Analysis
-
max time kernel
138s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:58
Static task
static1
Behavioral task
behavioral1
Sample
ebca12884094995c018ca5fd9cd287cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebca12884094995c018ca5fd9cd287cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebca12884094995c018ca5fd9cd287cf_JaffaCakes118.html
-
Size
57KB
-
MD5
ebca12884094995c018ca5fd9cd287cf
-
SHA1
bd3bb14862823489b8914a50c8f400b5f01ee45d
-
SHA256
16521419f1286a124bf60f2614032ffb908076f1846946ca8fed7ca85b67cc75
-
SHA512
d9a0de4fa83b8ddd5c006d24d5b9634c02ad3b18f8f8cbd31ecaf94d8e1f8ce9501e7de7d147d70cbb5e73380dd62f6ae70e35392730eef2a5970b9d944fbf77
-
SSDEEP
1536:ijEQvK8OPHdVgBo2vgyHJv0owbd6zKD6CDK2RVrozIwpDK2RVy:ijnOPHdVl2vgyHJutDK2RVrozIwpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b2d534b50adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C149211-76A8-11EF-9C13-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432926966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000070fcb81368b548da92481f216173ef40c70d412e90aafdef91027aec4fdde8cc000000000e8000000002000020000000332be4b2d3a49112d0e7365ac5cce05b1add8694c2d8a114e9e63b627d2157c2200000003eb0f6b53102a74cd18cd91dd18c49b6911b07e4de9a65588340c40c1048e632400000004ba90010c336eda93c419898c5162d96752d990e6f01feaf374a80751e24fdbb1ee059848d46ac64ad567d8953d59c2bae1eca53babd61334cd25556682ca919 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 812 iexplore.exe 812 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 812 wrote to memory of 2500 812 iexplore.exe 30 PID 812 wrote to memory of 2500 812 iexplore.exe 30 PID 812 wrote to memory of 2500 812 iexplore.exe 30 PID 812 wrote to memory of 2500 812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebca12884094995c018ca5fd9cd287cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf4141538c5037ff2389837dc1c3f3e
SHA18c403032b2068e3c00b39e5cabcdad8da9a747ad
SHA2567604299ee6cd60d5f7a3be7051bcfa68b4f61a4afa2d131859138a6263c482ae
SHA51281bb38c7442e213ccc2a16df23a9b260483f2692478749ce87cb35e983dbb8b0b1e2b0aba408d38ab96ff2ce570da139ba643a3029d35f1c4d21fea9fd088374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282f5936258cd69b3150c101b9a19f89
SHA1ada3930f3a7e3ee9ffa454f5cfb1c3209564e636
SHA2560bcf90c65a87724d2e3bc0eb4f2c455020880ed32d9416cf7457d88d4dd0b6ce
SHA512670e8abd1ebaae3a4f2922ec840994aea2af6eb80ec9c696d43a1b0d9330a1d2dff45fc509130b447d01e6532da4f98f13f5663be243d83b6f962531d5a5d76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576f441640331c715b4b3277785a848e
SHA15dd69d7286a455f41dc78fc5e91290ac8c3bd690
SHA256d1a67acffd8e210e5a9f6a21357c803334bea47a949b8d89fe145b076d4a8bde
SHA512dd427de006aeb77fcc4191b12e9256e55e43b95ebf771fc0f41f6fbacd919b6950f40a32e7e0ad660783c4b689f73f2ccea4c2e2dd4ff8db932ee8b6dc706792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b3626a11e286cc867cfd89f0cdc917
SHA1d1a2b96c60f318177b7df3d052129653302936a7
SHA2561dd1a10d1a34fd5a17c162cec9297f77ce2e98d7da720650e1122e9aa18b801c
SHA51205ebbe5ef9ee5918ea21bb37ceee647975d703eacfdb06c27fc04e436d39be3d03ff7c0074500d3417b8485c0a1f9c1f2d997fa41c6f6025c9a3756650dec735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baaf864874341f58f8d801b7cf3e0222
SHA118e7aab610b12f569ffa71b2ba93c51310df077e
SHA2565de110deff358468ec09c39dcf10ef978dbbd136d83ad726a1873f3fa2149fd6
SHA512e58da640bf158f14cf8c89cc15887e7054ef31698143977c56a26b8048b223c481904e5a0b6e2fbc8079f7d569df0d23b2c7b7d5c40a3d2f53bb4d43f27a05f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff5c6d162c54238114cbbc7319fa261
SHA153df4de020e62d3509eacd6077a48302b5667834
SHA256409175c63b215030495e781dff13af2c2c86d3bd233e7bc399ca54513a2db7b7
SHA512cc804fa3eb13b861ec52b70e4c1908c02b806c2ecd037eb02345a51502afe64077ed39cffd48232a9e59a7adf2dd0d810a38181982753f63ae2948ee468ea276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53856463dbbb452d26d7990699df6f2c8
SHA17fd767d197f91c149735b9ac155c14ae4cb5a52d
SHA2561642a18fd5116067e10f595e99dd197bb571f0b5b8cc40663132f16b2e478434
SHA5124844ce9e844b274014d7d6af27240bd580cd5daaf7b14ce221760a0954510ad3c127314b8c7555baaf18ced89822eaa3599dfe469934a67d7a64214ba3eedb7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a814e2ae1fdbb929fc757123cf0776ee
SHA13e8acb34894a06bc843b53c9dbd42ab1282b6326
SHA2566c55841f82358cfe3ec047a8578cb090604852d63d697a1da4a2bfb385314683
SHA512862cc76f508ed991455c5e146bbf9e79279e3756b129873d25e0052b07792bdf65c73185a4895a08ac9b01a583a83a9bd4c4c967f8790a3c7a662d4cb9415c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52425053cf4fa70fad3ed3e11426ed1c7
SHA1ec813efe8bf261e3d6139d98232d6eb21f60e849
SHA256ef00f773e916968c91adf26c48ccd38582743c925895b1f11b8becd7aec06749
SHA512b2482ef5c11b97bcbda8528cda0d55530799dc6b01aa061e32831f51cda65800b2536374c75ced1e04f90cd3407b96d2707858f52b0cdb0370405f65c13f8ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf1bc9ae13e27cf434a59d13abd65f4
SHA1df50aca1731f9278e0634df8ea1d8795ca33cdd2
SHA2563cc2151ba9634879882e5cb5ac87013f3a815361a7c4074a97375d715f9c6573
SHA512a6c79ecb3f71e9aa5b844ef69e92a3e6050ce3d5ca9d17ccb91dbe1288580d18a4d6bac8879638f46681324401598235dd0620c1e05e50d22231d9e413d63d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725eda8fb81f9f14794dbbf86261ffc6
SHA1f6a177ee2943a1d0a06e1cbfcec7fae9973b6313
SHA256c5d82377b1f324d02c508a3dcf43f29f6f413fda21d83dd1a7a709d9e93dc6cc
SHA5129e5e4eeac156e1086fc19019ca78ee57c18d5217e41dbec38b73ea0ec0d490777f65c7e5f2bc10b313bbd346e58c56e2414a401c0703cb04a906175034d810be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592931ac8984f9891fa13baa0134a4ac5
SHA17f01543c65398888f016a3910c030db7f87ea5a6
SHA2562cac30ddc11ee9ef5ce47045449b6a477cad282f269ebcff0fa9479444479885
SHA51279bc545ad0732d40ab388c9dd1e0489eada387c170790735c52137c0aedfca65ec613bc17f274e35a8b9c7191f9665f3f2bd0232b5d5ef0302bbdc05cc57d318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5758065d84fa605b4701ae7893dcbce3d
SHA15cb68853277ec79938d3bb59a0f01e4a16360f06
SHA2567dda012f47c15a2f2d73fa9c1b46de661131d126dcb93d023a33a1b6e541ff0c
SHA512abe5d3a2c3210441dbd6cbb5f1b2638150f0a7b443ce209739049a37b36d57ffeedb90490e7bee0688674b2d8970ac511b0d0863c3762b4322460eb8564b5bc2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\f[1].txt
Filesize41KB
MD5171eaef046c8beec47133da176a63d87
SHA13f18281e12496ecd32f9a54c05b18fe653bb0930
SHA256d1c5afed3bc204e786db1e2985211c22c6f4e3cfe18406192aed32fd4d72828c
SHA5128197167e27c57e00128bc4618fddb4160a42db9c9556bb869095dcaf6996ec9a65a22a6639265f6f27f01a6fb1b00a04e4fca0f01e123e69569f7583d626b69b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b