Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
eb728c99dd36f53d852f681d4f3c3086_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb728c99dd36f53d852f681d4f3c3086_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb728c99dd36f53d852f681d4f3c3086_JaffaCakes118.html
-
Size
35KB
-
MD5
eb728c99dd36f53d852f681d4f3c3086
-
SHA1
811728697fd7d71f522dd76b47f88db4157d519d
-
SHA256
381e2c1abc6352f64e986b0fe80215d6a337be5b208103da5fd6efddf32a9b89
-
SHA512
f0ea45bb94845eb7aa6e6c5956d8c59202d1e4d5ddc01ec105a4f961ed7fa906125d38c33b7522819be35de66ff04ae83dc58add9c33e263c9f8e0bceadf6c06
-
SSDEEP
768:4zr02ICmC3C3C3C3C6C6C6C6CCCCCCCCCyCyCUCUCuzbOsYz9r7/FYbZzSP8AJPK:4zr0LNEEEEnnnnJJJJvvNNj6Rz9r7/a3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98CB44E1-768C-11EF-AB29-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109a1a6f990adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b1188a092874da15e4fb5696faffac7b638af846de3a53b229019de71519f642000000000e8000000002000020000000a9ca692d72509710cd24b01503986494ceb21dbe8533e09de2f10270e54c017d20000000a40dce5c99f6094de50acfbbab1b7e3f83d41cf7decf32239d743886b3a80cc5400000006d091727f973811352c55b73edc6a1398766a25dcc2a6d76fa23106268cbd2ba075b32133255ad75c6ead424ec8bce813a627d0dec9bc84768a8aa9866a20e1c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432915038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000072d92e74123be919cf99b24130abb1f3246254d865a19626d5c190244e44e0a9000000000e8000000002000020000000b95ae428fe2394c988b99adf9e2af625232f324e34742a55f15381ee5475f31f90000000ac0d61220188d3feb160b1b1fe6d9624e59e96c78a02b61c774de9f676066985f6249bbb7fca36908d17718dd1cc9911cdd1b1f7a06693bb34861dba1029a6704484e59e9caf2f235b9e8794ce26f141ece0b9d1efee18a8bdd82ad2507e45ee44cb7c7d37058bd0500e0e3398fa8e03cb93c6d6150bcc6d18068e9edf59afa23029c2224c8bde8232cc1623c7efc2b540000000f78a05e2097343c489cd4e566272d549fc37103f1fea838c040eb54f4445b8f86df548f731ec1fb86c1f5d8f6cbe1e7a2fc61d7493697b6931a9c67319b0251f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2636 1680 iexplore.exe 30 PID 1680 wrote to memory of 2636 1680 iexplore.exe 30 PID 1680 wrote to memory of 2636 1680 iexplore.exe 30 PID 1680 wrote to memory of 2636 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb728c99dd36f53d852f681d4f3c3086_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c852084c0784f5013f2bc40346c851
SHA18d7e345c0b01c6b40bcfcdae3ce0a355ad6c76ce
SHA25604d80940144eb94f853360878ca529776fff0da0c145c4ff9c1399a86a8a45d5
SHA51217cdebb1b247cea6e49a9c0d95bc5bbd779ad64c146caa55d10ff25e7f851a506169da922875fbab2e85287ba8a127e59b66afecf7f9e05095fa473978fbc5e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e00e34c47276ededb24ead20cae333c
SHA10a4065a01b4379ad4cccfc4b6ca8e4cec11a5ee0
SHA256ee15c7e562f35777d44fad8e8d7df0dcfde5e842f710fb7d363d170ffe0914ae
SHA512b48ed97d6f1bf4cd0eff79bb3a02197b38f19e0ea2aec6f0f2dc9e134b7bcbc9374cd6c02d7be34e880708dd02885c99399db187abcde88ad5bd91a11fab279d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b441afe0fe0c691b7002b9f2730995f
SHA1f8c4ceb7ee0bd291ea450ecba40aed3a5b06e1e2
SHA2560470bb3c52153f0b8f3e600b4e8050ba14750148aeb007cea55291c8005ab3f0
SHA512253f3420fdbd7d387c8a02bdbbba7b8865b1b8cb3c844aacab8158bdcb6b29d60763a49da4726fe92ced0df09ff8a18a7881421cf08724cc8447a1ce6b05439b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280b0ac3ea4f7c98edb337dffb05acc2
SHA15328aed6477aacfd6975b84ba8f7dc47ff642e84
SHA25634bb8ad1c510f387eab129a8a80a4f4e5430a84a25ecd21d889d4e60afa651e0
SHA512685388f4d4b90e95a88bb8d5ce23b0b37f76caee6670ce31995701aff4c12c7e3ef5ee3dd641f2ab3b17f77d47ed3cb605a138050125bd8e1dbb4f3a311cde0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b455b81b3b9e343c4aeebb231a87617c
SHA1d5b61fec55801d4ca8e620183ff2af4561ad87c3
SHA256636da241eed2e059683f484a7436cc5386c5032b8239c31a9c514f25ff5a548a
SHA5126fc3bd56bfdc175491b91a77e0afae077b04c957ff758f9eb43af725d571da4f9005ec8cb4bb444db80e25d07dc958c78a3e3b4e1360b3d7d5cf28bf6fd64486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e163971a8afb6a06b77ef4695c5a50
SHA1e0f52520fee5af88908c72c06a9ddd7eb0e15a8c
SHA256fc53bc413bc03e7badeb5dd4abc2f29459c91884b9bbc55257e6cf3be16b3d77
SHA5120d586939a29e44680465d1a79d6c391331029c2d52fd3c52c8c2f81531ea637028f70ab147bfbe87c5f0fe8d7ec5e29a8cfe9ce9cee67f03ec087e7cee83ba2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e4411a922c5f0a2dcf4ebed1c4d7b1
SHA149a11737541b02cc48d715410a9771883982229d
SHA25629a9471b6f46cbea5a8bee9f4a071937e3255812724f2bbfd94d829db0b5d9cf
SHA512cc4a9319ce6739a6fceff31a41a5d4c8f8987fc13046af687bf234532b626e8c4652ccc6c6c695531b7eba1e8ff361e44d7de9b2b3b206ea66cd3e298a510d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574eae498e0687582fffc557140a7c0f9
SHA12cd810f5f2067f02583a8aa3ef749024bb5ecdb4
SHA256cbe50a18cbf27d2a6e6e7dce5a3bb240736b6774d34cef348f60b662410d1857
SHA5124e8be1f03b5de16538a0eef52c95c0680deed152bcf0be1cba40edab7f8bacb61d3f860737f8cde5647c4e38a598dd9b354ec63e385d03c8f360a97a2d02bee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704433cef29cd2ba18a6bcacd60d6c80
SHA1c93c08967a10854b5df7ff5b895105d2e8eb56d8
SHA2565b515d56721863d0be5a7d253945e7bda67f8b5829f3f62e4d907e506e76b666
SHA5126a1c39f9b0f92bd3039ac7e12a0af20124a05b11478cb8d135f7158897fba31f2fba6a65aad80fcb797c52c63320a7e541f99d3fdd5f254469e3ea976ebe9796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394d25f1aa6a174b017faa57a8e4143d
SHA1a8839a936448e0031abf2a1e891ceca085030ab7
SHA2568e961d5e9ebd98de654f62827ad385be3448fe500e39417c3daf766f7c6f5e0e
SHA5121cfbf7d5fd0882f790ad4323f2864f456f781d9001db32b7a9e98df6d392c118237ad8ef1abdd8969a0f8279def66bf10e65b887be1dcd37896c9eeefdef3ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b08015876a3c362bb20c7c87afcc9d3
SHA1474983e059e9722db064c82caeddbfb005d5a042
SHA2562080d1c7e1430f34ad4c35c42251411eb021b6fffeb6e2b2f2c7d61cd07a5068
SHA51228243816dea3932d7a9602fff449c39b02047ff312aa193d486f2240e3399919f953690da08ea5fd5cfb7dae4d5428348a7a1f29aa46e03b17270b93b2f8a7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b1cb50a9c51c0d5d87144bd2ce5235
SHA1ebb838ed7b6a7a32c5a838c3510e807ed63f242c
SHA256a2d7ddd202c2cef03e2b5fff7087c5edb99e85c9baf3c486d9967b16fcc0e77b
SHA51272f4cd993cc427ba50fd25d5d5a743ec80abb8f37066be401eea2e751f073bb155c2a13ae26104c7c823a72b07657038d2b4d26030117bb4bd29fe9886c599d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e2aab42b82fd226fa47f485ec0ca60
SHA1f0ea32ab50014b0e43af865eaaa079004d63ccc2
SHA25631b267ded68fca1ca8bfd6cf26b2e86aabfa07bd5848b13f3d3d13a1c970181b
SHA512cd872a9bca36652265b46040c734a8c41b3564be51b1428b85e646bde905cb9f0d84537facd9a395db06138f1fe18c21602f61356030836d2ea1fce9a98206a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be2d2838bd01dfe6d1d2afb36d443fd
SHA1142fe9872514d1e8d888a22cb7d80e81bba97acb
SHA2565b59ed47c620f474560c1e8bbcaddf295eb2cdcdb3f04973374e828828e45124
SHA5126bcb1a0087a4760e95a969508bdf22e652f87c9cb8a9d6a161bd1a7e2d0cdaf7ccd93f1422d2ae06ce266b73a85126d34c49bcbf526e1b1bfc21696fe0aa1149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dabf73cdf16ab366a7c0b7136965c25
SHA1cbfa05fa7ae35f10d1668271876e16b367561a60
SHA256f0acb30a8bfdb81217b0d25c67e619ae9b6a0bc1f54c7d07a94cadbde371b54b
SHA512cb970d3ba066c3d190cc0849d2c69b84444ee10c0f2eb48abb0e3bc3ddedfea316ac264d6216bb3ffa888babd5b7bf3a888f1cbb3962554bc9fc5758c3c9cfd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6a371ba1c2713bd6e9dca56f30950b
SHA1bfe2c30c81f49bf0e62764c455d99e062664408c
SHA256964a450ee534bb99995055babfb49595005a0fd8c58a5184ae16ac96620165c3
SHA51237f66b8eb1b8b038ae167677c4591535a0a85d465d1f249f2ce705264499fa93a69598808b42c9684dccddf3d66df3b1377759931e3f7e608c816df9ed9adde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3de7e83441e9d43f5931394839cef7
SHA1e2c12c12677eab7fa909c7d6e019e9c51e7e1a8d
SHA2565105e913ba5a5179bbb2fe77a6044c70d539268ae49c6ce3bf37e3a04537956a
SHA5126ea53decdaea82f1a81ffb52afb427c7155cf19de6c3e8960b20b159c5f68e74219d7993e0c9b845b7587258dac15adb4c1028d4378f7ca5ccd6156b64606617
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b