa1892e8b19bf8541e26ea2536826d8f2103246279c10bc8effcadc8473ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca400c9841f2c6edab07d18bba4d5619
SHA131665069794eec664fe1215787d9d2c8ed5b90ef
SHA25629f1ff87bd659530598b3106caf0ce74e21e17a4d3a16de2ae9c5be1e03565bc
SHA5127fd3ea8ee0a60c5fd295381208f0dc905c9ac4e74617b5324e9e7d7c2f66feaa105235b3b12555a33881bfc0c0d200add3e44ef05725df88d8d3b1718fa40daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576dd889e8346b70a132f101c25cd8be3
SHA1d9462937a282b491f682a10c1fad26b8a7c70d02
SHA25693b9ddd5f3cfa2dd131170c880ef445d0f092c99629dd233cd8332b9240ecf6e
SHA512c45604d818900bfbc4f8bb3d1c73c13633b817ff2424bc3e75b57edf0d52337aa19aa7f801b43bd88426f63006faf8deaec1a66266391816bf2c49da88462139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b01b75e88f7d52ac68754cc686ab39c
SHA19f0a11330ebf8a6bc03e78710017d0caf087850a
SHA2568b6cbe4ee6c55184a7e32f1463c9f39198711cf17d385f1ed8f4fd59113f4c30
SHA51253c8b6a22575f38264e4c547ba403b74da1c04b9ffda9c10b43354017e6fdd1a64daf07708b9a4911aff3049ed96fd70c4ce1beaae5c49b20c24301ea3cce47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc807de62987c46c4bc57fb7377187d3
SHA1c0801271e21a281a7c08b0a648a63d094fbabcb1
SHA25658deb3695dd1397b35a50e08bcce0f0ebeae3d9e9ad2851b158b4bd469558b97
SHA512324fa7a5572c5abd1c5ba383cf240d8131756522f94d1ba125923cbcd5417799930bd4c9e7bdf3823235a796eddab96a7e947f5056bd11a8c1959a4cc4ae66f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bae5c9e76e27ea7272edf2e15e25972
SHA1cc7a8e0822662947ebdd213d58bf44982f51f9c6
SHA256decdd677ce349628da0a556747621810f01e9c19af66f365ea8159df30063038
SHA5122828b8e0a78b48f67023e74c18a6a0244c0e791bb0002128e92dc649bcfac32ac284241be09b962f2f61bbb640f3739144b51c3e87630b7de7b443f3e059609a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e05392feb8c80c3b935eae5f2eb1937
SHA1368fe4cda7d861e7b381405623201775ac4d5043
SHA2566ca36565e5628aaa772201eaf8cbc67de0625f804df62b8d6415ae6f15bddae9
SHA51242e936dd14e2929657d859ad865d92e3f785bdcf019322823978b81904c8b2ade4604589935af50dccad4fe0d45447ef9ff0149d96bc5ecb9a4a82e469ca2d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb0d5f4b62ef65b04ffaad66012ecfb
SHA1f14b78ecec11ca70f0c3787145f9a61823f1d938
SHA2561e64f3fd9368c4f0aceed6a253efac26c60026437a679bcbcaa30fa3652c8c84
SHA5127715c125a4ef2f502a861e241a6b8c1fa8fadac9cfb971fc6df53ff8a1d0d2a274420480286b3ce0d099577e216cc74049d664d2021784757094a548eed1d97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6413967e779e0e2e17985f7ab07e98
SHA18300ae641b5ccf0baba71ffcc102368e00f0d790
SHA256cf2f92c605209813667cc0e04fd052afa1e0e4ec2fcbfe90488821b458e5255c
SHA512b7c1e492d9337f20de9b7935fbdae7ba5f4fb4b6a47b3e678623d408fe7b2febb985ee64c72b262bfb6d6c9ea44aafa75158a965f9e4004dd90b910d93541b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e4e5db7e55b8fbede8627dd88b8eb7
SHA15b82c98e71805b2142fdebc8c6a00c1806b533ae
SHA256417a96a0939e102bbcada29b7f98b49a01e7b5f812c6b50172be146400eb2e96
SHA512572d0924046816b45a622a8cea51e5a6e1e787f12ebf30fa1903a44b722b853c71ce57426b9d85ba010ba0a415b88dbc91fe3df0291ffdc6119beeb5ac241136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58913b6c44ace5f7d4ec340eaf6e92519
SHA16e12e8ee52b22efc0ccba2015966679b0826601b
SHA256c11d93ed01c48a0cb4e70db3a69bc4a0b040b027768aadb8d5e956b212538bbd
SHA5126470e47b17a23fea301f9749021fad157ff4595cce1d6d11514076b69821580150d6984982dbe6605c7b8d3a6cedd52ba89c60bd65475bee4db4f6afdcab2b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3712468b71476721ae2586c24d7600d
SHA157f844ec8ca0afbb737b059fc1b1a7155d785515
SHA25632650b08f9f80463dad3e3eb18ffe8598582af6035fd51d9cc913e9b66efaf2d
SHA512bad6f138a677fbb17395b6736a849d12f888acf364abb480fe6e6dbd6c3933acfca9353f9c35e0ec9900bf29dfa7951948510086a66afcfcee1d0d8af6ddf2fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ad8058060920daa8427ae43c003812
SHA1c81e75e411cf96b4fd409c5884c1db4fc8e53934
SHA2565079497760d639784d4317c0f12a5da6c53d6b0f5571ebe8deea9267f50b890e
SHA512ec50e84c15ca381e827bf22f730e67422a43f56d4713c1203046d9444838917e6edf304016a78a850ecdfa04b8e686e648ffa7d6c8e542f96750bbcb15773be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58258b50dbe0bf1380dd82a0e125c1b7c
SHA102c324c336a98881cb4c5c8f8c9eddcb5b89386d
SHA256888c667ad448ee876cf8b40f322acc694d9f1e2f833637d7b9be4ed856790fad
SHA512d2ac7702dd65918037406ecb7628e41cc64aedc53f9476aa419c85edef4f8fabbde5da5642771bfe7a2620eaf5f2cd0a73935433d7491084aa351e032cf42b7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b