Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
eb96626177cd922c6f657baacb806b11_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb96626177cd922c6f657baacb806b11_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb96626177cd922c6f657baacb806b11_JaffaCakes118.html
-
Size
27KB
-
MD5
eb96626177cd922c6f657baacb806b11
-
SHA1
d53fc9116bc8e749a69a57ce20eab24e56d35378
-
SHA256
46985e9215a5d7ea88f432b3efbfe5c2c64816cbd4b8bc02276723ba83c63d07
-
SHA512
0319be26ae7f6c1236f2fb3bbbc89227c2e180ebbb1dab1418737afad463377288c32579ab8a17e2d4ebc20a8be8b81715e3d7699136d18ec49a1faf4511e86f
-
SSDEEP
192:uw7sb5nI2nQjxn5Q/7nQieqNnvnQOkEnt5NnQTbnZnQ9egam6uBGQQl7MBKqnYng:lQ/xZywGzSEna
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E6E9A21-7698-11EF-9107-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60719a34a50adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432920093" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002403437c3d6c7a1685fc6561cdcf985a425e8b9eacda21ed284e07bed98295e1000000000e8000000002000020000000aa2fa467f97f2713e88a7ed93ef4dc845a17d53df8b11282df58db9b8ebc2ec520000000112d80c286ec94cd6a4c19bbd778714965844ddbdcecae378f3d45bdb273598440000000a2d6cc2e1e6305b8707937397ee708ce1381f0b8c10df33e8733bf3e72ef04cb8dca02bbf2029b86ef9aab1141a5e3b32cb68e1f641b56e89e19e34567218a71 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2144 2956 iexplore.exe 30 PID 2956 wrote to memory of 2144 2956 iexplore.exe 30 PID 2956 wrote to memory of 2144 2956 iexplore.exe 30 PID 2956 wrote to memory of 2144 2956 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb96626177cd922c6f657baacb806b11_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254500f0e9b014c25a6189f70ef03aac
SHA18693a545641af688265747597f30d6e45629fcaf
SHA256b1be68a86ff76c40e64a0cb6fe530c5d204f7661e851f149336895e8a3bc5004
SHA51274d175494fb6f8be32a655f69b25d7b081908700fa8e7b1f5ad7000ecf6e300011a1e05b9d5d644eb6beb0f2af5da09ccf4bd083a32fc0c55cb1e3594df65aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ee55460e2d105ffc74f80deca95e57
SHA143ff078c2331355af434d67be7d54954d852791b
SHA2567321be2ef1e04f546d27145ea7f2ac72c9fc9db6bf36c744a9bac1fae99a8895
SHA5124b963abd5b2c2badf89b2919f46badf2e0bbc08d4528b971e148efbe10c35d9beb10e02695419fc99359a5be3739b4c412d4665043fefca4957521e32a838f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ecd0079546f3c56f7688b0813306c4
SHA1d255d23420d684235b6a9d8bd75902e4a5b38ca9
SHA2569e23bffdc1c7068cb44352306c1ae55c9cafd48cc43730ba948a4c3dc6611f84
SHA512e5f8625a413877c9d953d92f7f4e5879827f87357f29a2a06583939442a14884a98ba5a3a1e9493e16995bfe8fff9816e3113c33923ce30a2b14941d5538dc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3cfad1385a7373f25ff151d6bd22ff
SHA18aff9078f4f1e4f5e65f569857fe2a8e6e0d796e
SHA2562ed0488467bd409c078bc4329cce3c7ca6bb3cefafab7ec49bd841d866654753
SHA512dff33aeaa0243f053892df958050b2f88bbea2834a964ead46f713897ca31ce155d72fffcee81c127a8c370a2d0e3398015f833d9db6eef2e98fd8f2aa534657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035fcee4091ecf09c44c72492f8f3736
SHA182d10b5f5e8d57169fa048e807e30ce6c6e5bec8
SHA25688dc0f9f50bc16714fefe6b908f1d00face6e610f1c9eb75a1f4f3f19f4e39ad
SHA512fefd20b4cd0d913cf4f2ab0d9622c14ef72efe0f6b079cbcef1b5f2fad46e806e2ce456c6a9228f155f44b5339e8a0ba7aae3a9eb7d57027fbacad27e8310a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b93d799d47accda8ba625330a7f0ee
SHA1e9bfb790f0ac7463333618012d167648c451a0d6
SHA25666f9f65bddeac4d44b182074d9a35a65a1384fbf604a1f4166c507f46d7edf68
SHA5127de1c1fda7fb2fc525a88fb093cd5e1100bcede0029642fcd38389cd3d1c9361bae52f195dff5f36c0dcf6f6d6836801a856f63bc3b192ccdf569b7eb3592206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddedce66af0225bbc65f0c2d4878d401
SHA188c3d579bc6813f3e8d6536a4f1e63754099b778
SHA256d3fc424140a5a8026db8ae4dd011ec2ea830e1073ad4c9d24b76e1285e6ad239
SHA512f1d665c2ffd088ea5f2bd5c05d6c9b63f8bfa7bcfe17dbbf903a9d28f14424f149723166b1c86eaf357390d575494d881863256bd6e7d9aa9db754ac0bf852be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2da7c62db866b7f90fde1696e0bc387
SHA177bfecd4e861f7e2caa3f7f6b39f9e7a9f8af052
SHA256ac92efc4319ccd62c1737dfabbf6d5779e5eabb0041b91fada36fe0ff0e2fb03
SHA5121a6babbc020059ed45fb36fc6a68f40606147d27857e4221ddd713f9ecef5e02dc4419f20fcdb7ca8d89d30453a2986cd54d4b7ef4435e58e5734af44e96dd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef95db47e773daec2570b6fcd428fd52
SHA157abcdfdba16911c13a673885d8c139f0041c41e
SHA2568b18a013e66f41e44c89c67b8d2080fbf908ea617aa75384f045a7062f7dbbdb
SHA5129b492d74ae7494e6d2227dd187a230120d0fd94e7b031139b45ffb4a73c00425038fe3ea3a3cbde32bcf6e20d73a8ac502da10934ac15572dd66cab039d3a12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3297ea717d44197bd8a1c3e495035c
SHA1d2fd1227023ac3c4e6f2776943bd9c2fb6cf7d3c
SHA2565b5b0653c48b23d2bfb2964ef9e7ff997e2fbd94a38b56d15f1fa4bbe7f02f09
SHA5126ffff3f9765cfea2181b6c701a1ea5cb52d137c36266219f5a940d7cc527997166a41b99b37032a8edac513b2b844254eb747f9a213fd60c5decb466a7a6030b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf6b1bda27e5e6ef07716514a1e0fcc
SHA15ff422ae1ce7ffeac9d26f959cf826076eef5021
SHA2569277f2bad61604908db8164cc24433df8b476a893853212aaedef89f37a37278
SHA51261f3542480f6cdcd4bb8c898d6b161c313f55968c77ea135486eda0c2048db2568a0d0213f36a994a29921ac299eeac432db5e51e389755dd9937a0942405a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cac171d9057bf8c0a8f324ae9593c43
SHA11c7b7350890d05beb60db294db2ce926c37762a1
SHA256eb94ca4bea5eff93e158a9d6888f5ab99a2bac78ad8d740279dc8dae0b3e9622
SHA5122a8e9d98f48492975fa3ed56bdbbdd408b1053022ee4485735668b3ae3718df2d9b1c2a57c2b825e8f06642bd9f1283bb8891fd9852b4edb560d588015e6f74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a4f7a224a0fc8ac1bf7511790af6e0
SHA1ed137bddba52204bbb3effc49dcd3aa1bfbc2d13
SHA2569090fd1dfcbd5919b10ae3841dcba0a7b0c61c30be097c7665a8aef1b1e458ef
SHA51267b223123224dcfd1eae81e34955e69450c81b869d65e007645becf2fb6010d328395ffb5a3daeb63459c9c2ff12cdc58ab24c056aecec27e59dd9d50de713cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64f629a4a71fd4c09a9ebba4d22643b
SHA1f8d4f5af12bac5d4719ac4068f682c403b0744c0
SHA256e06d67bd42af743308c5f82f283f46a00bee8ba2e10f0a1bd42766e92a15949d
SHA5120bea3a305f16ede8956621160b9dc5e152cf92cfef3bbe71ad94f176254586825ee75886871ea9fd9ae9096a7a989af5abcf603dd7776ebf7b122c63813637c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecfd785fd02a40b0d9be6f16dcae7f77
SHA171cf8d981f75363d5876f266f2180a78de0ad4fa
SHA256e21faeee75d4efaeafabcebec4140995d477eb862a8853bfb8a8e84d41a0fa30
SHA51255cc106a081424be4721264e2161a97a41f058db8f782b4c88e33aa680d587de7439f1f7f36f7d76988534502e69f4c83a060a2472a7b73f3b5c794d1793bb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fccaa6809600d6f833181f52e7805b4
SHA187ae13b7ce343a071f8d1530bf70ccfb9ee44b82
SHA256bd916970a058500763abff0c7540d3485b14bff4f86af84bd4e66dcfabbf434b
SHA51226021b6f53fc1462c8e3c654ec605e7fff65dc122c7ed53970ae794b01b17404e6e102d50af8d29557c7af401d109cba11dacc235246a5e5e252eafeb23c839f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8fe0e8687eff01e35fa8cc0eb1f1d1
SHA1f4c12d52a6acc31484ae8e259d3fe972970f24d1
SHA2569e6101a5b4b803b0a69bb48b6c15683cc01d99cfbe571b525b882fdcf6f8c96c
SHA512d3d05b1bb4a22ae67ae7c0785b62a3e78853bd956b7c273841ce3c579b256e02641b55409960800f1b08a646649c9057aa12c289467bb8f672edcf7d63d2d10d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b