Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 15:20
Static task
static1
Behavioral task
behavioral1
Sample
eb9df8c7b9f0e9fbfde299ea5ba45982_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb9df8c7b9f0e9fbfde299ea5ba45982_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eb9df8c7b9f0e9fbfde299ea5ba45982_JaffaCakes118.html
-
Size
68KB
-
MD5
eb9df8c7b9f0e9fbfde299ea5ba45982
-
SHA1
589516b905d50f8863e461414b1cf72c913d31f8
-
SHA256
01bc9701dde2c83d1d6a2a787754d8a3b9e2cc66c4a7e41d8721820a201e025f
-
SHA512
2be0d47d43719ff5c091342ea79c4ad674dde37f83d489dc33c7a6e6aa703c94d8540940ab9cd3c2758198a41a6b6cb56a6214081113f7d4936a30097d5f633c
-
SSDEEP
768:JiNgc8nX9z+rbXT3HwrBNor1oTyvC8koTnMdzbBnfBgN8ZYyxoogQFAG/sy/Ijk2:JJNNzdMWTbpc0zbrga5TNnGx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3A4EC91-769A-11EF-B729-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3060de89a70adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432921096" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003c07c494503c23bb196548f5345149b1293659ae6079e7c6ee0570c622b4f837000000000e80000000020000200000007585e7a536e1ef129e14d844e4c89aab2ffdb2efc5f9b604b7e65025191c276120000000e4a095f6cc7181c55fa5e21cca0ea343957c5ead0f97093d6fbc9ad150f2cf06400000000036b1275444c80e49bca490c951d2472610a3da6fefd7f2b29166124f7272811527f570cefba80a5c8e9b7ba02dac04b627d96fac90e4cd18e5babd3a188b85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1764 2672 iexplore.exe 30 PID 2672 wrote to memory of 1764 2672 iexplore.exe 30 PID 2672 wrote to memory of 1764 2672 iexplore.exe 30 PID 2672 wrote to memory of 1764 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb9df8c7b9f0e9fbfde299ea5ba45982_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502989cfc3be8c3ccc2c33fe2cd0d07f6
SHA125cde86157d62b96042c8ae2c1469f26bb37817d
SHA256945c0b4197781aae48bfc396b2d6fec8e37e6dced9b0ca96c6106acc9fd945ff
SHA512586a3c9ef4895353a8c62cef532757161d4c56d9230e1bdf83ed81c48a37fd0581b1cfa0e730d8b55eb8004c2b2a6e37af2ecce2bca86a961a19013cca672121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce25d2b3c2f44802ec04bf7cf7e58734
SHA1731f65895359b8eced1e90ad1fdaddd9a2ade074
SHA256d3ac155dd0cad4c7def75e5be50c539e45aca307bdef050627c4db378e698904
SHA5124a268654573044b0d4c903224ad75fd3bf2dbd6606b9393b70ac6dcb1caf5bde79d6e13a43a1203748ea62f0e60d534989638b4ece6c04fe0e3d49e1cf506c23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562dc3fa3bf6e47137541bf4f5ef6d980
SHA16a47f9c46033b05470689a5d49e327b0d7be8cbf
SHA256648c9b7bfb7aa52a3d805418c85d96637e72d380e23cf021bcd10cec2086aa22
SHA512ec0e7564836d156cb833fb7e2725376ea7042d4f65d8dd19120695e0cd91e893245b4fdc4fa1d6085428ea3e7f595361e7c125010212c1289ea18c52e033cc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d3a28fdf2ca92e052c4d53a7b6099f
SHA1b1b39e7fd0b2aa3f1ed39efa20b12d6cfe1ee389
SHA25628d608785a97701b9c43fd6559313e4f5a22e8983fb5eb3b7f5eca2eed37ce8e
SHA5123c8a9f7f740d5057300a144577289530d1394a7404645c2e05d27c2491b5a404b125fea1b97d824734541dd50927a0dbb0dc15613f74600e65bb0b406e71e622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e8f2500834a14929681c31c6f80c969
SHA10e4ea8d5e366ca8b3d6bd21fc0dc42c7fb7ce737
SHA256c0e3e7c02a12a1cd25802f75e6ebecc4f19d6e10a43fb37e0d18483029f22838
SHA512468851511f4b6ea38e5179fd1aff38e02c4d5e344badd70e08bd1f92783a108cc31d6ab0f0a0d546d2478d82620eb2a34fcaf376d5221d602f8656133ac5ad70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5f36227a2d4375df4dfe227be68536
SHA1a916f3a1ecc19aad9b662974a995668a90d9deec
SHA256e99ea308c9801d87c076cfdd00bffbff7b270779d0b3680919bb603b47b0f0c3
SHA51220b90d16f6eaf80aa4dbb8534ec683b0164aa4f21742fea7474192970dcce150f3faea71c3a0150f426722590ca7360a600109658b9c085f47deb75b04e97124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b2842d82b941a0b4d59926aeb17f0c
SHA1ab1a6e52590ee0e3f857c5085d566e644e73931c
SHA25679b24cd159f0a2179f31d8f368a07c2d5b4aaddb650bcdfe96758ac5e78b42a2
SHA5125fcabf37ac2a1a94006da28107e916f964e4b0bd0004bee931fc143722a12a0032d475a31715020d8b04a39572cbb10bc55603a6f0c7c03aeaa1addaec2859ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7298362954afd12303744ae3b017234
SHA19b8c8cb37ab2daf298ab86c05c2e450eee488251
SHA25607544a226077792f4460507739cd7bba3c142a5879fd14a38df76143ba7606d9
SHA5123009b71a70a881081684ce6f2ae819023e1746fc2b452d82b1a657fdb352ea211b21f407bab74f9044302fc4b58cdab6b407cca9e2e7162d850e8db2fbbe7b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f42d9a397c7a2fd7eec5da2f073805
SHA1c186e96425612061f17e67db3314731f210b96e0
SHA2562eed6ed2655b728803c1f0d19089820a5a783c1b2eb2f893ccdf17ec5c1c3f3b
SHA512c9e19df7525ca00cdbd81246c6dbc338a98122465e33939bacbec6a4e6ed1fda5b4ff30037280825aa1de99289186d2fa0bf101a3a1b7b13683073d1dfecee9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3aca5a2a7f050b472db9ea17a72d0c6
SHA1aa70f79f8f3d4dff992c156afb369e33d41e8e33
SHA25627671b1b2e21009b00e795908f40d41d6c8ce0993b996e49c905371ad6920cfd
SHA5129c71b8a716f780243207a53961456ed4ac45e9486198dc7c29a6fe22cabe1d8ed0f4a71a511930e1d0d181327d1855e49c67d1b44852c09675a17955a8d339bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee006d141816ad7dba8cb553e62c010
SHA15315d7031077c2b8c948a080018fb3dca3c593d9
SHA256dc0a54e38ed535178dc082bc3c2b68b9737779840ba8fe28f365efe96efdeec7
SHA5129db796a5a2138ff8dcda59d60e6e3db7d5b35f10303132a24263d0aa6124b887cd460446ccb7ae1963b5c9d8e749e2a70be9a5dff3e0b56b681169ccc5fe987d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcd4796feeeb29f671b0be9dad7411e5
SHA1b47f94e727ceb368ef244b7e28250551a898e0f2
SHA256ba5dbe24cd16301465540c40e336352d2c7ada7125993edcc8d147435268cefc
SHA512b877d743a0d1627d0cbc9504bb2b0b0076ee8207cc17dcb74ab3115120754a75c71ded25d4e530d46401e999b3e418cc5798ce6bbdd585c271b079f01d4520ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24ac67bd4413b9b3e3568b3751dc559
SHA105067d1c83db03dd7f58738c351da677ac316ccd
SHA2564e4be63f64701971e2e91f8c9aad95f953be5c1a723dcc83b52b1a1ffdd5ff57
SHA512630345b3a0389f973dcb824dbd7f8a70ccc6c3d688c8a012c1137e3a612e27812ef16afc3bceb1b22996a0bb254b2673caf0a50741b41d9c9a79d8dd5e5f153f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507feed9055763406cc31e0d7f704e22e
SHA1967759c77a4d426052e849c1357568677e699650
SHA256130b3e9711dbe071394f83045acfee1f940d81028db580199b4f578b37e3c0b3
SHA512758c1148a91573199e917242a2b7bd67a85d5114c95a93b9f2367f92c1054e287c244de49749e73134227827f2b61840ef1399f4d5c946eb0d52c89f4f5c6d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbef4de217640fb8e1432b625f15d68
SHA1a94f652a260fba9b509446f123c8e0bf842e359d
SHA256fc6b9b65b2f26856382a71b48789eab34da7de3daed8c2bb030507f81fb17701
SHA512e0c64daea7916c704d9fa56932b56369afc293714f5ab62cbad8593b4d52ad9822e8251147881bede6b9fa3620142d7ed83478d18aecb28adf6b5426099fe960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915affd0d961898e4b089b2c9e01f5a1
SHA147940284a595d76f7e4323bbe1136067b9d078a1
SHA256631546088c855a588808ebd9ef633b92e212a5053a488455342beff34d8347ff
SHA5128863ac1e592da8fa3ee7fde855227f76671ecceafceab77b9b1b4549315746b5a64f5d10e1169bcd2a81eea21235281b0a781450c7fa137dde9a1da1f3b927e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ff55e220d681463f6cfee89dd3bdfce
SHA1fa073e526a9acfa47be484849d6dd6a6ae954783
SHA256c08fc5871f9d911aefb9b4ebf1fafdd13019161adecb07b624ae592248107fa3
SHA512c77c80b713e8afea2f1c4f46323fbd2d3bbca6ea28adce8265764aeb5df6e8f163dfb252c47902433f07fa07c56e21df6b69c5653215289dbcc2b05886e2116a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591cd4efda566f7cdaf01e8270df3b85c
SHA1bc1cfeb50e495889b2f9006f8d73411a73b57635
SHA25602fc5784d4aa9938d04019a58c968bfad2ba3ceb571d65925f068d5caf5c20bc
SHA5126f816bcab86f2695b9586ebb8970e3d51518492e0921758298982ac64f118684f56f2de7a8d5c64fc483d725431a5ba3722796a8d5d41d47043cba464af46153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4772cb8c8425eea4976356b55aa737c
SHA1cbca929d96cc4a6ff5314a4a41192279ed27d423
SHA2566c357b4a8a9d21ea47d2e4e3dd5ea327f633ae28305563e4581ec02e8227cf14
SHA5121040784fa2793301af303b4c60d3d3c7bd43236942a0bcb39090267091bd4f1b4b0b93655950596c22088b5488e8a66b4f323a6ed8b549f457ffb2002c1f4663
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b