Analysis
-
max time kernel
67s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
eee3d9b2eeccb1ec876a8c7e45514b78_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eee3d9b2eeccb1ec876a8c7e45514b78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eee3d9b2eeccb1ec876a8c7e45514b78_JaffaCakes118.html
-
Size
4KB
-
MD5
eee3d9b2eeccb1ec876a8c7e45514b78
-
SHA1
1dadcdebd6460a24977a9daed913b3a31a08e548
-
SHA256
1ce0215a95be6c3c478f119b2fab39d08b91f483cd84d374aa713a8a983aa6a8
-
SHA512
bda9a1a0de1c1cc5e111807347ba4b3fa7090e3af71d28acade55bbf178c25593e3a6fbbe83b433f78a8ea7b2f651b5d926d9f44ccbd2ff5571b510a63e2a918
-
SSDEEP
96:aAm+ADLpNudmA4L2k9b6GS8qe4cSHHLzWZj9guToJdDgS:az5np5t6SqeGLCZhdsdcS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000098d51e94474dbdac4bc6ab60727a526c4367a52ae3b928475e839ba6dad7c12a000000000e80000000020000200000003ae3c8d32365264f51c3c1dff8d786330a265623c66dd650b5f4c9f2f6039c5020000000cc9014af96e0f8027e3c9d0a828e36102b11308bd9d45bea78985b25b61125f1400000003131338effdd8a825ba1b734afcfa1cbcd8d60ebd3747158a534a617d3159e726f9bb59f6b14860f4008def3eb7878091537df9c5ac50b8a997fb29080a002d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433047030" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA2C5701-77BF-11EF-A817-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902a9abecc0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1352 1736 iexplore.exe 29 PID 1736 wrote to memory of 1352 1736 iexplore.exe 29 PID 1736 wrote to memory of 1352 1736 iexplore.exe 29 PID 1736 wrote to memory of 1352 1736 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eee3d9b2eeccb1ec876a8c7e45514b78_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470f2a0dbf0deeecf5686119f1b4d2ca
SHA1bd6d644ff7fc0085e6c3f0de991adea0fa45937f
SHA25638c3681feeb0fa61a1e9f90bcf395e313f7b1ece97bfd25100f73a5975178ba8
SHA5123ac4133397f5d56ad912498c618975a6c8fd421488980d1ee0f181f81c9a33c02522ebda131988af3e90df26873f9a79fbc63ef3caf3fc1e22f01f6db3c232fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133d345eea4237c88bb994cdcd644e1b
SHA1fb247823b3035fa4b4c2fb31b6957c356e82bca7
SHA25683d9470ed43209dde4741fb505f9529f7a43bbd72d5fde76264151544f0e0a39
SHA512a692e35f59155ebd59464bcdbc0630e38e1c58a9a71835377857838e0a1bebb3680539f545011b872f852a3d3ab7aac52afd12df565b4c92cbcac674bff37fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d7d975e1e18de7c07a87f6944743bce
SHA1ae7f73b502c81013d6421175f91282b50b2b0ad7
SHA256a801d8f0bb3978c944b23695221e8500ba0a4cf65689f4b6e20766e5f24de04f
SHA512f8738b23f8e0e22a0aad5f7f055755efb5b0e646405efb621e0f802c048e0f098254b7c59b6b8aeb24be5e6dd4d5054eb424d5a515a8299731b1833320c2adf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49e1848d3af5965a049738efd927801
SHA1f6a5a7f9cd6e252316641211d9b349f6b4df8f1f
SHA2563c7455f06d6570a5b407f9d761230bb13751fbc942a2dc96f2891d38d5ee5896
SHA5127352eb9a30e98cc97cbf8dbfb142f66a94d55212b406236d88fbb9ba1d2e428fe2dd6e968ef807dc7eb6f243891216cfdad214f0aa7b87ad63c3e307d951d225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf33abf5ae1d127df1b01a5d03ebb43
SHA12f2a5d6aeb4a58b850a8aa1db2842600f6b6e20e
SHA256e2fb0f0f831ca3e14ba78e26d238ec28fd0137bfd997337a580ffb9f63cfefbd
SHA5128f8ec56f143e3c86251e430d01d301950c29c6eb63cbfafab89af718dc421c72747f91a4b60cfaaf6be2008acaed2c3e0bb71988770848ca2be0ebf81b3a9193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f473c81144964a103c7bc9a69b43b9d
SHA17e5f516a7ac7943b9ba869917d6fdb7b0fb0e378
SHA256178f5a4383a21c617bca3e5ac762ec6eaec49fd433d78e6497655b6d9c7b7608
SHA5123053e867e9658a0072bb8208870edfcc20f84dadacee434f4df426b4d7967720895855e983937649de39064591d5f9e8833cd8f9da07b8185a2063bdf26a5a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db60044832a59512eac0233ab3737af
SHA1744b2792d61914ac6a1e4b39b385f0efb9265964
SHA256919e0788b98daa66690656b17c5023e64ef48acc2742715f2831ddccc0019d2b
SHA512e72460aae0a5b9f8e48b23dacebbc824173c6751efc1b7bc0c82d77a91c11e05062080da279485a012001ad28113daa845e6181fd9e3349ba7a5a7ea9425bc05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4ebf417ae347d69fa788de0bcc871b
SHA1d17f5c5b5f01acd5952c04c4b44a54eee1b9db27
SHA256e40d7b639f6016ed9ba142c5d570f7f87c0471ce3fdee5b40290604b5e26a866
SHA5123265bf492fbb1908ecef40b813f366200589ae9b012a96effd6336571424aa37ee2a4ca4ee318b07b085063e6db6bc54aa417607b7a46913344229bd704a3077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7832349ac4206c3c608737b888aa21
SHA1a090e85710380e1101b752a70cac392d929dd5ca
SHA25622310aa454d04ca1f56795639473f1bc65e78a5442fd292fbb501a75ae701791
SHA512d7a1d5719e045576002b1feebacc0283482eb799e24f9cc527532b19f25b8f0190ddcf3b7e1fa92517222121e4918eb4c981a2c6b284ab519079519cfda97189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cabd9f9e876f154001a40362f45500
SHA1f6efa627b649e60df082fb4279fe199dbd9ea5a0
SHA2563b6000c01c3a26dcaf703dfa003e075c62ca054aa9aa0e51b92e8f3a070e4313
SHA512be8ad5f86ce71e3ad852889ee7aeb006631a4708e9a0c6cf1e2cdb2f9333a3425f8bf957ef9de3d1ee8b18ae5b80aca24c0b8fae7deba5aac0874ff43de430a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e481e3ecb19986c5ef85e917c152009
SHA17fa8b855cfdccaafb7c7d18883451f0011ef1309
SHA256f26ac291f2718cbb804c2d50b6789278337f20e2ff2f044c336d060f317dd9ef
SHA5121270c2326f8e6fa3c6862adc5889a8e96541131022db6ebe87a30c547ce13802284b608a0a26b1e092d3d7f411a5c249bc44e068a8949c497b6e3d03f50c8812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dbbeb14157023d79261a77b3fb0671
SHA1d7447e648e3fc449398f4bff34e8d88211800761
SHA25669a278628d781b15f576a66ce44d09a450ed34d45f9a678b96a07ba8fcdc1453
SHA512cb72e5262cd9c3eb0a000fb7e23acdd86ca1b017f97432cb6dafb2855bd219df99756ee35fc43e49d40af055da1dd946bc66292f4ea42feb8b978c5d13b78bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7826c4df45dbf4ee97605bbd0bc3d50
SHA17d5a091427792217d1e9385ae1eac9cb00c628b1
SHA2567d5a5f55eae55530c3d79102abe2658207eb4eec4e4e9a8f026adb1b3d4ad218
SHA5121322f51803d3264aae5ede8a44e11687ae5b2c3fb149d879847f9aec6d517a9b233d8b68bf6aef0f2ce9ed7aa7959511a45d74abc6e7614ada8c106b21799422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d0f63f3e9dc65a7cd4ab819fe4b916
SHA173a670d884a54cef642c5930d5767a7ee2c37c33
SHA2560696072617dfc6d3b7b07d1aaac4753b53dd2041775de4005097164a2659cbc3
SHA5125375500277c48f0fcdfb091a9864ef41c5a47b5ac53ce9cd0d68bcd44c08f38dbd28f525da0b54cdaee74813677ac3dbd17c7a68ee07374c9739ca9586c6398d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d9c42fc2255bea4722401752a28c1f
SHA1d4ce66fc8d77bd199a1f64d396f406bee4acae41
SHA256567e57c7f8b4c65387b6ed3e4e6efcfcaad0decebe3888347ab6dcc1a4921cdb
SHA5127f542a1c3497347edbdef65c41a4c07d628874a414479536b4c55503d9be17e066187ba5aeffb927f18fa23e7aeff8175f4545b074c59ff263f1de123b9da8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54425bf6aacef60d050c9582941d12c8e
SHA11a8e340621b52c77aacf2718f5ce8bf745475153
SHA256ee2dbd3c230eff8c4760c6cd5fdc6f83792266cc3f0a552f728dbfa42f9ee41b
SHA51289ed1abd54ab34a6ad4b3844567c00cc07377fe0ed935a7a9bbcb43568005be0e1938cbbf8df6033d72583b670aa6481bd1cf1b85623976fcc55892dc9754d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912aa108e1aab6ac3c556f8aefc8cab3
SHA195a0997d99055dd035f2a7ab2e7d580ae568d22d
SHA256c6240f456ebf7c00114246749ae286ef65cc4184438022164246748e10cac032
SHA512580189c0198b740babc91cec74c08acc7e6f6f818dfcb5e78cd103d82df27bdf4be75a51093af71e16e053dca47457109bb9519661aa6d2c9d3a59db5e5dc3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a538b39b49dadfa7d02e333ea692c1c8
SHA1c53da87b24507bc5ee5c1215fdb2531c72effba8
SHA256f52553c46653c51d7643cb5bfb44292a5c0158d9cad48cfdb6f6ff77a74219a4
SHA512f8e847602388b044fc84a83170ec239087acb8ee8c3a6584073a15c8fdd2adef206b5d0c8a74fbe59b022d55f52581c5ff23b1e5c0e939f33f6752cf7e512db2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b