Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
eaceed9aced50c9314d7e82df735bd52_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eaceed9aced50c9314d7e82df735bd52_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaceed9aced50c9314d7e82df735bd52_JaffaCakes118.html
-
Size
68KB
-
MD5
eaceed9aced50c9314d7e82df735bd52
-
SHA1
cd171c81dfaa726c826d9355138f9b2616106756
-
SHA256
e0cca2a0c79e31e6ae9660c730bc563cdc85b492a453948f6cab0496f97928a0
-
SHA512
e68f1350df33cf98ef8980fb0de0ca75597351968b3cb6d632bebd8382834bda378d01729324491b756f138d9f82530c1328ab84eccea816d0cbe863b643891b
-
SSDEEP
768:JiCgcMiR3sI2PDDnX0g6SxY0LboTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:J48oUTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4E29BF1-7654-11EF-8E5A-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709981a9610adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000eb77a182ff55fd6a3f2310cb4359c23c82c0cb4680b8b2f679e9f0d5e0d3298f000000000e8000000002000020000000e10526ea6bcc9db75f66e1ec85cf474190e4864e5d2d95889ba08609f13ecfe720000000a7ea0e4c812fc65218ee398379e3c0b3a623b24a309218d1e7cd3d5725881cd440000000852e15cff9d5f67c78c35e74a69336b092028be077fe013ffb245d73d5e333dd01978de5568821dbdeacf4c575341b25977fa5ac9cba0fc3e2297fd809c2351e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE 1856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1856 2876 iexplore.exe 29 PID 2876 wrote to memory of 1856 2876 iexplore.exe 29 PID 2876 wrote to memory of 1856 2876 iexplore.exe 29 PID 2876 wrote to memory of 1856 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaceed9aced50c9314d7e82df735bd52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f84551c1aacf351640bdc74d3f299d
SHA1d2b84d915db88f196f7126c74b808e490e4e9cbb
SHA256e20ad3f080a9c463e705c214f8445951861f929b683ef40f53515aca8cc712c6
SHA5128f92827a82cfc5c322e3317d4910ed1aad7f8fb86a4ffb960b96a2c9618777203042b9a9ca045d2635fdb930391650c21e370559855d7970f631b69077fc8f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea7fb6951bb9642a173fa3a9954351a
SHA10db40bcaa52aff4f1bec0f1f8aef48da2396fb0c
SHA2561dff5c5735bd515da1a24c1900ae11cdc860d6a8c084ee6d1897849f7246cf6c
SHA5125b46ee075b2e694d2c11213b34f31255a9b708d54af81b3f23bb7b10a3ebc67cedac101417151b78e3338baf6a6d3b1ff1783d25492333eca21021b6fe4fc233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f05bc44056d41b80dd1ea1a2cc45e2
SHA1a884981a37c8bf6f64c146fe912ebf0fe761cb9c
SHA256b134d1bf34fbbff4d3c2b35a24fa020b398995c381a734ad5d8bd16e389ae787
SHA51278e647f1c7bd84d1b1ed5afbe3c9cf67487d2e3fb2bbdd1ac9d7a96a418fd85b90cf76e2c78fe18b871d1172af8e7c36bc0fcaab584f213435e4a176432e7c82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4dcc3786fa99dfc3a6f5431a653a422
SHA125ec208d20a939ef10ba26a17be814f5d050a801
SHA256400b093d78189afcfbcf5ac898e717f2e2a2cac69c589510d08f57bd8147e104
SHA512f82e06a7452ffb296aea40f7b38866a3a35e318388f75f7d03eb8c64baf309ecfa40f57d165bec37aebe8b25e392ce3286bbcb62befb5ab1b029e21c4a1f894b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e76fee56d6d4e62d2b25365e79b0d32
SHA1d980d4585727453945e423d1bcb33763e71fab61
SHA2567a7069a971f0002ae6e31dec73f429970bae2a8c44b4c3fe9651097b1b685664
SHA5123dcbba0de3eae3a6a148380ad5b97e4b92369aefeb9c4686f20b679b34c54a40f12e7fb367be63b96f37f0da0e988bd4573d1562e281699a9e3253a18111de34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5ab3c6f7f6a4a010f0ffac1947ed9f
SHA16a8469025c2e068fc7a722b2e41e5c925692b91a
SHA25622652a9858ec5aeb6266012a97385f33b9f1157a3d031446378ed824c8a02204
SHA5127540fd200d7f101ef058dc8be36d4bb8e561d21395a5a88f9cdb1a690f855c8eb5c12d6617efcdb03f2aed90c098118b5c9c2665b868a8f68916b527f799e294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7853ffac9cedb1bbde721ea59a9e78e
SHA1014ba72954722f0be203c754f956df5488e0138b
SHA25617e483e8fe04f4af0f7fc8d84bcb2363c8214107da3f4b72805cb74d1824f098
SHA512f923ffcfb4db311523682e27b8e8416d19d69387b096552a031c301161f9383b195320465baa746a9c18083e061f6292abc953ee03ab8c392c5a134100a4854c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570212344be2140f35f1b12fdd607994a
SHA198687fa03cbd337ea2bff91ec055ad5375ff47d6
SHA256d7d87e7f8f0add47fc9930d45a5cbe7e946d010bfb3bb091719f7d84dda7e355
SHA512d9726862ccb9a7322719cd91b11c1cf6b61a2b5e62efca31b42aeb90fb73c98a34b3f1117af427e866873d4ad22c29b641a32068d9093509a8a55d5e98fd9d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59a85e5bc4b248b57deb5acb2d21578
SHA1fabb1950227d7af353350025adafebd48805fbb9
SHA256b3a69f309cae1e568beadd7137a7a33ab1c1c8bef5bc1e97f267d0b94ccc96e2
SHA5129cde2292be378280680fd67147d6027cb11aaeb14b3df394def46c727a7ad7ce53d46bbf062655dde203bb817affde31f8a9db2306c5be62cf39f60b32f1e967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bfac0e7257125135ad3ba9c5d9c2e20
SHA1a363654081cbb0cd82334bdb9eaa5f47430ef6ea
SHA256c9c004d0084c9dbd59e4b59fade3fdc043fd444dee4a556b34d99a7d09af3a5d
SHA512bf305c5939bd8c765c6fb704f3264cd832e7c7dcab4981018276dac0b661b99efa3cfd2e7f9f4bc94d43415394c8dc40833978db8becc0a9e4524abec66c054c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3043416449f67365a6c2c45116dece
SHA1fe5cb4fd76d45ab2175b2184689aca5a240a849c
SHA256b9ade2887f4b5d14a72ffc2ebc802358b0114b0b9f3af3fdddb222cb8009e009
SHA5120291550a84c509e37cba68f8249066933f2671ce80ec76ca054896ac53c3b122cac299ac53b94a5a9b8a1a2e9fd4455a189b77b2a78cf49585b0c5caf0407d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539035bbc596530d85dea3388332c159
SHA171e9b41e8419c0e7ccd96088ff6e231bf09eba2b
SHA256b76fedeeb61a757b7dee8fbfd223a8e9daf8112dee45ee756f8efd06bf02a2a8
SHA5120d6cbed4e3083de50f23f61a61ab671b9c4ac466554c4a61be437424c8ebc3c26f2f084d866f868c659e4c19012de823f463588847e54ef5bc05087b952b4041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272ca29edb3851cb299fb967766e3cba
SHA11e7e6347816330216faa15c4322ad2ff450c3457
SHA25637b62380611b4161d469bfa1577d597ae20aaffc00d8c06dcb3272aada5d1203
SHA512517dbe853c5332719b841cc3b04ccde9553bf4bf4feb74bf87129b51addfa00b20422c3921789913da3c56c7978e8b46a2b38d440559077d83ac70e29c04d328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935197ac5011e8387b62cad6bbc62005
SHA18e30c181c75fd7522778b97e8caf9c0929b9e5ba
SHA2562e43f65bebfdef10bd16977f2b7c50ef82bae7cdaa454b3b8a042e2147161c59
SHA512f375d90f956721d663baeb6fa24cb7ab4be85fba01ac3855731c9b0296356b132a114a13927c0391a13acafb475283563ef531a6cd02f0d70ab658f676d5ea4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e976633d8f58b23f9b61d62f0634a2e3
SHA16dd1997c53aac370b20972b3b8e1c215536ed6a0
SHA2561b8d22c62ef6ebf98f353522442a236a01c3c021b28c4362ca2e2afe3e4ced60
SHA51241b4cb67b5104efd309bcb1ce00e7e4ce2c6e3289e59bc785bd0a7ed8538417fc454587a892bf56e866b233ffb29eb88657c0f09094cff05f7c3e8bd4824ca45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98b69e17748bb94cf7aa69094b0bccb
SHA15a2902db43717ad5092fb7a804176ed8dc08db73
SHA256b8679633aa738f6b53d33a9ad694a6f13a3cb680a6ceb28cf851bdcd8b14b8c5
SHA512ab897480b69604d762e04ae1810a8521f4430951bc234c55da40e52db41087d92cc068f54a6c19380543a6bca72c84e76a5c87bb99c0553c7974f609fc409929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6de08e0f410613ba885fe7f3c7f841
SHA1f2dd4e1f5038b46e2d59b44467a44f65267ce7bc
SHA2567a8c557771ea4f79600c425986eea0975e1ecd3b6c64fc05c36f405580d76802
SHA512edd1e16a06c5d497fe0acc9cca5b373b86c914d847014d29ae4f2298285f888d8affbb9d3783c815aeb4225555f4954df05ee44ab33771b1621a600d88ad65c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb6b11c07fd8c9f56a3a61054c517b1
SHA1554511885cf4bea20f826376305cb22dce2d8da3
SHA256eceae42c1518da1b720b290fd2075d0df335f4275c4f189e7ccba1e47a3e00c8
SHA512e6df767b97610e113d5a9183a86f7ab28dca0eb140a91973af9cdd81b66b0740a3c3fe73136ca026fe37e589f5f9c9c421b5ae8a009a975a0289f3b974361962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2193c0f358f1615f6d6fe62769bad67
SHA1d0ff3df56ffd05326f916a0bbc884ba4762e18ed
SHA2567e7261e598d6023e2a254ce865db0f2c8809aa9232ce022219a062770efabd8a
SHA512afdb89db7a67df4b1c4119c42ff25dace305b8affe1609efc76ac00145b5e5116341ae3ec495b7f520a6a992f32c269af2bc88ddac8973c9d657358e304ded77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b