Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
eacd9ae4b3efe284ca98c9badc25f22c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacd9ae4b3efe284ca98c9badc25f22c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacd9ae4b3efe284ca98c9badc25f22c_JaffaCakes118.html
-
Size
3KB
-
MD5
eacd9ae4b3efe284ca98c9badc25f22c
-
SHA1
a9881fecd46881cf2f829d5181b8f848faa0cb39
-
SHA256
c607ab0a2abd3ac433eddf05e31a78529eb93f4fb4c879852dedec83cdd63f61
-
SHA512
ffb0028f0028235ab2062f6e90b00beac439784a930487ac2e8aa40ab1c93d5701b9795c28c6062b7f261c7f0c65f9bbe326f6e6562f9f9193277091cc46667c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66A2C341-7654-11EF-9BF0-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e7643d610adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008c1b6a0b104280cc2286f2521fcd79b25dc908f49fc933b35731126aeb0a2a28000000000e800000000200002000000092cf1a0596a5b717d26d22fb4d8bf95c19fb1d895c7714b67592dffe7beeb036200000008fda3a2724b6e1420345751c02692a6613a028009db80c787c26fe36062cf2e340000000f5250e1559b577948b1ac68aa9d1cf74f2f4445bb0cdf46dfdd129ebc82949bc5b686d1e4df41faed619212821d8f9ffea92991771646671705a2dc8bc9d35b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1392 iexplore.exe 1392 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2140 1392 iexplore.exe 28 PID 1392 wrote to memory of 2140 1392 iexplore.exe 28 PID 1392 wrote to memory of 2140 1392 iexplore.exe 28 PID 1392 wrote to memory of 2140 1392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacd9ae4b3efe284ca98c9badc25f22c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3f75ec1cb675cb906fcd1fc9521cf7
SHA182b18c0eab5a4a4a0dec97cbaaa8825b850a084c
SHA2564ddeee43f1043e4a07b4374cd35c1c671c579d620bc4d91d8ddecef0b985a4c4
SHA512adac612094ee0fd0cf6ba3ae95b4036876c5b2d6ebac1b64fb1c5dc1c1d4f492b4be3fa5dcbdd8db50096ce241416fefbc9ac9b3e7f55597c965c7729859ea8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529685925b99be08d0ab193974b1c6db0
SHA12fd7a81c85a029916964b58f6e7c660df532167f
SHA2565d5725585c33667b00da01fbb1ed6f662ca7fca9f4f217d2a0edee476c5d7a47
SHA512fa3b2d8d460a7880c2b327d30845e7c6f89ea3880d9625cb39d28d95777fddcadc1ffddf457f338138aa3ba14e2c2c243486727520addad7a1ca8e853bdb7135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba50b77688437b7c5570482cc20b36df
SHA146947eaf2239273954b32a9f2827b8a760038ecc
SHA256c4aa0061feb0849260a14a4cde6c0a9ec0899ae75e20c4b85a1522616a516a78
SHA512674e6fa5bbf16f67e48c0878ae2036612cc082707dde6fb030578637ee821cae9d8ff4a80c0fc8668192117cb08d7d4ac0f862fdb63afa5751b81549faf70f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c5dae38896a77d164388200ece0dcf
SHA1a65c4757ffdb93928f590b30610694f72cb00927
SHA256e1b6e04a86dad626a9c091bb52c92f547fdef41f94772f3b31fbbccd57500934
SHA512541c72b14bb72651ad71d920b2dc563bc008ce2cf5501aa2deb74588c715e843e23709a09db10dc34148b9e597a00fee4e2bfb230de47e94d347035f5ec4f3e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491413cc00c9ee6f29dc8881c44d8b18
SHA11fce2bd7a20b00f18fc42526a72ea43ba374552b
SHA2563937b6aae3442a121025da6080de43574957021d3de3970967433ecc6f23a063
SHA512b050d97cd65b3b81d77ef07ee90f58438d7484e5fa8b6f1889ba8c3e53c29a59b5867abd17ecd361b2974e651119c09824497c0e8db07552930a5a3a1a393c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3543fb8a4fa59c97797ac8b6b0ec81
SHA1fe72b1574352a7ab964f0fae917241b792e2cca6
SHA256c65d93f0cc89dfd4a6193ad6ba00d46e4c2449e470d6eb8cd8073d38d92cd681
SHA512bbe50b81174d9b2f7de28cc80b06190abf95b0924d007b461af50306adef1b3e10134cdfacddaa359bc63c4e2474b4a1d6c156b0a896d3bb5a00e65e59df21c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f58b178ddb3f5e8dbc75f3c12e0d415
SHA197035ea1bd7789bdd80c829e0c12e4f8f521e178
SHA256eb0754918b7cbf9c5f7005671ed6111d53e74faccdb338baf0168ecb8d3cfe50
SHA51298b2c7d40635974225e5ecbeaaf5011d0daa95ec947761526038c17bfce4a49996b97ae9d3ad8016bddd36e3d53826601cad19cff1add14b5aba100b1874d921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859a2e89e9df5b98066a0c850c8be1a7
SHA1ebc13c81f24a46be71cca18b5d41b204cb4999c9
SHA256afdbb2dca21fd119fc8179893bbc0fce6c6d2d2ccad4ede66edfa3a3acbf4ded
SHA5128357f10a7712445d9ea78da0c4b1e75401730238eaecfdd831f2813e79d9ca990d10ade5d27a79c72eced1445f4c8607557dadac3ec1dd0c695762e98117675b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df91c4f440d96dfd6bbc5d30b193f7d
SHA1bdb26622689b15b48f051835d31698493d8bb8f6
SHA256a89a1cc733ced128148a1a7cc90b810fc0b906687c9ea7ec00a0ad02bf219fc2
SHA512149b74d606dc6c917fbb7bc583b0bedf302095c5325f16164e8b31afe033cbb3c7b97be54200474641b36fade689c86339d98b84fb3d4a3e84ae491dc6a01c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649e7d6ebc0babee7d79e70f43414016
SHA110c5171fde2a3f093d47b1ba31bd14ee0e88f9dc
SHA256378fc8ce13b51fe3a429661783bdd384a2098edd3476c3cdbbfa38c703fb48dd
SHA512a6d369ba80b51a6469000efef9c4bb51a7fc1e1203c6de56eddda09d35948fc9d8a2f7df8d5de5600e67c296c4148078ab1b987566287bab314e8feb8ae8aff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c16da184b0558aa7f36477da35be8b
SHA1058b4a9879598b441ab63e5b871f3692b30adc84
SHA2562bdd6e3b5cd3cb668e2898932b44dcc78866c023620d4902c19c4b06ca68698d
SHA512b35ded3fb9d542f614cdbeffd3c74e0e674503e1de141b96790267a05b2ca63dafb2854cca49558d70022a1430d3ab57536ba85bee32e0c95e36e93558aca86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1fd087d5c3504665dc3871c4710d60
SHA1c0cce6aaba2e1858f0fae01c803362a0a5a522ab
SHA2564518a8da098d2b46a313aedcc0fc60c055fc74c8ed15815bf73e051914891f40
SHA51207d99ac531bf284cf3d04db42aee8828de8e8d905cb3096b7a1deb4bdc4a7e67a50709605a7401545bb2475db81a7ea8736bd340f8cad6be9f3e5269740b9904
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56031d30162df400b74aab44113690236
SHA123ee547ebe41620e7984731d907cac4e6d52e6b5
SHA25625161b9a43bb0a076e93780b4715ff0dfb9b08fd1d6f3e15937cafba854ef7a7
SHA512f5fd3617ffdd0242da4014007e9cb9f8d8b22ca309d16bde4403f887373e6679bd5e2812d63909e8e7f45519252bcae3bf325865872a4bae49e9b8022811f488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b5d2d6d2397536e04c9063c9be5d6e
SHA17332d7d7fa7a3f6ac507e823becc73b75618f1a4
SHA2564eae7e2aac2f11fc085d4f1154ead9eca765bce3077e253ffa7918c0e5bcc126
SHA5124f679167b2b1a1afababacf6d30373a2afe34a7deebe7971f4bf28781dbcc7d32d2908adbe1d4e165b0cafef026d00bffd3b68e46416ab9b20d672507a931704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3f3fcc4dad8c38937f48bbff3a5905
SHA13cdd826bcb20c9c27976b8bf069a738bd281f49a
SHA256bd774b8a4d7917946c30e5c14e01399f63b78e10d7903895a38d435f5c33350c
SHA512a87825f85c62b837ceef0b6293ce7f157779008601243bed0d56e8be1047adebfd9c97388e87ebc9a45843e453d481132f97ad56e97daed4c69e158e9c8f9bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d266ca1de0de60bb46de32f4ebb5757b
SHA160eef942e63730dd182632182141f3aac72ae548
SHA25639789d6eb4724700ca28253bbe5175ea864d63b8ab1db7d03627052fb7014e61
SHA512c334535f6951f1f1c4aecdb402cc24d764b78f87c3323f9bc883dbc7ad15f18654339c31738490f381986ff17c486c2899b92cd4f55536b820cec7c57fc7cc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563aeb37e59261c61542a2b568ab6693a
SHA11c0984c79f8ad4433b2965aa3e84073ba42e2581
SHA25617e8ebd792f62c397a6981e32f0e98d3dbef2d3f5357f0e4bf20f66b619359e5
SHA512beaeacf0e073aa95b83d87cfc39a95b09229664ae12491062101218c4bde14b3b91314bda0289093fdc67a066be3bbfa28be631957ac592b93934afd347917ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04c1cff8f221cf80ea19c692e2be23b
SHA1f6ddff48f275103d028d57828ddc7e02fb4a6f93
SHA2564c91d8c4fb6b6381721322e6d4832bda241ad40f0d1e66aada91e6052a23f0e5
SHA512075005a61053f7c21d2a374aa52d19ab69850946b81b6c9e3772d238367e4469418fc144ef04c2cf5758881f78f5129d1c671c8e49d33a28ddd574c0a9e1c3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e88a629df1e1d99c771a85fc52abba
SHA1681607bb6bbafb44448a2fb0bf61fe0223779f45
SHA2569df3efe079445a8a16d89eff20bd0e61ae6dab1cbe15f1d4aa4251fb81676e79
SHA5129ec0c3844ceefd0d60f3446c83b77697971acccd469d98f5fa77bad151ca112f88c0686323a282532c5288f14723071e28a58731e87cc00dba3930c80e40831d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b