Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
eace26b3f554a1cb3dd5cceac4aa2007_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eace26b3f554a1cb3dd5cceac4aa2007_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eace26b3f554a1cb3dd5cceac4aa2007_JaffaCakes118.html
-
Size
24KB
-
MD5
eace26b3f554a1cb3dd5cceac4aa2007
-
SHA1
b097ae20a1aea132c40366877a1b3be15b9bc443
-
SHA256
8d75674fd30b716ceb96fe61f73807777d4d5445fe39a34770889553629ac915
-
SHA512
dd7e30973b880d72577165468c7b36bdf4fe598be441ab718f24e89d4c693ef9a1ef030e9fdebdf830ee22d6ff5dd4f35be1486feb52767a6b364305584adf0d
-
SSDEEP
768:sGAs5oXA30gx8PFNVAtK85loYn9jX2+K6Adi36oToKQ0:es5oXA39xHAdmoKF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CF5A751-7654-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000014fa3e9faedc2c66f8ee7f3dfabbf0007d4ac7d2dbbd2eb8ba812b89fadea493000000000e8000000002000020000000d1226d00566db2444a6150255918da82faa1bd54c03accd4fe9619eab713cbe2200000006be332c61f1f6885ac9db14be9bd23fd917cc8afb3c9d86a73a56651ac946500400000003677ada067fed04bb6e9183af57b5c1dc0d53b5d6f78b328013af1c7805de41a60c0b73244eedad3c13d27cfd23831bb22069e7c50ab88f3518b3b28c5ac76b1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890994" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01a1573610adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2748 2796 iexplore.exe 30 PID 2796 wrote to memory of 2748 2796 iexplore.exe 30 PID 2796 wrote to memory of 2748 2796 iexplore.exe 30 PID 2796 wrote to memory of 2748 2796 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eace26b3f554a1cb3dd5cceac4aa2007_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bed5d3c8c75882eaa209aa92cfde84
SHA13b2114ee15c228eb4791a68d263fcf1a6b749d75
SHA256f2ada7c768a918fba653dee88caf60174d035ff5fbcdb9f3e4a7a7e1908d2c2e
SHA512f53add8144a7c3f7ef327d89260853ce874492906287d029de49948de2b33ddb5b860bd49957b7bf9c7ca12d6feaddb458bb3aee9c49d55dd737b39ced980cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7eafb7ee5413616e7e3e2fab5de248d
SHA1e0b27d4ca3efa000c2c6dc605c7865c05908fbbb
SHA2562f53ed54f8470cbf20576a01f7cd552922583c775303de46277b249886224799
SHA51204c8a4b8323a4e2a61e02074a4d2f548f67ce5adad13d2a61e993b4019eaf72643708357b019910981ce35301b45b384bec60ed0ea2e3a487909df0178358060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e58c855645b6f5588f15243be70b27
SHA14055f3322408fa26026213ea615ca0650745dd37
SHA256e648f7a0c9f01913bcd9d032ccb403205914fe5d5a0a89d37cf4ac9cbf39e097
SHA5123227fd304eb88644dea407384bd944b21a3c8a8fd84f6fde36dc0c3c89f7c0bcea808a555b61c0792981ea778919adb6117acab82df19b4a8297e844c20d1620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c16cc6bdd5da58a83923a7a0bdbd860
SHA1bcd0eca1f4e6ce40e5112e264ca4ff83a964577c
SHA25658ab2fcb4e584053a55297878bcface7de869a1dbcd879ac35b45921a51bd6a8
SHA5129ea250abd98721ad37c1da66d8a82135edaa5a0586dc3d81d5d75b674ae7a80cd9fef10402387cba4c2b1394e064b718b886e64a2743ae115a8da2e5f8d1430c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57689bf66f79a5492b9c54bc560e35251
SHA109a38581a6c6b8ea4aea8fa14f711ff88a7b2303
SHA256af5d65ce08803975bd68db22e6a43fd68e0c647924406191ebad55bc58b86e70
SHA512597a03e339149750f6532ac0abfb634b36b32d74f3045c2f980bf87d98ea58ad4e6a62728a292cbf11acb1525d912ed0db9ec55f81b1ac2bb81f247f82ef2d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b2a399f2c07279a99ff0aed90648bf
SHA1ac11fb25d9969a5d06b65f78a867c90910bf0738
SHA256de6dc47c4fc02ad99076f153c648010dffb7d5dcc1396f030bae609be4086765
SHA512d0d808cf41df291de1f7e4d47ac79f7a58e8514cf7ab1917402058cc2ea32949083aafaed8a0edf51344defd86647cd807cf2ddac48f6ab6ef7adc7c645133bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b53bb7dabb3569a3ff1222933c68f3
SHA1956c09b53119ca6d98827f5656d1517ecc7d0d04
SHA2565f46743007205f7325c0556265247f322480a39d20571d61afa726ec6a0a91d8
SHA512fba0b3eac03d782a26e1decbdd904842cfca4ca32680a7a3fb41341474785c04331ebc41b18bb8af7b23da1cdf9d665f7eaf2bbcaa056d5b3b9b73aa4e853fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0e21e4f7620633009fb7c4733394c8
SHA143a97cc5f1646b23b5b15c08531829c76b954010
SHA2563dba7b447a840af1a72c189a5dd9ba1108139b4f07aeea430446681cd191666a
SHA51296a13b5daa3845269040c2ab662d92be83899f0dcf6a8828c6f7f86182aaeba86e6f5118f70339fb097efde1ec8f1221c8b59f401d2e5bcc1f89d02441bbd6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef51ec8a3810822eecb029fb6785de6a
SHA158b15ba3fa534d3d3cf60b92e5338ea04cbbb5c7
SHA25662c547ce3533309ee703d91af3c7b1293eb58218f105cf6e1c4879008ce7082f
SHA512bc7440b50b00d2e638d971d9174391f8138a164d3d587fbc2b63d2a7c8e53804576c3a00d6f890823c72022f2b89ad70e3fba68b201ee32c8c23215d63b64355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d23ed48d448e33c97d3be66ecaab64
SHA1df457a652b2130a482e226b330d4173c8cb35e61
SHA256a323d44efe4df2e739a1243f53f335aaffe1abb1c94676a9d09f1259fb36f3ba
SHA512f2402a63564562af230b43b34169f6b23a09a39344822e7b59973234489a65740ac71bab413c9272532a4c20d89f9e517b676148ef8c3e9e6faf192c5e79f2d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb4b8f576b6d975ed40b2c90d309d2d
SHA1f7b2f5ac430bdfb1daed8216e8cfbe0d08a87a93
SHA25628ec1a1750f76cf1ed11b354143b9a8a44bdcac553aba123f5faa5b4a8328b49
SHA5128e5f3e6618882364f3ae16965b5f2f93e4ca95a6b807b52231fa3db2f66c652961deb2d03a80506dc35f31c92dd5bca597f0115a552c32da5bfcf07a29e8636c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c83d515ee825f0055b238ef961123a8
SHA11768a139e5608fe10f723d668e5f7153aecef16d
SHA256a71f582ab3967de20777b7eef325d2a61597839ce8c0d4e8213cc19ce1d4bb95
SHA512c7d6cb97c1fc3d5735ca99f335da15c1b81a7bdba50f76d825b321444bd7c2188dcaad6bf5183cdf247c05ce88344ba197c7c1d42c3844b34e54c8e53c10c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a54cd85084436fcc3afa7a3ab16407e
SHA1923cb28a490c01e3133cc06dbd62abae9fd17566
SHA25677da75e752e8eb6d108cc42318689056e7ee5e60c0184158d58923ba652b28de
SHA512326d84a6bf219bdbe5e5527f6ffc2ff8b43d2526ccd3630bf057dc19d2460554b54206d914097fd45289e57b100d30141538b50757435a0c1d9d54013628ebbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacdf67313be265233656c1a9ae33201
SHA118a9999c9d7afb476709673eb5814858b833d6d2
SHA256c41b3c7e9b30df48cb7c98af2ee435b0c4bb05435b2064f3ad023f94b7c5e379
SHA512895f3645d762bbe24086061857f052f306765a97ae94d23ede0eae0d125c9c52cad55a6bdd0e66b5d6e12b6a63bf32da4b2d7b02270bc78788de5584ee2fa8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580eb03189a7d050549b23acaa8e94e15
SHA1b449697b69d3139126d402b3652f483203cfa0f6
SHA256da33988abce6c811f4fea14337c21f0775cdf51da3d750d43a4e5fd8d9558e1e
SHA5120ee5ab0e9d41b746e76d20b96bc558fc165da51ef7973d48d7d07cc0e76a67825ecf7af70fd586eb38739499d690fa029f6c7369d62311df7af7a036e33be86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb63e1663e5a14d9cd58897a67908056
SHA14822b188cbe77db539636c0941d0af1e791c3672
SHA256a12f11afd64f755de2a6af36f5bc6efaf3ee5c0e9c6b4088db565282a7b86b09
SHA512ca81c94112e822739a4d6a67b42066afb4f836d1cbc797f7ed5cd5b4216f5bf3b8acabf4ad64961895cb4fce270f1e6cd65540d23f6f24417216f3b3d15e5cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8cb878542d99d7a2953ba88312afbf
SHA15ae03b59bea22c4b64f6cbd39241780898f34885
SHA256660fe6619e79043c72a83b49402a15d7c417a51b1db8e36cada43a03008a020b
SHA51281039b51463106a9d26beabd3df222c6a40622bb96a495ef24c704ecfced3b6ca8f9cae1db5d5d36f5ca9e471a71242eebca04f913ced81b2548e894dc18333a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cfac6d3f7989c55e7fe3fff65d0a3d
SHA17a109f8f85aede6a3e1f3e3cf0359340c6110b39
SHA2568a1602e61ba2b10f07ba8ef8fb65a3e90712be0c960c949fc1505af7163ed604
SHA512b52e9e94b956f6a980a0463ab589d9a97f5ba72f8c21a0a7312c974f11c26867f170c33bf53a66c479875c27c4051ddabe7a76728478373fe10f3e9a4c9b575e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb22559ceda21b1f0ef95f96003b167b
SHA1e26adc56dbf6a537965620d066925e54855bdf84
SHA256f6f5cdd8ecb8204ca7a15308159d2d79ba3309005dc57e838a5ba2f9a5aae633
SHA512fa5418cc3857dce42adb7a5101556679cb9ad1459d5ce15c56286825846fc0dd5e7a668225d064cad1340b4fc929d5406ba6c73eb18f665a27474f6f9be9663b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b