Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
eb2a2a074295de59a0a68d773ede10b0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb2a2a074295de59a0a68d773ede10b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb2a2a074295de59a0a68d773ede10b0_JaffaCakes118.html
-
Size
49KB
-
MD5
eb2a2a074295de59a0a68d773ede10b0
-
SHA1
9047f613839e24409903085f0dd473205834bb10
-
SHA256
b805b7dcf57ca63c26230b8674e92669e1678e48907f5b325bbb64e003b730eb
-
SHA512
482be5f00551b18268b218833f5118af57dc1744d04dc5204c7260c831e9bd6e8f722e0d42d976c6925af109f494e899a4cfdf95be9f3a1f9099a9fd24fe260a
-
SSDEEP
1536:yVwmZjIhBEwwaaFFPPwwmmmmmmXfcTtOjtfP6oggE0IB42:yVDZpcZAP6oggpIB42
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E4263301-7673-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000ae2f5f1f0868e957e57bcec3ded83b80185d9b46b8a82eb8a776248d25f97514000000000e800000000200002000000065b18265d62dbe82abbb92e5d167a3d596ba812879d84b9d82c7480c0a86b157200000005a071e395fbd77bc42c706c9f9a7468ea781f220b4efddeb10bff7b37affa455400000005eedaa1303695bd68e749114c221c59510bcbef72743e79074da9e717ead4cca282e57c4fe8e161153d12570abd57352d2eb640c8e8b6da30f1fb105b3b840d1 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432904426" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bc16bc800adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2708 2088 iexplore.exe 30 PID 2088 wrote to memory of 2708 2088 iexplore.exe 30 PID 2088 wrote to memory of 2708 2088 iexplore.exe 30 PID 2088 wrote to memory of 2708 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb2a2a074295de59a0a68d773ede10b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7adbe024d8cd5f5f694310c39d93da
SHA1b8e72cba2d2a296f45c3b9f9ddbd60136bfd9bda
SHA2563c3d235759082d60149468c0a188d0e1804d5af0014221a76530f34de7dbb576
SHA512478acf253f7bd5a1525fd25e29177b8eb20d4006fe322ede866d00dfef5bee04b47a00b60039aef3add762a703a58e66f07739f3a59b221e63f52bf68160be34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517845038511dc7167a7b7c862cd6207d
SHA1d71f284250ef432054d06a2603668390c1b6b682
SHA2567a1d27934e7dbbcf624dc93ce6996bdca210e65efc4c0547ab7efbf9437940ab
SHA5120116a49fac8a0704fa031fa190f2d68a37fa62fb4765fde1a7d076a175c6f25eb160aa64023d01ab742a613c57427d05e889d443611b1ab777f885bac15e4ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a26adc7d35a82766d999f5bba56d64
SHA1210bd15d76ac0446f0e1993668209142286b4cb2
SHA25619523d314fe80bc1ac538e1b0b14c4990573d3cc05013f11530fd6cadddd1ef3
SHA5121e3fe91b0ca07ab91edc9cd7e5dce2bfc60ff2cc3cdfa399697e1688f7abaf47f45cc62732361eda830dc2401edfc05154416360b69c239f9540a7cd45fa4518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e02b9c11110014aed315561d563f3b
SHA10fc89d106dbffb0d916dcf0516011c9c91766909
SHA2566af187ee6c0d5f6d398d7292f824818aec54be8388f2adeecba715c209fedda0
SHA5124597a029a08c0a45047b949418597df09d33684cf6a54141f92612323c1d03f39b9d1e8af26b69b688423c1f5e1680d226dff180bf49c9899d18627881715ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea9ea8a39eafd29e9c7197ab308c2bc
SHA1b32f7f0915b11581409645a751bb9c628efc6526
SHA25639437fdbedbc58104a20f97c30412723140841228df0b061dadbe56b3b01fe11
SHA512797396fddfaab80c436deb366eab91275c26b30711eec489bf02bd44cdc5194a44b17bf9390b3b92520d153716a904fd1eb0b62d91fff504d1c6b169734200a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39ec63d4cef4fc53d4d25d7573a78f4
SHA12c5fbabf78b03811051550f96860cc2116e2c544
SHA2561e65e12e7413b28e9817c64406d78539a1c2d9722fd64baa65cbd769f8bb6933
SHA512dd0724a8a71434eda42aacf66fbc98e527e1a38f14ddaa688d53d35e465ed78001620524ebbf0736aef34f502e63e35cb917b1acb75f0850b4ba30695946c174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b5d0bbbcfb5f6ba2177d63c0089758
SHA125c49468e1081fda502856153744c82346e64391
SHA256e275b42b72ac6e21e209dd9f9b2a4529f729b88d50841fe5b4867967c27ba18a
SHA512dfc61466f8e5566eab33a77ca819924a7866a69e007cb26093ffde83503486b4894bea27d33b94fd18f8f98d7df722555d3e99ca6e560fcf201db867ce5137b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5db5f6a4602631e88ff12995e83c6a5
SHA1988b7323b5ac4d4a15de204b5d39aa2526c4e118
SHA256aa6e1b7681136994168940425c90a2b07b6402d3fe5f6ebe3d9fe981a1886b1e
SHA5125edbe1bcddb187e813bf794d2d41c1a1a0cea79aca319d5ae5043d4ddc1fb6e2dd867490aeac4e558d3e0ad78a8bfabd32bcf906287830490cb00bc52cb96967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6ef3408903c03bb1cc8026f3753b54
SHA12581379796c977f069a4f82bc5beaa16b7fa08d5
SHA256717974b819c82c640229692785ea01947ac041b3ea4d4f9be2c6d643547e2483
SHA512b02f076820ff37d701907c1ff6a9e862c7b746897068ef55cdb40b36e9bc550413b768cb11e5f0268b875f873223c9c4d196be0ce5f77ba17ff33595f35067a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101953a9a1eb4afe3592cac4a7c68f81
SHA13cad3ebffbe6a9deeaa68a00f4f0a95e3e35b39a
SHA256e1b6fc06dbd91544da55f94a81e8d71e22a3f8f5882d13ce85b1b890c5ad940f
SHA5127d5e603ee42ee01fe0a1aea3607b042a055560dcb8aa103cb36c7d1b72521449644445bf8df8de7d5d8918e5e0d0783004dba707560f5517e94c8ac0f868a788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a3d1d6789b5a7767e01f8d863bdfd1
SHA118367f0d5820c035d5b95378f1e4192fa249c85b
SHA256dfe92554ee7b7f77ba25cf278baa89f06115920252b149bc62286d6423eb468b
SHA5121522807b0624d1632278fcb2c57506ed59b2634d4557f03bb5585f58b247c46d7fd79c8240fa6889a99d37eed4681c6f4628535ed54337ed838e1cdd13be09d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e841b436f8670a186afc0763f6e2cc3
SHA15577fcacc83a708e02a9bc222e76a583f666a144
SHA256c804bdc172ee3a61d5ec9d3b2bea59efaaac2c20cca522fd231137e91c5704e6
SHA512d2b2b5085bd1921ac86c3a782e4424ef751a499931326a46f05f30b2c4a6763c9697de6fdd9d825004136e690e2a7188c1b472c6cf09057908f39bd658bbb5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c8aaacd666e155085fdb958fd5c03e
SHA1472880e45046027924d81f1ab3797b5f8d7d424c
SHA2560743d49cbb2ec344e12319b490c4dc83f97bf6deb291c06dcbd2305ff70037ae
SHA51222be0d6de2fa038fda0eff3895902bc8a08f8b93bbbb66859f7b461c2310481fd06e2e264c2e04fd5bbad9eb1475eba230f073f33adfa6333bade3d38f14d929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3136a68b3d955121161990aeb6a0245
SHA106a2b0973499d08be22f778042ba4ae17e7d3ff7
SHA256c59decccd24d8c85ab50bc5cdbadf2cebd76543b1b1673a99b5237d2c5486fab
SHA51285f3c37762be61966338e8e517af4e4f61a96d70413ff5c94d7717ea32d4beb7c3a58af9bcf45e178fba36e3986db1dca765756bb87b2ad74910ad4978403652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1d2326f0c1b351edd57c7f6194bb76
SHA1a47e8b0915dc47aaf2dd57d602ec28e103bc3049
SHA256c0ad06d3c39b72b7598bc636df09266ddfa70c2eba56d1592d4ea6bca73f47cf
SHA512af442abc6306fcf44855d25022ec41070774ea14c760d2996fd0fd9c77735740ec3ce56645a3db1defdd2f8038755316e34473a9fd2958f6acb57e469b409ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e00053669f2b0f3d1b18af42931f187
SHA1ef8ac548d19b134eaec717e9917b4dec4a9f5315
SHA256f66bb6f5e527ebe0aed16f184cadf82789af84c0079f208788a570a8767bdc7a
SHA512653d37449fab1a591b360aa28c0609340b2e5ff95e4d396671e627f02840575bfb43461c224d6ef65e28843676d8d768aa910a86a05a9a78436ba411b149a144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f33ae44982700a1c0afbae20a10bb7
SHA17cbf85ac9714c65d246773b7ea6bff9a3acc3f30
SHA256f87c9aac93449b4c69752f8b04dfc00f8143741b4a3818f6af6721f7b5be5be2
SHA51222c5547763d9e7ecb3351f6f4b2e8162e17c16f4d73a429fd68d183c0a502779cc58d984a9d4c7c88cadfb78b232afe40e5bd02365522d06d71d0e056c804999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57847269e7acabd281a3b3146d32fe133
SHA103f69a4698e69b5875f065a229b4c2c22d03aa16
SHA256c60f929236ed858394e6cdffcfaede4becf48a132ae9bf7e5b56e7d17dd93dcc
SHA51220caeeffcebb37bf963b94edd632bf50a127d0bbcac7a8e9afb81792fa87904d947e9ff768907934d37899147166831d7d6387a2b188c761cbcce99a3b7a3cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5058af483716e443d2fe78c8aa434e5db
SHA16292b327735c8b621212df894ebed1a423e8bbab
SHA2566953bfbddbee175cbc048624fcc92a359ce1a409ba30ca6f49a3140f78dc2579
SHA5127a6772d4c8714651743b534e8614a4a6eed02cbf9f250d4e0d1e4f8585117ab7003fb25a811798c47ac63b3d02b569871121294c0d27fabe924689a173fa495d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb292e112865c9f94c64090883bf2d2
SHA1d519605b34eec1a047d894a910a1f50681feb291
SHA256108ef08ba754b08726b91ef0832d12bfbda437eb41908c6e9d926c17ea50560a
SHA512d2ce28014fe0019a5db389e54951fecf02faf40b7cb09f363c4941b1c48d0b402c03463d4cd465a983b4c133f35b7a464441ff3ecd00adf3efa32ba7e682e607
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b