Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html
-
Size
51KB
-
MD5
ebc77d79161083ae402bc44b67c87dfb
-
SHA1
9e41330b11064ffd290061a22e566d2541c60fb7
-
SHA256
b4410601229465e1dc03162aad80514871f2f3475ea0f50cb59df19a41ce380b
-
SHA512
1bb33796e0c24d6b7f523fa22325d81af58e9210fa166f12248d0784e808090085738d10c8a8a49d9cc75ada1163a33753c93abdbdb5a384d556001580cc2bed
-
SSDEEP
768:9uiY7GgqL8lJUxqKAIxrY6aSsGmK6mW632tLWapmT6JNqP6h:kGgqL8lJUXhxmHKDExqPW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB06AC61-76A7-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432926665" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2060 2972 iexplore.exe 30 PID 2972 wrote to memory of 2060 2972 iexplore.exe 30 PID 2972 wrote to memory of 2060 2972 iexplore.exe 30 PID 2972 wrote to memory of 2060 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebc77d79161083ae402bc44b67c87dfb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e417457bd08cdd0eeaf5ba8982d80f6
SHA1135db43db52505c71583b2034c7dc3fae0578f42
SHA25649388e110415fd0865890d0d3578183caf697dc968f341039b04447077ece94b
SHA5127e1187271c8b16efa0f023f5be183ce035ac1989c8f45db11a3800ae739ef31e62412d3dead9da20f4e2f5476e156835e6a74a24bac3145f968ee00493195549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee274dc1f6f8596e396149878fb7ab5f
SHA1d810aca5a86c3fdf33e25c617c6e28d18a3b5d2f
SHA256df6416da9d617fa8aa403047d1db81ded973f477dc9553fec195a8afe8d363b0
SHA512f2efb60f49842dcbb55ac0733647a8919408decbdc3c5d10931dd5534cf89429d160cd9636709b1e8ecad4a9f7c17fe774a6eb0c5ad0ca144e816be6754c168d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5173365ce7117bfd2aaf997a7dc567761
SHA1707660d8e29601ee01eb151247537045712b7cd5
SHA25615729a4e7864b94d2218584546dda5368630db090e9d017b9be1dc8583e28bd2
SHA51276d96482c8ff856ed2d23edb6d22b3c2e14d850c84ba2d72dc98d24adb7177bf3c3fc8f3bd6b70e18e431b8ba5e908f6460a4a7ff79b5c0714cd064f76a6b8b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b176d6552542333ce4abe87331f0a901
SHA1931eebd7c7ce9a232b29c39ae31ffb85a7032ffc
SHA2568a375303a0fecc2a70c5cccea33d36060f87b4824f00f9758a1761a73f468119
SHA512f29a0f6e4441356fdd12b86cf0ce86384f979d6a5235ed9069742c76ec7b72193a63eca9f7852d0d9e7cddb8e88352e3cea13212b026cbc36339e9230334f94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a84c6f7f76447e8b0135199e610857
SHA111e8aaf8753f315ce523771053560da414564b92
SHA256550f7b6dadbd0ab623bec12257c64c2674da334c17d696f4fc4a0035c504100c
SHA512423abc129aba519ce96586d601b77f82e831721f13b7cbfef2a5aed515fac61d18a797b6cdcae0d13df3f0e0b91d96293c83de3abd71f5e8788d9db4e5a36073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e34821f83333d50416dcd4e26e552dc
SHA1b4e28d0b627bc47c42cd569636923f0873fed12a
SHA256d645b3d314fd3e85baaca84334fa46644066586c2b3e13b52b46cb84675b6935
SHA51295bd0dedd4894ccf84516e299e95fe22280165729df2286a9fb2a5ae9da0a42fe92fa6a356e59259be75ace7be2ae94b4cdcf4cc44a843320f1ea7182863630e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593432cfcda09b00ec97c2b675254a23a
SHA17d80c6d2a732644ed4c87236c23e80eeb4727506
SHA256dc8fd1213aabec4e22b4caccf0f36d7ed0eab22db69c7b7249f7f0137929a90f
SHA51203a8ed23300373f24ab0b770762e2f32f038951767d5ef91440ab1536bb5bfff3b84a3f12a7df07d09782caf2c4f3acf558c653d5d91c0fb37e8ec4b0a902410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fbccdeff37e5ab2490cec8783e0e049
SHA1e7e6d6f49ae996e7cac01dca40904833fd1d1317
SHA2560d0e8e483bd21ca1d03d0001c9baa1d62bd5da3135c53b5c4382c43d83e10f3d
SHA51282e61101c226628e8fa44934fcad11e4de4b1aa6eac75222ef0497528d700a19eb61eaa3c7575ec8797e71ac44ef3a70b88de00ea2f512714da5cdf007131d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b1a6966e3288eb51bbd2b23844f1b6
SHA108cc4f80e5b030828a211d9de75055b4945bfda3
SHA256fdbd5dab9bacdda16c3003e764ff927ca5ee5101dc2a7d26088cf06d1a69cb71
SHA5122787558d24a396a4bf6345fb105e99163ff388c76be23e6f73db0b4699a9e49e90ea79c50db8c83fbb7e8746224fdce7e0cec081294f9047d93f50050867066a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec4c269a6719722a5b7de004ca54e8c
SHA1336982de774f73ea5462dd3ce4f1a49b0caea2b0
SHA2569b6aa105749f2a1448f32427340550601512b137d625e4cb2d764a8f93f1ab83
SHA51265bdd3eb8682774278aa3421059507bb3c47f1af387e9de4939ef0e97a12331a6fcd2eae971ffedbc295fa7eec108ba5f66404db2c4a0162b32761381801f85d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b