Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:59
Static task
static1
Behavioral task
behavioral1
Sample
eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html
-
Size
69KB
-
MD5
eace9ebe5b401673d169f205d0a9ebd5
-
SHA1
d09aecfa3e80c0005cf5586f029320a7acca6fea
-
SHA256
4144b0b83a4a3dcbb27d12ab7c760e01ddd7dbc630d2a83f0cd6a138b3a30d37
-
SHA512
c2d239d46113d08cd8f38afb616edf7c6183b32804d0a3118fe19bda61486e3424335f242a8a11189eee66991ab1553415aabcd79493376b25ec8c0d685a4873
-
SSDEEP
1536:gQZBCCOdp0IxCZxK5m4w10zKkXY9gFhe4GVJFWWHPLwpxFDCpMb82+HsXIJHbhlI:gk2H0Ixx5m4w10zKkIgFhe4GVJFWWHPc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9073608f610adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7ADA661-7654-11EF-928D-EE9D5ADBD8E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000038c4de95e9749b197bc9f9df9c19255a4c7082e80942a8952c7dcb16f12e0c2f000000000e8000000002000020000000caf7ecb6cb79848360a9c4c9d55ba4a10e034be11719a7d6a5f64d82f8cce32920000000a153f4269993ff3db4654c613f81bf49a516e44d73cf774523079191ba6b379840000000e47c89258b9f6c84bcfc69009568f02827f41b4d38df41ad66fb19d39536299b25cf23e665473be59cc4391280e2c190c2fa1f01fd524d1224cade6bc1f714b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1808 1924 iexplore.exe 30 PID 1924 wrote to memory of 1808 1924 iexplore.exe 30 PID 1924 wrote to memory of 1808 1924 iexplore.exe 30 PID 1924 wrote to memory of 1808 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eace9ebe5b401673d169f205d0a9ebd5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275961a21f39aca4fc408a3f4370576d
SHA131c9a89dacb3cbba7d97ef69b462d6f8ecc5d1ab
SHA256a411c64e6225ea92737d87c4f02c48875084a289be0381db83f31e44b45f4a9b
SHA5128f2e873f1eb6c5925b03786582eac0ba077f630d38092a3ef544ebf4f85ee04c066c8a84937988c68c1795e28dbdb70794bf90c5e0f5946ea606c6a8ad8f3687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da7b577788ff4c56169800cdb0c7eca
SHA107ade4edfb03ff204c98ef0eb74c40bf7045b7c5
SHA2565209092b652a1179a03c105dc92a077d7cba3d9794d7c1741911016406d1ea69
SHA512ac4995b53b1e03ad7d415d564233b0f9f4fd6159d5513e38d82bb0ec33222133d90345379537876f79b1f0029834dafaed71128fd317496c554be4993709df29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b1b1878f5ed4a4e0278441ab227853
SHA181175c989c2d083d56673400c29ebd590af46b9d
SHA256e710120a2a97fff3074e4b41c0b333ac3ba0960417e38ebd198218096690ce4d
SHA51233327e85139e948b700148ef3110d62d7bc0dabafa79d8058be2e04c07dd2653cb6b8ecab9527b41a8e0d9fb7818f0c7d1ab76bdffc1d31781e6465a9fa3b440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b926a9f31af8705dbd8b77d62f35a1a
SHA18c68423db1e8878adb288c8f4703c8139547bab7
SHA2565d89637438859b74db831f9633a4c54fc9061a2b8905ae6b083b6bca28e527ad
SHA512008706b4eb0445ff6139539bc48dac74e8bb05a8e139a888ee192f47bcae83530fcdae619968714811bdc0474dccd23c5a929c91c1bec4831b51d712f04135c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e5cb300dd76539b58c9384128ea677
SHA163d86a3d92c6d0808d06c3e2026a8846118c6352
SHA25660a5e658a31c18aa7671df4036b772d5ed327140fec99c2c4f6e5797fa75b3db
SHA512ad30639cc88d02fa63ccb5cf072c1467e2c460fdb4be797d7c36ac0c00fd4bceb2b334656cf5073c581ca61898bd54b1a8789ec928e1f398f8d6e7fa590cfea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1c6b982d96eb3b8e1c9ab3baa4e0f4
SHA1682292af6f731c587f3717c1a216612d6465b331
SHA256c489cc14853fbbb52bfd037a392b172679af25c42093150b27a7d5d0b0222c83
SHA512febac0437de8d5122de11c4014ba794efcfd66c3e197cd55b0cd34473d9cd1c809b4e90a617392b8577b0f5758422698b8e3f064bee08efd226dcb200d8a6d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba481d173a62f09647f3bae0afc11bc
SHA116ae0a7aa7ba612f72ba66fda4100ff699de3da3
SHA2568fb802d900948bb6d93bf6310c03880b4c018730a6e47add64c5bd62e5c86ee1
SHA512451e19ef33bc398cab5a1eecfb796fe009940a6a46985c6d14a9bbad33ce8fb9a96d2bfff3454a5ce5a94e8098b888c0393886b6f01b2065d51634d7c3b0c551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7e9bc55d979c1f886f8824b47f1260
SHA1d7c3539a3d7733197c50f5ec2d39fc62b5c9c477
SHA256516aee92b8e70b1715b65986c0203967403b3e703f84ed8f670ca51bfd7597ca
SHA512b0f25f7b718949dcf054c595ae36ebddeb8dd15767c855c416e9826ef2e13caacc1778d2036c1e067ac5a6d1e2fb2e15e3fbd1cc79c0fffc9d7138896f14bf86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503cfa682368a8724edb4a82d98de119c
SHA1ce75364d3a068916f3e88a6ef0a91d577c39a7a2
SHA256273b6ea21a924daf921a51a9f999e2d04513c32fae3bf51e949b78fffb1ce669
SHA512291e771e58b2040e16dedf71910ad63212dd896a06f88564eee683e3e5c262737f5a711013d16403ccea4271f585e7ebf152de5b2d4beacabf3abd898d5f1a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b73f195e1896503e1e44f824ccc1845
SHA18e1ae30c2d4da50ff70bd35ab9ba3314b3df05f9
SHA2563f7fdb04de2046037c4f5ea113068cd21217869000f961574332330cdffb3a04
SHA5127cce6873247a92c64fb218089c621d336d6fe0374ff487a8f01fa6a60322d0bbf71304e459b6086f022b512c0957e837e9c59efc0767c8b2e73e1574f55ae202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcdf37bd7de79a9aac3976e967994e2
SHA1ef5961f380444e0e4e359b9c9a3b5dad80f939d7
SHA2560bdb8304aa710018d3297514e7b63d4b74f46342032bdda9010f2d7c0721318d
SHA5120896b2274699f523099d513c3b0629b3656ab250a4f59511c6d3050c34e721bc74d6c2b3b2016c5f46b2bc92b94b2095904f1d4dc129b4e8dd3b4ee38c9db4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a174329b93f787129b226ad18f98a505
SHA183ab2bf83a1c4239416f4c4ff5c2f1d2d00ef968
SHA256e0426816dbf9d618fef6ac01d34b4e6a058e2fef2359a472db8a7441dacf823e
SHA5120853b7f98b1f6c0d1c4a09f58e82b9859d2033a0cb2365db15b9e3813f1ae8ae5bab1e5756d26e81fc66bf49dc67b47ddcc26e84f0bf42f6048a78d9fca64957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0b228b53ec4270409264122080404e
SHA1ffdf0399611f06fd8062a7b9e8a631080ea89259
SHA2567e9555b74aeba226857d67fcea66c563ba01641026ccab497dd7dc8b988a7eaf
SHA512a4ed8462a3aa2537ab1f8158bf513d952224507d40922e704446707d5725002f3d35b86c8172f336c7852176f26301e5b98c4f91131691b657995776e3b0c42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dea507b3ed08a748bf200687b8fc21
SHA1b446d817faa57b38d0a13961e20e279044a8664d
SHA256a668e646212a585e59998bff596a5f1dccc27ba97032806da6ddedeef15b6be5
SHA5123ab8bcb11d47fea35e217190f4bf09f42cb98234e26b1228e94c90080515959659da34921f1ccc1aa692d4f2cbdf5272a03752c018ba51c95ec5f4ce16040a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76e22d5fc1b248b1c87376803e2bf91
SHA103daf11f53d2245c9f06e1dd01188df3f71666c9
SHA256a2c73d00ae900f6043e1e8fbe9daece7c75b3a068236882301241c3964aadce2
SHA512c5ac677b5a2c872239fc78648eb984dbba663fb85b28c41d720eab096ea319d7f13facf38db9f68a252dd3a363b004cb260e50ccdcd06c08e01e6f884c37321b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5359a0da86112dbfbd3bfb2c9b8cce9ec
SHA123c75ad9417054da9971963d8dc0fef6f111da78
SHA256789e3d0027f550220858a973c6e5514e5a31805d8e8c6bbfd63ebeb7ba06a2cb
SHA512df6ef6517329bf9bc20876119a067765104ba7ad7b400a60d0e7d0be849fbfd5381bd664a0f7ecba0119d3ffd89dac7be901f9f426957976fed34ce14e11981f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e74a2da6312618b19c70156002b352
SHA14b7d96da993f7a781e5641a0f7cef0aec8db6b7d
SHA2564ea22a24dcd25dbb0b6de0513b61592791e51aa0e6560c127028465293fbe66f
SHA512ee1d43d5cc8b0b4fd1c3f88cb1cb42c199bb1aea51a056ab2e04dbda4d1a29d00ef8509892fb1b6f5c13f7c1e41eb67f43be045c7aa8abd50158a33c8f5b917c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1db4a6548766e28cce9419b16779b36
SHA1f6495dd3169962f587f831d7a4ebb58d87bc001c
SHA256e912b232621c9e2ce4a0cd558745cdceac0ce7957c38614ac5c9eeb2f97b17ec
SHA5128201dad83eb2e6c3b5f8a121cf914ddba56f6a8bac8936d0aed3c2ab869b16814d5af689d629465e7108a1879fa43395305c726a04bc509ad374d7a59badb9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed15d9ccf265a958490227fdc877f87c
SHA10752f20d04f519848ea1bcf5d07617e64b7d8489
SHA256c851c133bdb1e60194abd73791637ea8191b09474bd7a18f7e8b3bbd3fe9aeec
SHA51201c7647719ef1124aaacece5fe2389591f652a8024e942790c63695549f739164fb939b60c8793ae2d6386693c950a6acfe1e5544c96f95525db937d999602b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b