Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
eb7c0269b943cb3e6cebf7843a054901_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb7c0269b943cb3e6cebf7843a054901_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb7c0269b943cb3e6cebf7843a054901_JaffaCakes118.html
-
Size
917B
-
MD5
eb7c0269b943cb3e6cebf7843a054901
-
SHA1
72c524db30b67be08a0342872c9f2806cb926bf2
-
SHA256
2d1244be8b96ae37d36a3bf4737b66c790dcb62471e76adb81323a4423a7bba9
-
SHA512
6b64e252c9f0d3e4f94aa7a465b4640c6690bc64e04ac926779b87a0ad682fa48431312c664837d2945bbdaff48b6121727679468afd2149dc464f1d5c509e5c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003c8d1c56d0dd1b420ddd1f9bc8e4d221748522f20132857db421155973fabb5e000000000e8000000002000020000000aadccb1e888485cfc2994fd6264c85e415ac8a50635636f702007616417cf34320000000ba86531cdb4800b70d3677b5e29327dafe20c87840dbb01fe6397f59c50b954540000000823c08b72c02e402c96b321bd934c81bb7ea2b66756ce518576a1043fbe728f9e6873a2422e367bd5bf18e944949acb3608ca020eadb413d9ff0080c659af389 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432916395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004372e25b4e192d20cd13aa48d1729b5e66f4bdd7ad787995e671807e0d525379000000000e800000000200002000000062631112d6830afd1abe045eea44129830ad04272a71eb15ac9a6a3bea083c6790000000160e2496fe1c782ea6e98d3caa7219095b3a79e64c9f1d8731cc194d4575cca21fdc2b6d7d04ac2059b6a2f5b6fe610733e21373c31e6ef7c2c0315213a0938c44141666c7f22d3af68578c0939b2a4036226730b3884419a6e3b02b6b1045ae5a1a7b2896187e61330098dc8379eb10bed22edd8a6e50c327c02abaf0e48fef14265e8c3a04b123a45965e319d2481e4000000082335e8a30974c7f567debd3570b1120425a7cbac7e0564b156c86b3f5a4be6d5efd5e7c5abf7c775f060f079b685736184d87b18129053a10a54ad89471544d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C19FFFC1-768F-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90262f969c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1576 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1576 iexplore.exe 1576 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2076 1576 iexplore.exe 31 PID 1576 wrote to memory of 2076 1576 iexplore.exe 31 PID 1576 wrote to memory of 2076 1576 iexplore.exe 31 PID 1576 wrote to memory of 2076 1576 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb7c0269b943cb3e6cebf7843a054901_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1576 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d3c238c1ec6b9b1feca0678ab625c4
SHA12053478d737fb8d629b7b4555f213ffb3aeb749c
SHA2564b2b3b248582580f06ed04642a528d567fae41fe743a37a3094d30734a91258d
SHA5125776e7eb32391e553b5634ec0b213b80cdc5795ba255de92475f92d97f9196a99fb43d2ee8d2822bf6539f080d018aa87053ce92634a8175c0967e4c7366960c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b666bad82b18b2b6288c861c045c19
SHA1a49317c368ea9ecd1715cc045e6363fcc9b9cf4c
SHA2567f66b86a2fc85b6fe269d09023bc90b449147107d440c5aee7165b3b286aeca4
SHA512a3c34244d873c26da8b54cfc3690cdeee911aea12691448f3b2f11b6101e49826b5a15b6ecffd1dedf38dec188474a03a8051ff2200fe3abf2a39025309932e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5475ad4285d1b09750b6d472ca15374ab
SHA11e8bbd8131f08b0d4ca471269550f49948326c38
SHA25696086e6ac008846fbdaffc0de97b48ab9a07b8712dfd3bbd9198495c1817fa8c
SHA51254bd35db9a0f52bb518542912821695f7a2c0188bb00a6036a48758de49660c7d82dfc2b34b17e79c7c990da90aa0179926e95d73e230238b8be4858de6f62a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bf998115a95b619c64cb6e36598ecc
SHA1edf7e165227c8d01a6fb0df53847de8a5fa1ad57
SHA25689ca7c9de5e043f82c1e4fdacc89e7037bc759b4c3204f87f25e8c21d7c39f39
SHA512706615dd3cf887a6d80508871ca5a9b300c1518ce587c308f6e683476a0b3390056a9161ed189ac5b02cc1934a69edf8beedd9b971d96daa05136e4c455f5c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb81e126eb54d97d9cb86568013488d
SHA1085b0098aa6d95e14e1979725a0e5368864a3e5e
SHA2565e629ca7c164823ed89127fe2dcc48465e214c504b71caa807f62545c463c4c7
SHA51213213e1fcb492a38ee3c3733f35680fc1e2e796e9cb70f538b7396440f17aa676844ef22a1ae399657bb6fb74fd236d05308655376388b21d3fdb19a871b60e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51228a21bc0d7f8b4c0b2b12b0726f2d2
SHA18830ca975ee46a4d61202b56713532a0425f82fb
SHA256efb0849050f5d179b0a1fbd22cc6fcf00c5f688f5bbf424002af9d80c4986b49
SHA51226b2b1db8c7535c6797291660dd3347407a8176cf66a90da5456a170d3dda7a3283bed96ef0b173b2aa87e5ed0b4a769eb9bd4631a05ec50e069c7366f57da9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7d471deea4b52bf79b2090a39d749f
SHA17a2d826ad454722f14c98047df833daf72885694
SHA256cde39f6cf1b44a1c6ca16a7684a19267e8304d08ccc3f30e5e659a978b55b5a2
SHA512cb86814e9e1ceb4139e9488772a9ac763d79bd6c278e482e78a34c7fda158daf84f248015532fa934bf244086ec737f6c675ee94cbdec4311734b85b95ea9a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c533e8c6457933ac09a6ef0e12d5b2a9
SHA1552ba0dced641d83ea1b7435eda4a080977e1625
SHA2565b5b0e1ce408363b76de195e81ae7a5f66033ab2186d13603e29c89758bd3ce5
SHA512109d25983b8f3d5df79121879dc2fc418906c0c55a2c7bd719b1171b8ece0e09c42601187bdb4db3387d9e5254e275cb361dacd32ae96e0acf5dc39ce3548a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55261e62fa79dadb61ce812a18c5bf102
SHA1f9484550ce2581a11a5c8e281a814768f8c8e943
SHA2566f3e54590f02da61a3c1c025c3896a8b79a2750dc511886433e2ee318975b66c
SHA5128d7b061cbac4d2b6ea0c4c5d27da36552abd018c6df4839c83288cecc96f88d5f969e1d5739711b136b46d5504dd96a18fb4fb7c33d58ff67551fa288d2bc6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0c1c7958ac264aa57fc05e9418bff91
SHA182b0581aac7e5685dbc268fce9b24c821ff7d155
SHA25692d5ac21f33cfecf7b5f136394fe3a0a476643916053c044c77133d185a0caa0
SHA5122c6917ac10bb4e4c7cc2fc7e800e40d5d5a876c9561e9fccd562402b9e3ef137715a7a368f09c4b309112477e20ccded55b6586f631d6d7785d081622d7630ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97e1630f16e26bc29eee1e0df1fe24d
SHA116ff72e5e7c9fd0d823502d8d182287ef034b20a
SHA256ec6622bfd26ed7f951b054f74c70f5f187f72075b2bce256db7909909448890b
SHA512bc6aeb85ac41df82ab136474b3ec4977e76877518d89d89a96b53c0cec00099533cd9bc0a61cb87cdcc2de3e949b4e4b02b894b9a0f6768c8586a8683232f49f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a15701b1b1842ba2cae564e8e4b82ed
SHA1d9b2d7c53e70afb9af31b6658eb6d5732e8bd449
SHA25694ae23a091f56d8b54643d8646ffc446332d1cbb33caf5403493ddf48850a3db
SHA51226256dddab74b001c31534c5a3e855ef8b6615e823e076d3047bd57a594acd2dfdba93f696c9c1b6fc0eb9a47bc9367b3155c5e693bd425fe6c8a9a006d40886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbd3f1edca777b7b9cffe69701afe34
SHA17bff87214c32ba9d004e40ee818f9a405cd9ab66
SHA25657f36d7961f936293f18c10ecda0c0d5023a34fe4c5341102370415e42066a8e
SHA512eaabd6a16e5c4f6fc7e891a91774e6fb8f919c3f0caa1a3d32deb867a8e87fc8a7d17e88a9b30ed000fb528ed9036d945a2311da255c5ffca057738b2fa3dc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33bede7b0af69dd5a6c8c7573b75f1c
SHA1815df3b93edf56b9dde426ec9453a39cea0233d8
SHA2568a7db50ffe0d8fb5ead8b91627de4dd8ba009a3cdf9625907f1ec8e8d5009218
SHA5123277eb3cb68a2ebc141f71d97f8836f57b997a4a1f7f7319dac3b3e2fdc061f3bffed3eb8841950accc8f88a492c1ace5733bfc997584e039165d9c068252db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277287837dbef385dc2bb5a6149ae376
SHA16efc4e29f01900b8f393e9e8df5d2e99ec192970
SHA256384eef1836a530b51e42d4cb6519245a6ec2536765321d6bae562a8a1490d9f6
SHA5126d1b329cdcc2c56a17664f2f598a9597ed8e9ff785cb3ad1d3bee928a15cdc48b727f135e180af1b027739a72382a3b014928e80d9317fa39535a1afc0cf40d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55835a59cc083fcc463a355638b7cb189
SHA12299cd3c685419882382c2e3d67034266940b672
SHA256dbc7dc9c3423a547294da5eb8c19df7d46c4cbc1c0a2e723ec76f7d1639a02b7
SHA5120a7092c42e6147c353e2050f52238b6e3f732409678eabff0fb9efe9c07cb0afbdc45003db7bb98e35109560718b3d93e57bffc7519b4717443a932529d4c65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969c53c7e3a8766d085b1afacd00f854
SHA1af0e5035fec1a5485d284888499be10b96ad595e
SHA256179fb4dfb702b01909872b17427d92e891052ed4a68b4350d54e676501a4d38f
SHA5128fb72204126347f3b3a64b7eae324164c04472aae22534a076d9faef9ce4e016b543b5d0ddf1da620ad12ac1dee81b1411fbbc2c63e25604837c8391336a2cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ea52327e95800a139a6ca52d3a4adf
SHA1077d4930dce73eacd74fc6293696573b6d270c6d
SHA2566c75aece259b715d26c9a3028f1801a468b3a10b93e65c147cbcbe1ab8b15fb7
SHA512c30ffce433d495e33c3241f7abdee4333e6db17457959b7cf3f33ec74a4fe084759be0b7b65d7055da54633dbda93a4c1796c56eabb8f1c6837ddaa80a47c130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb3985bf5183cf263e0355cb03df4fd
SHA1c36cecbaf9d9b2bfb98a6807390def34ee91ac37
SHA2566faacdf84cddbab6922d0fe49cd9436432b5fafa6c622aaea5d49acd18e745a0
SHA512b72c0c9497077eb75b1e711d1062ebd04541e6470b698ccaa3c2208be0f82b970dadbb94adc05452c31e1a4a97467d519ca2d7d72773fdb0756fec0097ea2b5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b