Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
eb0bd1277416bbd758e2ebc836d1647b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb0bd1277416bbd758e2ebc836d1647b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb0bd1277416bbd758e2ebc836d1647b_JaffaCakes118.html
-
Size
1KB
-
MD5
eb0bd1277416bbd758e2ebc836d1647b
-
SHA1
d3c6651c3b3ec7b19583a8f839b966571e367f69
-
SHA256
765d0a25363cfe02c84935ae75eed0303233e43c18de70735f713439ec4f5b9c
-
SHA512
1dc02feb822bfd799f2a67dc33a9881bdb3082c3aa07a0443b99863de77580956170e126d3b3ad7ef5349ce92e399c340e0cee1be027b1c2807e653f29cb2e6d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000084473385ab17d6c10fedf87fdc86cbcaebd84af253a79c45ac20669b981c8acd000000000e8000000002000020000000a60561c60fd5f82699a25ffb0094944fecd28d81c1cdff0ed1bb225d8c580b8320000000ca8015a25c0c0d9af84c420128f02cc62737b88b44af55241b302a51a7151ec940000000772578f739134577f57355686e95294598085f87c39fba10e11f24977305c6879036e282af975f6458eedba74e792362f816ea4359f450d0b4444f4abec56fce iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c2c7d1760adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB5F9E31-7669-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432900170" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1692 2904 iexplore.exe 30 PID 2904 wrote to memory of 1692 2904 iexplore.exe 30 PID 2904 wrote to memory of 1692 2904 iexplore.exe 30 PID 2904 wrote to memory of 1692 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb0bd1277416bbd758e2ebc836d1647b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a8f2a71166e7416e6339cc87bd44e8
SHA1578b11bd024af8512122b32984d2b1f1aad9af1f
SHA256551e424f45a29142890e602b72a75c6ca7614c081f17302d004af4cee3bf8887
SHA512a9d6d6bc3363eff923a4bb6ff484388dee8b05f4a8007e969c06c7aba8a1ac85b80a748f487513e753a49656aa59121aab6b2d4e2da517974fb70eed184822bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff22793f3320c3cda0504332ef8f8f32
SHA1baae35c38ff1c639182f1c17137b9a08375be9f3
SHA2568eeb2027d81b494e136d26631579931176e719430eaa7f44f2682b8e7c3d4283
SHA512e3265ef422651259b3cbacbedb754e43648f0b2c9079fed22d88e71f930ec2c1ce1189d0769ae3393dd30b43b85381d8e7e0e3a603841cb1222771350f038dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ffc8cadf2baf8308f42d0ef6496e3a
SHA1f658c4edb4cfd1129d52e901a8b7a0107ebec40a
SHA25621ce4a0c970b0993b4b7d8027294a9806cdf620ac02316f5ba73bb3b75bffff4
SHA512d5cc3f3d87f9b9cf6fb7b78bac713844c129e0fc09cda2db77944d23d9608894f50dd469d0ed5ccb2e56bde3534f619d2ffa78975ecba4aaad935650a45dd586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b533aaf69afc9e39519b8df8e2e68c4c
SHA113b763c88819b433ddfb9140a9742e850cc4142b
SHA256533e930ed2c444228d50bce1588d78d7f620dbbd87ee031b13f6834d94331054
SHA51203f6a92fe7dffcc83791e4a08e89e6220b2c99f87030c84ebd3e684b8fb6d8d2b5dc87573076e9aa477da94bb59e4d6c3c2f2abd9f38c89f1a4be3a868e80f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b720076cbef3dea88175093af799c08d
SHA10fedd2d6d62a623c6646ceeb8c90a3985df2801d
SHA256ee7bf16e5bc6f0924bf52dbf2180a525d997190e092c93613e4a506c6b79ca84
SHA512880e64fc19321bc925645da5f822123137e9c3929877ac86838feadfb9d340d021bf0052204b1d830e2a97c0bcef3a15a952425f8eee0d6933850de37bd5bd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b27e2885fe9f1f188962457a24a0d7
SHA1d7deef584d9c74126efc4ffce0d398ba107f9648
SHA25666b3eef4febb05dc1e6bac7c7b46237afc6ed2350986373c38fb5b1cbba95a4b
SHA512340de1fd3d48b7397ee19c2e3d5ddda23589dabb525ae00975f0b186f751ba4ca4eec5477d18b77f35de4502af03160666c5349e2da5d6d3d6004c10b813c97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6870b6fda9f91518615593e1c122a0a
SHA1a8527fea21f12c9e7e75bf4f37905951c6aaad07
SHA2565fb2db3ac1e5e33ca4558c9aa4662e6ffd84195a192f16ac83d5f51777a5a13f
SHA5126285449827295c2d8684fb3ae79f040e22a39a8f9bc69583829757b9516799d8b5a5a471b0f1230ee3571c7d792e571d192cc5183436dacb06272a6df7b0258e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea10014e162b39a221e4c6bd47858f8
SHA17b17ad70b0cb750ca94e46656a85697b0444def5
SHA25628ef71472bbdd22d801a1237a9a23721a0aaafc129b23703a9168f0c9b7af1ba
SHA512f710edabf8decce6bb27d6aa8e51ebbdfb29f7365f355b54779c233a3dc06e8c1217891c38af798a647aae3b9d2be20e91481be1738eda380889f07a75710e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39b309b890611e6fae4df07e04008b8
SHA1b6173da8b53ebad8e2b8622ba16a42ab66ad5441
SHA256bba33e82ea95a2dfe7b74c66f75d2f3d3da6603273b3d7f6b9291c6130d4fe36
SHA5126b3ee5aebe1a41dd7f847fc1bd9aabb8c3074f4ae55e659d94a3205a0d145828aa2f1d8d1505a8f8b69b12cdc2bfbdd26c3c33cffdf6d2017f27bd5ac450ce7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f661cd9214f83ae613bebc2b4092926
SHA187868f5ba1badf36d4d464cc8741c4c33c36c3ce
SHA256f0303f14b0b4c4c08468eb857d6fe4b3c57e8b4c8c7472ddf7bbed4a6ddc264f
SHA512c84ac190254e9175d65539dc5a6bda6fa52a9e5ed7eae343166ae87d87de40c4bdf2d615e1954b81e5f1a3f1dcee7245670adc4889ac6a57246df3ea05b66db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d94b2ca5e537e8297d2deee8134b575
SHA1cd5cd52e1bd88425da162dc865be95a9ff3f0ae9
SHA25625b2941de33ed36614019fc97493a1dd5236b21332589e25e690b743207fd6ea
SHA512cce41822065c96d7bdf4eb6a8811005aa11672523e8bd07de779403a25dc698e1a0a977755c27e75937c177c99bd68ab5112ff8c3b255156f7c027e86843aca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c92af7eb1fc102eb16234b6d48844a
SHA18e0f20e4709c9837d4919d985567e439b1f757ee
SHA256adbcef2d73211dd5ccdaabd9527768d349fb5ce716c41d08220f463a2c6ce583
SHA512baa75ed5d336093427d53c36339022454281e52aaf7d7a561b5dada1280306fe28422e22d303cf43c565de55d9df8df2368e4ba091503082ad173ea54f99b460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbaa7fd2eb454753059972f06575f0b5
SHA123f55074d83e033eefa3298647a8fa90f1836004
SHA2568cf2fcd4b85998f5372d5b2b349f0dd9be40b85c8ff5136623453010cc4e4759
SHA5124a6af4d81cfdef22862f9fed193a46a8bbe9a5de88d7bd217a32cd79dcef17a65324c7471e1f5c9e9623f49365e232c2b597ca127c01742d2585e0eae8c1ddd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53927dcf70f5845c1131aca0cef76449e
SHA177a70d1130e9afb40a77e28775882dd1039418e2
SHA2563bbd846dad30aaba67b416d9c724760f7e33d72da051b5a304773d521d79f778
SHA512995613b680aa5c9edc43e63d39c21393baf6b7e235ea0ccc6a1f243edc4e4b81c89670cf13dfbb2a4a5fba10f8998188b3655fe544ccb666b6782ca945073363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584fbec89268c2533ed6bca6ba956ec3a
SHA1416cb4bb4d36731c834c1d1621ace8c911f34eea
SHA256223423f606c8b421a74af2eb7408ed8ae00a5598a1eb9086a8fc311e81b923e2
SHA512db79a2c144d407325f228372b58f93872292aa1785b89b49e234f8908b6f0f8c4b7f660fa0374fc2270282a7f239f371ce289947b71c4e4ce0ac4e6c364b03b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546be730c4ad8604141dc4318a31856ff
SHA140ea0cceefd8314684bb700eda7c6206f5298ca5
SHA256686333736e2a5c6a73d4f3b6451c151cf5c2b185165fec0f1343f3cbc36b9bf6
SHA512a2b54b79eca54b3ef40013bcc200eda957403c3ce828cd1ff21805a0435efc72122a8dd3dee649e24e483a436541d51532c22bc22838c6d3f47f01ac55f01021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768193709e06cdf24363dfa7c01169fd
SHA13257d1d8b1e0889cbe450f44568ec1a3489999fd
SHA25685801866570bad896d3877c4c3a36ff6a0a1ff8133ea5ade4f7a8f3bd6709474
SHA5126f8afe9cdad6455525a073e8b74a59442695b32af292a012eb1b320ac032e9ddee616dd73d9b761214ef4281f460e46fcebb20fe5f94cefdd19df6edf83bc3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277dbdf4d6864702f127d2d0a15d23df
SHA1a1cf0616b1d1f8ef51d8f73ad2d48870a7ffaf21
SHA256c0341f3bb0b3a5f547f4eadc2410fe8604137255e2d535dde864a724537bbd3b
SHA5127ff5d64d1672068c0f24ef8707fc7e0a411c04623ccd7348fd8634d317a3e44806f412e73c03485b2a46f7aa55c3c7cdeb94f3e02f04ab743707f59f9b39ea1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5874093525dfbc199f366fb0a863e7dc6
SHA1046fc4716fc6ec94af974be7d2a0f76268e11c2d
SHA256dc2b884132ddafbef809edd2ae2def55979ab1a4e3a6bf4c297aea074b3bad3f
SHA5120687ac4db23143e1846d74d12f660a2efa6128ead6582a170abeacba49e2b4771f2c4585a7cdb0e7d8e9faf8d6ef90d8e7a457dc4320fc60b6597bd281de1fd4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b