Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
eacddf68a4221abc16583c32f1e92a14_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacddf68a4221abc16583c32f1e92a14_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eacddf68a4221abc16583c32f1e92a14_JaffaCakes118.html
-
Size
11KB
-
MD5
eacddf68a4221abc16583c32f1e92a14
-
SHA1
f5a552ffd4aa3cbbd772057c23c20e5560a4e34b
-
SHA256
145796219e59bb779e9a775f6fb355dd032170bad47d6fde97207a081c764be3
-
SHA512
b5b287b2eaff8ee33b13b763971aef59328c751c91ab5a578f06e3ee4cb4a969ada3c96625c2db57f0a9099508b51f15203e98ca232c7023241b8440400586f4
-
SSDEEP
192:syjMlB5iWygYM7wS4Dv3HVxsFcrj+etPemRe0u01ouGHb2JwIppupO:syfTQwS4Dv3HVxsFMjbJb11s6Df
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83D69F91-7654-11EF-9982-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000e8d63bc299b44480eb179838ef8c59464bcc876608efbaadd2f565cd3f0f3228000000000e800000000200002000000001752854492b797c9d47d9532b8bb8d66420bbffdc7f5aa2674292885f2ac55a20000000ea2abcb2c78db2a03046a31adc57d9da96773491882887cb300e5dd20d38a21a400000002aec9d362b2c37dd68104f62be63daf51b7ca60ba319dfda5e27388b3413c42507134afa6097db69ddc034e42a7a4b504cedb4070d809235896cf14b2c63a2f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60393e58610adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2236 2520 iexplore.exe 30 PID 2520 wrote to memory of 2236 2520 iexplore.exe 30 PID 2520 wrote to memory of 2236 2520 iexplore.exe 30 PID 2520 wrote to memory of 2236 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacddf68a4221abc16583c32f1e92a14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e399d25c900f0e481b4155890cb5a84
SHA1da86e80e31e149464bf751ed89aac565752a5882
SHA2565190dcb28f45ab608ac6fa4dd68db82a445df135db8dac4035aab4c92422a8c4
SHA512e92262095af3806a71cdd2d1c99bf73f5f7d8a7634b7c24020e9f3e5f682245816f150af532186fc26dc8a32b7cbecbdb6256381dff819848918f77c86d2ed8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d71a464af8a79549898500816fca95
SHA17a4d593e0ae42003cc3aac507ddfaaf4126d043b
SHA2567594ad2c159f84dcd8ea96cca53f742a0fea56fa1b9b33ae14d4d419ac1972ba
SHA512338c0b996b6bb88013bc8cddc6bccb405543d00ebcfa3b8c048d9c20e4cafdc699071b5f8cf83a766827bfb6a20494c99520d4ddcdce8083af6f9ac37018c8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55522c152b161a1b6d702f694c1fd7b87
SHA1aae3a5d59135a72bc8edb9abd0b1d40e5616c623
SHA256f57e19679a8e6cd5874f6fa47cd628ede15b3709b96ef28a33d46e3be17abc46
SHA512b41e845b7e281c096a9591783e60910cce894df9f052a5282cd99ce35db1cce058ea095597b456a1c54c856722e0fd9add1e9160b6141e43d6499cd8806f9a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5eefbbcedfa2e785fae2b7aa1a9152
SHA1cb704bd2d00156241682b28897d99be58bc353b4
SHA2567a620e9134db7ba82dcdaf829a8175dceb7eee7f4033932f28bcc5a371c2a141
SHA512e350757ab1bcbb6df643d30ade03d884a5ef0b1b216eff0620470b4c7905b01da33c962976699ae25f00553a910f9dd9821b6c6a53d56cc64c3e4e98ecb065f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ca972baa28de355267f334bededaf0
SHA107cfece50df78a502a136068ebb2584bc93f13c0
SHA2567df67215ed410bc9579e6b0e90444ae60a1c6d9fd5bbe1ab869fe335177780f1
SHA51226f0c84393394d2bae3abc938e0ba14f00e8b985b581d2c9a1bbd79f7bba6cdd13fb1bda4e2cd58bc258d7d07d8b1ef3c5ca8341831113a5e8245eb0ed6b9c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439f9a2d5caac848fb02c3c26720532b
SHA17424723571d77fcdd27b6e4129baadeed677368e
SHA2566806bd1494664394c662092614e8bbaf93357c563e2aa77b712b546e036195c7
SHA51228165b019d9e83c18c1a6f69455694c4a360da6817d6801429506b2c4796046dface0e48551240ec9c0ec23cfd9422e0522eb92264d566be38b26fd629203c68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64f796e54348776378c8a8c0f76b016
SHA16d60936ae1e72ba71c6bab856e43dfc91acb334f
SHA25623bd50314477a7e1f59cdb4c8a4108246c7aec8cc66d021a2c87500aa48a06cc
SHA51209aacaacf8483af2d13adbf194c10b01a66b2d19a12aee449f9d7b27f1dc183ed172a7ec01e13285428353d11d468cd338ce51666343c8fd5499e443af758272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54588c0d6087f7ff771e1fb7ef4b61f8f
SHA18fa5b469afed4cdb80da3916ef3f06e28612cc46
SHA2561d356ea548921902e6f02fd21977c8029817b2a370bd995f09811924e37faf16
SHA512e5a17519e5dc069b9a564bcedc4366c8904a30c7d38fc4460fe346014cc5497a2c8da1138d1ff804014892879e92ba521bbf10dece4096f2b9ca4942eab4abb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9af0fe37538bb142da008282c70fb7
SHA1759739a0bd328bae0d50195503395c3c0f9e0375
SHA256c64ee1e71df235f91f6e6d853e8030439717a87cb00c2678d8a9dbba776fa558
SHA512da4237f1bcc2f168af137cd1f4bdd9f41829e22c423e3e6620f8e759e2e0e61c8d7bcac593df5fd1837c792211f3952048f4fc4a51a401ef1dc14a9d60cb9238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fddecd30abb8267b45fc71f55e0708
SHA1fae70d21f0dd258728fd01aff1c32a18f57154ab
SHA256792711c359913c1e1411ec6fc46d92871b8b2b773a07fdf60cd64b4d5dd31437
SHA5124f49ac7c28fc458125d4b1ef1a832cf560e991d98b1bd2dedddba8271bdf0a68d38e98ede12930c73b62c99c84212f07faf6332a602f80b73d725b8e790a3f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b87e4958b5d872e48aa1f77fc34d90e
SHA17fcff93123aee7307409906962a38a1f03d11b7c
SHA256c73aeae17ef386226186180f0c5de6dafa64b3f70949f85c31a5f5045d3f2a53
SHA5120bc2413d37d732d1b077be146bb85d08de6c5622df4199d46faa5aead0b923ac74a4f8df5fcc62c662572584b001457a23d60d8f7c3ead10ef9b097d28022402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddcea6e87dde2b15b32e0f679a848cec
SHA119f08ff259b0ed3aebeb7c431d520d3650c9c7a3
SHA25611c7d7f86ac7c5ada67d6cc2a27ce64aee867430a1a477d6071c0fd30482d6af
SHA5124d6d4527fdfee54d0c4f5621b3f453654b3a7b5033adabd3bf49f15c41acd6f94fbce6de29a6d07c2b46ee44e6e7bd7db061a66b47d67e5451ba295fe7b4a982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614e8f8df190762e003dae4f5740caa5
SHA1cba688989b06446e207ea3cf66c19052a7c3bb7d
SHA256359885a386523b5c6a44f1ec45285dd738f5954e1f4ed953692e00538ff25e5b
SHA5129b2ab95c2d9ea2f6e6437b557e0dd9e4d8c95fa6b916ec6a0cea6dd5cf43053163d37d1358aee194b74a3fe14d28b2b37c80c98b28381b5cefed277848a32586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dfcab28719e3c68c2483add174cd8e
SHA17c46fe2f07c7c06e13063d77ef88454927cf52ef
SHA2560523288751f8b9f67a22eca6e3dab4b1181f451064934d15776522b8f8cfcef2
SHA512412d8aae18689aad69af9715dcca73fea4e4514e80c9877e85392f36d3574c5c65865d7dcab3257adcb8f280943bceef09b849a33ba0475d53b70008a3416183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d346a7122a2e7b5b51fb0d37942c06e
SHA185a5f4ce7b570ebf22628f3477155fb0cce40a34
SHA2563a8dd96e8f9b95786d70d9d78a04ba6416c5bc0afe7643684b72592b20116252
SHA5125fb3cfb290b30da75d5dcbba8c3beb4ba6ee41258a88e8b5bf22f3229feca89b19d3aed23501b8c143c4736893940b1a1733e667d31f2cf773c5d42fe3673264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d83d12451c90d0a5132fb94dacc4c6
SHA19074ffad56d1d6ddb23542d22a4484f9bfb9317b
SHA25656cf567dcfc7876f851e427e434907e681603351200af79b3e2ba36d694b67bf
SHA512949332f897708233c1a5436f590f3e81519c8a33ff4abe3757176996afc5e43ab3d258e4cb4881eb18db580124b611d9b011749624504dffc72a4373960c988e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae3e0ed467dfcf5ae71a715f788fb48
SHA1c4fe7d0c23228e6518a76bc91a4f548da8b1f176
SHA2560375bb91c56003080f36bc1b722238cfdfcae7e7541de9740d0e1f24332338c3
SHA512cbc16215df06c8d8e776ee68660e4f0d5cbc11d24aa4dbb51925d27a86a769c3577a85d68335e8955c513f62378e1570b9841420e6930f2435c7d3e662e1b85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fe2e50e9d316ca3b5042854b24d147
SHA10174d87f2e85914704f9a69b69c3095cf4747651
SHA25687cacb1fc41d7902538eea42d54a5929327923a17b195137a3bb1367f5ce536b
SHA5127382efc2da7be4fe07e8769a1540816dc5cda9442a9a0e7dbff0cd2f17d751ea6327ec9ccae34f47640accf63f8c042595e3c59f0a394735c4368048bf032f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57946b0292c9e393c4d8d818c209b4bf8
SHA1edc7c931a60c217168166e2d144e2cd70d47adc3
SHA256bc2aee653ddb62fa5109f14f4a8ed5f6d553d0dc92f80e8b9e8dc71853f10779
SHA5120fc34c5f20bf81526c1ec973be27e097126b332aef034f9d09a838efe63b106909946e9ef28344aee1fcafb43690b310ab5f487a4998753c6be139676bc06be4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b