Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
eb46e357ea78299dc90ea5347bf5e091_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb46e357ea78299dc90ea5347bf5e091_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eb46e357ea78299dc90ea5347bf5e091_JaffaCakes118.html
-
Size
50KB
-
MD5
eb46e357ea78299dc90ea5347bf5e091
-
SHA1
76c5d2affed10a77fd4da0ea034a601e8aa827db
-
SHA256
d483561d534f0aee2c3465f3c295da3f962515025267036bbadfcfbcc537fea6
-
SHA512
5b92bbf51eae4f138f60abbc5bdfbd34bdf04ed29189e321830d2a63fc7cb9ba06134aaebc963fc02a76aba968f06998efadcf2b1f9a3b9f3615105233d7cb50
-
SSDEEP
384:ZsnmCdowo2XbNNzcCrWL7SRlqRvE3jgjE64+5eoYCeJCc9:ZImCdVpNNrumUR88jE64+5e6eJCc9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432908564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fd4da0ab6daca9cb0e76b80b846643cba52d29cee121726c11a3824e98b02fbf000000000e80000000020000200000009ed5acedf5cad45efb7a61551f4d28246af522567c854838f049d304919cc00b20000000414e285fe73ebde2c97219213dcef21bb3a1a875d6bd70317174dfb1d3879bc040000000484893743b5a57bf17e36278511ce9d43feede55cae1d4362e7317cc03a2b763e35f1d1568366800b79d8ddc90759fe9c9209bf558826510d699bceed564244b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8698E7A1-767D-11EF-A5E9-FE7389BE724D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0097f5658a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2188 2296 iexplore.exe 30 PID 2296 wrote to memory of 2188 2296 iexplore.exe 30 PID 2296 wrote to memory of 2188 2296 iexplore.exe 30 PID 2296 wrote to memory of 2188 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb46e357ea78299dc90ea5347bf5e091_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3df4aee16ac6c55bbcf981c619050c
SHA1a4cc57107ae94a5156b48e0f0f5bc487f1f3be1d
SHA25635cdc013ddaa4b3d927f5f0854db089178c539c42245b44cca327a181e5d1467
SHA512fd6a4ab15141b10e2607571418197f947882c8d52d9ea044de9274462623c2b79b6c62a970c93f6655a9ae6e06894fc3bccbf2b1fe0bce2082dc17fe13378b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407962a52985c00ed77a90c3439226b4
SHA1db87e1248c0db9a471d343015151fb5760ee88d3
SHA2560ec4cd747c5b6fa9b917f78b4b584fb92cbeb12f17277f261040479ec23713b8
SHA5121c8438567a80c6a14e4c4d8d65fb24000b0a8fd58758bb6f48ecb92b879f1193858f7b1a789c86fce0ac2d4492cf7808ab608c6550e591054853665632e40bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1b8dbaf3f7534d36c9724e31835c07
SHA19a972d68855378170bd54cf76c1fc88212e59405
SHA2569ed7460cc80247790f42c525b6a48786e35a1eb29017b4b8cb0f318baec5021f
SHA512e0ec5eb0ab5479a054d5da20311e3db091d536de9946cddf4adb14dbfe368a1e8c18c429c9d3b6a58d14988c08b19b983ca23762e26583977c260acebd8d3ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b958e7d466cad5871c3108d3b7692b
SHA16414679f1518ad8fa59608ef95e541f6e0d47cdf
SHA2567da206e975af018487750b999c210b958559d5b1f0bc61c468e3d40f68315a7a
SHA5122ee1b9e1f9ed58b906a69eb0e7f2742647a3f27098d4c94a223a35ad3595f7efb0db8c593dfb6717157be1dbd4a5fa3a28d7709792e79a6ade798a6de215ae87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397cacdd06e2b53e72d4e2dd1854ad80
SHA1262021504eceddb3bf25031df35307c98f35f176
SHA256bd341f178755b8bbcc8de7d68376e619b964927ade286e4e68ab2a32c65e670d
SHA5128cc044176510250211f04a969a4932ab367d488c30f5e4afd5d77e1890f82bce4081ec9b057552de8b6127eb923d80ed5e3638c60281d0cad2f989292edcb33c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3ccb5b1faf353674654b050566a976
SHA11673223ec86b25da00b48b70f72a639eb72cda65
SHA2566d45a245528851ab1135b27b447a71a7bfbbeb2b6f7480c45cd4bbaf9c59ed31
SHA512b4972faa4609b993d72ee74a228c1d98dcf0be86fbe3cca10ccde36fbdebc261c045019a1feb5bfb8ca8ce615d7fd7dcc0c0fd35d24a84338c3d43aaf189fcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583257de99ff8e196f4c2f45fef495950
SHA10260e4b480a9c7784190ccf62a8447de17c3b688
SHA256c1cf7bef5c36f0a9f7089bcce2e007bd6222e68493e0ac61ced52d541fde8f0c
SHA5126e2403aa4900b117b2fcccd4b3491d7ef0bf2fb53f886e4d45ba3a7306fd44fc4e95cc864a61989c2e5d4d2236f7d3bf474766669d55d5d1d94a19502cfb0f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534491e080e364d6bca812bbede387f2
SHA135f612a4f6e2b0768a535f74435ddf06dc0c813c
SHA256d90d5f3d703b6f406e7093cff9b7a27023e0a83519ca84f30c7fc22324364c79
SHA512bd92ef588c353ddac515a5c45842ed5b00b057a1c5b30534dcca2d0310e7747b84dbdaa86c626ec6908e1eab373942842086efef2b7b7c42c268c65fb138e47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596054550fa9f70e16b2d4d5ad7f5d6c0
SHA114d6f6832d245969b23e250f9f0cadb93d4743d8
SHA2562d4644d741d0cc6b27bd0ace780e74c7ad868bf56e5a93a8379643bed8362846
SHA5122edf4c4b36b795dd8d18f632b241e491afbd1c2aabe7d1c69d408579ef71780fdc98d5838d55ea2c3a793b1341c24786ee461f2a8cd38cc98fe62ce98bd7bdd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3012d03fac7eaa5f497883ada31b97e
SHA1b7d697fd212e90ab137ca03b25b79e2ca8b86932
SHA256170864bf6eafee7029045faa3f43c762cdccde9820cdb5e18b4380e4e8407b20
SHA512cb9fcaa974232afa106e62a59c5b0cab951d8ab498f235409773d10c5340a5ac0e9ec09cd323c61e94f25848a6358c895ee29ac63a4aa940e80ca2e2152e9e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515058ac66bc3fbeed87900df09db1f53
SHA124df219ef1f1ba2cf12533f1df327b16dcb77363
SHA2568706730d4372ff216c544576d69ec540d03630bcfdd4525df779ddb3acc6c621
SHA512e3216e77d7b6e77d58a62ee2623cb9bc64f8835c4713f74f59e4716ffdc5317eeae92d9d3649162125a59f0f456a11778e5fb441357ab55d47045f5baf26a1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db539df7679f41f3d5e2df107666777b
SHA1e9cbfa1c42171841cc35e8fd7279cd108a6b387f
SHA2567db0e45fd870528217e141f6b850981dd338d0e2cbf2857aa02ae097a8f98338
SHA51209fc362e41fcd3161beafe4c1c4e904fcca20ee8d81317c9480cce6511d7746221c4a442910dcfce0af076550bf314b2de48588fd420d7c79044e07174b6a675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842eccc7af9a20944717fef1a6d27a31
SHA1ded1dd8c24ecce2681c93b0243ac10f0d0820837
SHA2565617cee0ad121b14c9841e50cf0b5c75df15c6790017a15d7151953968ec267b
SHA512ae4f59bb27bb2038fc12958af804f4b8fc1acaf48c4f4d992d07a3c3db4e7e0fd95913dd735f290963a245b6bd415fd7deb1047876da43af43f7b8fe15a50189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f61b9512c4dde919a93702ba102755f
SHA124befc91b4d8c244118b3bffb1e34abcbe3180fc
SHA256e0fb73be0eb2de7f28b39f93e4ec1552bdfb10c3080b19aa8779aceeb57c68ab
SHA5128142b899dbe103ffa191ddf519b6af2d2a402bec23c432f65d6ff8592aac064ce591ee39a0b73edb0d0699b49b8fb493ef589abd2505decbb63e9403d7fe1eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c819c7d6fb68913f750aeca0a04fdf
SHA14ae988e123c255d0bf21c2a3863589add9b8d2f5
SHA256a1dfc6822e28eb00d2d35743e1b28632856b20790b206dfa30865506c24139c0
SHA512fb32587e019c48a756a75d1cecb8eaa296914f56d00285eba775ca372a23c05751243a58c2c5fdf7e1ccf81b9f2ed8c805f9c722d666ec99cd8374ba8234ba4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e80ca020c4c0aacd82fa76cbdf7a074
SHA1a59a9f2c2d46c4b033e2b05a91dfbdecb87e8f05
SHA256b528f978f8bfe5aedf0160b03a04ec2e66d7359723f9e0926083cf777b97113b
SHA512ed9ed33b266fef9b906639b95f0cb28b743b672471e00e524cb327a006dfc06d16173f1daf90d90ce20873dc391f47d8c823b6875e09e131ff264516a560ed62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3e8efa9a2f2b95844029b702ed346de
SHA178734f068aa87323c2f8ae47f92a9dc303001a9b
SHA256813ed6233ac8268f5b53325630032150e55373b3e714967c8efee2759cb74092
SHA51240da6b7c0b6c71478a9877016101bb62f89b9fa6548a66087e4a3ab3178b3e2187023e3d703e90f0e021fe131b6bbada0d24496ec727d85f49a1f4dcf23aac9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7d1d9f66843b6072c7dc98d4f3d912
SHA199df0dc533dee77aad7c11eb91c817e99f1c496e
SHA256ce282617dad0de4dbd044f64ad2c7d06d6de49d00205161d8edb13da701842c9
SHA512ba8637ca75b474e4d6b1f2b27bc7910e7ed959427806a42269d3f450f0f39e9671ea7aaa459c30e92fabe1852640a0a3aabd66fdb8f9722b4f4fdd1a383b58eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1eb9fb89afecfa6f88bf38b93ea985
SHA14f2b085b5a36fd32dd1494661a1727f56d3659b2
SHA256d8ab12420b3e3f26eeeb61437868b3167e3ae6f81f43209a22b5bd8f200bfc8b
SHA5123e953860429a72f8ef4ebaeac27790327482682889896ae5c6cc6324edf08b738a446eeda016c5dae2c224bc995df11d77b6d77777d81d4e768581d3f82b43e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b