Analysis
-
max time kernel
82s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
eace1a7bd8501cc9a94070425da94d3f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eace1a7bd8501cc9a94070425da94d3f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eace1a7bd8501cc9a94070425da94d3f_JaffaCakes118.html
-
Size
16KB
-
MD5
eace1a7bd8501cc9a94070425da94d3f
-
SHA1
9bed675f554102556fdcb1626bfaacd2e31458fc
-
SHA256
153d8466513af0944f92cd8399b356513b850a0e618fd374ebf0eb79e5487ef1
-
SHA512
957c2f3a1f06bc91e87dcd86e1bb28f2b4250dbe42eee63568476a09e199166c6761224ef7278a20b9b27c289c8481bbdc08a7359e3f4d8e5b06086e176a6d9d
-
SSDEEP
384:dTTAy3vLRIAy3SoRqAy3FyR8Ay31uRRAy3BRSAy3F2RrAy3V3R0MOM6R0Ay38iit:RZvYSjp1GkF0EWLYR5P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000f07fe8dce9e10cffc2730c62cc85cda83698f91d4f4e594b6e38d052e7f703e000000000e80000000020000200000000481ed63b4d90c9c32a544ccbc7917b2b8b1a088664b9ea3c3e4546ae0f81e4020000000861138aa53792df4c5c7d16d1791dec4bbd0a486f67710f4522630a86db62315400000003a3f6b21a5fd89e73ba8af1588a1cbd1a97eaf21446e9faca449f19736cf2ca2f18fd9ec1b35215d2fc009a485071f95d4e62f310b0f78617fc0351bb6e4e403 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96368AB1-7654-11EF-B956-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5063eb6d610adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2912 2324 iexplore.exe 29 PID 2324 wrote to memory of 2912 2324 iexplore.exe 29 PID 2324 wrote to memory of 2912 2324 iexplore.exe 29 PID 2324 wrote to memory of 2912 2324 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eace1a7bd8501cc9a94070425da94d3f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67db3a66799ece941f9c2bdeb7d3c60
SHA15a2e234c7d22358e0b74af2bab55038e6b95a478
SHA2564a3a12ff9df2c1a8ce61c00efe1a804f7e9409bf2a4891a97dd9d3a4d42c2f44
SHA512e94685711f81406e8b7c8644574db293bfbe31e0be21850ff1bc1392a8e6c1a9d1f0c18d2cb00a837c693a9b434efe146729e8947a8e5391b43525d607373e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515c980d822f03178e835f5ea49e2ab3
SHA1dca912312881279891170dbbba85cd1a05979d73
SHA25697fcb2a7d02856dcab56fbdd4868d8408eacf97a3f7ce086acb7f6438d511caa
SHA512a8ca07ed862e9e65a60e123b5f290c09c17a9853d37e8a6cc581b5e166937e3b2499f8ee1727127108b6ca4d1755358c88e83a053ca03113597833301ac3e435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db85da9dbcccaaf36dafe55700fae204
SHA17cd9139cb5be24c5388548bb42983b47e77c7d40
SHA2565735b852dd972682775cc33da270699ad7e443cd5232c1d3029446ac86332301
SHA5120f536c6b7796077dc667d77be9d5577337818da0ad538f93bc2cd3cbb74c77f3188c6b76b64239d6500579a847321a3dd9b374ddf8e432c538a71919d6f6880b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093061245bfdd0377b2fcb140172d3c1
SHA14d139af231ad113154da57042d345aff709f9c64
SHA256703a4f567263284b57cc96192f795b21bb8b3dd88bc719e6d44e482784f32274
SHA512b0d61ca22d3820acacce2ed52d563ad2136f0a670f0daa23287db0af750593e80cef8d8bdfbe246175e1409b31f79161677b4ba2358e5e550ea12a02a07166be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9b408697529acc76f8df83bc530312
SHA1da3c4a31967d59c94867534c29ea706db15bc1dc
SHA2563a4d4dda93e4a2bd607afd181a88ac8d8082726b9caae4cb3cea72c3675628bf
SHA512f9dcef8065e597c502d5fa2ae748fa8d76e436e6ebb9717dc47b21a77353bb23bcf7e9b5c25c9f30723b6db478dc4a685c3a43e94b7e7dc242f9203d744f9815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befb51474d415f7282ee0a8ac4b157cd
SHA1eaa9c4671a3e445bef6ffc06dfc8f8ea899fc35d
SHA256ff66591329c7fbf8ebd0be3cc98606bf713321cd08fbd96c45b77183ec3aff8a
SHA512897226855d35b975d9a097b7e938480e4161922bb2504fa38e5a6d59e6cdd51008314e86100c7146b02d04f0442502730ff496bc5132d66096d97889f81daffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a737c036567cc3dbf1ff77fd5f8ec7
SHA1dc5259f07b71f46b7a5542e450ae17b389a7b13a
SHA2563b6d5fb7e21ff4d1fc0dc39df4c0c7d53cf04ae2b9ce09e6fa5bec234382a4b7
SHA5129eb8f4c102563f20d9c2a5c462bbddb5dbd1b09273f6083fa13bf5ee5e5f8527f870690ff513185115d608dc03ec295dfc7fa8083366f936b8f8a792a6621bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c610afc153610bc80fa5bb96f10f357b
SHA11fcb5e73d0b3ff8b957128478e68bbad8c5b4b54
SHA2560ab2bb058a97ac21d8560e727093e05604902b8868cf980284f5b6529467afb6
SHA512e1360423baac3e2065202c57a0d2852dbda724579d165d7ce1543e03f7b79c46a7885a0a3608c9582be4df8c608568a07c633dbdca5037e688939bcb0e6c39ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6884a8cf4c7d1ee710fe9f11941259
SHA1eb6cd728ab8bf5baf7129a3fbd6e626ac8bf33f9
SHA256bc7632ecefb193beeb8021b4e9dba6bfa27bc983e7c51b6735c796918dc1b6f1
SHA5122d94a501f567f79f7fc8daf286afeaf3ba08453a558070f3af7ee9ab51f44582a0ba015ee2771ab2fa44fb6cb0f9377d83b33b0e6b0b7e6751717b94bfb36057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eba4bdd6b3c982cabb189e03ae081e3
SHA1b17182daab65f838f66fae75f830586a500c92ae
SHA25682b21260573d443f4cfdd346803f65571e2beac802b74a80c367e160fbcd5cdf
SHA512146606600134523a0a20c5bdc438e7e8c1721b9319e68da8fa56c9707ea2b0eab39b0e1c4fa57ccd4dbeac98835bd7235ac651d1c64e06152b635e6cc9b1ae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51472c14bdcefb5d945d6ed66daa99254
SHA19023e0c57841d2586f74585fb59b94512204edc1
SHA256fe29c562618c1b3c0b2a0264ffed57c36abc9d2be0964acb9cf4446f60ee9e91
SHA5129baf0f4ae4e79bf7861af482f4d5a34df133ab823831d9ef37b4a193239b144d790d7b48c4a3eadce9c78198db33167992714b2eba1b62ec3d3be62016d8d68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b2813aac8c5b5ea140d0a45405c1ed
SHA194e07c19c2ed9fda25e9d4a72e845af286fe585f
SHA256d4da7af87e327dd32bf772474a8574ed5bdf2b271eaf998ef0db4a340bd494ff
SHA512b81df5a55527f14f534b4c3e81a8938cbd2d2046d3d12bda11125458281957379e096deafe181a5c609c9f113b592cbb3aa6965b9770684b0b7488e79cb88093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7589067aa2b782d8f5d0322185e84a
SHA193b42a69249020ff1b03715ba6a91f5c8ea613bb
SHA256cd9fb22afb4403e733263f0a7128de585334c2fd7e81ca551f22b690c7bd3b04
SHA5127d37fc3e954798e36133620d96259fbf38cac73f8989355d17c6054d1fb22b242184af0def54e25a9227fd1aec52ea13be07817e38797bf4d77bd70431391f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f9f3654a1e053dc6044d6e89bdaf1b
SHA19b4fad2306b763d76069f1e9f68a6586006feeff
SHA25640a63ee992128501915458ff671d2440f9b223dfc341fd0eb8761de9d3efb311
SHA512f7b2c4fde8274969b658570d883dd9f4070caf58880ba5909ed30efce49f1aa1a567f5f548b31b3a245ad1bbb9d06d90012ea8e281ef14a809bae257ee2249ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560ad7c8891787cdda3017a42874cd483
SHA1eefa0b5d64b909d6642183610bd1f2c5f8cf560b
SHA2569bee733d3482a71ecc9a705bbe8d1287228d59d7ea9709203fb47085723add64
SHA5127ab833c1afc2d34e762cec53897ecbf29c45e9345d98025a2fc959dfed666a0be04b81d2c135b503d709ead73f519ca0e4d1faf2e6b49d073a77cd6e64d511c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f1c40fb2bc267f56a7cee3ce781829
SHA1af81fe8cb0bfacc08ec1d1878699f12ecc65e565
SHA2560dc2b42b49544517365f9d783bed59fabbc9cfb2f2392ca82838941939040372
SHA512000a04a687e94a8e8afd2472f379fcca900178d6139246be492da59ac34e14d55a985dde04168784ba239add37360445837811674d3d59f9c9e42e87b8da5f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b289f0bfcb4d7a9944dcad8b6323c16a
SHA120aa69e7c070dac70dd48ac37b8b8264503c206f
SHA25664aeb4f1980d6147ec837a903e97cf5c7c1c8d314e218a969b032f259a667144
SHA512f9de59bb11c13c78ea70cb423ae43513942f32c40437fa029e27056653098d94fccd4dc80f65ee16f8d3c29233eb4b42567f8ac18945c6cc54c1f632ebd3c01c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b