Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
eb76ee31142be476623bae7c7232722a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb76ee31142be476623bae7c7232722a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb76ee31142be476623bae7c7232722a_JaffaCakes118.html
-
Size
3KB
-
MD5
eb76ee31142be476623bae7c7232722a
-
SHA1
2da9e8b1055811595a250204323e01b48e106fb9
-
SHA256
49309e528923085c4709a6312f7fe76830085890ded11e4ac97db4503be69913
-
SHA512
be85d68c1673ccf1921bba8e8628fd4e9f3c76db86f111e3c28e4ef98e2094885d49a3e1a63581c2d7dbde81ea8c1d46070d7e873c87aea4bd1b119a85c4d907
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04FCBA81-768E-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000004f7de0feffd9dd9fa65a944affe1282d0aa5e2c302ecf181a128d11a12e27ce000000000e800000000200002000000051e38ab8426cb9a323a403edffa3fa0badabc8619b92229372a95772c1b273702000000055c7d5249b995751ae8c56040ec21abc67f63362205d5c5c9bd3b0b5ff76af28400000003c15fa311a08172c69e6501d391c3407f02dbab82b01e3ed8267e3a8f19f8bfddd01224736e02e92278884b02014ff2486d88b81ac8bb2564ff4d0e482e38a37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b5cedb9a0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432915648" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3064 3052 iexplore.exe 30 PID 3052 wrote to memory of 3064 3052 iexplore.exe 30 PID 3052 wrote to memory of 3064 3052 iexplore.exe 30 PID 3052 wrote to memory of 3064 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb76ee31142be476623bae7c7232722a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852b5cf14eb3e45207c0d3077fca040a
SHA185264e8e4bfba286284a7916f58c1c2960e96182
SHA2569bed1a7cd7403466c1e9a7e985205e8a2ca6768e668660f7d9ee2c69a2963fb5
SHA512ec0372c744c34156006cc969b71849db3993adea5ab7d15b81dd999ebd04db9be9680431838fcce68f74b979a196de74bef4ab3860d949e1ab4376ac18398509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f6b04b48c32dc0fd2e17e2100137b6
SHA121b04656ac71c3c8e41b0e6ebdb9396f290fd915
SHA256e4d86de1422060d3d6a8ce54430b72c51ff40943b5eb5bb7b25da17804023e0a
SHA5126abbbb7ee3511d7bb8814c241d0526768a64f217aed26497fc0251343171062a8f80b7c91deffa9d1838347ac0b507668b220614afe6f02f14a6e181093fd9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084e6f050222d9055d8cd62e180b6c55
SHA1d01a06c755e67828711632393487d0a3dad2ee0f
SHA25613853d7509b01483012624817148d016136bf2870dcdcbfd0e31fcacad6bf7a4
SHA5127c43b029dbd9753cb086f03d38e56255ed6f19b0e837f34fcf67b57e3f74043e2238dc48d13a0ec0876f41721874c52d2e13f543eefd0eeb091657004a0c89cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7832e7d95768f2309f0523f19953f4
SHA10a224fdce6518250ba5501cbd5fac522e18e4cfc
SHA256a7cf1a723d30525f028b23bb0173f3bce0df7767d37817e20bc7c14450021d5d
SHA5120b7ba490db371c164001982ad9a9781b79ac71b0bc9fac20cc720802ecdcd0ccf9127d1ccde1f003be2d7c8ef5ef986f05cf158a8ec1b0be410627445a62bc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554024d1ea7b49ac7ed4bed43ba2350a1
SHA1bc912867f2460a4e18b60b613542d7cadb1ce98a
SHA25623bf6a8a0c0c1b3bbc63036acfeda25c682d58704342f26a3108e8dfefb132d1
SHA5128bbc891efbf0697df1900cd2ad582e9a9bd8b91333a8abdab40674aa391b1a592d4b0bc036acd3ee28db7fc8e2541635a0c17646249ac84ff4f7a9016efccbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0beee867f7594a5e0c440a3ab82d59
SHA14580c0db9d4d7412e3b36ef447607c18bda870b4
SHA256cf5053137975ed5f2cd9947831b0762d951464e2831d4ce04643ecff36db212b
SHA512132d275572a1e9905ab547a14a76bf7769094eb8d566ece4e62a8ba260cdbef106f6a83c75ff25b732eff340ee46101715d00ec8b8414b202e9c22d98516d5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5939881d6ba0f694895ac9ec5e45ca61d
SHA1907702a0779600dfc457ada8ac0cbaf7553fd0d3
SHA2562f3f54b37665d77459d9f717168498754314a581bbf48a5b96ffe52a26fb5f7a
SHA512d10ede65e5bd13491dc7f48689578b44e9316bc2b5e4b9d2a47972c36c4be8d02aea393f731b1d3c2f8ce356ab2eb4da692e6ded1c8f068af79afdc4375ec587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b28ec228961d2aa6f22c4e01d08e48
SHA1108d0a72ae4aac8ccd2eb089bf640a9b39353121
SHA256e912fe8a10e1326f31e4a1cdc3c22fb1f91726ca5f4a1fa12fe0bbb7c6110a51
SHA512c57d374aac9ea1120a1c13592f39c473145793a52fc0036e0029e358fd9716ece5f212e818948500f8960b1d2a3e4f3f67a978b1a200ca36dc8015f973ff3643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0355f25a9722d9e311810f3b6a69ff
SHA1f8c32c9b19123993489ecec781efb2c9b2215873
SHA256f74f64baf8b2ffae5f7d7e7526d8cfee8d0e7e52446e3b8f7e66a3f824f44e4a
SHA512c3f0c9d9d7fbc09abbe04e710adc1b5d77ac1e638ad1cb189fcd18c999ce60b417c253a2bb2b1ac13921fcf750165c0e3ae7b4bcbc6d21a58e1ba24f1d87e9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2dc11d263bfa7f42c28dc83df2efe7b
SHA1ba6b6d6c61cf004d5ec18b70e93c9b9d65dc977a
SHA25691303c736ec7c2e90a65b7c1c03f715e09bb7ca370796d12ddf3c3cb6b55dc90
SHA5121ff06dbdb25243eddf9fa73476758cb8fa74b012ff350bbf93b255f7f9e7eec5d900e5a1338fae7fcbd51174b2e6a0814ae7dd4c96d1142a8dcd7a10976dff66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c59097e4cd802254f07acdfade75e1
SHA18b9232a7656efadeec6bd897d5aaf711746fb3b7
SHA25602663c9b9275c07c83a976f0407fec02431d7f4797c04e56954f2f0de2285ffe
SHA5128407dd3b390c2beeebcf869146c5c4ce28c2e88c2a6b1336ba93e2e575e20674c8252155d71073592f8dd034f186f0631a52c1f4f5685d78b425918c73ad8888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0282ed78996fe86dcbdf2e428280f28
SHA1e1c52bc03333293a592a91ec0bacce547e8ee227
SHA256d300ea6ac5d062cf1326ebf43a2071ac067945bdc0335202a21545b64334937c
SHA512ac8bf91673d232f502bad04fa41297af3214044d63af9fa6a2d2d10826283f809c1a764e3a261c5d3fe5fc7eeb2b500dba5d78cde4791fa6d067d161f6b7847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56651ffd01af67d5164ca1d2a6763d805
SHA1ae158e6b4b3b79591e869df23f0fddb2d4be4b1e
SHA25656ea5d4674fa6e0bb1f50d2f7cc2bc94807cef444b1baf695c6066fcdc9f7ce7
SHA512f1cd2f446b49d782f5a9630f3b2e1522c8b3fad7d3bcd37510dbca31d7e00919df592dcfc407c2490777cdd5aebd4e0bf7117c26c903d76d5d7d85bc6663cbfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c17f06a437e631969b31d869997d75
SHA1ecbf38842c6d55241a4e86eab8916907a8bafbcc
SHA256563b72719867d53273a26c44fb967b6602fd782a1c4c9ff636d4309785f6ec50
SHA51283d3ed5e3a29db367d7ef351f94a5f63481251bc5932572ef1914ab0fdf065d61960aa2f1bf7ea321c13fc8b14b93e560f5643166c89e4b1cdf7c92ad20d40b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a87b200d9f1727501ec7cfa6ab76551
SHA1b19e4ef15d71c28b73ade91ebb08d9e671656a14
SHA256a78728868f70d06c6654d01b306bc8e967a410edb2475f2ed5d69b85474ee6b4
SHA512e2fedffad07865b3ad8d10c3f38ccde23a588993bcae44d144ae7038bb8e4f418bdf922824521a1562174688204a342c676c8634a7758e22c67fd403cfc67ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a009c79a9e74c420f50c713cb1336a1
SHA105281fd1c8d09c70f05db7c2cf326bd232f4d1a8
SHA2561c9f19ff96243a5f97b6c80ed3ba3f897d4fd258fa6a9c277d8a8ce35dc093ea
SHA512f907042eea10ea4946a198c0431ef7c896728d3646347357dc2acdec74bb1203e29369cbd3c73cf4e52e4627d597b6c5425ea978edbe7c22377d17de3a53bb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c705cdf3474a3753fb57fa199290cfd
SHA1dbb535802a98f87e8b0ac6da7bd1e83f950bd2ea
SHA25652f986933d4d2b5f56605408c8c10fe764ac1c5004c9639685967aa4c8c8e49d
SHA512fa118d8271e0a657f11049eb07592e32756f476ea424d045a1a6304a05f4f1a0541586774005ec5405dea631b52e516ab6b58f6ce6a91eb6bf6020e374145fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4305d4ad5cba5650c9435d234cda365
SHA17df484b859f730cd2c8f9fcf38e26c65694418cf
SHA256d40a53b3067dc603e8687535476467ce17be4f0840381c6feb99bf982c615f77
SHA512408369e72e26c8420e3330497b84793990014b70f65fb8712003cbffd4b23ddd012c00fe1b505817b6dc255903f6a73329c5009eb386e623f0d5126bb1710b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde6ded60e409e4ffcf612940bcd452f
SHA1d8c50bf1d0cc6d4dae4fc41e04fc3011dc8d1370
SHA25603b1b3ba81399de3ddc844d4cee2c98b2ed8ff6d2fc1c0e674a8ee12e719d974
SHA5124776e2703801684d9c0b274937d86c3b7807c55c641d4b90526b6cd9956d2797431cbce75f6435cb050f41699186bdb707c521e9e7ff9cd3e554166694c19abe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b