Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
eb66a8007fc0e807564e1720aec079b6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb66a8007fc0e807564e1720aec079b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb66a8007fc0e807564e1720aec079b6_JaffaCakes118.html
-
Size
139KB
-
MD5
eb66a8007fc0e807564e1720aec079b6
-
SHA1
307d9980d0b8438732a171dac398261e65038c5e
-
SHA256
27e4a0ef3ca28fe17008249516a6f5c4efa4cdbb5a6aa916b96edd7dfae90bdb
-
SHA512
0246664892a3efce0b231e11c9e8d0fcfe6016bd2913f3fa5d875602ea287b5767e2079c564db1e80080008bda843c9ca33de5b56e9a9e7360eba4ae26f030b6
-
SSDEEP
1536:SwL7HgsQltjyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SwPCyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c4efb0950adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432913324" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000682414be402809682cca59c668cce593a78092a20008063da91b1a80ea5c4e0d000000000e8000000002000020000000d7182ecfb87c6716d157d31fa788ac1d1d06d6741249d9093141abfeb0b288b3200000000eec4e5f89de64bf9d6fd7d0cf16749bb148431580fa0d2b222a5beb38ac5dbb40000000b2122dac0e88eee4da94ddb6d2304f5ca4ef4dd5dc6af98fc176f0f6b8b6c5476f6f6f7386f7d200cde23c1823bc288eebb4b0a56577a333f03ca03ca70ed64b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9965E3A1-7688-11EF-9704-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb66a8007fc0e807564e1720aec079b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f765004198fce442d6700935a7e2c43
SHA169a2b6d8b3b1f18cbe9d2db53ee73bc6c5aac80d
SHA25695299e27bb6acac6848c52580a7044f1f31da5ec11cff3c923f690f5c1372fd2
SHA5122ffd2c239433a102f48bfbd83c87c98ce21860598e1f5dd14d18f8b594d4378536fb3b719fc52d32d0402c8b73ddceb9707b4275bafe2059a1c8dd2dde7fbb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3371718a0d111280663bdcfaed7dff5
SHA1ee0360927e41e587aaf8f642efc76392e38021ef
SHA2568b568c6850cca4353a7a6ddcc60c722bcbc39ca9e1fb6a2df40680b328156be2
SHA512b7a0c5071b771fe7a57a272e55061e524ea3b6df981b6385db3935d4b6c44f887fac12961ec3a663f37463f33fbb17bfae0f8eba8893801c6fb7bad5f2496c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc980aa53b9f8b4ff431feb5fef10459
SHA18755c69e691669511a82fc7249d96e65ac4b8859
SHA256b9c0d2d8912764247e09bc23288d11ec8103d67a429b5149ae73eff224cc24d5
SHA512efc4b4b61757ff734278acab13a9a8dbed21820fb05855cb26e73fd67f2e404fe63401185915473e37ad2d563691f5c74290927f95cca2468889080d9ea9a0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b26c2155cbb28e4fee2c14c515ffcd
SHA15be4d038625087aed62169778f47f8d5a64aaef0
SHA2567f0b9437bacca6b289bf8eca301de88474311c54192a846216032f6c62850c86
SHA512fb46515f0a9ebb8929dc5573095a5d6936d66714f88140e431d878fb31af95fce5122484bff7e387d08b54d70b2b6076f2795edea04c8246d0dd703c62b3a858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb52639df3b19aaa686e2aff6ea8b61d
SHA14733bb6f2a268a168d2a902cedc97cb0142030a3
SHA256538edf76ceab1ee53514dcca3fe9c88c6fd2c3d5c874dd4fc2a97397807e7a16
SHA512d35238ad42e4657349e3e9f3eb6d01b8d6d0ca45d829ac67de135f07406c130564980a6aec72f98e7d92fc6f787eeec6e5fb54e41a9ba1cd468488297674b365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6a68c8b8511abdb4d18d152adc0114
SHA1eb7109532d059779af6775723eda08aadf8e1c67
SHA25610386b1ee327a8464b6d066aeb93c608c06a63833d916b3bee541bf03702a448
SHA51276aa9f251a95c59ca1d90cd8d600d0b480dce9fdb42cca36792fff2ac9b3b8f17e952cf95ee89cfa4495a3d0baa1ed85a6acffe1e78406c8765813544905fee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9cfdbbe7ff77c702274a5dd9d6b658a
SHA16415c04ba2237c2ed5ed2accd06244141ffbb8a1
SHA2568d6c3ec26cc525b1add24c9046163c2c370a354f1961a94fbce79b50b591fb6a
SHA512a58e25521ea458d95e57a881ff5d4a957879befcdce0eaf2484444565d9aefa0d39bf150657aa0c73a6dccc663437f44be0d02c9d143eb5f1d8f24a2b2adea7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a842c7bfcd10d1f9a9f2f457d7910d9e
SHA1b3a7de309f28b857f87de81a0cce0c9a14f2ca15
SHA256f0d45e15ad5632b0ab3afbd716311feb366804f3c562355505f14ed4b63d62e9
SHA512e0f54a36292973c4730bd5497bf6b51585ca37af21c2f35b4d06346f3003e35881c1468b80cde5dd3b95103eb1203bdd78889c29e81a7ce73c50e0f8525b7c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7f984ae58a47f41491fb5899975090
SHA141da2f8e09d676824f91e179764743f90a48526e
SHA256c6791533308831f83dacc32203fa62d29b08c733c30c783034f22ed3f4c90fb7
SHA5123783e0e62b0ee49398080d1f441d099e6d1b2554d192bf9fbd9a8f75646fdea65a279729364f265dd1e5c568ccdeeb004b70620aa4cf3fdf4dffc74db7c51d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8d767ed948546e73469c5f0266db9a
SHA1dbfbaa4c1fff2d2cbb9799971660e4f2ddce5692
SHA256e35c68bf8d66daa703aa8d8f596857f26d70eb61deeac6d21e44472560b1e1f2
SHA512f323dbc2a534afca1219ec133dd59de6e1b8ae0c059bd4e8cf51b62d9cb4ea088f869510b44a80c4225e5c7295acd9605f0c869ec24c360918d9451d5265785f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1dfd963c89dc531832fb09c27aa6f5a
SHA124e42647b7f1e0def0ce18b3432dd7c6f4bf35d1
SHA2566f9b415b0a8227e0a96ab842244db955472b696aaa8bae0a18180a6dd9348b47
SHA5122da6cfa88a607487a86f8d267b7c1900b32e377d3d80cf59adad7e0ea1a9b7a5c49166df9c0ea82c603be469ae30a615bc6d5620771759f1d218c55129f9deee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf3f5ca659f23fe84b35c33a20e7000
SHA1c518e9542005f234bee12bc878fd16592a6afdfb
SHA256fbcbf2d17d6e1cfe442ff283d171f8b9455aa5ca0e4d3f3a5c6ab6aa3b2ead15
SHA512db29feda89e219c3ff2af007e62cede1b3fcf15dc4cf5a75cd797dfd71b259653f9611ea04fe6c60d97b70db4a07bffe65bf7f648dd29db06f058f96fd290c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae044104b5e651321455b8d8763795f6
SHA12e21a7e2956e4a56d9dce76709c5066956bd7ca8
SHA256cdc963f1b13317e80b24f861d2e134f4bb4a6fb6c7a38a4f004cca009958cae9
SHA512e5b766a56c040522d81b79a48ff14976b1b4f94aa9be4c212a2d07e9829e55afb70d734c6bca403997c13b9282123352fee315808350675ea2f1382d3c915543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ccb9d0b700dce494c28ce080299ec1
SHA131f809b8a8b370e3233ae0b9e15694af7c2e09c6
SHA2560ac07204fa6927c37046ca186fd3a0e209560791f1164f3c4dfb9ff403d7e6af
SHA512938cc5c69012408ec886546f1d107251dc3ec7b1899eca70d782ab8953db9330db24183ae27031ef269e9c977a324c2be27a339b0152005e95e35f8291b122c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf9dc067615939b6698bedec51f3f2f
SHA1529fd770363158f0a87ebaee4f329a2b8c678ca6
SHA25637f8914df5fae4f0c89b32b0975460f23c5e48d92a778ee778df2522e1c9d8cd
SHA5127af038b7743ba681e90470fb3ffcac7c7c042d47db301c3613bc3cab2224cd9d0519dede66e0cedceba560bfece6424db3dfc3acbf394a825d49f882d918fd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86544043aeddaa7d73ece72efe76f23
SHA1ab06bdcc686fcf986514f97eff2862fe64f1fab9
SHA25665192f38168685f39214e61c1a19557cdb9b1870c79b332428d7172d1b7c605c
SHA5122cd6f937cc617323d3e0ea4fb2a71f853585dcc77f01b7e02dddfd60441cbadc351223bd4fa4ed35e8316fc027b613ad6f8d38db48c4443ba3fe578cbdd28ded
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b