Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
ebedf590c20bbd93403e514274f3b3c8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebedf590c20bbd93403e514274f3b3c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebedf590c20bbd93403e514274f3b3c8_JaffaCakes118.html
-
Size
89KB
-
MD5
ebedf590c20bbd93403e514274f3b3c8
-
SHA1
a0f2d959fa3e57618be233f59dff8304a87b5fdc
-
SHA256
a9ba91a3c8fd85cd8490801f6673cb4f2d080c11ee44e0a3f1cdd1a19a85b82a
-
SHA512
30771fbfab1c600ac586f443a0dc7b53845ed56b14e6154f778460672a915ff6960d6e86902d8beeeeb7fcdb8e6df5accc0dae5bb5229f7dbe9eb8cdd2282572
-
SSDEEP
1536:A2Mf4JdfoGzcjiQc5SGOSimKrpAbeN0SehKIEMf55wMfcK66LhnDBPLaKlfJZXb0:UohxYjK53ObmKe66SlsR5NYQPtlfJZXI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f038a1abc00adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432931884" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e4c70be97c5f0e8c69a1520461c62c94824aa2d94493c99fdd44c84866726f59000000000e8000000002000020000000922d9476216c1d7611ee51c5d7ee0cb436a96f3d5fa3542b4370d948ffd9eb3b20000000b6b8a9adb9852a07cefe7ab7a00934bc4eb02f100bca1d72abfd408292dd9d88400000004fa67ee6fe68d9cf2e8a4440ef61dd9b2690723f4c56832354bbf74b6ca3a4405c0625d835bd3be9d093fd0419cb55c658e12e5220f2e2d4efd59b995be07fbc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1CBB2D1-76B3-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2060 2076 iexplore.exe 30 PID 2076 wrote to memory of 2060 2076 iexplore.exe 30 PID 2076 wrote to memory of 2060 2076 iexplore.exe 30 PID 2076 wrote to memory of 2060 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebedf590c20bbd93403e514274f3b3c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28b38579b29c2858c50f9b685dc9fd1
SHA1fd3b2453ef1b99b59efb5fadb6466f0cc5cc7134
SHA256f28841005e51758651d9cfd292b6aef0915b1e6a777ea75479eecfb5590b4636
SHA512e260cf1e9dcbc04c272e14a145c05dd37910f3c4d5759c53e0532cdb7eeb9de7b54c27b36b1c9ffd21dda2fba57dba08254cb1f2b8eb8e70ec037eaa4c8e7a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207cfed272278b15963d38887ecde212
SHA11db03a2f63fece37bccbc5fc0d7ae499b2591eaf
SHA256b5d7e5a395758ec3df19d47f631b66ef1db650a32f66ca25774d58ce67159a9b
SHA51225bed123e5859e1d798a2d9c346d504f7e1048d0ae4a35e438c94a66bc835b21ef3b9ab4a2be66b6c6498bee3dec87e6c7036b76a8f775de0aa4ab975bf54cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f139ade4709e60ee278829e8e9e957a
SHA1af0ee1543f94609f6900c296a3d8c541f754690b
SHA256c56f74e1674325b91dfb3ce179fbab4390fe67950dd6134df0da892c23efa41e
SHA51216b3b0eda5abc410adf90968f39abff58648fb4f2d895da5928bde5e31b6314a070584afc389753c2df469fd673662fb03e50e94afac03213e1dddeb304c228a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b8703670e610dbae7bea4b03407508
SHA1bd96afa6c1fbcbd147e6bdbc614656cd8c401880
SHA256c37dd3831443eb1e23f68b89cc9330e882d19ff4422f497be73c9b34d2ce7b68
SHA51264fed247bc4cb7bc59cff1b15f819f92fff1be645a16f75a132ecdee2cfe1ff3b45dc4330d259fc213998af097ef6a78815971947381cbf90e423ba77162245d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd839bf0b9c4c63960040ace66008d7
SHA10e057ca109a4ab56f1db7f46616479bf76b21c5c
SHA2563f58831d28883ed5d439020dbeeaa1367e680a9e1d9ebc44609d6f60f5e389ef
SHA5124c37e7634471348382f8c7585d1bc19cd71b39fce07a6538eb90e4588a42fa39756716a9df1cad4f36c878c97c2060396a3f1f1c8dee09ca424edef10b028817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c270bf4d01937e2b0964386141f8cb6
SHA1c9c717d67d862cdd574ce40c8aac7a89b3f4ee4c
SHA256fab3c171814a0a5b4507f7deaf555589785f00b276926a108beb1144741de681
SHA5123bdfffa2f5c32c4784c240bfd6961ea6c8bc0116985f38a41846ff4ed88ea52a6f5cae3afb8d933a716db9fe65dc56a693b2423c70c3c102e6a6a535feb4af53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9df1d69fbec972b69cce14d444ccd9f
SHA1f95740ce5d262091c3bb5861e4741a7dab734dcd
SHA25611db55476ef97ed608d0cdd6f822f7dc53699bb3e05d314901d8461e59e16e99
SHA5128a88d37c46958f3009881d4911d253f24b9560e43f463631dc4852c2e5bb88b520d93f10de09b596fdbdbb6fe4e18c4e628386c018bfa1a36239a6164c55a63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578878112b9195657f820fb70a4703380
SHA161d2e635d4b70a7475127a726b474b345c3aacb7
SHA256e19d28a0fa887c1212cfe341dc578a07514bc64944ab000472bfb8972c97015b
SHA5123d8923cc8c1a84bb848c2eaf831210b282337de8123d54b36391e3ab6ec2e5acf68b35e627933b6345a960482c72a26e311c5fe75197548545dbb6b5aca6a363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589268fea7169a3644956e696b3bccac1
SHA15d1fac442f1fa67b72db357cc4b6b7d46549461b
SHA256acda930b0c97bfdc5655cfce1bb029621ab859cef88d01b76ad4342157a06f21
SHA5126410888ef2943519c9ef971fa2f8ed3ceaf5e3b04a7fedbe9bff2078f1aa64333ec04ecdc0167e6d80a1fbe407267e07be793e9faea98206ced1f0a60bce1d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f54a17624e9ef91e07cecdf079136e
SHA1d088135c79f8686e0ba3179846860d2fe440c16e
SHA2566c142b27a63751ac7535df3c654557b8db2982d336a8b669608db64fbd45d032
SHA5125dbf60a15b53db58b06bdebb785f6d8827cf1f9e2480040c7789888f765933cf2d2dbbe7759bf7359f5ee281afd6a57dfb4f746e1fa83415dcbfb793bec20250
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b