Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
eaf20ca71cf0b07e7797b12b5b7fc2b6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaf20ca71cf0b07e7797b12b5b7fc2b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaf20ca71cf0b07e7797b12b5b7fc2b6_JaffaCakes118.html
-
Size
65KB
-
MD5
eaf20ca71cf0b07e7797b12b5b7fc2b6
-
SHA1
7b17b8465e25734c66eb0a8f830c1e98e2ebd3c8
-
SHA256
a601cf2888ef42fd49c00d38ff60a42cc21a3abf906bf1903acd014b9bd702fa
-
SHA512
213e026e80f8833f3c9020c8615d4880f4998318c9d53ca3a8855cf3f05b10421436d83a596c2c32a81ef70227c8b0f7fe0a1ac5a812a8a9353607d36200865b
-
SSDEEP
768:JingcMaehAx99uTQ6WYQxCF7oT2+CZkoTnMdtbBnfBgN8/0OgcRWQFVGss//IjkZ:JjApTo0TAec0tbrgaUcJNnjUl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432896461" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9091562d6e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58A13581-7661-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000000ed076428ea1e9e355f64a8402eef42223eee5b4a6c4c0e7d3a61732bfe7c51000000000e800000000200002000000027f09cf60a5abf3c71e74f358e35ac8404d09ef66ead6bff3fafac259aed84de20000000318e592db2f07ad05efa8a505f5ba704ff72d0dc5756db1988da501b321427694000000077720386d4d451d98a0aa7394ad0d7bc075eeb0343c620f6213f577ff4eaaaac36cb73bb79b713e9884ced64506eacf95328557eb337633906a40f4205c2d653 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaf20ca71cf0b07e7797b12b5b7fc2b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cc9ac10615d81c48ff3f32966687e9
SHA14cc0f9943b3615778f473b8225962022ec462d0c
SHA256e498766b2f1fbf6d55879a76c7415f14b4cf89e5103e4c790577e385596b7578
SHA512a89b2a74def41d95d0ff605af8d90ecc4438b0a968b8c34dc1f989d66a54aecb76a973c08ab575a88b35568a0c4573709fd3c74469d7031df1eee681faa651ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd109a7c72d38daf253f150936c70e0
SHA10562dbc56d0abb3496a2ad69ff3557b913abd69f
SHA2561f14de874efc50b2c76dbb5b879307687201605d557d622d8b9beef6661f17a0
SHA51254f8e9688206f10ba296d46df56d849f20c4f0205e395bb036125f9fd3446bfbd002bfca2725a74d091a03c771e93c2f92f5ce26b61addf943244ebdf17e9c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c52cd55602299cec6d91aac6aabba6
SHA1a49088d1e37f6a9bec27bca93f994042289b08e5
SHA256a8f735174dd35ec3f94c2d6c26bb69eed20cc760780e690b6f7c6abc84f84b6f
SHA512306006f5ddff53073ebeb3e2c4d76be173dd92d714906b16cad374ecea36a425f0ae2043e071c01d0e51eded87652bf086c7138c927399036d55d9ac51f09869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a750d0fe91047a8ead8d4690ef076d15
SHA1f1d992e835c4e8c885d349c8a7bb12eac1e418fc
SHA25625ac983c1d894c3369a56e97da0755184f9c88f856fdbd9672337ad9e291a8ea
SHA5126f82236db2caec66b640ed674cab33d8809a6f936d9eb1461868a3f1110d7221fa91c7994680c5d8635ec23cea3a9a9841e436bcbe2d33b43b93f962f4de1818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553814d8c9a0571a663eee5eac2d6591c
SHA12f1aa18d653c7f6ad60f1b419a82087d9c41f4ac
SHA256a461bd9184eff4db9cf9e865d9c1808a4f4c608d265d062b47b15e127e918657
SHA51237514f9117a91a315120feda57194c01e72b38c0d1b027cf1811c8475addb81f426c767ef4e0f79f54b03b8c61663fdcc4e85068038c3b4b3f58032b6779b979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648d7d4c7db9e4fda2819ff2aeb40bd9
SHA1926fec58e0137437815cf222ccc84d5de7d0b5c5
SHA256341ed85fbf28198b34f19ea1c2473533072d0bde60a2fb792ec120432cab595e
SHA512d793b225820ba9b51a2b06c1a07c9a376c7acc26bbb8d76c6b58c78a640db5b18186dd9d598b7f24efd68e27e954cdc0db6452e34f5eeb75cc4031b5f79c74aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe54961b33d524b29461f1538b168de
SHA18124d3e2555d59575f4afa7a38646d47ae063f85
SHA25654eefa8b9e186e7766ad60f270264c93eb87815b9ecd308a2ba7f00230946da2
SHA51209c229c16e5f62b007e6c61f1faa187ae7816679245850ba77a4c6d116cf96e4784aa549c75f19a0b30420c691082b7296175987f572745aaeb8a579b8edf47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90b40821ac10e6a26463cdd46b79bae
SHA1bc1845b9f70906ddac536f0d57aa2c9ac0b549d8
SHA256d8bac1dd7fa8d7e201d7901cfcaa952190735f174ff57a88eb5379bbf86d6b15
SHA51203770f97a1b8b5b38b6fa4c7da8e4b1302b53edc872a2bc95f82dd68cb603c00bb23dae2f577c19db2902cf2ffd804a6788a823cb17c9278453080026f356127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c451d25b87ef6607f50b507f274e9c8c
SHA1d9b7001bd586be9302e613eca00afd14d8272126
SHA256863abd50a64791ba4fa9972ddba1f214ee0d00a85c8db5d8556b0f2c9640f541
SHA512864a739d34d625af8699c3b0a6c3b2d6eb0146e78231c047d44c3345764a897838546ebdc670a95e79bc5512617534167636475cf2e18d7e10fb76cbea2d3b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7079daaf4d8785a23e2bc79ec8f401
SHA13ada0384dafcedd3958a5829dcd04d0663f8f33b
SHA2560e292ddd19884aa129c4c187e5082e6fa3d8341c98e557791e43dcf7f4951e0f
SHA512d828e68df2b64c050d6566e8a08e0d455073d5ed6252962abaa3dd8049c991d06c68695714bf98bdfbe47021abde059a2ec7731c798b50a272be90c1956483f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c5b17ad01ed1751a94b28b20ec7fc8
SHA1a1261ce661ca3c51e33df0b36b25cd00735fddff
SHA2563dda9a76c7652731e0fbf2963c62e91bf92bb8964f523286ed9c0e96da7d3c76
SHA512274174601f74a923fc82ab56045606db0fa92b27e22eff579d258dc64de41246b984f62bb0d7d46a193bcad2c410741f13058240f3dd06f23b711b8647ca1638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f45bb3294693b5a1abb963fdfa0e7116
SHA152ebd7373074a53c087a68a35c1513df8c2988ad
SHA2565a4c4f64a23a22769d3ab0faaa198dc1f2344615dd1eb1929021b4e05057a98b
SHA5122e79e15f996d830ca122d1af76eabbd7136b4a8e5f88c24f5e7e7c91d79f10903fc62b04c59e4b311a3f822f29f8f902d884a413a7a823c94e2c1c23737fb53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c0f3ba4893203470bd0f98ca1c57e8
SHA1374fcab51d9384210b5bfe7543ff7db7111cd941
SHA2562672a40647db1b44e6d6c60d90ce0558978963b95023902016b2692d22923bfc
SHA512438f941a5912b443ee4a8edaf70622e2e41198fb54eaefc21b7d40772f882f729adbcde52002d14a0cc16587a8f35dbe6e592478e03c63b25228b789e19ef0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d1a6976c0c7d556e86dfba8174af81
SHA1fd0fa185c3633c07140350ee3863da1b782f2007
SHA2569533265acb6f8b4d866fa0534ec56d1d15d365700bb5e37bf57c6da12ff56185
SHA512c3c3dd859fb3d895628eb3dad63cfd811c14fdd39096cbd9e0f84bf6f733298b77e641f9b45913387e10ea67d293f34d2ea4a874f18cd7e5d4b546349a3cc0bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de95acef39c514757000aad874cb0ac7
SHA117f035174571fbc9bbcc1ce950f979a3f2b9c991
SHA256a28586fa3b6ba7ba29532e5c6c8d191d2be39a96669798f7e20cc27c091f9145
SHA512ede92ea7cdd77da0d46e0514ac8fb50a3dab63f479021279d501ff5b2fd339f4a6a60192a923efdc31a2500ce5e86d3066daca5ffede8118a842f427fa764336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e08920466ead1888a5c2aeb3f6c2fa7
SHA10fe7a35c0ffe7587cf002d26f917e1f2222f940b
SHA256e77a53e949035ad7d7cec17fa31278c6d7e7f08491e89fc85c144bb7f3d5fe72
SHA512b7775b51da8037a5a80204952e3e9bf9fdc493d352f474aa441bdd22c77375346a4518f95579d0fdd21c73827373e2d2c14bfe63ffc962d8feb79e9718f299cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526daee8f3cfb244dd75ed3b442e7220d
SHA1b023a61ba84ccefd6f3a096eff03bcbd41ba950a
SHA2567f974d2b42a4d576ed007e1deb22fb68f1660eb89638c63ccb4ca1bf1d709750
SHA512808c656d867848035e3f0d3355a62c9dac9de8b6a1c729f240c26b01a7214ed28e6c9885d622c19aa73b1f4f43b9b3a0944bb909c58be7cb34bce29a644f4718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb09be6ff6e816b9ccb325ed983457b
SHA1710e43b7c4e3bf66ecd5a33b6f2f62448b37ec71
SHA256e76f61428ba15de5e227ca6f628141dc4d08130094a52b015f137f571d7c5b22
SHA51234b29d50372d7bccaebc53f0dcbf98a9ee759c7293c2edf0b41668b74c828fda2de6c03deeec1567eb4318dcb4be4b30c2abfb4b7726d831c0fa312b378d1aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b523c0f70dd441859c267455813e2fcc
SHA10beae7fed192faf828c48b352417ddd6c6215ba7
SHA256399397fcbe77a43e74e32f431a5d6f6ec6066203b3dc79622f827ac9d610a17d
SHA512e5135a801279b583d3905dbb52800d628d9554869aa3002095f7c235487d02c5068e0afa9209380c0054d4ca966f2ac57fa719d12096ab52f3d6904712b3eb44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b