Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
ebfbe2c3ec78ad1efa16deb775a8ef94_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebfbe2c3ec78ad1efa16deb775a8ef94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebfbe2c3ec78ad1efa16deb775a8ef94_JaffaCakes118.html
-
Size
23KB
-
MD5
ebfbe2c3ec78ad1efa16deb775a8ef94
-
SHA1
d05895b72da74b996703ad1ef57eff4362cf95b1
-
SHA256
6a70a6aa69c217ba569e6725d726fe42143db733972cbe36bb0d797c9d5914a3
-
SHA512
d06778d0f8a7b901d80e5972e2528b86d0506d5e55a0bb2c591bd3d7583bc0d7b48abcb9eacae25b081422ca65885fa7988bb3e9c78cb5d1590eac347ff3aea2
-
SSDEEP
192:uW4g0nsWC/f4b5nlzc4MUPtInxgvjAnQjxn5Q/XUnQieLLNnkTCnQOkEntxWCbns:EQ/L9Jo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6767AB11-76B8-11EF-8002-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432933853" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0101f3ec50adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000ff4f130120a46a3a3b7cfefc370d4577f6a6fdd948cf5da8ff05f97d8c319551000000000e800000000200002000000075a8663be988936d30bd0383e505fc26daf431ec01b1e34cfced0a4a368db88820000000a08cfcad9937599e344a23ab246883b0b792fd725f3c2e46630a41cafb06e49040000000b9e2a43d963d7d99973c3c2f1b1ab1fc5edf7b4069e4e09c9e46b43745e497cf89cc8a287e9159e155d541a531ed2ac69637343f7493e355243daf39d4600adb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2696 2332 iexplore.exe 30 PID 2332 wrote to memory of 2696 2332 iexplore.exe 30 PID 2332 wrote to memory of 2696 2332 iexplore.exe 30 PID 2332 wrote to memory of 2696 2332 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebfbe2c3ec78ad1efa16deb775a8ef94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546cced36e05641ca954cdb9e9f2c51f4
SHA1eaa118746d9217fe9246a8a2b7dd50b8cc20e977
SHA256a46b0260cbc0419e3c8a1ed1cdf7c22a6bde2e0a142b35285f2e98518b5f27fb
SHA51232a89891984dc0437b94212affaaf7f2a9a692db42431d984fbc73f7625362ce386a8fb866d9590df18ebfbc44bf784c0ad5c70f2c7ca86e74e38ca4bc1225d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55980c75db6b62ea3725ebaa01443b109
SHA1d199b7262525851f5e40c6ae099967acd42e3608
SHA2568e9da5ba83f9839d853c144d44ac4675db22312b3c299b27206565a097a6c6e8
SHA5125b063ce4e5f0e8f06a40b9f841b94b7a68561eaef6257c72665c3a03b69444e5fba6fb7ec67ddcf4368fa997b13436e8f2732bed89a0781ac3b3ace614b0173a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a570bac7728174de91fa110a0d7332
SHA1ef12abc5da80f30729e2dd460afe6345ee14b225
SHA256cac34850a18285b621db2f91ab8d4c7bba96f750c2d58cd340f3ab8686261c3a
SHA5124a33a4c9fc09c4ebdbfb8f54b3e3dc7254329fc6c986598c6a0f0fe243dff3a41bc0b6719482fdb3d4d75b575a92ac54d1b57c372317a8c4d3474fc16c8925ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd22964f1ea3189c553027f88d3958b
SHA18d67ac863c318e46b5a88b2837c4e6f84fbf5489
SHA256be93729192d4b58723ea254c9fdcc0cced0477e2a1e83d667864ae46c2d9fc93
SHA512f9ce2f6afe9b97b0693daecea62dc6fa38fd680c3a3beab721be85d5bb59f220a08c84b1524241b65247de23a1505214fbd2f6d7c9ef90244e28a3998f590a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b492719077c16d70e40caa2d756f20ea
SHA1c5e2ac6b31c1d2a377437de8fda67e9fea7b1eb0
SHA256974e5785558e7b53c1a3fa99a7c547f93f933696bf34eb0f0797496fa28340b2
SHA512f1bc117b3a6d748668763c127bbcff48a95b7ee967dcb69bd23d7e8aeec5c1fcd40f975ab1133cee97db5be0435b325974f29dfe0417153e60fb392a62f0d5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960d1ca7b7ace113b3fd25f20a1e7e56
SHA1836228645e6124592fc421d09024242ac59f911c
SHA25645605e2336c2e8e351523f286bae3ff8b382b4b84b3479ea5c2b21840d2c7ce4
SHA51231fb430128a6a5dace7e6a3b1b27d00059f9039e528e31f3deda80d2afb7bfc23e4ba6a5e6a3cf8aafce46ac68f9188be2a4c2403d3cb7c750bdca729d00ff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0db3083c5476304e63e2debba5c21b8
SHA1e865f770adc5eaaf866232369be3f61603ed15e0
SHA25676457e44416ca1eaca2a98e674764dd5d7ee9f92bd86271d470db0c61ee5a3ab
SHA5129c11e568e3b0153d791bcecea1a32ffb8e3253bc4279695cb2046eb881d1287ad81e10dc3ee504a04836ede92ebb5941d31e6b210784ab2ed017b3aa914663ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a220a6c813b039521f25ca65966c55
SHA1cb1d7489a817430679171992b329b01f617950b0
SHA2568064d0ea6ee31aaef25d9b5ab7c0a3968093617235ace172dc077f0d7c9dfb18
SHA51270e3a3db301ac30721fb2ec4f198de2f6cb881e6fb145723f80b638df915eb50e5f62bcec4cb632f1bd8fbdbd20be4c5e3552b7782f018966259d42c6ef02d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2fab7e58b8195c964473dd97fdb9ec
SHA1eb37d65ff9593801f11a76a4acac6c0e9001291b
SHA256984036261ff5ce6ae55b99ee122c49e7e58c26cf91c88e734552481da325d3f0
SHA512b5eb45d900c3ca6b36c3856a16fafc77afeaf9dfe0b7e6ca5206f5d1a77ea418b10d038a8a4af3b602ed236dca1c11e36419b0c23a3a10e6dd700726206092a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea77d6d4d7244e6d2a0e25236bfa7772
SHA1e2bc9299a3d2752383f0e9dccb5b9321bf13fc95
SHA2565e89efc22e4adaf8ce5c52d7b841af5b0e7d5878d341446cdf7f1bf2e6591952
SHA5122b52292c111f075d2a88a3a789d0d1285a1bbe3dfb34b068567a94f65b754c41f0721764c33d942793c58f98f3626434ad5c8c46b90311407b7b1edbf9fe957b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4754c499eed242a8163b44358313bc
SHA121fb71c13f82d204fc2199fc94631b8fe7ee98d8
SHA256a13080f8735990745d009c06870f643d2bd8780c21ae29ee5287ae43730b1f8a
SHA512588560290ed905431bc5ef4d83b8a18ee706bf87ff783ca03226479155d9e2fa407ccd55e4adf3d1e95474ef628c9d39667243700014fb4b6f567d62f4de24d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c47af1d7377149538992ce5d94250c
SHA1c079a99f19f59effd99628d2732ec6c941e3caa0
SHA25662043bd38704a8f61b4d10f144e5e7640729687d9e9921b6ce8fa56df1374cbc
SHA5128067b720a8d1f7781fbd2f3e8692cc019a57cb56093f068e3137964a7327d31b74d92002e0210b0cf17ddaa78f4cd1054677e62fa539239a768aa843676f9e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541dcc3c1909c58e5c01c13d729d5ec03
SHA1819c86455e517ea7290c9642ccb1c3fc10e9a65c
SHA256456aa739d1ad6173c5165eee0a90df7423a088bb8532b8289d4df49c3ed2d708
SHA512df7cbf3105056bacc8792ba5cc6969038cf804a9cd4532089c9e1f257c76512d8b10fb9547b51914b494957be8a0e3df6cea198d4b679e4fe3731e3f78672180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fad4ca5c4a733809fa67027718b569e
SHA1390690019fde3e7d7afc12c482e5bf6b635a695d
SHA256d1eb8d7bb29d8991b307eb639aaaa1e73879dfff830b523ad5faa854fe2b0fac
SHA5121e64583ba48b68fee22f3a7626bccc35c103dc413b7a9954d8bad660d89cfc89dba0bb776d63a4afb122fcc43b4a3a74d260f1a4577d2f16b3d9b8246f2a9b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f975725e2f4f8c1e1636ba6f68c99ecb
SHA18dc260a0d91c96cf0f5c3bca76b03c65aa5029ca
SHA2569207dcfcffeaf1444e7a2b441d52b425004579aae2b8cfce01705f088c2fa38a
SHA5121f197069dd710f57a8499b407f870a08a1ae6efc0a10b0d2bbb898debbe580e5097718e6c5ecf5b14f3252a1786824046b6e2e44d76f18586911086163b275c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ca33e55cb985d3f234848fcd4f6f28
SHA1d5c7f8a7eaa492f0770323949f27ec073d3c61a0
SHA25689d33a44735199a4f0631a4de09adb35b150780a7917ec802f60353176036ff9
SHA512298e1677fa1a17cb92f09a7a1910a477011454507d2f32291295799d3e65bdc2a2e4e4b015943c803af1ae5895a25b00f8b66a62537905adbe26b732a68314af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe607fb75135c2dc6d4a1c9ec4b4717
SHA17cb8020ddd8c927a751a760b12d2014adb496114
SHA25680edb275d22e5b39adbb5fb35542edad23c18bfd7d6291f2e34ac5c7fc105ed0
SHA5123781808dca5e03958ddab2f77a8b26c258e2568aa5e17d20d5583228e0a7700490c5b8a26754f7f6118f074a51a91da66723912f9e98729beb5733c087e218c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4999e59fe2316f4da809226bf12239b
SHA1390641ebacebdc46a33b9aad71e5e1e1bd5dddaa
SHA2569bee5bfdb43f2c32f3790484cd4feb1bce1f57888cac50356ea8451581517207
SHA512f94be601181d033422da72bc21927532437e3053dabfd9bdaf499cca74b39fdc2a21efde1a87907d97b161f10e4882003d3d9afcf1640ecae81bbd6963457121
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b