Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
eacb8595fb90d4427bae8337ed95f759_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacb8595fb90d4427bae8337ed95f759_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacb8595fb90d4427bae8337ed95f759_JaffaCakes118.html
-
Size
42KB
-
MD5
eacb8595fb90d4427bae8337ed95f759
-
SHA1
23c002e5599e17c902d01ae8aaff999192649e78
-
SHA256
3a7db9e65bad0fa5756419ecf1e1f707223030d800235b9afede4612781f44ff
-
SHA512
c536490ef7e22d2fbbed258c3663df701ebf2d2c99f604ffabfb4408861d9f52923b454f6ad74aab37af198581221437bf5ada26de2627790074f599bb6f96c3
-
SSDEEP
384:+24aV727e7jRdMtcHlI1PO07OPpH9TM1pGgtirS0YKCt6fLYVWfq04fK92lQ+MpQ:xKq5+cFI1207OPpHK1pGG5uHFU5/p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e0f885600adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890593" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE7D9E71-7653-11EF-A0E9-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000806c1deda0accb340cf1017f37ed47a7baeaf10ed3fd816f3dc9cc1bc0c09661000000000e80000000020000200000005e8582ac46aa7921288eaa73cab49808b4f71e150c0287f728ee3106db39d47020000000f45c8fa16ffef8b7a01f8a8b9b52cd832f40c5bd09c6cc88e2d0d5d083c2fa18400000003a6c23ca6509130b836511295224456361720d863918759c80be46e5abed2713a27608af45d56d8d80f0bdb69d140cdc4773cd531f4799d11988ff54e83343af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 740 iexplore.exe 740 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 740 wrote to memory of 2380 740 iexplore.exe 31 PID 740 wrote to memory of 2380 740 iexplore.exe 31 PID 740 wrote to memory of 2380 740 iexplore.exe 31 PID 740 wrote to memory of 2380 740 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacb8595fb90d4427bae8337ed95f759_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ea03e090e67e528d6054da53873fe7
SHA1b009289b731d5b73b8fd9866cebf5669392895a7
SHA256bd9b3f25d45abebb34e163d7470d517e5ac78e44139e3c187e76b065fc68d7db
SHA512da2e55ca51909493fb335eee2d16fffd069279d62629fcc1186b2ce59c1897635546fef42e2cfb9eb2db1b4d0ffd9dd983c0f3968620ca044e3112facd209d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b3a54a62525770ced0e81536ce779f
SHA1ec792befbfe653e34be27cc4e98b7e142a1a1e38
SHA2567341b8e70391d8590b5696a29e85b9c8d498ca95b3dd54b17d7d867b434ea4cd
SHA512aaa6d4b9432481c6c7a01a63e7617cedcd22568aa707bcf9bb1d3ff4e7ecfded0010fa2689e1fbf09a60c7e5f3c81fc7acb61e1c6a98e7df72b9debbdf93cd10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd9ce97ca7c018d5ffe50c158399dea
SHA1478971535ac2dd10fe72ffea25f2382e6e638744
SHA256645f17708d1dfb2dd43ad7efa8865b018dcf83088f6a9c2c532665422681540d
SHA512a6d01e5085abb4a8957f6878ee8384bf27a5638cad58938e4baa8dc671d89e7616154c723bbe686f75d6bb283aee671fbb0204954f9b714fc050e61c4be8e508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c4119ca3a93b268d42314283876ffde
SHA1caa9b941834190abc46ac5eca3559d3cc6f16e90
SHA256257234bb5d4017e1447ae8cec9c5ba96c5708715d97bce8737e9f491ae844c16
SHA512488923ca59c49b7124c237b44b8e59de0a68cf66bc3c94988c681b4097b79c2b452d005f4b9bf28cc56790e6d09200a0d79c5a07674c8623efffdcd097376452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d89f3d7195511f17692ae818b0a84511
SHA170fae3a8b38f68106c8a9ad360c1c1315169599b
SHA2565dfcd3a86bb975759bdd0a7b110051cfe6f8b00adb2e1f1417d68df02b533be3
SHA5122520b6b610a267be51c146f2278823a73105c41fe4cf921fe7f446bd163b0a86c9341dcc717de877162e7accc8525b97847457afba6fc1cd3ba5a16e8296d2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302dfb7dfd8e1dd4aa4ff766e5294c1f
SHA1555d45a5d5141fb12f6d3587025b487ba9ef7deb
SHA256585e91f4481f532cd90e3df79bdb913d9770a1c902199ec7606dc58edce5a17c
SHA512e0d22a3bb2e247448bf723550a6173cee5bb594ed7e38ed73a26e9846a6758894e5fde14fa979d6eae7a5fab3823ddb7b0d5ffe89a4b710967efd3868dd24f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52191439d29b23b617b720c3b6b6c6e23
SHA1043c9271114a44f8de91a2b2f7a52851cf7afa1f
SHA256c8ee84139fa5143264d81f9afbe82dd613ce171ffba0c4f73730b8b1a36e50f3
SHA51226880f27df4e556034b625d9247549aac5c883ccef4b93e1492dce84d465141954df33ca1f8acf5e7bdc02ee1489a1cbfc388c3479c00d604f8cce1dadad9c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0373c07b87f914706b4fc1d5ac496a
SHA1e10ed78faf8f269da2b4fbc52131ca4726de8400
SHA256b7583c1376f74c55aa8d16d63d74a2938991cf90ce8f052eb68bed5ff66ffe7d
SHA5126997e4beaa318c11d34f98ce530dc9b1d3fb9ae15efdc7fc661938f743e962d9a0e503e23074fdf165c095867bfcb39fb48a787aa8659a6fbbcea4206df66767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4f8143fc42c444cce43e82319a31a2
SHA1a9a1bceacfa2926b474a3f8cba10b520d2a9022c
SHA2564a0443b0ae2d35976dfa799cc81a6ee5b5c1a44cbaf64f792dab3c82c59560f2
SHA512669150b9245a5842d861f9e132b36e38c6a17ada6e877fba16ac2ca24e23f860a8c3010ae24a39a930a03a773a21c0ad225a35f5d460983585e5e4047f8a9682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503648eb7ae9ce47549dc371849f696c
SHA1bb3c0261adefd2e10f971ede9ad8430868fd4f58
SHA256c22fab2222700a69eb231f3c21c25952e2bf0f5eea39bf541a5ebb0dfcc42ec8
SHA512c26a12c5751cb3f9e3a5516f35553c63adfd3cae3efeab2284d14bba57833110106a7e927ba2c7c31140f5d3c68e6a31502cd891c241db1ad208296ce62db445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5b5e0314bf350c621f8375d329fbd4
SHA1e9687fc9852688012b8cad741324bc23054ae5d3
SHA2565104f21c7f304ea0f4e2e697d08a7e860d1af473242d48186b5a9f3d263af68d
SHA512e7cc05d52a070ee842be18ddac1429e84830d56ec51ac04fe3503f545405d7146238682435633942f069e7216a751c2472422c99299ad7d64ab5a54c0307ab61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302dd9603b1c8eb886dc82e3e87cac8d
SHA1a0d85539b2732ca677a5ffcad6157bc7e80c8dd8
SHA256d74f0c6ff219e6435c8be02de300df1bdc7675bc3c61b1cdb5d36b5085031d49
SHA5126193be2ba98ef2ba2c46327684626e1a3865ac16aca2f61b775759b9de6be7a17b227817d86b5a1e627d927bfbaa814193e2a8715b990d6a02de3f4cee9b3808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a7e948de05c690b1b7ead61d6ebdb4
SHA19d358eba7f942f5b3d28a6ea18f6f048d9be3323
SHA2563ef4b9986abdb6b7e5b5dfa943bb6875a33f128293d51fab200c0367f51f60a4
SHA5122c24ddc4cf8689d3b80ae3ed17aa492783d767041aa2d9e0e4d4f03347110eda1e4844fce60660151e9c450a522fb43276bb8edd48663c2403e9b6a5b748f8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e740bd2120784c94ad9c68a49bf1f1
SHA1450c6ede1d52d0a3b11f3564cb81846676f6b13b
SHA2564454da73a9ed9df96373a30aa2e7eea97dea49af556e8685f45d7ac5bb425a22
SHA5122638cef4024b38ef68529ce87b5beadf15287e5c34a9aae8e9d8b74fce13a68636595884e01ed2923dac9221300390bb96b8da5e37c171cc54304d68e5a9cffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0cb8120af6d5a5d3958df905559f82d
SHA1b18aea213ab3401c6cc5f70fe95f850152ad16ed
SHA256ba60858f89b2552d0ed820acdd737da521526e6d1c64ce218857428bf4b70155
SHA5120acbba51778e843092e9d21da96f03601838858836c412a423c427194fea00ada98c678f75758b9b9c4ab93fd91b6dc9d1f5422742bfae342d2f5dd64d3d361b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b94c4ce85b4fb6cc902e8f44e3c029
SHA112cc21b678739aa6da0985fa086634235a381e61
SHA25665b37057f7165b64db5a2018f2b926ec5a4e08797a10dcfb94015a5470dd126e
SHA512b0513411df2487cca7cae2d4ad0a2a05fc4511bdc7c112097c015f22daf3e51c7c8c60ca0a80d799739b232cd2b3f8ab4dbc9e7d16b501f5c252e358baa2ffbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f651e6cf61c2ab633646a6136e073c33
SHA161e76721f17dd52b51ba06daec1a8b6c2703c8e5
SHA256b0b8af9a355542041d91e87d1565fd19cdc6497db25aee2ba21224826af1ec91
SHA512b69e0352dccc1f7f4366e8ba37c673849935cecb04559e4cb1de46e28b359e47c60e146dbc211adcb55554402a4082a867ee50424c9b7c6462ddeb3f7b5b40b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a71a63b6cbbcc72de34deee93d55f03
SHA1554f5cfde44b4f2332e747e7aa1de3dff553784c
SHA256ef5a6ec49fa368cbc11ec83588401edd83dc5eb416976df64ec0dd8fed70a6f1
SHA51211dc4b94cd68fa10a436424f00f43905508e7651ed0bbd4662a1152f979b79bba1a2e6078f1b8fc5874d8265eb697696f2fe658f296675f04d8a6e8d6658e152
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b