Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
eabcedebc0ab1967afdb999315715bc4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eabcedebc0ab1967afdb999315715bc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabcedebc0ab1967afdb999315715bc4_JaffaCakes118.html
-
Size
132KB
-
MD5
eabcedebc0ab1967afdb999315715bc4
-
SHA1
c46b55667282e37faa0ca98407431aa206a76f4d
-
SHA256
d3d21ddc7f67d81c5cbc7bd6c137e1446cf68e74f9a0526857685a73a8bdec71
-
SHA512
dae8c49d5fd982b35d08a2af08a7540fd9a32c9435906fc82179bdad38c0f6c6508ea5a2d45a62b35db6a66e3d49a06bbd97c756dd5a259511439d077f070c84
-
SSDEEP
3072:S9dIH8Kq4kaSPGrKLJDadI/NC3tyfkMY+BES09JXAnyrZalI+YQ:Ss4sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007a4bfce7db4c752c8fa7e623337ca1c5c76bcb0c267e61ce19f3aaa20dc964bf000000000e800000000200002000000046425266a0cc3b853274a2a46c481c3d57e4cd5a64189fce450cc1a491110e612000000094f82d2b6f5b68bfa62429f16e3d9b65b330e0aefdbd14029792514d49ce046f40000000418c21be0f2d6c4b730603363900dfe67478c35993bcb8958edd9c1bc91098c19d338e3e1ebff66b67e34ba658f8bbbcd730ca6cee353c6c31620858574ce680 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4008b12d5b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888257" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E1C6671-764E-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1852 iexplore.exe 1852 iexplore.exe 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1488 1852 iexplore.exe 28 PID 1852 wrote to memory of 1488 1852 iexplore.exe 28 PID 1852 wrote to memory of 1488 1852 iexplore.exe 28 PID 1852 wrote to memory of 1488 1852 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabcedebc0ab1967afdb999315715bc4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a078a283edfaff5b5dd9ff746ca728ac
SHA1b8c0ff0be7d2b42920cdd65c4aa5d34514c6a405
SHA25694a319b4ae3e1eca848e195f56a16315f29b5ecd48628b70bcdfa957e67736ac
SHA512a97f2792044b31c66ad76e03c39bc52c3ab638400e39578f8193e0864d8014d30f092a08dd44ca977b47410a7d5f705fc1f352490c06e8d51a75f1f702321ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdc7e0d70cfb15119c1e45b339137b47
SHA1a4c98a4e5229fb0147c09846af151a3428e61dc4
SHA256cef1fd0f60fc6920a81139acbe9dfa8e5e79dddcfef59e24049f8b4b927c9ea7
SHA512a5f5f64092dedc0d56f4b80f6fb933fc92382d49010c8fd2e65fdb1f2e0f10dc0fc250664a1ff4963fbfa7b2d4a4941875992ef30aa54ac95ea0b902cd9ac388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56189eec19bea94da743acbb255359728
SHA113afd0b0205f6218780620f83b285a13f16d4cac
SHA256385e890999d96bbd0ecbe81d57e7b3f76cfbba71df4991093494075ac29436b0
SHA512b9dbde44958191e507f253c928074ed5f7641de1e14b6d7b39a080b6828dcc02be136f341a7302b24019fc874a887286cdad1779590d673a53be8ceb2f600dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b94ae6c6c4b51c99b3ac475ee08e83
SHA1eeba136ac212c2f7888b49a50192eab09281f502
SHA256a148531472b1568827e105c936669495626cddd0a73143689db704af792536bd
SHA51240120243d336f973b86ca01c09c91da373c123774ca09756f2e7dd889c74dcb87d32c505148211fcc4e628015ee0d7c77ae20488852a0f4437506e40b0375389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a292ceb51ed6f3af43922c8bea5812fa
SHA11d14031398478112066aa2b9c069916bf23ca9bd
SHA25656e7e209c3f79d33185fea4cb440b2fc38bb7d1f394c3541f50ad56f971dc5bf
SHA51271ebaf1352f108096f4a7f2c5a8c8aea43a7e66f85ab60049dd3b15cc6d17e478b4274126a1ddc4e918ed56ff68d6c4cc66ab3244351f0443d1399062ac7015b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5111a10e73321aaea129682f6e1720d11
SHA1ad4c7b7ffd3785631b447f42ee290d7a38af361c
SHA2562d5d36e38bc4e17737d425c1642c1143d7ab6a4181151daf81732c4069d87796
SHA51232fb5e5114da13218171d3c3fb600fe6d368aa4ccb92857d5030004ce4b86b0cea27cc17facba6420a6a804cc518ffea7262f40c2fb7464c273e5ab4d2681ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59611af49d1e4742ebf4159ea041bbb63
SHA160f411296ab6555bc0e88df04950dcaa76b580f4
SHA256d5ce8479272d0c3bd4fb43d07cfcb86599a4b5564662dcd00d77fa5183133008
SHA51233529578d0e9c6c01a5c938813898542f33fb3c1484b2fedc06e237f7e2a9296539956ae6822d807900aed794f97cabecd87e2ccb36cbb83e77ce9da1d242483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae70e4aa900f05b759fc2412cf5a3800
SHA13b98952306ffc14f3fb60d6d7e099d6eecead119
SHA2564a5c6876501d9d7d2a08e6e4fa1707c8184cbbf8c292e4021b0717e9c45d8761
SHA512c09df48a29a985aa35b9bcbee7cabf1a09cc83a495bcd46cb617d620e4814853f877695b51aaf9b8b464d53b8844c1cdfbbdb4cb16b3a4b5204c4dd61fb3bba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f0619d334ef1b3bbb86ced53654c2d
SHA1edf265bf70c8a0d15cd16f431bec814f269f3df1
SHA256fcbeaffe0d7b9b0f8c16337aa4bc2ce72f8f90c5e23a7a3c1410f088a0269adf
SHA512d14b2773d53ce28e58419dc12883be95ce9439125a11081fd8748008b088646effc9c259fabd73f772799263ff2681493ee3b7649e5b98efccd33d14c37c471c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a46b4e85101a754138a0e4e6c87c53
SHA1355073fd52743cab222b5cd03d73a1e520768b47
SHA2565e5fca684d8f09742b1e632192ea703326af863973c31d4841d208ab435c0835
SHA5123d353c42661c268d5432a0719a323d37151699854ccf12d8447f61d3e6ff73cc22816d5acd556e229787af26e6d830d9e8b785e89941e9f52e4e2d1db6d0d828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58967f3f3d4d43628efcb76f6198a3fb4
SHA1e35080ada4fdaedc7a7720f60dedc6e7e7b95f43
SHA256866a60051cb177c2a5172d9cf55e3ae649e3e2a346e69447e844084ed02fbb2b
SHA5121e5da780ba1f2a1559bbf833b7150090bc48263f1ccb37015797a3f2a8491950cf34598bf85805cc8d174f783447e9ab60483b786a276e233076682913fddb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399322a15b683ec1331256dc8dc9ae4e
SHA16bf154ec02c40feb144deca8e2545942057f69f8
SHA256a8d92934b4cd2cc932502487454c0822ad845a9d8b61996039720b4e7d80f821
SHA51204618733f26d3bc2eb20d06cdbdb5425ce463ae6680a49488b7772187936f4950e21da840ddbf7c67b2f37320143e9cf06b7abfdf75d28bdb2fbcb2fc2c38415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52283a375c607b0a04d74e2cbd8e5a460
SHA18b3f8b858ecd5b47134b61d349d4cdd00ec41663
SHA256737cc7438bcff44fb9b27c6b9a682721a6cfecf6a577d37b7da119942c6a3ee6
SHA51212e77a32588201eb6500f46affeaaa9c11232fc179f4130258ceb3437a7e87e31e804015a2f3982ee75f7b6616abb7d5c69a5e257a2c22f81803ab43478c30b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3d87d664e724630ee86b2df8f659c28
SHA1fd1e4e09a67315e29fab21d353347a61347fe63e
SHA2569cc6ce6eddf41c95d30f3cfdeacc53fcb5c1a3f2a59284d07d05b17bc622c412
SHA51290ee7cdab3e2293de94ccfbd5ff7cc49d9e2875283a59622c04c8417b08cb58d892dd32d3aa58eb95a3004834767a7abd65de7a8a6f1dc4403efe54ab7d441f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b800a7045cceecf5b3e37d72ef9da08d
SHA1f05e74d759d49577639a97ed978cefe1270ec009
SHA256454a55095ee7cc71efe2ae71915f508a1da6b7b43ed32ff991f33b0da7ace87c
SHA5124464f03552530bd2baaeddf086de9a53a8a2265df9ce0025e894709a4008898abd522fb3a82bd1c147f002bb73fb190d48f34fb7a5d1d02c6e82d26dea60c298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af25411b1599be412095eadb77d42987
SHA188891462a2cf100826d3051c2dd61218a22fa16e
SHA256ba1165b4e54634fc0d94be7e50820945c0936240ec29cfe1a1e6eb781ecf7b2b
SHA5120e0cdc394d5e034166e56089eb38308cb3f36ed9680886720a1e9c8e06957437247147133da2d6ec2e9be276bfad8a7222e17c14d4ab17a134958fb8419390de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565642888e6957ab508a3f7efa0b91957
SHA1dc2903d69da76f52d9ab4977c5e8fd581a7640d9
SHA256eabf5903c3b81367f56f9b1de9cd85f326c4943af826b0c3bd9de40d3f5d44d2
SHA5129244e0aaaa6ddfa4609a4d4dac0cf97eba9ee0061c8120ec9a051bce7ecee0003edbb060aae4b12599900ceba08daf4a54773adf1ce5f0ec10d1b650aebc59ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b17be67343f1e5d7a3373eaacfc931
SHA191cfed82f256fd132256e90eccf1632b455ea270
SHA2565e4070a676a8443bf76d5c1ad5e0cf61759568682997ac7c614db2c167f14582
SHA512d0dd51972ac9acd594bd5a49b9503c3fa6c1e6b3fecf93dc6955e1209263db600577ba9e1c3e8268487f1d89c7cd38d150e0adcd1351468c48010649d577b383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552164f63aab68c5294432958ce5e33bb
SHA1ef395900e26ec132e4ba58f37a635af653e1b6c6
SHA2569d3ab8dfb926bf1ba19a63fdeb8a866c55bb9b170e1c9c13eebdd93d3b6f1fe6
SHA512ea53285415683315235280a007a07c699e19197ee15b60f4cd3d2d4d50b58dec29d60e40d58d75e413bf9671e5bd40e2822145b792852b5adc1c57e552fc6dce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b