Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
eb621e6ef0e0d3da1cf86ea283f50fb9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb621e6ef0e0d3da1cf86ea283f50fb9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb621e6ef0e0d3da1cf86ea283f50fb9_JaffaCakes118.html
-
Size
53KB
-
MD5
eb621e6ef0e0d3da1cf86ea283f50fb9
-
SHA1
adf15105016fd5a51020e64f3149986d0d310619
-
SHA256
45d2b1fe6c04c51523d3568e50bee2d33b8005daf843ac831c85dff701f5a515
-
SHA512
a98ffabd58c3731368e1856f983c5e6535e817228bff4dd56bd95fd0099b29ac23d43aeada0c119555648c85bac3f36ce3386da13d917d53af50d230b78991f6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUZrunlYK63Nj+q5VyvR0w2AzTICbbsoL/t9M/dNwIUTDmD+:CkgUiIakTqGivi+PyUZrunlYK63Nj+qE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F82F10C1-7686-11EF-A0E3-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a75bd7930adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432912621" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000865be5ae6a0383eb5637cf39588ef7c4c64ac2ea2f38a585caaedd2ac0ee11c5000000000e8000000002000020000000291d5edac8b307d2e3a12190e2ca027c1d1b37bcc566ff047805af9dbe8433652000000088dd8c0d4e7d9380fa854ab4b56fc7ffbeb13f34d61ebd8ebc2b1a64e77c96fc400000002d1737032246af9293f373453a016b90504e5fcb6b57f852c9e91373e306e5f236a904e9db496e0739c02397d52105b9f6bdd8643425ad5bffe5907b1ae1b714 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb621e6ef0e0d3da1cf86ea283f50fb9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9d42b734eaf39c3f9abc719409060f
SHA1e2f9869d90fc823617eb1d5f7b09ba5e0985fd72
SHA25605e6d42282af7fa98fb62c9cf0b0d7702c4f379981a39146b60085dc6717fb35
SHA51201d39c7391f0dbac482c0c10a0340f49fc3b5449544e5c45344a8200cccdfaf7ef45d1ea12f7e94a510b73072b525936416eb173d26a06b7f2d3ad8adaf8e8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae479f5984d3e15d84415744d90e552
SHA11457202b4dc6547d348a00784e3f070458f72556
SHA256bcb3bdd7e3aba78b6ec333e29a44867a1fceb135d6c4d063abcb6c018f7cc2cc
SHA5120794965add471b23caa5a757a10726440cc014bb6160b1006ab75bc3ad7d340c6b71c0416f4f70422dea465690e55b1be36a3cba252efbb33d5a59de3c6cbb93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6710bb54237e450e3f496fb7e5bf91
SHA17e164fb2ced1c89e9c0be8f378bd726dcb68ca74
SHA25670d895c92a4ff1818bf6ee63767e7d8b206bf4700c078785a805393c282ff3ad
SHA5125c6956e3fdd7ced3a20b542e6e041a43c26dccc6ef5accb5dbcb89ed329ceafecf056b872b7be02ce26d678001cd0145ca58313b70f046083b0f1e0d69fb99f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aad84b098a97116f4ff038d1a6037e3
SHA18e2f6830294e934f951aba6eea19be7978ec3889
SHA256646a465a2827de54869f7ec1bf7620ae47125ed47719eb48d61731b5823b9573
SHA5129686848766f02e5be41456e13f0feb8aef74db102accff31d1dedd85250ff9af100f98e79d492b1a7be417f5516882e6c171cf59490b41aac5126813a2a33227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631951b444ebf76fb32e3a264127f9a9
SHA11cec5ab68b8920786d0f8221e82bb4cd90fe3c56
SHA256dc074e9f1350623719df46451bfe6fe790a5c5febde7fa24860ebf9bd814843e
SHA512fba976b238968328018d5b7f7ba1f47e001c7b95e14c63883a64a37d1aa1dc8e05cc96696f8a3052b9b41532aa5e723f8837fdc54f86c1dafbba68b71a420cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589cd48f28d57cb45d390a6681ca334c5
SHA15d3402261564db7e29b91dce9ec99410bd5485d9
SHA256d3be20390487146b899fc18ebe903baaa37404a6d9406ef60b8c7163a9dd6c77
SHA512bacc43f994eed4d6e6dd22c4005eea6c97d9aa28933b818f2bfa12261257597b6c3efe5c7a9c2970c88ddaf13eaecbca573574f123d75ee30df28090e2512854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440e960a826ebd2379fa1fc3ec6c7157
SHA1e6593025d499c05d8926cb4c4f177c71ee852579
SHA256691242036a0f4274d177a39797bdf7f27f4797a1771f7b5694560d962d42222d
SHA5129f54d626d721c1ecabc6e6e7f315d6cbb29d4dc6c11e1d6ce84214a2e4b7f423415177634d02786cd4137b846514ccf2f5976c7da1a32fb0eb5e9e63a173ddb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53330ad3e77541a4949ea5092612e3ea4
SHA1ca0c4d9c1d86a29e7238ca93633b2175d4242364
SHA256ad5ee34bb8a4ffa5645c1af6cd33e7ec8162733a2bdd41d16ca5c55bb12249dd
SHA5120cbbcba7c6714ed37f19c35a3aca39a8c8993c1d94e1bb4f3a750b4485c355e6c61a3d0a665d66f415e14e22c86320adc18027f38c21aefc159ba1f4fe186eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a8e818214d1dc8fce12cbf8cd099f2
SHA17182214497dae1aa07a359d1a3de2d9268028f16
SHA256f8b28893dea6bcb88153dd7acea93ec4119f3d75d86e81fb013c8b9bf6a94535
SHA512c1253c4716cbd976a3263dfc1039c21ed4d3767c460e062d4c1d263d10be041045b891e24d356d836280f3b1c45906b5a1adbf6843db079627b15fe04ff30019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e3ddabac89746a3d490b44c829ce19
SHA126e93c985b40de15ec73a8a7cbc0e9251da7d047
SHA256e677110cd268ba9c6af608f220623cd218d2a7b791595e111cfd49847bccab10
SHA5121f6efdf935728e84895ebf872d887684a14bebba072dcf227e24735a778f246561eb4f8b96d3de7860c64454f664300029643b4023f65365f9d324c1484bddb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82bf08fbf551081a699620c6691b6d3
SHA14e44b1b2712b7225ff11991b66283b52de7719c8
SHA2564e022f5bc30c4e1553da1976ddf951d6ee59b66583a86f10797c4fa8102714a6
SHA512bc3c5f05b06f2751c496137e6aab6595959341667ed67d2e71b91d33e86e6fd92f1c01a1a7daf333454b1364103253408522049b08f4b11c4b799076002330fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219e55463df6964ef07237d5622e02e8
SHA1465feb912ceb5d745f797f02376f412d7f10e71f
SHA25611aca6601205290d7e9472c589d26bce02f3e2d4f85791a50f0ea141733cfad0
SHA512734dba76257ec327d0e25c2862e1bf7c5bb59365718722242116cb2c3350ccdc99effbb867c1cebc656edd75b70e7f5af0b694a7963af9f7c0fb1bd5088bd834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508034c788fd182403622c311b5d6f96e
SHA11e0a530b40850c9c1e7e66523b8257f9256c0e4c
SHA2566f2ae944eebd36ff7e5a39ecd268eb8d429df0ba12c7ddbadc7e4fa0a3f51efe
SHA51262e1e60537b44a39a5282022954b22ee33883c6256593cf3e1d5d2c995c5f78bdd51f22cf8d0acbfd56d62176704443f9b4c7da193b4fd5ff0626d0a9356a7d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8075ab4b5ca2284a2c74a1a1bba933
SHA1dc14e6b8631e77ba7e80f545398611fb4ef28174
SHA25635488805b531b9a3fd3852ee60d00709e9269c4529ffdeabb14b8ebac4ae4b7d
SHA51214e592dc8d8f179ffc0fb40c4d383532b5cbf4f5691f82ef4c4d89736aacd68e03dc6f4cd7eab53f356ff079efe186bafbadb6c231e2d2dd9063025013318cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564bc51fefffc037e0da1a70de53f2247
SHA11782cc0197ddfde0338c578fdb215b00b1943ded
SHA2563b0f4540d941ce05c6058dd03d4b9b97af70ee075ba17659d1dbc677fc56b9ef
SHA512c3cca52a21432db0d9f6e1b1d02a9822354a5e44170a7623a5a6aeffeeead05fc8be7900f03946431880631317affc63e30e16b54f26201c6dfc3767a3e9f25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d0e8499c151fb5001ba6dfd47f90bb
SHA1966e19c76cb084e163d3616ded258ee8d7c10672
SHA2569bf27a3fbe815b89e6678584343619bb6ce9264c8d327f5d584b4d9861b4aca9
SHA5121a75cd7ba2703e245fb1f1f9152309e66ee23f809bc8c75bb2a530f1cae2a63df424f25e62b3208bfb1c5ea7c71544cee922333329b73ba6306731ccd2ba43b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583d3a0038acb300f4970e96f1f3e5767
SHA190c95e261387acfbb0c270196cad524fb5f6d451
SHA2569662510e63738cfdfd8597de6d1c2a907c593bac38514901f5c65ee3ac834f42
SHA51240b4c7607931fd409e6d2dfdb2706d4295e03abac5fe24a648de62a3d0cf196f5b3a30e2134b79e0bbdaff3323945e857b081b8b4a44209761b8a79e815571dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e62238fc9b276e022c4c9c21baa13f
SHA1aa7c39ed55ccc2dae300bfd7f039ddecdfa14f4b
SHA256d3bbc3da2dffd78b58ddd1b456505d2de7fdd5fdf49339baf2667bc815555d40
SHA512e0ba5956b83d189f6d89d58da6a191aab47ba6867436a18a51d613480bb6e376e9b0d5f8885ea27a26da4f5848422c5a43670543a2f52a6144532c38a2b1258c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b