Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
eee070a69094606957f8a5cbe257ef1d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eee070a69094606957f8a5cbe257ef1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eee070a69094606957f8a5cbe257ef1d_JaffaCakes118.html
-
Size
18KB
-
MD5
eee070a69094606957f8a5cbe257ef1d
-
SHA1
0e09f66e66c532281b02b8eb1b2bbaabc16749ea
-
SHA256
cf3fe2c6670c33a10a8b44e3ab27f7474f7d420810e5cff45cfadddedaa5b8e3
-
SHA512
5c575cb8b9cafaaa7b2103f8ba0d33840a2e76d475bba18adbb6d8172d8be0572b32a89a73cf1d43268298aac7b1ad46b18dff0154ead512077ba6d3e4ca3f72
-
SSDEEP
384:W4lI5NHSommm7mmmWZ1eHC71rnqp7j21eHs1eHf1eHU1eHJZi1rnEf7j7mmmPwmt:WLNbmmm7mmmmeiRrqpIeOedeGeUrEfjI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f6fc80cb0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000064e5f756f06dc9f7622f88f93a066c690d3ec7771b3a48d3060d3b6745684f23000000000e8000000002000020000000fcfab6fe6adab3f9dd49a2a6383e3494a07be170cbc81162d5c17958cb96dedf200000004e9c32fb73b2713f8e419eae6c60168d3db31a08258da3f2ed4720b24673aa16400000005514f5affe98963bb0f8627d0fa47e76bddf8f8bf2e32f5214a22e687cf5ced33f8ac7cea388b1326f735b43eeac035421af1e2efc60916961584f03d980cbb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433046495" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB239C41-77BE-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE 2664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2664 3064 iexplore.exe 30 PID 3064 wrote to memory of 2664 3064 iexplore.exe 30 PID 3064 wrote to memory of 2664 3064 iexplore.exe 30 PID 3064 wrote to memory of 2664 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eee070a69094606957f8a5cbe257ef1d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae5101f5f34a0e0d321ee2f81f0c2ce5
SHA17cddfd706534b2cd4ff67f03020e0a4bec2bb08c
SHA256e91f1700f05a5927a324f3348f89182b46b46c8f1f84fc0d4ff547da6a70067f
SHA512957812a49a6da324d8cc7c591947144f41e794e651aac9c2675d7b66321922b10acb5b316cc28a77bee9577e0de436a6e1272a9beac61ac771ab2349c9762741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d35024c641591ab0fd5e800f59f15a
SHA11c28e2499f187014773feae054f212bbd99d7681
SHA256a88bc855c259939e61efc51d0c047ddae695a90c2e6aba1786ee06f2b844d1e5
SHA512c58bc04b34c6342961b816256dd274d7d8ff6ed58a62d268c17182a381d35a2f4d7349108750ef92767dd29a14a5cc51dd9719a6b4fe2c9b37332fecc236f59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffcb52ff8afc9a75ac6edd7c45f452b
SHA179fbbc79fa3c0c2539dcfacaf45d7a0b1cb38a3d
SHA256c6fecd2eeb405d342c37a6616c6d8902375b2b2e7a60cc9dd618d438d4d4a169
SHA5124130544148f8dc585c2119ed5ec918d63502e460ef477d26d6f1e8dd9d8bd6d83f0e7f5b72de46574a9ff5259c923075c3be3229fa14a9155d2b04ad5ea385d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0bfb16985e80b999f555bc5757a288
SHA1841c9985a8e2544c27d43b0090bbcd4524d0ba14
SHA2561a79210181637ca1e898786cae933eb44e7a29ec6d8c57aa972ea8eeccbdec7e
SHA512a7da26f4cd2ed6c76bd89240667a4113c15210aca1a72348f58698cdbc4706dae1b4f93fbea547c17dad23a3d90b17d5e309f587a449dfb68c9a8ce480033908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a451cd6c6ed9e82e1cee15b34bf2c4a8
SHA19caf89d44d0d1b99f33350c9b0502555b33c7d9a
SHA2561d3319ae87162b9590555d54f58698dc1383a014cd50969e0caa1d567dd5539f
SHA5124ab9be4056e5467a0db4c2ea24b03b0c2f22aacce94ede955dfb30051e39f3ac6bff350fce5c21108c74cabd07b32462f73b63035b42a7450f97b266d82e5cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d600cd1ad766912dc3a9602294c2aa
SHA163ac93e26e037c209346c8972516d70c943d5e1b
SHA2569f6d68aa2fa8bc8f3c665fd90fc50c92f1699570d58925f17c7695c88d6998b6
SHA512c9deebafdcb92ea1fe92310c58279d659983c372044e3b2dfd51db6c7ee218fb0f12d8efd35ccab750973f7782843d4d4242b2680ad90746d965ba0dd9208afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9b4d3a52d502fdb235c07cb114e809
SHA1774ad0e02eae805a924751537750e78b6356e696
SHA256a8cbbdfdb73fcbe911104d81058bc88c4d73c6a9db9b7cb6c6f91191283ac1a6
SHA5120cb11b00f5ff31930b3729041f1895495efe99d700e024956aef8229eb56ccd24318c645eaeba1e9b5eef6fb2e714806d285bf96079d7969071cdfbb83f39c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e45eccd7975a03993c8521e06d736ee2
SHA11b863bfccedee6d81f4ceb4d2213306e4222b4bf
SHA2561d7be7c20da1d8498c97278e22f4d2da25508df5d7fd53ea6d249fdfe98c7c88
SHA512a1903bed3c8eed93dc984c83d44e9613b4f3550c6212cf1691eeff81052a2f887b8c70564e3343b7cc84dc79d542062df568b021c33c954d35d2deb06766f018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51331da8c02bc1a34c5a0c82449b8119f
SHA1f45a2c6d65c91aa7fe5e18e10b819fb03f9c3718
SHA2560c7d43e9c16b5c8facc50b7c123bfcd4868b3ef2f238d3685f839013cff5ab00
SHA5120246c236d21fb660267a233d1e3b69e5f6f6b768f5c8a88b2d3f0e193af3f2c10de6dbd4ab90ca7f0a40cc8150e5c15323a400c7dffdfd7a43e75df0fa63ef5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c31e7c4c9557bd240e30984261070ef
SHA1c54f2e3fd11d1eb7e9b75fa023deb6d48ccd6e92
SHA2562a9ab9d556150da78092e14354228768e1def733c62f6e4c4bf050986db80c23
SHA512f45ada94bbbf562c8faa539cc7f08368e5b6136ca008a668c237765c009bf31433e7366ff85c8ced3bf3bff0e7c5178a2e12aacd8e6a0345b4f1d9c935d11e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600c1fa515d06f0c5a41b78a98b9c09a
SHA1a3cbf68798124e7ccf87ec0d60d3134fcfd962bd
SHA2566f1e194e941be3cedb25ded23c9c52abfa5951e7abce2bc42fdcf929e4e69c0f
SHA5125b417acde2bd45c04e86d54b6cad357e9ebab97544819eda86025d21fe219f450a6b596990d99b4047355d075af3e513f32c5f6630c53d23e5fb5db874dfa0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa41ec6938d9243da2e73be6664d8fd
SHA11cdd86ebb316532d585b106af5c629df12ce6ca8
SHA256cb856b9714236e6a94fa967bfdb98c1b6bb84d720a7a7578307ddd2030c4551c
SHA512a93ebb2df194a163ef1da9c291985ef872402f5edf48256b75569470bfdb5768228fc66b6e677ab6f4ea3e2ab768084a06afae641de694b4d3483fb473184d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739b547edd54b337654b20d1911a3e8a
SHA1637bafe6b82e61702a478e667615a31f4188be3e
SHA2568c55f287bac005b3f427dc5c84f10a61a3ae907a6ec5c98fe20d0fea3ebd398a
SHA51266ef02af99fd53d686273f50211f41b756a52d961b5400d16326f50dab1d7859ac3af5dbff7ce19c67427fe51cef6e0bc694816dd25d5c04561673775d726d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a859c194e72e7c47e69a10d9b96b0c0a
SHA15e57a48c71d41bbcc954c5fb631b4cc74eb141c8
SHA256ce294ac7fcc9971321632e8bc03ba25b073dc612b8a98ff716fd8a7d4cf8daf1
SHA51245687c310567736045ef61ab19f3e21b6a3a39d90e6cabce9933b6001b77fdb77e9bfaf5b3735fe6a8806724d990adbf8606078d26ec76112e7381d66582c8b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42d973be3ee399670b20a07ad756c79
SHA1d362993fc13158f8cb96d82dd0270c570a2d1fc3
SHA256b5bcf91a30655f1ccf4e0111fb566b808618f60cc8cbf5c8a1668077f3c239f6
SHA51216e0998784a8646959d27a83c9f52ad05cc7aaee31e6eb1126cca643fbb4d7a82b0dc8878814bba5f47d7fd050fd224577bbd984ea5a81063069b9e12359b2ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709392ac6e8946fd1890d0a73958204e
SHA1023acc020c64c2801641b7ffcb74158c09861559
SHA256eff9b49d152c643e1a6f987fb621d30c19bdd5345219d038cc5b549f32942b4d
SHA5127e37ea1d04e8a4072a8dde54ae9ded7be729e543d33066201710a1a2e81dedbc5401adc5cc6683a78837e1910cd77cda7a47e3fbd3691cb4944c3b47f3bc90f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6a66d446b8783493b7782c19b2ae31
SHA126d162fc0deb9b172d6a4528f8b991c8ac323290
SHA2560efe012b63d8dca737990bdc737b21621243949f636b1cb4ff7ee52ad81daf32
SHA512523a1d1591d8c687c2c6c40d333a9528a3163c7e48bc7657d4e61ea4ba3e9529e6fcd422597748d7e0e145fabf5ac998fa0dd74460a0752154f5c65f3c9f5b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6a4c05135a61554e0ba5c0cdc81a52
SHA152b969df3e545aaab5e4638ef7b83e603b8b1c8b
SHA256606f29e101bffffeed68145fa61e56432ab7b3d2072433988d065d494b48b5f4
SHA512cab0993b9be2ff76220fbf206987b347b1763360dc676cb0c280a7f7e58dad43cdde9d92dde5285ed44667e0f098d7460a8ad6938df86c2d5e56ce55869d530b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b