Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
eb74184ed59696a9a13583f8c266e000_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb74184ed59696a9a13583f8c266e000_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb74184ed59696a9a13583f8c266e000_JaffaCakes118.html
-
Size
6KB
-
MD5
eb74184ed59696a9a13583f8c266e000
-
SHA1
18434caaeb3e9a48ff59df4bc2d5157efb606f3e
-
SHA256
eee72707aacd8e3d044eddc9f9eaf71da1cfa75b8ef472ab9c5ce8e01be2e81a
-
SHA512
79ab571b7c15ff7d93277dc6c65dab6124ec4673fef228a8533ef296e5a29ffcc2588c57e7bddeaef619f52817aec1490283baaf4488655761dad6ec24f67198
-
SSDEEP
96:uzVs+ux7yrLLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz7yrAYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432915267" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21543DD1-768D-11EF-AF94-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000003f55ed04ee3b63e57034febb81a2e682d47590fce49e2666cf03b72b82a8e870000000000e8000000002000020000000276739b764e6621fc47357e7ead4d1af7d6811b0a348d464a6ca9ab300b2a2d82000000036bf8e34f7b37240e9ddff97b4842ee8b039a4c5d39d591fefb2793bc2dc978f40000000851c57431a4b4ad2ad0a37863bac77fb00488eb6468843cf0ad9366d69ae3a1fb65b50441d594fb259daf4171e0d488f1136283070dc7f45a5919ed550f3f2d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d0f0f7990adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1996 1648 iexplore.exe 31 PID 1648 wrote to memory of 1996 1648 iexplore.exe 31 PID 1648 wrote to memory of 1996 1648 iexplore.exe 31 PID 1648 wrote to memory of 1996 1648 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb74184ed59696a9a13583f8c266e000_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780ddb161e093714121eb1cb03a0fcc9
SHA16171497907fe76a667ec98870cb138105dff25b3
SHA256efc09e09d9ea6547d1876a58b99744a112a3d212ac806aa64eee3c405d155c69
SHA512737a6682c5c296128840963dd32771f563f2a690280794a8a5aca513889fe7d0870ed83af7d1eb5989a8eca336700e860f720587d4d54472c6ec518946daf13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b620c6fe6a4ad3adc51421b3f26d66de
SHA1236e58d7a045b2672696a9c1add09856627def25
SHA25623e43c343f4738a2af16996150e9c4e98820ff5eda8c9e9707c4c54bd699e5b5
SHA512bbd72138bb5ba674188a0a00340182f0e38653c72c0ff260ba86fb25ea416b835d811ca97b906f20ab91b0fc206456b68c7ab7fdbf65e40fd50a66fc7fecc585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee627dcf6c9f1ea82afa827322d752ea
SHA1f8097715f6d0b88a21900c60cb7bbd92f324fd8c
SHA256f2ab53f4ba4d601dcde51be7b19a33097e354926c815188d2bd655f0ff1d0dde
SHA5122ddee0883c886adc484bacff15ac4125f7ec86a6f735fd62508e51f4bac98dcc29f5d847ecf2ad08b019a4ddaec477da1e16e1cf647574acc61e97606a0924c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3f46336191b7dbcb44e65e37559ea8
SHA1d4972701a2c691c426357e34edeb6e559dbb63f4
SHA25653e119383a33ddf0da9b888007dfd7a78177a229b1f2187964117e74ed8bbdca
SHA512583e64727b16f970fd8685dca2a73c392405c1b17d75e837041986cdeb12ebb945325e8889530e05a882410746c606f9d1139b87dd1e4cb505a96f4a14aa4b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa8e440dbfdbc8fb8d860b3b0b3a65a
SHA191c5b6580f04ea954b53f3e4d5090c38b346438d
SHA256ab722d3abafafb059f5f87132a435f9c8846c5d2a19f20cb2e92132e6dc13d45
SHA51226e94b9359a9dd28a49f6eafd6c6c48845306bd64ddd8e180f4a963b7f0478ed9f3cd66ceee94d277ca3cb3fba682b114042861c0be31dd4b82e74462dc3c508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2fffbea9074e39103b40709316f643
SHA19fe57a0406baf545a3ce42ee3f14e2ef8ce68ee3
SHA2560b1d80ed457b8945244e1fa7da0d07b1829552fc9ce68e7624699123cc15b6fa
SHA512004a245a6f210a04853d775d722e9891a31405a107a8aaa272546328b90aa6c602b8a9b7bf184d3ec88c33366374cb7ae9355a2aa4bdfd81833c52ab143a83b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3ab7caa97164024550d5b8c43de9b7
SHA10693b61ee5d701dda39560e2b4cfc2fb78afac29
SHA2567e4c6ff4721ff8942723b005f8427b3c360224e7f459590fb147af16440473cd
SHA5122b9d2e6494e9cb61131443ca545cc8f27cea875cd2d3c8eb30793b60fb0a56dc91078844369c3377016a93bddea62448bd4b82219a46d39835259c4053d3c077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6655905da75027c25d4423092c3f7b8
SHA1082dc7649b08f6443132cee28b4ec2c74bed6da7
SHA25649552ac50c0dc76004a25361b8ddcb5a40372f5e458b62c159361d9800900047
SHA5127bebb67974dfaf6663365cbab79f91ec682631f326d3424f6e7ae211ca1887a6d2431138097432d31ef135583851ffd79dea426952a9e51f42c76b4895f9ddfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50135054fe418922cedd0dc6f1b1c384c
SHA1ee1e296a4a8e4c891a5e59072530f6bb242e00ab
SHA256760b560f99d1dca36d995ef8d550028f9d0b32a9e77fdaefc674c83df4af20e7
SHA5124b6947945f7145cd3402a4b01817587f556cf5c3b847fed3b648842d002b103f0f6b6ba26fa73d6246ed637d48ac9a65334390ed34d712896966e1f613cd1d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024c99908b79d64845a3bd48bffc8583
SHA12611203d6f2ad8a49d3ead688c9dd2eea007307c
SHA256db1aee218b9c02712f7a5633c1cc8a0691f25c610a5f00b362ef8a97fc142d88
SHA512b7d033c12b3078496e9909644a31dbfe56dccf89d6090a0a7423285f16ebb412d0f1c065ebf01fc3e59287ed88f465af36e4689e73c2e2f06ed36d5bfb18a158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6c56413a855cccee9235e4d9f48a0b
SHA17dda4e053cfcdc38057ef7ff38727ebd6de58ecd
SHA256a52d6ea11ba571ae10b701242eb8912b2180480ff199dbcdb10294423f0584b3
SHA512122970674424336183111f4b6ff8c45ebc99eb732c1ed99bc83979d54e0240fc33e04b18739fff0fa2cdf5c8807525f189eae6678e40625a39a48185767b19aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7beb640858cdbbe64c0786d9d00f131
SHA161618e25a04ddc1dbd3f299759b1b5401761b5e5
SHA256c6df65877bfff87e3c5e399a13ebbe0c0bb04532ea04650bc4cb2aa4a4f7eff3
SHA512af2ba838b101031ac6d77a7182f8e1a8538142c6036a01a03b5ace89d33e4c39320b4e180793ac014b28fc1c210e4a991c10dcb418a2bb44c9939c7d110fd73c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b6f121bc678e4fff6de5cc081a928b
SHA1bfa0fc272880725c900ebe074523876e66bcb4e7
SHA256d525d7795fc35bec3af13eb413e91d2ee98ef971a1174e7d9ac2c873cfe8ea07
SHA51233f1c4114fe08fd4a2ec3c94cf9c5605f8562872e46ea4457095fdb3de48e6a69fafac445b67008162025c25924242814504006060887aa404cdc82c21ae9276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51497f056b9ce6b282e917debf4d7797e
SHA1d2906abe513ed787f559e13b3d6388d8e9431a20
SHA25666fc72b1c16617df0976e1dd559a80af2ea23074f1f1ed0fc533597204846c7b
SHA51299ac1bf248cd87967c87c9385eb19de95a5217cddf67f3f2adaa516d14626bbeb7e10a182cf2a508d71db3599f5f4eedee125f2061fe6944fb333a5f04fc8084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e2da972139240548330986a07f8193
SHA1d7ea1e5aceb9813159a8be1b2782e1e7ed0e7e52
SHA2567af5accaa3aee7cabd8315814114936bd2b6f46ec9e469128423d4d0c03f3a37
SHA5121911f803af79fa27cf1ba0848c6829cef9db57fd228a2ddc601c7ea8b67ed76b095f43859a4b7713499f987dfdadb47c571fddfa67105ae0fcf37b210463b24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3862e6ee535417eb933aef19019ad5
SHA13448bb8a65c6100820b7473cd9829c0f708d6d6d
SHA256ef2f0a5c145ea268166f76e8c938a38cc48c7f49093fae21cd0237fa0a8d65d7
SHA5127cf5f051926ee54cccdbb99ef9d26441aeb347ea7f1e79213b0724a30675d6b3e37289c0f16fa75a4651409c234142c5eb370abdfe53f4609e27002e54b4dfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e370aa917b1b26da238ca67291bad722
SHA114b9032edd55fb61aafad7f8c90f687639e6b168
SHA256dd82c9e1dd081b490705f3fd5f80fa6724e4079aec4d82435b9f92278b1c9865
SHA51234eb039ad9e283349f348db91dbdc0f51e0d16db1e6cb4f1d5da57e4a1296afbc2639a8af5633b978d57e824f33f2c665914eb95f318c83c05a3f3bd4c9d8e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec1dc0e619a7af4226d0cc0546ebc51
SHA1d71e3ee13ea380abca724bc04f75b753b2046203
SHA256a8702320beeb925c7b60c34b19dfe2038e48ad701c0d055b0792d5d692cee4d0
SHA512629a10de87c9dac287ac0404199ab58e4b22d55099ac8afa0a6b0686c5313ec55d40711416a1b38f491677e707e2d652984b505ba4e6d242871b0c7ddae14065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acbe4ef52e961a4097eba790b34ff47
SHA1e298ae129b5dfcd27d30136611257995e575d894
SHA2567416e8031bbacdef4236ccdb1995ad582ff1b9aed6b4299ce95c3bf3d7352908
SHA51270fa3d5a2c56bd6fe2b151da267f1098c7d593f5605221525a9176377afcfe0b487c0a75c3773ea66362d28d82c9e022168b117e7edb10f83240e30af6a5d002
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b