Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
eabfde26c799572ce2ac66104ea42655_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eabfde26c799572ce2ac66104ea42655_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabfde26c799572ce2ac66104ea42655_JaffaCakes118.html
-
Size
6KB
-
MD5
eabfde26c799572ce2ac66104ea42655
-
SHA1
91679e9e592c5e28304ad57234d4195ff1f91314
-
SHA256
cd5f60e487a5f0de1f72974160bc1cc5ee910ac43f1a009c9adbb37c937dfeb2
-
SHA512
d5fe67a44c5eddc174900a8e4f1f3152f515430aa42759b26970e1be09b0bcfeac07d6655531ba88ddeae7faf62e78612b3d5bee96b9440a4a3c59161b279c9d
-
SSDEEP
96:+IVub4Tsuxe5nLlQ63wZUWRwHW1ug59BI/M69jPUwp9v+/DLQ:+Isbyo5hQiPWRw2l59BI/M6hPUwPb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888744" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60597C91-764F-11EF-A1CA-D22B03723C32} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005a1330f43a0abc1e06d5624fea9f54aacc56efdc0e5b4c6bc24009a5088f8b83000000000e8000000002000020000000e502afae553e336eb7907b2f75d2fcb424220f328e71f0748cdfe0523154752120000000ff4005dcff4951d26b806cc10727a4ad6c448b3948a031e60b030343de61ce89400000009cc7bba829ef71f3beaa7e382c35945952848aed6dc6dd41220b1f97834c3ab5847dea02a0b742aa19ea84ad83bce92deaf7b1afe608e4378d9403c430334d3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001eec345c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1604 iexplore.exe 1604 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2164 1604 iexplore.exe 28 PID 1604 wrote to memory of 2164 1604 iexplore.exe 28 PID 1604 wrote to memory of 2164 1604 iexplore.exe 28 PID 1604 wrote to memory of 2164 1604 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabfde26c799572ce2ac66104ea42655_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9c346c54a7681819cc0088ee4795b0
SHA17af77d8079df54b0d5453bf7fb3500ee88e1d85b
SHA2568e304b5a4322b9a458513bf417a0715dbdda24422d86bd63ab0c2c4c4b714862
SHA512f0ef251951106d8494c80eff4a7d2a528459b9cfbd983fcd335d86ca8e81421f456007a6c1b5e4cd5a9b13eed2eb0cf1604ba7dc4cd1414230d53a9ebd11ff81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51797cdfb8860a445610c2b12e2044eb3
SHA1fdfd946c5d94c095918a30443d27b6645ef9d856
SHA2561d159f31ae252f73b52f3200708ddbb3ef10353fd45fd88dcd06f48e1c2c9042
SHA5121b799e5a6fe65819e58c734bea24a31194d487d6976861bbd5f202deed6a31f1cd3bf037f5e2c6e5796224dd9fca0bb52c4be93f6da3b486a64308946e2a926f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19ac1e9c79ad99e8adee6a15122d754
SHA1cfaac90e18df24387893003df72269978d8e8147
SHA25611d80654b69ee1959d00663c9d58c227beec991420f686ff31635319bd316896
SHA512c34631d1ded3f75033469cb0b57e333b3a5e781c3e9895f3872c8862c708fdace8264dc83e9929485b8ab50a4a7bde2b3eda55079aaa62d34d1e51592430049d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6ea83ceb6867d987e546bc95c3af53
SHA1a5779842caef7282fec67e756fcdfb1c271dc5f8
SHA256be3fad4d6900044266e968a53d6a4bebd757cfe6fd7b81bf0ec605f6b312673d
SHA5127566a1a5904bd8774988c4b2604136c19e9d4cd88009c5a4006d01357057cc9e5c6f113b1bfef3d9a62464261f783239d8a1296b686f7b7fa9fce21ae45705d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433c8092e07ab1d6e192ec0efe790e17
SHA13f28501328cea1410639cff8ef5ce13b25fc0e52
SHA2563b9d896c11b8a78ca1773e6b1b31ab3df2c42d419a1dafaf5876a9f31c659bcf
SHA512863ab754795423d220d683b651096cfc351bdb0111e24720660f3fc6ed020f4fa0ee43adaa763ba021b57f5c18bf6deeaa79829d4a314e103182c52c74d86332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8a3cc32837e95e1c4037a911c974a5
SHA164d0fd2c4a8dbe2feb852c5cf2cb6fe9736ffc4b
SHA2562aeb34e278085d546e0c35f0f114912957e0a04232cc184e822f76c36f6c1040
SHA51234866d901ceb9763c640bba9640b1143bb54337bc77a8bae66c7a76437e78a1904cbf16e0c7b2354e66a310f02dac8be113e3808e3b3d21fd6b5ae1b9904b94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc5916d2bbe2ef1700e9fb3a4dbbb6e
SHA14647a0e6a4b0272c9347d165669869e2a650b544
SHA256c31743a48fea24c2667376eccf4a0f20c3e8114a269a56b6c2687ed3662e61fb
SHA51243164a20ea240a834c5379ee65e88bbc3e1910021979bf53702affbb58e4b9470e2a251fa4967e6c47e308a517684ad18bffe381d1ee610bdbe2c631b33f202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e5439f5d4361fce67ac88c74ae498f
SHA1b56d201d7ec5e8298edb26cd1718262501bfdb6a
SHA2566316fe42be979418edf1f884a6ea2e758cafb256cbb68269db80092d470d88be
SHA512003cf6f505be3a75efdbee3ebea7bfa16f4114b0c56bbb749233855aa752c59322258f6e26d796b0245c4cb52c5c89f2b73b19002571e8d823b1d813d4de64c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55766f9eef8c686f0b4a2977c1f8260d7
SHA1d29e4b3ea23bf13e704795e622d50f4619301764
SHA25669044cc34b2b701088ddcf9cefbe6665bcc5bc60a92bcca657f7e010eaad45d2
SHA51286d277600f15dc12504bb6bf0efd51c6bc939e435f80e6db1b410ed71d967e4c334483ab216c39275c7bdbe4de6b2d31c35f32b8d2a6dc64476419cf7d34c5f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58271941e376d3416df743a262fcb27f5
SHA153a50044748196b272647b8cf2cbd969212cc2e5
SHA256cfc1e4f7af6642d43b6108936d64b85cf7549ebf443ac13a5c02918fcb1cd74f
SHA51290d654fa21a8806db112984b29ba335e816bd1f8f9b228ac77e92a01cc32d64521cc0c86a5a418f8cbfbbbae9e9840fdbd3d1b7e3e72dddd39c480af1fe89544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f40067672f036724bdc6b23c29ff63b
SHA1dfc29176e3b0f03b90fd89f601e1df21879def1f
SHA256f973dd1aabcb6bd9abc14cfc0f1729f64c065e1387a93b9b7c21446d86df6fbd
SHA512e9c848a58c7399469a423387abdfaaa287bf08b29fb2e2f8ceed3474a3c02243ad72dfe8c367d99f74dddfe474e5e416891a9aacc37d6538e3f7011e439fee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608923b60581caebf03b164bffb1b58a
SHA1c07fd21cd9dac47ac83703ff1a1145a47ffa6614
SHA256c50fcbc22cbcab8a66470d1113c9781ccf1d207a37f34e003e26e50c0d683bf3
SHA5128fa7b7cc48ab531cec5a00db3fce741e3af9fa173951f4ec1d6b806834f93dbe3f36609b3362e964b2b47a9a55a7d2585ac71e93328801a1d2aa8eab9e174ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487dc97e16fef29ba59c17d03f75d484
SHA16b9a75d41dccbd844d14cfb0cff5ddb4d65c75e0
SHA256e326911559f4974bf600b5d7b3ec3d7e28929ed932522fa84cd0b13c8f9419fd
SHA512f6a2f955349ed1135cb4346cca044366bff1931ae18b97477f65b6d4085ef373c01ef542774fb965933173086815c449fad516e2cdc77b436cfc49830c4fad98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87e327f5b575d02bc2c11724965e929
SHA1e6d9797b60380e2a8517c12ef3473e2642f69b1d
SHA2564ca2167e9e357e115d61911b69c25f02aae566167fa173df1fe2fcbb2ca93416
SHA51282ab81f725de6414089e77319a33f94cd398b75ed84cacbdd5b3d539adf3cdb3a9eae56a2f0cb10c69c8cc9267c54c1b50c2b0d91d9c8b87a001752ebe99216d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0df29257f001af2ed0a5a0bbeba4827
SHA163d0e8ef5ee64648f77f319831bf9f20966948e9
SHA25685d98a18036212a739176ea83a56ebb8820ca3ea58887aa782f933ae4c536e05
SHA512e14aa55508e881f0a4a76d155956138abbda46451ffe57245c426d68cb8649d3107d5cfea8b20dab04015071f5d5ba33dec08271c3740600dbd8f31f18d5c57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ea2cf548423bbb7feb287bf340f001d
SHA13c371e3e725775215aeb921b78e61e012206d76b
SHA256b8a98f3f546d10914a8d1b46993a5bb0aeac4e6c313b82e67809d44ea3b92c54
SHA512e6bf2e751c9dbc268ad7a1866fa6f3ea182829024430ae7d924fc9bb5fa22a7c29f98cea32f3fd1db98f0762e505cbf31e0cd7d189624e0967840ef8caa6a753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58544400dbcef412cf08047a76f20886d
SHA1f64c2eadfb7255d7d7b7d0d728cc7eba4d2cad6d
SHA256e2a6f9fee919800defd73af704b9e3f2cfdc2242ebde0f627e669556aff4933a
SHA512a64e10ea018cadc420e158e23cc9fdb8507f631ecf61a1255671e9bcd8c90f22b06cb0d86beb2f05324e7ec97a32dd3f176a7e22ced553d8393a7cada9f7c052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d489c4605535d660fdfd5bfa3bfe0c47
SHA15ad8d19351c6c05d1c39880c5e3b51b645d5ca8e
SHA25601f611966f485125df9aaf976b19fd9d0aab58cc28a9aa5ad4c2f4fb28ea54f9
SHA512e1a117bc59fca7dfed25f96929a112ab54e51636821080c748d39c124eb451aee3125f80b5854075518a58bb1d2f8704dd28e148d2175de0db9f30cf71bc96c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ab1323c7731e91e9e24ee76e30eaa3
SHA13d2991aeb0a7d09e2d464795336e092b4cceb225
SHA256093286cd8635586cb898b9d46699fd07b962509c34ef9b37769250f70fea2fbb
SHA512f6c2a33e4b0dd78f3c23e724603c02b36e1d4f01c1db4c4a6fb0ffcd946b0bdf6d100cee603d4a9db120b194a8cb9f0179ca55eb23756a3f4ab9d6c89a3b3fb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b