Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
eaca5e06958338826c821837964d106b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaca5e06958338826c821837964d106b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaca5e06958338826c821837964d106b_JaffaCakes118.html
-
Size
461KB
-
MD5
eaca5e06958338826c821837964d106b
-
SHA1
3f871ed751f785f4ad58ebabecf18eafac2bf8bd
-
SHA256
ccb26c2eb7cb740862498a1c4d75bbe0cafbfa695ce0cb8511eb94b2f2deb628
-
SHA512
641045b4d8e8913ff023d3d9e7a8d9aaafff548a7dacd2d7ece54e8624f747a4026de1650233fec3d47b134c2760c147742928a5d63bb48addd882bdc72743ad
-
SSDEEP
6144:SFsMYod+X3oI+YdysMYod+X3oI+YesMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3A5d+X325d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000009a40fef11c182c60265f4f473e3214f1141a9e21510b798092af4eca55602ff8000000000e80000000020000200000009602d31fc60c5e792ed602d1b58b859d45dcc662362972047b41dd01b2dbfb4d20000000e04cf67683aad2ec3ac1ccd69e43d44250eeb860d9203ae06cbd8391f392f6fa400000007d656b5e4c6b20e7c566c22673e9cabf94bbc8b612e0dbd51229f1458c21d9007215c44d6bba64eff169f58a6e93314482c953c3909fd52328eafdb1463f4358 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00d8417600adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F00F061-7653-11EF-98BD-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2848 2260 iexplore.exe 30 PID 2260 wrote to memory of 2848 2260 iexplore.exe 30 PID 2260 wrote to memory of 2848 2260 iexplore.exe 30 PID 2260 wrote to memory of 2848 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaca5e06958338826c821837964d106b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8996208f471f22d0943941526b3974
SHA1aebab611c3168918a26b4de6799f18ec7563795c
SHA256e9e029c7c8dbff6af9a2db6687358998c1d7db96ede113218e3fdc151a16f7b0
SHA512c2d381cc061984af6866b47de15e4ac37db051ba643c12d8b4ad144c7dd2627271deeed11a32ff48335305b9dcdb2a46673b5cefaecf8bd72a63f2905026a4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5163c6d50d8fca1f7e1a587569ea42
SHA105ac80adeb29d2e32ca43110c526ee72e990f726
SHA256ec5d56e5e7b87952023a4448f22abe7a66643391495a58ee25159ff2d4d5fbcf
SHA512c3b2cfac3a71f59886fb559a252dfd2ad2ff14e4e1fbc0a0a6266385463beffa967b03d288fb4ffc7646364937feea8125a6f47c80241d5451e36a9ef7a557cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59fdc1831f8f16634a175a38f9f65d8
SHA1156fab5de308695b0d1a7050ea0d1e690214e7d5
SHA256ff3849b569b137698f60653f105881a2ee2bfd71b96c3866be9c6322e91d2a39
SHA512ccb0f9cf9efb5298295359e2339c9eee4d45d006be1a7ffa181d9209f3dc5535bd466c414c01cd2abef475cd430c4bdd3b2ecae762d6e666f5b3577c761436e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318cf9f992a61aff00aac4df5301cac8
SHA15748ce3124615f8763fc6a5476a81c6f1e2a474a
SHA256545ea7d214b26b5bca51d0ee9a76a83846f2a116d74b7f4d4731f6ba210568d8
SHA512717ab72ae9a15f2d6299a494045afec8ef919ff08651d5f6513041238c4222d51403e630ada1536cb3a385344555f0fd7a12a084846e9b422f181f40e4001e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e37e5721634933a885501b3ccf9dfa
SHA1d89d4a0aeba67816f0946374f1b7d26b95a20194
SHA2565682a268f947f2cd73855b58240f8987d682487d04503ccd11ee9a0232cc01d1
SHA512758d211ca7ed406d400a4b4ba90969efc40f26d4bf9c7e8c76832a69d9168dbd690c2fd8b9b038c4fb40e8351c1db6726f6be98a92208faf2a12f6aafea9a497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a11b7dae078c0b1ba553528def59b7
SHA1e1bab9d3c82033aada88a588ea4b87cf4fa2e1f9
SHA256c83170648363c93b43c9ca49ba914e146a78fdc3f7b2b703ed5d620aa12d8d57
SHA512a1db213737c82f827436bf1d9d45c0cbcc20eb6f3a1543807f9c5c73cbe8e514390805378d440f1ecc72f09436bdf98f895d5facf62ce90952f5504a9772be9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f65f62fcbbdb128a1f730f0f92a1cbf
SHA1a0351b30df7d938932ba18dd7384dfd7dc51f825
SHA256358959947c14c4d40a028a8856db27889cf45e1259f6afcc566e3d3a47e9f0ae
SHA512fe4df112e14d3a4691ed823776cc352f28c05dceecda1c8cfa94b770ffc6a35569a8f522f0ff42a40c04093f65094ebce21ebdfc499926252ab3570748ef85ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57455f96944aafaa7bfbc11b9b5c56a85
SHA1d70757835d479bf4d84e2a2f08fa5bfbf7065eca
SHA256ab322e9c9bce599da2c0a5653d100524faff8308317c6b4c9bbe18ee2310b435
SHA512ae461ede0a49a6df70f00ddaa61a5a521e7c02ac33bd603efd9532a3b71934c59ff86e185d9ceede885bdabd3edbad0ca8f7201858ef702563b041dd5dc82b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df505fad5234e1bb317d70b25f6f212c
SHA110c648b9cded6729f7771f9574544ecf5840202c
SHA2562614ade4ee5aa5c71d0009f4e26d89a44c51e4bce6c5fc791241e9098a20ab83
SHA512e21ef9fef95a03442488d8ffaa5b52657c6b4db81ef6f319de92dbc747201d2d5bd86107232254b849b89d2ccc9f968fae80f5c35762ebd9ae8c38870eeb68c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4a4e02e83769e874078037e57d91c7
SHA18f9a3aa8b127d71d18ff28139d8207d1b43447fa
SHA256235febe90c4da385a519a12e1d743cb5dcbd5b4a94e367e1dd0f9489e2660bfa
SHA5125017eaec9fb252942eef9c9a8278d88272e0bc13c83f1fefb35a3827ad299612d52273ef62450edc7e5266c5a60ed8f9f96acc3b8b9422514ea13456ec702f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6de81f3575ee869dd1db93b701ac913
SHA1211ab63f7eef05336911f9e5574907df108dbf77
SHA256c52b7674e3df9d67a945b668089aa5b5f39fcf9f8e2f1ba8e38aee2c4670ffec
SHA5125be2a7a5998a27c5eec7cfedcbf5a696ae01cdd81cb95dc198f59b4999d31c675fb5e0715e5066d1144dda536959a37ccb36efb4b6bdd618864aa18dba9e8827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540acd35b746005756f8ef349cbd0abf2
SHA1c14de06b08e9dfa9f1bf4f3804353d85adf3325d
SHA2568096c288a3cd3e114b52ef6c1c2404ee57b879b101170ddc1e6aee20f6c855cb
SHA512a0ac7a8b57e35448395ee8c7f8c8714e2985f7d2ac8811e3da21a42f7e18afd380a3beef21b8f6dcc4f481385f720e997d18ae764b97589b236f4c6320c85232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9223b5da2c43219aff53356550a223b
SHA1d537f74e53ead17c5dbac81f5b6f57ce0af33a60
SHA2562d8aa65bfc75375dfb5d7ba75901aeb443b89f2a4ea196c80b93b92ffeb1fa38
SHA512c49b5d5e7c04928713e874af7242c3a4de8e2e64dc7bc79b15604d3ffb461e481abc090b2d1df14d1ca9b3ad2408789c500e7bd54617f6bb21e730b090a5e9f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9d18f259c08091d658c4cd6feb2e10
SHA1a6665aa1008c25e7bba1582645f84f6a6cc10d48
SHA2565fb31faa57516762fc9b90362046aac49cc0ace4dbaddd220183324acc430b3d
SHA5123d653661c064a65112330db1683b616a616c5a35687f84a0f85ce439855499f14170c1c406d65fd10c408697f86e01ff5c007cb63c37d92f1d393dc897a4b267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cd0d35daca73a7d91ca87c48d6f08e
SHA15f90f72213b31f0f56c578be917a2489c0c33e32
SHA2566fa3dd89f8ffe14da24e0e170bbebc38178349bfcc554a096d1a74563e9d0d02
SHA51272f2f524b6dff1a90e9e956da719983f9465b42b91fd6ea1def22590a511a0f5b7caeb38f15bd0fd6807a06a9ef9e6eab45212feb7d91644cd80d62b0e3c964a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0dc7a4e325b80b464700e17cc6971f
SHA1864cd5294382ed16bb28c4c758fd7aa3067845f3
SHA2561962dee8a901b5d1c06b1ed93ce69263ce674bd7ae0bcfe3a02506bede5bfae8
SHA512f26cdaa0491e815ec65d2050ee1419e0b4382badaa21da4dd0c39443075dfc2b44d009aabcb3860ee1dd0148c5c90caf5b4b63d586c8353d3896c4ceff9a6014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1283bcbae54d0d8fefe3b65ac9d382
SHA161c45301aea190f7e8318fe05e4e280c6851d3f7
SHA256cce2877b9d13dead4b8a550b309cacf8e99754310ca3f8f7dfa2711365c23c3a
SHA5122364c90ea0cbdfea31cbd0dec4511d1b54ce211a41c063cf26b6ffb20ec7dd411f4848f1f6a593a70dd54fe6195ceece285ae64415a81b613ab4af5fb6623bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc90a8cddb7894b33b61078a7ac9fecb
SHA1fd0e5e3eb36e4eca0e40a2df191a54763e34008b
SHA256ae23feda469962820e0d8530ef27a7aed549cadc665898f8fe9af1b0ef884d7b
SHA5128507ada9305a92cd80995b62ab59857deba96656c8e3bfab79de23a66159af1fc11a2d3bb2835346037e0e20e9ccded3c11925f32c4a01c4ce22345de29155f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506705751af782d89bbe7fc92b9e9e6a1
SHA1fad7dc168f58c5422408d31478221c0822937cc1
SHA2568389118f84e4b1ca99a42424e287bdcd2b1335dd94c78507e91e19c10b954f3d
SHA512790e5e1ed973effc80d27596b72f9cac7537bb032c8886bdec9d63dd39a1e2e5021937913a7a2ea26779c3187bcbda5e526337726ee6f49de6d8dae9a153d348
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b