Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
eb4dde50021d5df862f49bbe4fbca7f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb4dde50021d5df862f49bbe4fbca7f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb4dde50021d5df862f49bbe4fbca7f1_JaffaCakes118.html
-
Size
460KB
-
MD5
eb4dde50021d5df862f49bbe4fbca7f1
-
SHA1
07d75e966f4714dae695c25b0e4f8b139d9ea4ef
-
SHA256
70fef1e172232ef356fd69b6ca71b1b964c0e9b56d43386ce7b8921def26138c
-
SHA512
7748df82da32b2bff35e9da723295980d3e90c4b7737a82b99720bbfb01a7de4d1154737fa918b0f649ff526951e14922b3f999cb49a711bcce271bf94a70074
-
SSDEEP
6144:SmsMYod+X3oI+YjsMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:b5d+X3F5d+X3B5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20613cba8c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d5da622f5d4a6ae313b4c80ef83f3928892c04fed5e238ffc25cb0d198df4f8c000000000e8000000002000020000000add6d2740b30b8fc9cba0f4306de2a552fa551ff6000e6ed588dd0483b86135620000000b71dd7575d8eba18e8546d28c8dc5937a7719c60d11b1278e2d613979367e7274000000024c71ee2145d4821cefdf8d3cfd1e79f5cb10a397610ff473b4b5fbb1da556936b39d034de82585a3ba7b7f938ef780000a0126c39862eb7f437c4aeebcf96b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432909576" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E097AF01-767F-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a029070c2c3ac56693d990940c938d68e481ce44af470a234ca14180e8f55902000000000e80000000020000200000006b8c2c2e1b873de7118777a1d656f9122ccf66f40dbf8d8a2f1eb98d003332f290000000dca0fe48f59f1d188eeb7071f159a4c7082c0520eb0638f1a72dc379f457bb5a70bde42c17e7ffa2f462b4fb9e338d1b283f75abc6d5cc70de6b8048f6997912fb64f40aa159805c51cbb1e9a4e453641ffc87ae4d73c8b166eb7f25f62d1c3651f097964bae47076ed399379dfdeee392cf9514bb72e8bef326a35c471013c46a6eee237242b3de4f470d227382fe21400000003c0eb4862ff31d46fe56cb77352a1b558112a2de6160c25365f22d7f2f4567112421d508e273747898f5826e058d389143bb8b0d51ef8983b68f7a7718e2f858 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1568 iexplore.exe 1568 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2064 1568 iexplore.exe 29 PID 1568 wrote to memory of 2064 1568 iexplore.exe 29 PID 1568 wrote to memory of 2064 1568 iexplore.exe 29 PID 1568 wrote to memory of 2064 1568 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb4dde50021d5df862f49bbe4fbca7f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85052c79bb49eda43f2ed797b320837
SHA1d34a6c1faabc9b7511f7656896a724fa18c059b8
SHA256b91dbcce573ca1e4a790dd41fa7ab37725498da7436535193f15d43e5f2f31c2
SHA512799456dae02f3fa0cc7e535b39cddf1986a3d4a70cb8faf5d08119a84e7037b432cfdc4668bd833a80424a4cf9cc47c78993cb4b801a3b496076fb338c2e457c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aef5bc7f123247be1e9b5c381b0fc35
SHA1614e53cf7faf8c81dbe4a10c13212a302280a9cb
SHA2566a36b2e0ddf59d592c432e843182258215d3318b00198b8972842fc7ab55b0b5
SHA51216adb3f330b8f247e1d7aa002f02ecb7eaf9395bd61ca2d68b5409ddfc6b65ddb5729668a222989e16ce10c0f3e675b747adca1be36e144889ac3ef6f060f2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa84b360be092a4239dea93adaa5e8e4
SHA19d68293f036b12c834ae15772b7dd498b83771d0
SHA256b767301e123caa9d653a0c2011b9c04737b4f61d56c607c65b2701af603ee0d1
SHA512885edc2390e848f631f37b852cbb76e291ecd969cb7f0d6d35f6773be9f13a3b11db5da17a9145cc1066971cb9307cc5b7e6d7da555a840e4db06c72c1e71eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bee25a9d8a656893d88e6374f870a7e
SHA1b79dee391e898741eb7644b3867bc8002a512dae
SHA256725ad53ee3b29f69ce1f659a8bcc16e54b15ecbda5a57cb6fa3cdc3daf7af72c
SHA512a9d7ce2619324354c3a9bd593a50e14983f981a6a19cabcdf528cdf0791f73a93a841dd4e08169ab6dc82a2f5716782989b90515e0cab32b31186eebab23b86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59654ad92e2148e8b984706584ec965e2
SHA15af2a937f5d178dabf24cc3ef2f74a19c87e29cb
SHA25653f681a7bb08f0d6161ffa3d0b5312f713c54695fd1a3c6c854e50beab23400a
SHA512d640570455773d4859e1640a2313e184ceb0db879b68a4134936007a0e130a6c5f5b502980ff599f74bf58bf7231d66f91042e58bc8a79bb0b735ae80f3cba12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a0c32692f9f9ff69269f5076604261
SHA1b725c9dbc5b01d03640276371fcbaa2221fd5658
SHA2564255053420e27a20c8846846a84d5f3af6a2250ab461f09b3186cf05b1b4a843
SHA51268a0ed3970f3bcb2a47ba49ae964c1a5d9d385b673d4db8286e1a815e9084b64f39762d5b5d8eb3f536cb3ee4ba826adb8b818b1f9645b8d366e75507b2eea15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b623fdbc5da38b69e811b956c4f7aea7
SHA1531828bad571937aedc6bfd21b1fbb5605507da5
SHA2565749ded9389b0fa9a83d011f31e54f3eecfa09b5546f0577fc894b3bcac6acc4
SHA512ea3a1733811208fdd1dfaaefe49fdee2212a0d769a2283d2b704e6a3da6a2888c0ba3f6b6a61ee72145d098ead72787f7d0d277d49b68694427047f044e47c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431a08a370f38e50ff2d63b59e54b248
SHA1db415f36bc2caca00e25dd9698df5cc91e9691f0
SHA25658350dce77e77a8b6866397f1c608a1c291f407fba417a756a21d294e2a7ab3b
SHA5125f5fb030c4292b3efe20f793a1a4032883f2d56c31495ea1af35ad6d87470a7678a8c0aa93d252f84bb8f720af4e12411191641bfd5ec659b3e9e1a9bd29bd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac02618a0147120fe90e18326157c02d
SHA15b23b7e6790147b3fa8557a5d1e3086deb4ee17a
SHA2562a95127d71f1af59ac0c42e7841c75d2955d31ba368c673623abcdc1e17c43e9
SHA51282d8bbce57f625b2570c2737e964da9c01169b206876a2b782c7eb489f941ccc49201b73ff0876e6c72069c6f92316f7b07039914d2c137f15b8862f3a40f1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573144e1aa988c88a2fa054b513d31603
SHA1227109772be8d2d91013be958c419de3a7b83f07
SHA256c89843054851f7998aa3737e752f2a5b2c415134956095a088ddacad7ee7da6a
SHA5129d0e1118c47c9a14987da9d82359f63c1514f673e19b65151bde65dd0128865e77cc87f047e4c6e059cfceaea9a1ae575b77e9454902247fe7b5ae090a37a395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58586f5a6594f6dbc122bd7c0a0f36b4e
SHA1aaef535b9eef8371845488fc8e668a6d32fe6258
SHA2565adf0c27862725d48e8c8c83960058ea9a9cb102645e73a84b0f80977f5231ff
SHA51218315ede820a45b7bb02dce6fdb0bbf4b6a532492a262453e11387b5da44f064ed8a2802d2e6fc3c45d5726d839ba89f29286c23217d0b7aa0b7d2875890c2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd2169af6782b15e72b44b4bdb600d7
SHA10f66940657bc26dde7bb0d53bee04f0caac4caf3
SHA256373196bc6a575784377e50be8f27b4527be23920621c5e5c4553b0f45d627100
SHA512495a5484067a3358f540b73bc1199f46d2683db0fdcb1dc7db9d69b31f8dbc62d005ac242f0e6a2b5e67e0dc7af9a0df2a7ffd242fb1ce2ec0ac74582c1728fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb51a3e470fa248f302904238b2a6726
SHA19d69bdacb0d57c30a19c0e4bd307577f8281fa58
SHA256c82e585742f39a479252df9bcb0c64c52410e1994f5a8fcb70ec4f56dd959c6f
SHA512ec82b022348e9f3bf939ac2ed9c2ad7ec9cd7562217fd130cd21b303f1177b608e8e0997ac8a8ea21eeb80e325ab1974d62f2d030daa99a92d05d16b74c52aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98fe0c28110a804d3276244d0c17c58
SHA19d5126979e19821ee119400ee441c82223a303a6
SHA25676ec599daeddb6aee22f30848fd938a11f0a8ef7643b059525cdf9aff10ee762
SHA512fa6b229a32b0f2eb773dd03974742eabf7843a294aed5f8b4b568dc189dce8df28c711c30d79650e7017ebf1dfb3dd664829a551c9395ddb1f86779e36f43588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab6257df5c0db1763a4aa8c2a4b952f
SHA1ce08ec78bd72cb4b5c573749857d43dc0898dd67
SHA2566056f7b6ae46ceb0eec935a47b1f46483e6d9cea70b69f733167ed580f00634f
SHA5125f16e0ee752364e421ac12cf524643c9312feeee85dc11b6dbe9afe31f4a5e488d1b14e740062d64503b51fdf2c60d60eec5f8968a4b0123cfb1aaa0b8244bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1646d07c7d1312662d6ebacd626f3b
SHA1285c6d9629853caa1af2e2e7a8ca10bac90c5af5
SHA256d0240712228fa7c5acb3a6cce612edbacde4eeefe92b38f6cea06f02b9bfe373
SHA51260b1bda4f366b0322464323a1645c0d95e3549661987f486b7515a66641a3e18b11685be58eb8409591450b69dbb37be750b76cedb37a73f1a647907d4242bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68b06044812338a4ca6cae08bebc673
SHA1885b840fb924f6085393f6972881d59723515c7e
SHA256e58dc4ab4fa3d6bbfbca0798284f8b84e50b2947a8fa0dfafa1f6303d0dab835
SHA512508b116c19ea0ead889d04e1940a850c21f39e352a48863a2c70887bfda3e65bc2423cadc0a7d68802ebaa81a69e78997a216f03cc5c63c45b3aad15e2d100f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62a6b0e0f18be412a861da218718586
SHA1dbfea2acf12080c6ce841a111bb48ab161814b32
SHA256d0a14169227c73b91b19fd3c69ca290ed2bb5bdea5d54886551f71d84e164e0c
SHA5129f3e5babb42956ed08ce68067ceb41fa1e85a2eea02a30e09876009c1dd7afe6f3fe60a60a9d4a84387026ede25e3406148bec7370ab80625a7ac44124e012f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b