Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
eb1decbef4fb60e20a15e27f449b929a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb1decbef4fb60e20a15e27f449b929a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb1decbef4fb60e20a15e27f449b929a_JaffaCakes118.html
-
Size
9KB
-
MD5
eb1decbef4fb60e20a15e27f449b929a
-
SHA1
e5e4132b2d268b7b636f4060d765a516680cda69
-
SHA256
412864bf97a3fe43464a986f9ca1c46d271660e62c12b90d559246c27aae0726
-
SHA512
3d56beff936b2ebe46c1ccb702a1169a666397ea559cf29dddfddb56ae395e0941c44f879e1117eb9da11bc59da9e7566f61a69e452da88b490638fa39bb2072
-
SSDEEP
96:uzVs+ux7rILLY1k9o84d12ef7CSTUfGT/kPsIpUlVHcEZ7ru7f:csz7rIAYS/qnUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432902723" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED0FBDF1-766F-11EF-8BEB-4E219E925542} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000939d4fda6204601cc7ccb6093d97df8e5a4c5a52bd00c8ad9082a6c5dec9f71000000000e80000000020000200000000da99e44613d51a376fb981ed5195c6159f783ae3953daedc0535e4b81862f39200000005ee7ee402e7a04ae38cc5813c8de4369d60d51941fedd5ee69f70a79f531b33d40000000f27a4761267b04a79f26c88ef814160ed4db01d7b7e3944ef8ab23b7c6d2ea9e0e960760b5099e0efb97a0cacb7246f3da5488f2cb14eb6815c5b5f550ee22e1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50149cc37c0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2084 2252 iexplore.exe 30 PID 2252 wrote to memory of 2084 2252 iexplore.exe 30 PID 2252 wrote to memory of 2084 2252 iexplore.exe 30 PID 2252 wrote to memory of 2084 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb1decbef4fb60e20a15e27f449b929a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601338b3ab9930b11c458406ce88590b
SHA15072d946916a28f4984fc89b85025dd666bbe13e
SHA25601f044a04bc5f5171c2f936dc0964c5c0c65e91e63cbe50ef763920e969d2904
SHA51263bf53a9f66ba7dee2a0820f088780896df623eb9727c08b030618846d5052123ee85de6cc3e23c9b8d731a38654933cf07d1f1f9fac59a58e7fec0326fb1410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5f70f4e8a3236dccc858004ac79e27
SHA14799339382ec6ca8353bbf0e574137fe9176f279
SHA2566875bac4cad49fbdd90f01019f9c925718be3c5ba53332415eb9dff7af1d1cae
SHA51205bfea260ba94505bcefb00844501a6d8045ef9d12f811b6346e51ff1f50a5353c85d2013dc8eebb0bb03d07c099fd2ba37c450404848df7acce0904968a0ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd7bf6067ee50f575cf36707ebdbae6
SHA1d1568b5d8a2f600afa5962692b92c6f56cf395ca
SHA2560d78e77171e4356e8689f9af054be8bde1c02bb760c2f9608d039d9b3d85cc6c
SHA512ee67db33afca54a802f4bbc309b8464d2af4448da33ae21c5794214206923779a0b24c78d59a5d545841980c9b90ed5a9749023ac1c91db43e3de0ec12a93641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afcfe6598be05e360571ac0b2ac454b
SHA10e0478a3ef9cb4c21c5b8b47bba13480885ad274
SHA2563194d452f46790bf5f06e0c902e6e2ee29b808c8be082e4064519d50358d67ae
SHA5124f6f37a5c5e638509fcc5b69e85849e67ff08d1864872c09d6ab1ee635ebbb92135dd44c0dc02dc8f4c17bafb3d303445356bee746c68fbc5be0fc18e9752852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597c077ab15e2b4bb97420a02b353c22
SHA1800d04bace5a7fbbddae405a52c1f9e4e8339626
SHA25621d23725712c8682ef78635a5255274aa39ea4fce8df9d9b3aff95e1e013a6cf
SHA5129ba8ffef8a81edc57accb5b6a553326114e5492a03b664c2aef7c8f8ed4a4b7b42eac3eed74b444d1c37066bd388081e1b4a35e074eb520b4f901c666dcab2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57338e76e8e7772159393a6475fab31c1
SHA163410ca13baa67c20268da4c56d063dbcaa8d21b
SHA256f136bb33a79ff272fa3b72255a7373a9a9d96702ffae213d9cff13f5776d6319
SHA51242866086d6315b72e281ca41f53b7f86b0cb209cf8356523541b8f88c4b45371b74f4ecd96b2cda88430e49d4ba14950c4abb7b51bbff82833dda740e842d416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50018fb2384aab68bbe37f9db66a2fef5
SHA1e5e0a5e2464d78e0b0dd90010a41fe22d74b0e41
SHA256c2697c3be9ec7a3fcd1bab5253fa6a232bd8ea13cc62a9368fc3345d39519e69
SHA512dc8bfdbf6c8730edaf899f24015bcf1eed965e2c059643c2cd5bd3b8c8d9abc7c550447cc381e2ece46160f4f8beae93abb55c38dd098076a5299d3ec8c4e2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51799fbbbfe2941bbef2bb7494d242365
SHA1d989350d22dc93f54f850000b25d610c24c7685e
SHA256342cc2b02a690babfa9613400484f57e9f59d198c0553b90d4580947890e2506
SHA5124b54de5e430232b8001b9eb38afe2ffff115b4c0335d257ba125de15a6309dfa25bec20c83b4652c00f5ec7be366e55e6507e199210554249be4badc87bfabff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bc7189d7ab3c521fa76f7085735e86
SHA12db2b0b01df691b934cbd7c058cd7d5cce93837d
SHA2567134c54be53107f7d884a44e3ed1c65fe183cf5d2c5603277fcc82028854dc0b
SHA512f867843337385bc267f98221789b21a2ab87b644d407b035c3b13bdab0089d6c76fd5421d665799ad23556be3baf50dc5da0465ae753e7d2578ce490717e97f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101db106520c85bbf90f00a0fe120fe4
SHA1a27941fc6e230dcb3c970f5fd35367f1d2ccb024
SHA25681087326f411d98d142864c70b100c7178e986361962f3e4613ccf4747eb9e7c
SHA5123abc1b026e760d6ba9b766d8ba147681f55bb4e89d87f7d6b866e8867769ff9cec7dda854e37cab8e2ffcd80863b765b562b608fe57b4badecb90910214d1928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b50049b16ab150fed347d04abb6cd1
SHA12b6d43a37d309a64fe20ccb7f8d10023cf2e22e9
SHA256a19707ea3b21739293bc4746df7669a4f627884c9eaa3eb6df0e0a8a3abb45da
SHA5122d3f97d64c0b8adea09e09ac5fffb7d4a6452d2fde8f25b15a9782edbcb4c0d1ea85fb84a6c614548e6675792708bf2ef1a3510054beed959af5868b5a037faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e658d565f468f28eac21419ba3236da
SHA18fd74138d020cc2250945caeed5ca90ac6635c07
SHA256bce0d7867bbb9949c8b9cc73337a0b50fefa9098f08dfa18392406bc86d96457
SHA5128d7c5e54f4795de128824a3f5e4a45f5bfda63b8eb45a68fbd5b392c2916f91cc82d65714b1019ddb104b79ff61717651992d47f7e3d344a7f6ed069b6d9285b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517dccb11ba24a7bd5c562aa304e79b0f
SHA101ae7ab8c549730fdd5580d5d6718c77a27edbeb
SHA25648f6e3297992ad4e54e22116f7204336f12167ce8cf56647cf56dfab31154529
SHA512bfa54b6db425854aacaa041f74bcb1f5baf573ee76d70ff6a425f347dcfd1112d5481f3650faf1be3e0624b8e20db918ee50e91a20cb775a5c314b56baf19536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab66d5d1543d21b9ecdc21408bcdddf
SHA15255a13b2d02e012c0a3683f40d74cd0282c74ba
SHA256ad136c5d5b2868522870248d4eae5e382ac72637c6d4bd36410a0ce1132d4b62
SHA512e8e66aa710daca9f24d1ebedb4f4522ac8669ed496318252fd5f7c8830e41d37b3695dd0845e870975de7a72ea6af90ba27d944cade60b0a6e867c4230940853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a84061a8c016f246d24d5f03488fa3
SHA1d16981bd2d501dac144d4fd0d32ddfa24fb93e73
SHA2561680fe3649ede52b5cbc691f81c03c9fff8560a02d319410ea33ce2a4c63160c
SHA512b6d892c25ee142a5d1e22d816145c44069322455792cf31d20167f012964ad6835b8096ffd641aa75585e0a1e67744e594b48e11e2ea42799c0b1380e127f500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55d7241ccb8fdd1fc5d0e2d4e54177d
SHA1cf23852504dbc53c8d5ce42443478c679b88cf46
SHA256bb50ed0263c31cefbbe69fe1dce207905608d2018a6d556545faa89138aa7b0c
SHA512be18a23126090532415fb38fcc7b221bca7006840f53056a89a9360a7435d2473c79bd6e49b32c5f46a52eb8fac31186f960740fb559bba28dfe7d59d73b0466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee2fbd0d3a6db8407c084a4a4013aae
SHA13b4c6a95e83eb5791d4fea1686906ddf161b67c7
SHA256e57d1ce97357d6b3d8f40c2c57b2791315971bd03d86c97cb86c3fc9f4048729
SHA5124a3e0867a298b4f9c5b498f7fb0e4fe8695c37adcc12abc9b3bcfe2fa4953484f38d0e84e73e8ace8e66ba0acc1faac9cfca1174ce180644b40586d31ac5cb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7fd0ac7f8f0077d7783d5ab58952b5
SHA12776acfd8621f2cd9fc46527c14d287d56ae9d38
SHA256c9d07e67c6b4802a0e25a4d727581347e89f1d34f4cbbe2c7a06db6790c764ad
SHA512578e8d4a3331847be4d4373e67c95691bca750e7ddfd55b700f7201e31078d0bc7c2b9eba543e65d462d619ecd811ae83a4daee10cab5cc2c7d44e8beb55ebda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4004896874e8fe0b36ea31c7ec00ea4
SHA1504e5cf4d85950827c62ea24539fb1da637d6f54
SHA256e0ac07f40567827affc88b61bc4c13f5070d6c21560d19ffc8ff3ad6bbe42d84
SHA512a8ff0f6fc75c70c6d32481d24170102807a6bd0552b36a931c35c3c103bb785478f2b3c53b60527cfa53d6f0593f7f745b1fd50ace115386e5f3e401a7d0267e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b