Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 09:47
Static task
static1
Behavioral task
behavioral1
Sample
eb136b992f8b6f27dc25740ee2f7e9aa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb136b992f8b6f27dc25740ee2f7e9aa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb136b992f8b6f27dc25740ee2f7e9aa_JaffaCakes118.html
-
Size
460KB
-
MD5
eb136b992f8b6f27dc25740ee2f7e9aa
-
SHA1
cd4cb4bc5569137f2eb67d1a6bf2ec8b49339d8a
-
SHA256
eee778d81305ed8828e3fa7bc29f55927f98c12eee20c40ef16f86f81c1d1ea7
-
SHA512
da5a70bfc6d46079208c0b632ff0e9793d98b4202c1bd21a80ac95fcc197550328ec01ecd0afa6c38fb38ba7c1cb907e8db937c88435a09bf3fbe037ac04f1f5
-
SSDEEP
6144:S0sMYod+X3oI+YqsMYod+X3oI+Y0sMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3S5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F5DF351-766C-11EF-B233-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432901144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000fd0a4e90b5ffed322ef3ed3a214208c2073661c352acc0184096f37db1077ce7000000000e8000000002000020000000dfa7c17762c0079e395df477ff923954ebe30e5384f9af8e90d7db1356e3fb1720000000c1fb03e32fc48f9d0830a756e144003230a0cc5ac4a3fb379258f23489667dbf400000001a33598aebc9c88d7cd3c0bb8749526df1210fc8518a5541980dd07dd5da58d73b28eafe4f9a54e6bd5d810cea1557760b9d443fba0adb5b89f33929cb030777 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f80218790adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2524 2192 iexplore.exe 30 PID 2192 wrote to memory of 2524 2192 iexplore.exe 30 PID 2192 wrote to memory of 2524 2192 iexplore.exe 30 PID 2192 wrote to memory of 2524 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb136b992f8b6f27dc25740ee2f7e9aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99e5aa6b13569c8e44f3b93cc0f0eae
SHA186299f81e046b1b2a31bdfc42472cff2f93a488c
SHA256a3a19c4f28cfd789dab604471bc486ed4259bc922eee650e1d36eb0e138a470f
SHA512a414346ca9745d99fd7c8b6a3ad251257fdc3b450ef719c80e16e276bb217cd6aadbe5444c5a880ea02895e1fe31ebe49b9b21f8dd68c29372e3036c39156340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd8f1bb1296084c5a4985c0734892bd
SHA12980686d184083cd811139d2c380de0a91c13135
SHA2560101e312361f0f48a18aab152a87808a260ade0522ddba52a9c2864ed8226b8a
SHA512e51ef067e1c906c7ec3ff50c38e2bfe2e85956a195195340a8198a7ebdff95f8ed8630d5651b86b21f7e539212b265263aa7c625956f452e36f6f9f148dc0c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72a426b204b8040278ce6bf43c50c2a
SHA14776e8d86b7418edaed12805a194eeeb18eefdfd
SHA256f1cc2d81d2fcf27da248f2c3b41923c5e197b9eaf738319ffa724d3c047f0254
SHA5128737a8841fadba8c8c8c41490433eec20c17c9be4719197149e951706b5cb49c9f0985adc8fdf7ccdcbd762c3afa00670007c4c5750a111a0fdb674a5e9fb4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f748e0fd3674bbd6632e6c91c3cbf5
SHA1809d4a92738d6ba7de152172e107534f0467b08c
SHA256721ccb5b71e56ab5108a40d76424aa38b0a8ac72a673b54993f6eee94df41bd7
SHA512352a62d102f06177e709f7178149d43a2f842ea43b040b7f32f73693504bb24876d6912707e2ab698792df939a4e171637f51dbc2c0a48ac2a51832b20897a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cbd16c700bfc8fbd32a5a38bd0534d5
SHA1e264283500eb11eeea847c3bec31e45fa1e26dc6
SHA2562e05301551f18b679be53f076fe0ef49a15389be3674b5f94914fcc01a520f6a
SHA51247e6db5ff0faae8d00fb8eb6f08ea7c7bcc8b658440909d7d46bb921333b7bb8c2d60fedaf4210cd6fce5db14b7e114209e51ac1a9ae38466fc5db1657bd5979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1aaa8b3fb83e25edd9a276c7112dd6
SHA138ae294c9c8d4ce497ec810404651ae2ab45dd74
SHA2566ab5aca1bf7005161ed856ae21545b6ec054ebb62c9466fdd3b836c04391b108
SHA5127f895c72df3a176a32ae4743880595e5a993f883771f1717b2639d0da06643724d0628cec95ac4ab8632992b2923a100681777cd70e026e53c5db8386341cb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56693ef9af27d4dbe106d69de47fd5c43
SHA1459122a393fca91f7cefa9a4c3d8e1097c387508
SHA256629ed7a28758914e5dc0957121f3beb46cd97259d8e31a36f27c4b30a5050d98
SHA512c34cd5027a8a2b03a37f797c80ff06a0027e875c935af54c6ee06227e007d74a084c4f955e1f36e40b5fef426f07a67222c8fa283fcf1a90c96438c036a3c9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddc4c1c2e25b6952c93b1919614a3f4
SHA1ca7719852b478b063a8d5917961cc135141f8702
SHA2562ac9b857551b8ffae7c8272c7c73d6ad3e068c797886c9a80419998b8f33e56a
SHA51267e697b0a532fb0e4966517ed369f0a4b2fd4e6fb0a3d7a30708db5f93d8c8ad454098caa1bc9a61a2792903b0612939f56ab346a98bcf512ac3caab7af5efb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f8ad2475f0327e17c530521e657f3f
SHA137b125315b3b28de0bfcad58b1d9fd4c0a5ac92d
SHA256c016e61cf9504c7a733fc5c756bb9b04c07f8e7137b9958f667e388d739ea2e0
SHA512875abb80ffb6af3fe7d71e7dd851c29f5f8b35c1ea7d50b63b8e75ded124c697bb3ff3883f422a45c45d72503ac5ceff3c7374df5b45d90ad63d621e0906eafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525edd7514d51b67a09f99bbb7fddb4d0
SHA146810d9d12ca8bf8575d6f2a8ee2525c18baf113
SHA256e2c98b0befe44b6df3ee4b4c489a6ccb4893e794ce6c183710f20bf056243101
SHA51240e08132185307ebc79aa3be41e0154bc24998d43d3e894cd2208953a65ef3b401340b8d26137ca6e84355d6061923a9492a3ba15e7be336423a9da030acd2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b012c9411a5467bb0379eb0d9d7dbb5
SHA164eb8ae05a55c33682ce8429df65e71a2d3eb3f9
SHA2567f159d0e0019b31e8a98a64240f73fb6956ffb5f40e205e01d9ccc024c050a56
SHA512399e284e0ac9e90e137ad6a865a1fe84c4b6e9e5a6db1221c00d417156872783eae02cfa17ba6e4d518e204953d70d365de1856607b55f8a073f08bddd5fb03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e22abf53f57c0b69b2146e2ac67a6c
SHA16b9a6fdec46c37a2d4340cbb65c49235f621b325
SHA256a76a4ddbeca4047ab14c5043d085a9262387f59012ad52f716da0c1441bd09cb
SHA512be29ad99524efe4e7cce9ba49e4e42f80ee1d495198f7e2516eaca00f5f66e9487dae45d11ff0e32fa1bfa4a3502c4ce376cc45ef6d014a41dd4fd0f71810299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa01a91eb379fc16aacceb2c8eb40436
SHA12871c2cb7735f3b4ba66fce6d5685dd4b7f4f48e
SHA2567d8280da7b3a0ad69d7db796d6e95389236a480c648f34021b909313218ae41f
SHA512a0c3e0fb4b667024e5682a67dee123d3e5d8619520b80036860f2219e27e211cb4d253d601635db47fb9db21a46719fb97cf8a5a79fb6ed60b7c2563c962420e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a86d9b7b6d095218945ba5329863eb3
SHA1365b616518acf3fc5da0ae5a6a5afab40b3f775c
SHA256fc11af1258e393c6be28ce6876990a03821254f3a819f7c819591ba918a8697c
SHA5124a617623964e92e52e3e0d584e8cdc91e7c2532e3ff9c1c1d90997eeb622ee3075a4a14985a2571bb3fc8dc069f6d4753ac57a27c12f590d957c66fc4e8810a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5629b71773c6e872bc10940a91e5e1c
SHA16b3514923d50146e7366a6f0a2b4fe1ae8ad41f8
SHA25687737c8dfef39cc1bde29aff0a768e8822bc75f0bf4244a0dd92a63297b605f2
SHA512d42eebf98694a314291600126ce57a3dc35c63b4f509cc55bf8ca013126c3e76ba97d67c67bf2f63ebbec33eaf6cd4c7c516faada9f3a1b4356405ac22cce863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587981b4eda5600f885a7711eb8aefb9d
SHA17756321febb2fe24bb780918ef530ee2a9a97820
SHA2563a53e768b10fa2b5e0606638e24625e4095b8846328c3077ad4cc31389ee50f8
SHA512e492eeb8751e2881611caf66ed23db7b1d438b50151452b1347d844e0387d33ca9507467374d30a85b519d40930a9de15a7b953e5f728fa849e967429d3be6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d33f38f064a4969534f2f6c5034bf4b
SHA1ff862523dcad48d5d17fe0e1b91f48115bad99e6
SHA2562131e3e4784ae04d582a1555beb9df6128f862ea17c852604b6a87d61c33b132
SHA512ae9f07d3b393a285d747bca1343afeafa75a615c84db35074bc1afd0f3e5191f804154c0e8d53ad42af6cf8f022ce7690d13c46514bb423e3fbb294a27998a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c1a467825a22bd0fbba4b419d1d995e
SHA1c91b0f0f129156782839a883fffb855df0266874
SHA256aa0bc9f1d8c42a41ac76956d093ed72fda372120778822fb4b36d3c881b2fdda
SHA51285ebc7b9ea5d1ca7fa1013662ad8da7dd38c3a5784512ba97d836154697b6da329ad5f6c65d08622098801fc6c614caa998c692c4afccc0e7caf7816e3c3f06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54742993c592146a64712ef3e99e0a7c7
SHA157d7cec0d17179192f1b42856a3ff63b9cc1bfe9
SHA256654e3f428dc07ed26d427e844e7dd0de74f73f01dcce2865b03dae6e19081e29
SHA5122104d973413bdb2528b6dca2b8614cf27633d92c31ada07fc438ce722b39378c6939415be738f4a5ae98fe61e3dd453ac6e283368e36916215a64b0e8c97af9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b