Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
eeaf305fc1fd1e1217d0f3414f511b36_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeaf305fc1fd1e1217d0f3414f511b36_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eeaf305fc1fd1e1217d0f3414f511b36_JaffaCakes118.html
-
Size
125KB
-
MD5
eeaf305fc1fd1e1217d0f3414f511b36
-
SHA1
56a64a0ef773f56a0b6c4eedfb9de7cbd9e2bcba
-
SHA256
ee419902dc14515a73775895a8e772ed12c0c99f767a1f3cec53d0de92ae2e3f
-
SHA512
7fb9a6e994532b1db7a3c9941c89055729fd242916d8c3a93bfea06715c749af8c74c9d51d9b200c50e2177670e12ef82d7c0ad88e32c09f816d71ebb88e6099
-
SSDEEP
1536:StlfX+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dI:Sv+yfkMY+BES09JXAnyrZalI+YV+t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000003d82a00cc2b16adf853f6eba49d547bebdf5e4fbfc9e674fef5f31e9e3e4fee6000000000e8000000002000020000000f6f314c2f0c7ede8a8f870f8774796e5882480d809296ac01b8ce5ce369140ff2000000047142a91df0bd9218daa19d067a1c7d384fe0c94dcb41c4d955fec46d6674d0440000000897d2fb07a13265b5a0c0ea1f771692522bf2bd0032d990060214671e02a44ab04d64e1d8f35fd85c4977894a8b68b16d565bf60b7516ef74e791b335334780e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c2e0b7b80bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2648C41-77AB-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433038429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1348 iexplore.exe 1348 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2852 1348 iexplore.exe 30 PID 1348 wrote to memory of 2852 1348 iexplore.exe 30 PID 1348 wrote to memory of 2852 1348 iexplore.exe 30 PID 1348 wrote to memory of 2852 1348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eeaf305fc1fd1e1217d0f3414f511b36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559129b2a6c7e696a88c8687ad72e4961
SHA138a954abd868a5fd28012dc335289ab088395629
SHA256a66d3c8ffb24701cad1e32d48cbdada5fd9bff06c7e1e3d9a7474ecea170876e
SHA512a4af315ae45dfc8eca256ca0cc573dcd4169ef8023295794a00ecd9b4e137df1296d1fd6e021160fc3c1d09c84b8f251aea9f72462b777cd9a79d881ae014cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443824ba28aedf59d546b2be0bbd5145
SHA10065fdb4148fd373a15f2b6d818b31305544d8a5
SHA25699229b0c6fe409d8298e1388d3c7683a658992365e9bd55a75feabc71451039c
SHA51286ff4b0f1148619d0d0d559f6c6b06e072984dfffd624dac5ec092e849ade06c62a7f1624e28e70bbcf8f95e98de11a7475e5040f2ad3e6d50856a781a550375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929d0210ae187bec062d232c0d235ccd
SHA13fba85fc1c14a0ce8994b43c68c760c5ff6975b9
SHA256ff7ec10c85dcff5bc5bf6852f89756fade027cdcbf0b6e30b00c3b7e75d9d908
SHA51280844246ea84b03c18556265f62928f9ff4769d86dc9b8bd2cffcb20427c3cb1410afdd533a0290dc6073b368b2a37903006bf36dbed7c8ab2d9644d0e560aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf871bfc15baa601c661bf383d025e61
SHA1020b7d0c1287f4b8f8917bf4d5412785c53f9ad6
SHA25659f09680d5de102120fa77e00ae00f0e25688a039f4044ad07df5493f64470a0
SHA5127cde946c873b7fe8e83544dfd7fcc4f2a1ba91f879ed331df2c1c8cd65665c8b40c1ae6a447cf77ad6dded955ec3ab5addaaafd4a55a7264f63b7e92ece75aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287bd3865e85a59b2d7289222c7c9da7
SHA14df9092e79a7bc4595aa10cf865406268c296827
SHA256ee74cb6de3049af43fc93af1990531433a92db38e270319233181d4a664e75d2
SHA512f6e4b47df200267abff872c724d54e1caca3538080d34951a8f14632571b5ac644d049a24280e3edc9008dc383f9f09bc2f019dca5bde9a3b3410e4c52011e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb1f62ee82e2232c2b1048e10d10952
SHA13d7586dff20c89e78df43234e8a17a7713b2def8
SHA2564ef2e6fe4df35184bf94833d143c168e8f67f67598ad31aaa79e9ea19e927cba
SHA512bd7c4f77fe959be62e2602cd7242e87a84ec0e635e75fb4449007198f8df3c632e09d6ed81f1005ae684e29eb2c06a2675e60fcfe17ff0bcf9c1ad339afcba09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59beaa8a0c8b025e292afaf1fdaf6d723
SHA1f6ed0c717fa14378a413343052eb76cefc616869
SHA2560023d5c35452e8892d3ea6b13b0aeb865750ada8b4591e16c660483afc10df28
SHA51241ac6b99995c8cc840aa7645c6bbae1a10af12caca2929d5028da823f8ad2090c3f626749b0066b651890450dfa48bf459582b30a7dd6118539a9987e4173757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da19f5491cbabb265a80b50b398ee76b
SHA198e39efb7561927b736cc3dc5b2a2184f4f44ecf
SHA256740f17d50784653ad89237246a609b3bf6880030d06751fbf372db5eda4fab58
SHA512f232a7fbb445293d8b8de34f54ba7db572e864ff0b5d3aea4c1e2d9f051e1ab97fc9eda3a6713eb8bc2c3e7b3edb65f37d3d395a4e0c00c60f36df87d2740513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5620359e27e9970bd0def8cd50605ea70
SHA15cc415211e0d271a2a1788aa8582006fd3199a44
SHA2567dbdee088f14349d772adf88559fd82069c546c151bbc742da8401fc61033a14
SHA512a2d27340d737c8cd91747b51c13c5e317e2ef7f978b4bbebdd1b8e23eadadc070169d0d1b963bb656fd1e0ee2e37249a951b7a2156cf89aa08581dc74b5fd3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567126816c227dac4a287b9c08859b97c
SHA11f5d06589ddc95e08cef727903053151e63f45ff
SHA256d52dbf0c16956a5c835a5f7ff80f55f9714bab194dbe2d1f95a3bd74ad864d29
SHA512b69775654cbd015b7bc1b9480cfa6d5a3f94a9a7eb3ff57f67313dcf3799e5cc68613a68fa4400cf9fa5bd7c9024baf99d844a697b6a54fb59c9f1dada56dcb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2719bb0097b595cc83b5e1ea82938d4
SHA1adc78da96101aa4b52479e618714c8ba88ae8307
SHA2563bbcec82fff1e8e2ad82635d60d558d98262cc8b4fd10a1e66633150d0371fab
SHA5120be08ebbfcb9e7861c0155b4539b9a8d1ae6a315dc45ec42972642e29d93912485ac26d6af7f4163e4cc52e224a5fec37013a8b75dfde7d9fb034dc33dc20af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac7caf14b44f1d2deadae4209153a19e
SHA1ae867edc029a8ff9728918de449a994b5367424f
SHA256f1192ab24e93de1f85d0df9484fd71123c3846112a0f9d3467b0b96046afbeb2
SHA5126dabfdcbe49b7ac33ce4335a7860b9d5a49227fe27c9cb3f2f2f7b23d1ea837e89fa8329604c66c8f8b0f52ccc285fcd9838e1e7ca87f4bd5434a508a9912e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7e2baddc0991d5b22d61969c159361
SHA1ae5b55117f8e5f99616c9a04e32e8b7572a43b16
SHA256336657f9cb160ba0f530afd07a041eeccba2d6d19c46cb30cdc0eada704b6f11
SHA512377448655f641386906c3a8e973330f2ee9a8ed2c62b761ee6db32b07687b7a63c166f4a9dbe7d6ec19a52fd0c9e9f3aa56533add5db060e423b650f3aa237e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d0f3be68c7126303bb65bb9b65f165
SHA1c373e050952b2bb8ec75c54db8880c9f1649294e
SHA256f50116b1bf61efca3010452299dc58746a5f9e4c6d4b6fd82af372ceb6ad3fa7
SHA5123c45df9296f0ce3ca84e61a6491be4a5a1ec3f8d39e49be8530ccd4d492448d20cff909c7cc6aad343634d5b7f9b2721e2f69bf4729285f6f25efb479bbac4eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23e6a49600c161f0eff1eac95177355
SHA1a07e18fa87a63b53a5c31e9cf709147ea7a605e7
SHA256d877d7ae97292ed72a54a93641f2e4572ecb89b5e58a69a663f9768e5c8238b5
SHA512f6f00a22d06d07dcf75e8dab7fb22e703eca00a6ce04f973b3df7322ae838c79e918071ac9b13f78496dd47d870fa2aecd229438df5c57cb738f5dad41bfcc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d30bab097791b2f66735b64f53bdfe
SHA113ac8d323eedb6014cf56e2e7a5f6d82fb224b04
SHA25642c72d040813fc0e00cf4c9ac0eeed637d76a06ab15810c16d6ef355421377fc
SHA51298f277b0c8c4173bfe1c5e5b19a6495d6dbe297d3c2fed116dedefdb71876d4e8450933ce8d4b2b63dd378ec0624ef9983948a32e8365dba921a091d35e96e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509000b01e54621ca88db3ff519c01ffb
SHA14e52c18784accea2955d39947f8d31fa06133545
SHA256df922a3ad35173a8372187f387678f456998f88dfa6fae6074f08e2aff2602dc
SHA512eabad22a518e277284f912f81d534522dfbb355cf61063bae3f210392a9a3dbd81d98211b25b759d9f2cd3b4c56fa46e7a384c4e14bd260eb5fd7f55267fe8d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b