Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
ebe3f189f05d933163794cd4b49eb8cd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebe3f189f05d933163794cd4b49eb8cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebe3f189f05d933163794cd4b49eb8cd_JaffaCakes118.html
-
Size
194KB
-
MD5
ebe3f189f05d933163794cd4b49eb8cd
-
SHA1
7f0750a69456375a2c38e4f39661b7c374b7b16d
-
SHA256
a4a1dab8a0241ca5568aaf0ecb367e1ae5967285c7c5a2c5c5fc5cec158bbbe5
-
SHA512
6d46eae5812e8fb457764afc25431eaecbbe88cf332560267be24298ba16f6240f9ef106ec06ffd13e19afa669f8786675b9c19da925e5490b1bdf2d5e9edb73
-
SSDEEP
3072:l59sWJ8jLkePU3Vn+f97aEhUX8L8CRwBEuUn:r8jLZSVn+f9j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000009cbbca9da99e3debd421f6761720cd32dffd5063e3ed1d09aa33c895f296840d000000000e80000000020000200000000edc858d2246cd20c2a962230d705f0694558efd19a17d04e82af1b8da7c08c32000000027dce3b10e1e055f82e8b489d5ec2ce95fc366b5a74dccbb743d7f5080b27b50400000007088cc97f3857520668e273699bd7d5d57cb1dd6f170ed7604bb07d4f0024acd343f1f41fc677968690f1f0f9efe6a5d32e0de0bd099c595c5b14305984dc8d4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432930512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B4EC0B1-76B0-11EF-A045-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cf5582bd0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 540 iexplore.exe 540 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 2312 540 iexplore.exe 31 PID 540 wrote to memory of 2312 540 iexplore.exe 31 PID 540 wrote to memory of 2312 540 iexplore.exe 31 PID 540 wrote to memory of 2312 540 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebe3f189f05d933163794cd4b49eb8cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4bf16e4641e18a3335c9dd164ee6e5
SHA1416f4888b64d9fe6d78836cd23b96e9476683a98
SHA2562926192338dc84db7b428355953690ed0ecea545160dbf606c4fb89bea1b13e7
SHA5128281e0bd6c057b7050d856ce0b7693357c8ea42c217597adfa94abcc0b9944c1252c066d31d95f28959f2d49204614427bc9c0737b61810cfa521563f65babd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bafe1348d5dd8907350ad99e6b245629
SHA18dbf580e8ab2440af873ee63b1443da2c462b8d8
SHA2566dba912ec2c19ced03d6e110cfe1bed849dbad1b98e3ba9cb4c05a71227f270c
SHA51231a8ce37c0deadc9b30ac7fea52d4bfc801368f92807ee5a9f6e9088c412a409269c838f577589720077b9e2bf576e358cf58a86264c2c087399b1a657446dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2edba1a46582db59e56c0890955469c
SHA1131694bf078bb7a34ff1fb968e7c16a7bd683a6e
SHA2564c5e4ea6b6a4f8f7bddb477085b00d48007f4c03e27032f8035e4db54bd5a421
SHA5123752fdc79d2a8cfbc37f6fdf06728580b4eecf7e7232bce068bcd7c1a40abf7a275188a554b157918283ffff5819fe784a983d0229bcc0e04aa7128c9391698b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e401ab9154ce16b73392cac8057fafc7
SHA117686ec418a53bac945d08028aa83974dc7bf348
SHA2567a492659ecfc674b96382b097256bdc28f9674a4f619875ffe5c001949976450
SHA51240fd573ffb71d6a1b852fef007eb25da7bc0a74270a14d9e56d3e07b0d3614dfc69eeaca87848109cd556adac0d73c3040eab973c071fe5847bfc8dccb2a9341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a28c84ba779c0f607107a54c7e813cb
SHA1de2f228b993912feee10c496b9b4613272207d60
SHA2562e58786ea1aee8cabb1edec5151c40e40dd5f3f36d3c2cc8aebe0914316f8497
SHA51219fb9cc8e0180b2459fb4730b284442f425435447780c76487602f2bed312d1ed84a5a4e3cd60ee7b39ccb622fe9a293c5a0bb85054922f110a6a6a000144d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48fd40ec1b75bef32f48a3b5ba3c3ab
SHA17f2eac86f1127bfe5f3e09b1a02e943ec36e0862
SHA256c84faec88e3bd015414c79161710a566083cbcb93d9bde1d1aa4276539553852
SHA51254691a6d7e53f88f7b1aa56da8e1ff3c5da1204680dd05d964706191b9f017fee539e140f08688157891633cde62a7fd2f9fbe3ed9bf60dd669098e8a00db4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf745bbc5a6f9e1d6769fbdf2325d2e
SHA1f30bb4734473289c6784785308aa713cfb78ee6c
SHA256f2f304820c5970edebe570168435a496b39f33d04176e4dffe6df19223a22cea
SHA512f944b06f35eb52950871eb233cdf69d5fc9ff7028d9c189d532e20f38fee96912faaedea927c79e322b18a75a78ad130cbd48ff51c0bfe761ecf68ff343cf87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57741cbe5f5b71f2ab138a287eebfe903
SHA1bfdcfff9d55fe9c268fa5c7ab2b47e7b27fe3a13
SHA256e6e2645af13eeece0f17adc46fc381c09efc31d2ff832ab9108ed67d55d0727e
SHA512933349a4e59044509ab932adfffc61571b808ca2ef0efa20dfb4930544f7cc7dc367055f523a397d0442a94b568728604850ef955a421b190e650bed59b454c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57addfa290c745ca41e7638d5c8a32cf3
SHA1ec9cc4047a7904e4f9a848d517776cee4a2313ad
SHA256b01cf3dfde25947d685ff08332787d65d9984e3412652a4834acc9ac8cb2e6a8
SHA512912b96b2e5a17ed70acca1e9c715879b1d39451478e30bd7c08bcdc685b190a2c6770f2fb22cc5c1279d76e66d4fcfa41d33f1dd0c91ef7e43f7e2c9a75be664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b46d3cce96e4f99c9ea8cd31df26a3
SHA1f31d99ce25b62c1258c220d76a7bf5e455411b95
SHA256e15fb807440b098e902a2fa9364655aadf64eb43676a014e1a51e000406a4dda
SHA512539076a80c577beda67d57120bffad9b53a68fe59d9e416cc4d3e64ea625ec50f5170f3b01e69ac2486972dfade04c60e5f7de5f702b3c88f8290c7a49e1efec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\css[1].css
Filesize174B
MD5f3608c4e58016a2fa664056cd4364554
SHA1dbb8854ec8efef869edd7dd9deb501592200a47a
SHA256bed118664d6a70a4434485b83128a17cc62bb96e9a1d10c97ce61825e2549237
SHA512cd69bae5398a2d56be65c7588c6e9fd81c5e10f28bd6886ae91038a76c6098ee3ddffbc62273837acafff84b408c8cfadb5f30878566c820cfe110c48941d0e6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\css[4].css
Filesize576B
MD58a1af4a616b9213ffabe41e0d355101b
SHA16707646dc2c9db6e8a6f8f6e3eca0139d8472ae0
SHA256f4392e77173b0bcd1b59ccea677805114398570af90e257f63be65cfa7973801
SHA512939d3db715eb2eb7d3c5365996883cac184b76212df75eac1ee7b3ecc8a95343a5573d1aa766f773313c7481ca03879322f02566bb4579200bfa17bfc818f704
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b