Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
eacfc8e2a982f0a03d333cc54356f8ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacfc8e2a982f0a03d333cc54356f8ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eacfc8e2a982f0a03d333cc54356f8ac_JaffaCakes118.html
-
Size
4KB
-
MD5
eacfc8e2a982f0a03d333cc54356f8ac
-
SHA1
afdd8517b3bda18dabb5d51e790887e4506eef21
-
SHA256
a2f188098f0790b6794e359626923beaba7cf6baa10f0ea156e301469201eaf3
-
SHA512
5d44bf0ea936f5545d965f18d41e94263a43a5bb56bfa861a235ab276b8b45d58b9103c6460ee04dfc429bf6cc6faee2aac21ba8ba6dcd772ce49d4fb71f8633
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ohUld:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28ED5961-7655-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000074920bbf8d93e8977b02a587001efdc9ec78f4afade0fbabd1b8eba48869e33e000000000e8000000002000020000000a0f8c9b02ce033936d8fd786b54d5d2588502dd9d84388523bce7386eed201c52000000021ff0e4b9034e49693aad30b34e82341be7f72c0f4a4cd4e848b813e93efb1a640000000686ee468e2dd467195ccf5f64078c504898af38281c30011c02babc13ba2ebe34810d39715c541b08599b4abb82fe31f8cfefe84a9f34a14ccbd5a04d1cb7453 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901262fd610adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2060 2528 iexplore.exe 30 PID 2528 wrote to memory of 2060 2528 iexplore.exe 30 PID 2528 wrote to memory of 2060 2528 iexplore.exe 30 PID 2528 wrote to memory of 2060 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacfc8e2a982f0a03d333cc54356f8ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562beee2f7f982a9f256ab696b7edcb97
SHA14c2252445a9d3d3478fe1188c2761ef310c722b9
SHA25617570d1b9e4a19006bff12e2f13d20829c18b556e3f896c9e67505b159aed534
SHA51286bec2ef82214b705b3bc9ade31a81891d9b3950855853930d6e66a56f11ef3f7973f04f4f223652bd17b154abd3ca6ab293193c2c6dca9b216db0a83ede186f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca38e081e87746575a99d98fcd0bc266
SHA15a7de25204db275914fe6c1b74fbde19f7cfc939
SHA2567bd915feed1e8739260fc0dc64c9a74f65869e406f444227b651a7be0ffd264c
SHA5123de4ca9f53301dded87e23b050635b1749e2b4a487556ec12a7e0f908ca05558a694590711455bc18e5e79cd5adf050afc6d15cb906817c4e3cff22e83c63569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54579bdb85edc1b8ab0810a96ffc8c132
SHA11e86e4c9f03defa07ccc9ed83f7589a0192a618b
SHA25680a7fb343d6166ccf3e91c035e18eea993f2e246159373c63fa096b26e348407
SHA512f40d61914149c9c105d325a9a5a41d13fd70b00b5de8f86e8a4509062b8f62d7dbcdb1590638a68d76c8894873b30337cd2c08281fc3b05b6b7de32068c58963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1a6fb43a5ab48940a941cad5865984
SHA1ec0956159899d380fac7f2949d3e6232e4b63093
SHA2564d21352179d9e9ff27bbb5b69ff5048bfede7c3b89116cd436b6e67c37da27ab
SHA512f3b124ca9b42425123ef52093ff82b44aeede15677323355d86b6adb55dda8f6f0bef675154c59907785a5620cdf36b42c45f63830ce46ec798013a928b9caa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54085a6371d67e4b66f5aa1fd3ea12aba
SHA176bd4e5d63a4ec8476e2dc21c6e550d603aa204b
SHA256b764038bb42f4d6bfc1f1f98f4dca30691591b2f57c4c7ad958ec4a7b74e7c8d
SHA512d57e5433998c29a7e9ad70488055a52c6a144e9b14db4b2976897147a42f4cb085aa0adf450d48b6be1aead2480a794dd78640be0e0d262771b2cff456e6adfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637c9aa1fb3859805ceee6ccf00ec3dd
SHA12d9b0c39283dee96404c801e63a351f46ae84cc5
SHA2560e326bfcad648cd62ddb7395fe0b588483163171a96b1850b99d0473ace19377
SHA512c1450ee7190e200200748a4d39d3fd57d037032088ac82e4e3459b59e8f2b830454c14adba65f2108ba1e8ce50b1aac3947cd69e101912ee8ec19a5e88553711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a8dde9290a69701475293afb6e332a
SHA1d295836b04a05438895d8c05ba7aaae26f50db78
SHA2560612ed3211ee4f994d151d3b3daf62403be4878e45bd05febd1311cbce4d11c2
SHA51218d4a5c0782d05184bbcdcdca8cbf0a6573bfbad3723699aa166ca1ffd314e781a5165f8db66e2c9db60b75ea3d035cb7094f9c9f4ce365cb5d6c70da731576c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a64a823e4a21a09d433e69d8101d99
SHA1569142b47b3bcf11c9afc5590406eeee8126ba3c
SHA256601f0b8ace3b026663d95f39d72660a8d2e83b4ee320554009be2fbaef15dbf8
SHA5128cb0968da621fcf8fa2a6b3cf782abf846ced852c1226b00b8168a17a255efea51eb13bdda2538d470f090e6e727127ccf052bdf7c9f2923478c4173088a8935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0eef4364a290ad86ed2ef349e380d5
SHA1976468877c51d03b9ad790c6e29be7a671052c8b
SHA2560072950943d9ed4d1fa4d2e368b942942f3c227ad09f1221afab0bfc5be14cad
SHA512b54359e146575e0cf2fe7cb66aa8a7020f82700b90a67bb75987b741a69d055d34bed1040aa1f65562ff58f9713d3d3e90c768d2330bd5aae82bc45d53e63a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56e96cf357ed5342d38bc7343fdac44
SHA17e08861e602c2e6899576671f73cc36b5d8d84f8
SHA25671417f68398adfcbdd431a3c9a4acdb56bef879111033422d47b955ff228f699
SHA512e316895f5f41912f876cd3e468d3fc34e676c06208ad708d21b212602df7f92486637db6f0f413cd2a919814c16c9beaa9870cd7c0b65dd3c15bd993e3d2e459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8a477db7e6a727ff359fc637eb9e23
SHA1b62b03215e9cf64977dd1a6ff699aaa379da1768
SHA2566524415ff869822694b66e52c8b55e82221f4344328ff713ae678f0dba11dbb5
SHA5124e6a9114e7b8be22ffec27e20403e2ab7d10aad710c443a6a21d54390548359b9f9fe2d9458c472a4311b5c16c6acb58685d3e54d5cc4ff6aa10588a191bab43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1f0b5185412268f7ad7e1a59280867
SHA188345f9560d6b9d3dbbf9b9f04bb102b258223a9
SHA256f83f1ade9e15a04c5e4a7e13a20a031636eee29bfe3de872aa13b3b24c2cba0c
SHA5123ec9c1cd98fef0401b9cecbb0b9ee1d21cd1f9614fae2bd19c05d245f26522ddd4e90e635009e719ba458f6ed9e06722c1bf7b03a927c0f0a657bed4b86e35f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5195b87907b28eae2c07ef43379d288
SHA1f2cd83916655f7680886e93fe8edf28e9ed112e7
SHA2564409b2bc00a9a8bcb2d85645f0a12411a740e6b16871cc280a8d70a9837e5544
SHA51278192ed37529f39369e92a78ae27701b4f32ca0a1cf42bc0985885881f48af8e52880b00c04d6f6c01b8c206499c5196fb39e9c00ab4d4f9ce4caa6ac9104912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c480282014dee21c82af784fb108a6
SHA1138356f8c8479c3a826b70e113e0b7690d6aebf9
SHA256fa158543e089022f2157a19e4e314a247a4153eb18894f9a5910f3db883c07e7
SHA512f13b8ea0cea0b5eb5b8eb4ecb3c31a135fac025b77e2bb87908da78bdeddff384563d9aaf53ee6516af5cc1d5f7d1c030d5e2ee860d8061c845f7cd7f9d7b6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef4e8f41595de2d6a5dd258adbdabe1
SHA126bf62a796fdcec6e7c7da03ae8bca6e30632fdc
SHA25671044d59921657c7778188300b885c63ec3f276bf9d806db9cae83e35e85b893
SHA5127985736be9734210c71db8f34a344d7456f41a2dffe80f5018f3f82f2c7d8716d4dea09256f677882583eebad4da63a653166596c419f1c65f0205a6989f8580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c6856d5f7b4ba50760e2d431d183c7
SHA19c43aef0adaa80e412cf16eec1da3123c728e942
SHA25639e8838da38475405c2f7010df221dc62c74acb69530863a86d0bc008e6e11b4
SHA5121c0b37f26260d497f43fd76efbd7f76d66987d478b7be5c19f1d9ddcc8e35c0033a3f2d503785d3d9089b5171b1ed638db35dcb0d50944f6837aa77ffec7066b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158d3beec4a668055409005bf5228618
SHA1c9cb869fe561dcad4af3185080687739c8975fbf
SHA25677a1eaf893fba6ee1bab45e1471af3d44cc1d5dce1347abbc9e40b5e276cfc35
SHA5125c220bf8a2d4eccd5dce37bc40d1445c539850ee0196fa7e15c762ffe1d1d27d7c952d52efb01348fd402b8f7a5bf5e069016aff83972f9dcc94c9b3ea12fb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecec27a8d48246f4c5cf6b974318da5c
SHA1678f92963d37947f6f3a769ddfc916b69361c36c
SHA25603492779c7e98f544c20cc3ac5d784d0de967f098bab09cda7363a367181cf21
SHA51296fb8597fb85d2e7d38bd358e8c6a70a7279173b7128e0507fb3651588d03cc5efd2088d456a8223a88153cef6e693769c0112100303c4ba944bf12029fb851a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226b26d15014473b46ea278b97b8f8d6
SHA1f91e9cbdaa2bf4b6a17808417cbb0447610161cd
SHA256841f1d0e350750db0cf18cb92958c4171cd08434d02acba8d621da5d4ef8752e
SHA5125d7a9b2454a927d112fded56227a89b019ca2403fc86b0c0b2c0d1abf9c8e398a32315c970ff81e400ff30481cbe4603c597eea1145dbf8b1a50599a140ebf6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b