Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
eacb22871b7ee60cd3f1828603ab14c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacb22871b7ee60cd3f1828603ab14c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacb22871b7ee60cd3f1828603ab14c2_JaffaCakes118.html
-
Size
17KB
-
MD5
eacb22871b7ee60cd3f1828603ab14c2
-
SHA1
c21ad49cdb261d2e008e790ddd7976744415e9e8
-
SHA256
50a204ce375d8db83c0a529bb558df72014a64c1b3dc0da01be0b2a8a2fd876b
-
SHA512
6926d935d80442cdd1d0c361ad2b15b5c4191471079862b09e8226af946279207418a40f0350a60c864fdee8a5245f9a649c5f798c12c7e7dfd6225bffc07b9e
-
SSDEEP
384:S6+/YBM1BMKBMyBMsBMC4cEpr6BkUHzLLLfU2Z6M9:SPgC1CKCyCsC5eBkUHEnM9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DA589B1-7653-11EF-8E45-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000278bd19a257bc55fee98119f65fd1e84ff7f501909f963ac488415a868f881d8000000000e8000000002000020000000c0b0dc1f5bf03de0353d146ff2c274aba6e1fa5c548992079aa9711b1be8712520000000d9d9d5fbe0e0d3e007e2d14f424546299d86d02db45559761c399d6f74bf70164000000083e318bdf28ac66364c7d07cbf1aa0b10f345ab428e7a3babe80f60fa86c687d4801af600439cdd95620fb55fbc690a957ce3a828810917b26193b770ab871b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10db2962600adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2696 2720 iexplore.exe 31 PID 2720 wrote to memory of 2696 2720 iexplore.exe 31 PID 2720 wrote to memory of 2696 2720 iexplore.exe 31 PID 2720 wrote to memory of 2696 2720 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacb22871b7ee60cd3f1828603ab14c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ada0ff2aad72c3288d62f4b06c094e
SHA1f2e83c0e8b11b583aed1dfe854d25b799cdef6dc
SHA256ef1f7b11cf9838b2d077a5b4d810b80eac922e00b35980f7930a75f0102aec93
SHA512465a82e037ad816c76dd14972d815fa4816ce16fd0ae21c7cd93892ba3dea71a9f543b3c875b57cf199fdbe4328affff8a603e0a116974c0b58f1dd113a26700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb5ad5a66a0879292425bdf965811c9
SHA17e91b9d8d53724ff8b3ea1b7b4c75b594b999287
SHA25676d807de64e204d51c648fe88971d0d956ba012fe3a5fc985e98a42e17aa5c71
SHA512fca70b2520ab7e159c80278c3c13aa6494eec7cd073cdbe45a6c7f8555d78c2dad81de1e7b782757b5848244813583ed542fa11ac995e6365897aba0056d2c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c46b12127f07073fdb375a78b2025d6
SHA11c1cdd3452c49ee10c509d5952662e3caff8673d
SHA256f0f7d5e963f24cf0a8167d6392393c4ebe2797a99d5ef28b7e25aa1c36aeb59a
SHA512410b02cd588a7796b7d73ce58374314f9c955707c049b10167530644dd15ce23ca2ae70da9bd543ad105558de5a67dbc20bc7259f393dd3f8cfae06b16e4caec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50744b6fc0c0f05a4a9f05f25367e159d
SHA1847c927dcff469d113fcc6f54884bc3bdd720ddc
SHA2562f8349e0581fc2e0c13efda36de0ab7c980d90a96ec24f757fb8ae2247ed9c92
SHA512a9c75313ce0b2edd2dd5afd1ec717eca2a0dbd90602a738a1763fdcecb258b91a606aad965a9f63c90633fa3d1e6e941d1cbcde184e297dadb20622aba79d77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f84130c11c5eb6485d3e3bfdcb268b3
SHA10bb73367d6e288e8e45b4fd7321c83d1fae027e6
SHA25689b5f54567658049e08285a2ac5fac7d14dc71e9f3a49031a3b2a0674d504413
SHA512e78898c9d315f0fd90edadeb1442d09a9840332a534b14acab7ad30368fe34aad324ce5021a86494196f3e885756e95b29d2de1fc2266d7bf3e72c59beee8ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fcab865508a77aa127ab25001ff81e
SHA1b4fd53989486f918c47fcd1c653f3e1512eeab73
SHA256703ed9027541130600b28fc29042b4d9f5f68a9af5730566746626f2864c6c39
SHA51211a2d62c21a713e91204e532beec9306b813098f1f8fb92241d7777b73aadc3ca6f9d8caae217b779da4e15fa0f1f193983097dad4313256225658f5f29586e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e45e5b8c25be36783507e039efb42af
SHA13be22e209805fbeceeded4b209c98d83c0ce2ae0
SHA256868152c9b1d75fc49079a6f210489d5240c5a081df4527857832193b10ccddd1
SHA51230d723621f53582ddaa63cfd5e699a0a2ddf189c6e2064b53ce32730b95837383340c9a9cdbae5235a45b0d7290a89e992b3b5202a52922839f6ae41bbad1731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524fcb596beff635b3ad202fbf605853
SHA13b0c76e6088a9f330066cfc27a0d7160a193112c
SHA256f707794668f49e1af5be6b090b671583842545e5deccf585813da2ea59872bce
SHA5127807ef26d29a18cc2b78aff77ca8393976c782e233bc4e5b35ee9a71f7c74043c357793294a4fe201753d82d78410ef320711662d71f4de7884297c80e3461a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51addae34a3fdf6a099b11c253161452b
SHA104d1f54675aad3a36c8b56a3aae51b196d672ac0
SHA2566b7038c8097e360d2a86bfeb1e0025bae4a64109842a2aa91c3dc4df4810b085
SHA512991e5ed7884ffc1190c11a39bb671b2c56389a159ee8eef17d91d1c0ea22c5afba239cf29a01c3c4f5688aa244d8e2e58734a21b785687c27eb6a36744692cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3dba42e2262c5abea003fbe72bfa6c
SHA121db2f1ae141daed6cd8448e526b6dbeea62d288
SHA256a644fdf8a8800420bdeacf7f65da45846f17b5b3d656996026fcca39c9fa06de
SHA5129a182160813ee2d909a6413469a4d94221a5c55a14c1ebe4d30f46a2321fd07a8c365d4f3ec038fc999e57a2d9f46696453ee7c62e4d444f63a69d91bebf83a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d12266d3f3152e65647498b9776fa94
SHA13c90e9b078eb0e46bb1990b32fd7d09ad611e6b2
SHA256d2e50ef6032666c7c45ab86aa7a05c7d9048cd3840afddb1646cd44049094c18
SHA51286aff267e2baabe4b97322815d762343293faac0e03bbc6780c5a3782bd854609577849ee54680e53531867398fb1ccd2a5cd1ed16ab07cafada20641a6c49ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59651ff0f8c6f8a6561c89f9e6e2a027b
SHA13e5de420421455ecf9b4e34e143d9fb95c1db18b
SHA2564fca2e884b2fa9428a242f58a33b77b2a3b5b4d93c31fc27d1ed706693082632
SHA5123853e8333f8adb975d94e43728c8474a96e495ef0e8729a19726a17cadecc2bf61112ec0d3a68d7448197bad2eb34bf5fa0f97968058a4d128ba9e5ba44a53fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8ccae0ac1a49cf7282c90bbf680ef7
SHA1d861adb477065a3d91d320abc374d32ad5f4b0a0
SHA2564bb44ce9aa2e6f7f3234356b3280c4aa81703dd5db5bfcc7e4880abf6f9e1c59
SHA5120b2fd4d5d11249abb03e88912518bb5480fa49e752bf06de065181780d5f9f636573e13649e090853005ba3c323440d7ac56e00132b44e0c5b45bf9f09b0fb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584210405c5a1bb2f797308a67a00d9f9
SHA1d7100da04f6865ad0b5b4cef9567957675499b6b
SHA256f5115a06c27b2f8f90d604923fde41be6148791df6af8b352dbd595bf313ca54
SHA512f6b97c8e29fb7068b10ef79746a20121648d77956fd16a056969672f54f9e0ba02aaf49c04f4fc6ce23f005bdd5f3b2b8ac8a48a4894bad20ff38072648f1419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39295ce985690e0aba6809097975c81
SHA1fad9b4b2677cc5763f33903575c5c8e9f7002e8e
SHA256dca2248f4e03b89ef1c94f17e0ed6bab7b6c52d011128faa51ee78d588694c51
SHA512336b3fc2aa464e006b390e7041455bbf9c95adb9e5c6630dcdad4f5651f32a7aa05954a2e43a3d7abce1fc14ac868aa8a87b3e53fcaffa8c880159d37bcdc6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d49f2be53678367e2ce242a9170b52
SHA142f9cb74d691131382e1e424a90993a6f33770d5
SHA256335bb6576fd0cd4d212437818dc48ed3f1e6617501478de5ca334459d67b9b5b
SHA512a99f0e0f5297fab3ddc9a06f57514612b7df8adfb6e1d48eee4c652e2a9dafce493d7990b9de6a6a5f8a53379c1f445f1c94a44a84d44c8c9d4377085d8c25db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a94f05113b585de691e450a4d42393c
SHA16c9cdb7c473aa4408bff3ca5e6b7da8c5119704b
SHA256870cdc6e7c902958cb9858289b6e890b756283edf3a9b89f7ca5056dd3974e70
SHA512828966166418fd20ff23706369222bf9ab8c698d03dd36fbbc027d2905dc553c2193d458ff783ca64517df671f0089a05737b500c474dac8a745720654941ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d36512f770ab7fbaa729face1a95a5
SHA121d4d0ccf46e1f4240908f8e924e7d32caf765f1
SHA256d8015af7e545ddcb0084673974dac16487f8cc9cd7daaa64da8989f8863ed900
SHA512571d3bf151d127b6b252052dcc05dc3011cf094754d7ced907c7ae05a91313af9ec8c6c37b832f780475e13f5dca4b782c3040a5c67730024732c3d2eb408c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2dc8c5ee5d80cfa87477ba440a6ab2
SHA15c8b359ede1d83f6ac145404aad62bb303148f7a
SHA2565678ceb5522689827dc248dc3729dfdd210687f53261caeba9bd6ec2292d651a
SHA512230169bfbbe3b9603b6dd3112a425c1f218861a8a1d6a2c7d00f1e4563fd77a9bdbe5aeb85b9816035b6390310d86277962bd74fb86a5c997e9d9125a4e95abc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b