Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
eacb73574c4798db489f34c032e4219c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacb73574c4798db489f34c032e4219c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacb73574c4798db489f34c032e4219c_JaffaCakes118.html
-
Size
36KB
-
MD5
eacb73574c4798db489f34c032e4219c
-
SHA1
bbf624053083b4ceb37eb25ed28f96105c287da9
-
SHA256
152e7d854a60c04a44a9344d5cf8319236fa5ad1c2124a52663b2238433e1fd7
-
SHA512
66ee90547298432e72ff86b61d3c9c133c9cc9678df6c8cdcf7e23080de5a355ab4a9220b00458aa30f282f814588caeee0fb6e545a83769ad09249c13e07caf
-
SSDEEP
768:zwx/MDTHcm88hARaZPXJE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRX:Q/LbJxNVNufSM/P8uK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7E84151-7653-11EF-8F55-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004f532447cb9072aea423a1b5582d5bb7b044773666cb8a411a427f773cff9ef6000000000e800000000200002000000036ea0fc1f7b3d7c20994756edff7e498074552cbae9a10497a9860c71670fa3420000000592263ddf5581fbde7f7a2c9f40e8377f1705fcf9811d63b168a6f485c08c411400000003ddd59c0e32541f5db91252dfbe38ce90c555a83ab85dbf157a76898d85c9497687677e8d77d3d298ba0aaea5c145d3595416afe6325f7d248c789d0ff92b59d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50931e7f600adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890582" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2812 3052 iexplore.exe 31 PID 3052 wrote to memory of 2812 3052 iexplore.exe 31 PID 3052 wrote to memory of 2812 3052 iexplore.exe 31 PID 3052 wrote to memory of 2812 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacb73574c4798db489f34c032e4219c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD546594406a8758b9f7e6616a320da2c62
SHA12b0f8019b9fd72c0581cbf99c79eba0ae9667817
SHA2561a34dd6c862e6827646c77e1c1e7bb7fae84446fcb302411abbcbae442f7238c
SHA512cda39808395b603dd8429581bc65863c69edbe3bbe92b73b76d51874538d0157aa9261b780078870d6da977f8959b07bdff4cc38db262d01ccb8fbbee62e8420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5260178ac19bd1b9fd9002cb84f3d9302
SHA19189629640fa633dbf327ae2372a762fb7719dcb
SHA256d551a6464be354433444f5cc32d9e1a2c3d835e0a86b42252c6b111c2e0a7ec5
SHA51218ce022c6da0378e378231681dc2fcef99b6d77f4354b93b40b4fc53933eb1696ea93dcd0be83d410f2b7fcc6e1512184e3d140fbe427919845c83ef283d0395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faead52d70d29331dd739ce76bd657e6
SHA1b9ae23f464d3775402117141bbd258674eda91c0
SHA256329c6b58f44f6333d04f89e1dd67208e4184050be569164935a13299966f81d8
SHA512cf74cd3749059c0192c419f590e43133027e2166a132632164457ae41a55db09e55c73805404f1a0b0d9e522329d83a8b6887efd1052b46e4cc82718fc4f2494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead462b23ca6ebdb6bc48efb3d8b9217
SHA1c28e0f8c1411d9a6975daa5b98ea0b0d31f512eb
SHA25631841334fa3d8cb3270a228b7f83d744aa131b0c84637013247a3e50d541f9ef
SHA512a060aafc6819ec942b416bc03ab09206e06f6042605a515f0ed6314499d50c0bf50edae5341c939400e52637b0dd567fb6400bf6ced50b71ac914ad7b112b2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9b94f3ca0232b4bb5f1abae1d57cf8
SHA1c4d30878b354bb82a486940e503aac93dcc8aec2
SHA25649be235a79ac98c56bf96d43bedab6f5f3bf7edd7b0c1e363848e7fecb31a13a
SHA512a91264d96324d02b07039be95a75f95c26154af5294bed6c641dab6a1b1aafb60055388af71ce4c34602b339f72cb1f5e1a7082a464bfd8c51a06a473b1d845e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f238c8a7a956724bac0b799b8cff0270
SHA12c804d37b832cfb0a1df17edcc0298fd9397fb4e
SHA25673a9115b4bfc1b741b348c98b8aa7df2c96621084791c2457a412809664345cd
SHA5121ba46c933e670a7145ea2700ca5e77a1835a414db47c4892b2f1d40941e93e3b94afae871678bb867a4217f486ef57e6d2884881680b2c475ffcfe671a94d743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e78763da6ea2453905f755f78fcdc82
SHA10b310161ca78c48c3c2cadb574aabd7304909d7e
SHA2569c9bfbd788ca9b14a439664f34c4c59003f1f6a93d6b61758504542c0f8aa446
SHA512488e6c5e0b9090b6f6accc0d431a80bc3ab4421af9177964b4d3b14c44a99be0c9b081bac0f430cd773b36d4ee854a5c17ac5d263bbe530ada082c07a7fbb555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283fef9335efb6f128145b88677ba47b
SHA1a92ef3a26d7e418ff294499753bc8053342c8cbc
SHA2569cfd09876fa2d097a02a84bdbdea222e5f6fa5fc8779b4673e8e73cc7c8a2f6d
SHA512c3b5ba63e5473e187215c35741ae3d10333294d8de3cf809f6e94dca98dc75747c0e5ade04d2c8554483a080adfdee27087a92bf8b4d114f931fb9ca1e4d206f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd8f633668c5e868b8b51211390634b
SHA159eba5385f74debd9fb7b7656c1795d2f41f1872
SHA2568f8beb5478557d45b6126fe0b4f7a2731ba1bda74c3f888551a194a6a9fba5e2
SHA512f39199dc959cead8c0026d2ae302e207cb7f5327459b06bb463932d80d53999aa75f9373cbbe3e46ad1821df77d6471ddd5f248f4589da4cd357dfd3b245feea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae25dfa9846949404a6cd533ae16469
SHA1b2ff12da90c6a4cbc60a544e55b8b3a408457809
SHA256bf89513561463835e0c1cd3d4e60547f2cc06120c4ded8934e127f295f99baff
SHA512a8c0f4dec0ac788a5bc9c32dc4f346b77d77d3fd8460c82bff723f95040dee6991e3e448d07c80d7f9f78d73c9fcef7d0ced3f6ac246a6328335638c19017be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da650175fa38b1734eea4e4dbebc0f5
SHA1ca0ced7988fbb6a9cffa91d5aad4d9ffec7585d3
SHA256b98cce1116310b515a440c20a24c2e155b8d1b0b8c123a570a7a20691fc9d98f
SHA512bd25e3a0d88202d1619dc35ef019ac54c1d0a351d79e25f64a5bd37b8bec01bcd7d36a2973b0cdb87a603d2cf2c1195c105e7927105b6910b3e3f537ccf9aba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a415e83a0cccb2788509e8608ec176
SHA1411e97969955ca13f5313c8b4461573483d2fd16
SHA256a625a339114334279b08a8c22b7614d62ccd845046fb0b622a7ce623cbca70ec
SHA5125d7289733fdd37d10da896b44aa11e3712677d447201e15f56bc3c1c16f9a21520bc9edb383df221d32b11119f16a2476382b45bdac77738406dc3deaacce2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60abb42fef6b2f1bf9873aa7afb0406
SHA178c7e4042a4c0bcbb46e07744cb3c44fec34698f
SHA2566b2696e82cf1c46b3c1dd492fe5bfff39ea40222bed1225557ced137186de991
SHA51231e2fcb34ddd74dc6da2df305aa63f93696f7da558e4d2165f76babb09815e812b7a6074a4e5fed87175397a3dc2d237c4458579f7ea683bec6c2825f3ee3cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD524475c5c30c7381c2af81c8caa1aa2d3
SHA15f9c5ca102c5b06f5c6578f43abd459a06bba676
SHA2564f491faec3b299125165c42685bc6b51c085f3d7a652fc75ac54144e4fd44a84
SHA5126a01cfae2f4c235382df6d679e5391361ea827b9dbf3d01e4d8d8d59d275143ecbcbc3ef461c1795f6cc8ee87b0198ac5cf5adc610a2a360a47d338b24b204af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5f6a704e6754e39a9d1703c56abe95e67
SHA15f352c820f62b01ee579ae3c748eb8d4c887e759
SHA256adb48f3c6faebe959120850e18108bd39f3ad99e2813d1ba7ac95df4893499eb
SHA512939507fb74a83bea1d78b8e354610b32ef151429cbe33a63c08d2ee4f5301f8c7b5234683ca63b67857e36a81b335d59b93f0c0cc02918b18199434c8e059596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD50de4d4745f0cc909838caa2c95413313
SHA100ed7bbc8c0a9c9865a88e8dac84de8d39fb55fd
SHA256bf4ce14661b06e1377e48b1e59b8026b61a9411f1dc8f95c5fe358f93bb3a1d6
SHA5128404c36522cf5294915bec42e4f602e5f0597e3745221a0172ed2d9c3258ab9f76320965a68999e57938b9e60e243cc8770e40b3b978802ab3dad057efe98823
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b