Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
eacd22d509b9d6a22ba5cbdca2d17a67_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacd22d509b9d6a22ba5cbdca2d17a67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacd22d509b9d6a22ba5cbdca2d17a67_JaffaCakes118.html
-
Size
8KB
-
MD5
eacd22d509b9d6a22ba5cbdca2d17a67
-
SHA1
9cb8b93de4e938fd609caf2873975bac38551a6e
-
SHA256
c80b4d96aa024e47531dbf394aaaacab020673e3bb8148b06134a587d82a56ce
-
SHA512
8be8474e2954a0fd1a1c3d65bcab21f58e2bb4e60bbc850c87fc2f766568f81b3ee5803ae97d394ed3b6a5daa0f82b16a72cfb3dae8c65822b80b5f6f0eca805
-
SSDEEP
192:S2OuDOf3E+KJKL/A81Em5YGrLq7PIrEng:SaqJ2g/pEAYGrWM6g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E173F01-7654-11EF-BE3F-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e79312610adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890833" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000ec7c244ef313a07f3817f2e464d9da59fe933032c4b7337968e4a78c95ab5304000000000e80000000020000200000001b86307981d57905e8b88732498cd8acb199026fcc4f8f2ce73ad26e8b357a98200000009536faf202cf71534eb4cfd597fa3a6c9f46ce58c1c383c942f360fc83fab34140000000dd75bf6a103fa8e46a2a1ec8126db5e5ad1a66f816da9b4b7badb43f8afb18d8828aa693dcdf9b4b5a92a2822f488936dff5ffa40fc38c27b7f3a96f87afb15a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30 PID 2640 wrote to memory of 2876 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacd22d509b9d6a22ba5cbdca2d17a67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563757a19d2ce1b11e344de63b31a0c29
SHA1d2e34eeca96810d6b24e4c5936a133d0f849df8e
SHA256ed8bab2c15bc53357bdc94dc0a704266d2d431f2811dcc2a38701008db9f8426
SHA5124eebfdeb976d47e428396996125b78838084ce49e6517a3acacab2918948d04374520c44dfd6b56732dd8ced45c9c378a0d856eadc20b80811c6134217796b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c41747be20bffb4779264e368406e89
SHA1f763edd998392f1e79d2ad2a7a255ecd7d67470e
SHA2561a10985e68ede97b726e68c8f8b7d93078e5a9da166d058b6b6248607eba4a86
SHA512834e99839d874db3ca705769bf11d9d9e333e559c71ac9f8f81ea4333a335be9d4f256ab9ee2dc696f61c53533b601cd973de80aa95ec782655cea3794611acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60d63759b10b838c209be8c70a54a94
SHA1964b41fd7362799aee94722db4323c42e516bb97
SHA256411096eb21e87113af7a06aef009977de100d790b498da84712f0af11aa5c89b
SHA51284021434081907836ea2e87d90563682a4deb90c620e08eaa206893631060d9b05ff93933765afc5d430f89350b47a55854b08aecaf90788270d9f2889e93c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5995a5498bb39e1e4ff434e130a023faa
SHA1b3bfdfe24514ba96227912c65d4df07422987dca
SHA256b498efd2ea9e9c60ee8aabf3e8de1c5ade5973d82f465765bd2c46eec8180827
SHA5128eabc09a6f4cef20277e8195f75a012b34ff9d02d924f947c86581a780b4f655a312d8bb774edbcc33a685e6bcb14dd63e32b4bbe9563dc793ce52b185879189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce2032fc9b2c33fd997ec36ba1dc3ac
SHA1e0f6ce7f57f7244413beea6e11e7dc95872bb9b7
SHA2565ca2956feafac66a0e33495bba34f0bd503aa4b5926a62c36ac9c4e9da5e2990
SHA512e4f2f973e1b292386fa852b4baafcabba725b3b59c6b84c2855a1273e6e84b1178c2eea7f419e5d798fe9b0e2dffa985ccbaf4211a436e295def521c70e98d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9fc08aa3d42e808b06a621ff4af5c8
SHA16d21dc99b72a73a0d614d4616fec7ee212746dab
SHA2565395ca7963a408e69c827f819a358f1ec116a4cf9e8b081a9c500b841c162fa7
SHA512e87d44f73c87e5e42ad2091f1bef1fafd148b067341385accf64cdd8d8ed81e2b0ab66991b7351fe2198f910b6102715bfa696459b50c5121f1a1c38f6f497ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7dbee64e3a4accf891e870e969a06aa
SHA101dc6a52bacd1396a4fd921d0e8a8aad03b67bfb
SHA256b7688baf8a7bc55b070c8a53ddd20a6c16e44f739366227b36a30f84f7ade8e4
SHA512a05111d1a89639a32acb851cbf5ab865c81b4a3654d9d58a3badd8f431e183e64451001f248761972c15148f7e81b0ed29428bf8ec3781170989967a9661337c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52daaff17df9ebb94791e5e159f617b6c
SHA1311b3969b52109e3aaa8934d73afa30419326f2f
SHA25694b14de65eccbec32d54af14b2a05f4e9462802855e3ec374e34b206e4116d5a
SHA512af52e7105d3ee31e012efc66e427481e5b881b345d89941bd85dc73339dc61db6c2238c29177cb9c29ed2771ad971e039a77c4397b117e9eabbccb8643a42e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5f3702333be12d7decce06dd7bb677
SHA1716f900c5e467b8aee0e8b06f3d92946b9ffef2f
SHA25689825027ff8b5c02898e471974b8552e9a2c743cc398b50681f215b39165ccd2
SHA5129c977b18a9d541ebb95397a19d0b0b05ccec82b3fe63562a0fab1a94fc49d7e416ed7a8511c673ef8859a3bffef984af722e24f4b38bdf13bf24301fbedf5a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed2fa0856e8be771a0a479ae5099f63
SHA1c526f66055fd88bc6640a68acf6ac5cab3c260b4
SHA256ab385009c36a5b862eedfae62e4eb0193cb1c197de3653d33bce76e26046a3a4
SHA512c4cc717b7794d77fa42343c129ba5b1420353271fc626e65ac24a8a3a60a0d01cc3c5f80f3d5d1603b114180552f53e30d57d50eae58378608614fe380d0e6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a69789f43683cb4ecb1c37cf13289d
SHA1ca34e6912719c4013db10c885917a36af954d933
SHA256be6adfc51309a6adcd991d1a2687825a72a54b651ffa12e90b2037c1e15b3b80
SHA512e9f53d5a731361f6088b45d1fb21f809db8e6ef1efa062665622b4eb3c500837b6ce8988cd581166b9f7432760566e3ee24c98a26153d0ed7a0db181db560df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e59dae20579c7c4422a733a713e7bd2
SHA1dd0e6b4f43036f9fa685b44e9addb44253c66d15
SHA2563793bd6b69bcfba354f73e59372e50e0d1a87e87b216eec6ae66e931f21eeebd
SHA512bde6eeb6064812598f8df0bab1f8791f7c95ee24fd1cf0a4dc755e50cae0fe1fd27c97ced5727705341bef74499e92213c5b5ffdede0ca5836d1fea95988fd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ea290162488fabf7299f284dce2204
SHA1d44f1b052368103b292259cdafc80c2b5ab9f39d
SHA256535650c83a7246a24caf4ef2d1d49bd7b2a9b20e3387ee61447129f101fcc45c
SHA5128817506fa98338f20a067b45402d47a78d97e06cd1b7f8c9b50545cb31d75fd7874eb5a87985a4eb5d60ac30316ea170a036a3555ee2b18fd7e53b00267b2003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2613dce99c328211a70b3fb83707838
SHA128d4eb1c633a7c65540ddbfab06c2a2b731ec964
SHA256791f3e22f3aac89f7a4d40fd5cc5791e6eaf2947b524fa9e76dab72f7ba94e41
SHA51294a35f71ca1d9c385f4bf80c790a6e6baf080fcd9cb4915b1f95f8b1bf95f986c59a0fed5f02d006596b235ad2a2954dca48ed7c62004423db0d0dd784ef4b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b17b909869256bbaeddf3ea47555ff
SHA160490f7eb69fb8aec62f21040a23a9f4789407af
SHA25621e6ebd20ba11a01a0dfd63f0657029295ea4bea3dc5ab464cca2b0ab2cb1cf1
SHA512275b2ec6333ffafeaa11982fc8491fce9d6e680e37f7fa9af63465cdd65683805de862f5ab902da2760abfbc1592516203b8aa6e76eb1efb1bc6c94477e3db45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391fcbd8dd283f1fb29545aed10e280d
SHA1b4959d67e2089d0d55bc8734084b6c74169af8aa
SHA25611e292186540e6ecf58e5ee5b47b64ca9f167d8a32ef8d4d1c43657b250a0436
SHA51222f11420b0d6be3d50bb9fa95adf8615dd63589e9ec66b4a4c0d832b4ce2f2ec9fa47f7fc9c33b4a04574ec2f40cc550a2103ebf352adf78963bf43ace4fcdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c86b5b68554d9883f194ab2c080511
SHA1ff2132984ccfac52e521006c3d3b6444e6df87f9
SHA256a59646fc177e2b4e6744de405a964e4455b674ef556482ef75f537cade5e9837
SHA5120829845c6c1bc26756f94b531abbc754c19708f53fa5a80ba82a493616e2d6a3831e2f1a0ec0b597487a37c4230c4ccd720c728408cc3cc4907a1dfc8e056a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522028bd6e3cad0f46685cb9d07e7c832
SHA1825bbe73343cfd7c4867198c343cb98d280d712f
SHA256474eec11e328817af3b2964e705aa4019d921fc9194c36fb7d085462c79a1c34
SHA512d939dc02aae080cf9cbdbce636a377b8789333b8e0b1890f735f4d65606ca73e68d904206ad01d071a1b787f93f1bc73170bf3ab2ef956e6a213cdc5e2798540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53060f636d2c170cb8bd9c568a3a62978
SHA145e3e7e52c8cd579f0bcbdf331bd5878c78db2af
SHA2563f8b538ef1a272c2a5f586053303499fbc71198676c5e09585760f230cf2ca63
SHA512da756cf71aafd5d34b60cae6cf2ccb1fa665f9031c9939121e1a063b3a211bc221921113a3fdfa7fc0646819047ab01fd7f89642ebca2b9f9162fc42eba51f16
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b