Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
ebfc9b62e79cd80dd340db5efc34fa93_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebfc9b62e79cd80dd340db5efc34fa93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebfc9b62e79cd80dd340db5efc34fa93_JaffaCakes118.html
-
Size
61KB
-
MD5
ebfc9b62e79cd80dd340db5efc34fa93
-
SHA1
0567a582d73dc1d865d4bb0e97f45e57d4c0789e
-
SHA256
382afc86ce6787a33ec65c998be8766a17d2e73e119c92bfd9aecf780e0844ab
-
SHA512
65c35bc4317deaec39e1196e5ecd996a17d12343f21ef1df5d90258369e7f5c8d984debd277b73f01c7b40c871e9317b61322533de334f54e1ec800410508a2a
-
SSDEEP
768:3gOriWNcaSoagGTRqzah3YIF+UIrWB1tDwNkLVY2SU6f:Y/FRqIYIykLVJQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B454191-76B8-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432933940" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3032fc71c50adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000000650bb736b3e8ef33f92e873d11c277fe7b91f8750206df2861c400857ae8ae000000000e80000000020000200000001344f14276ee1aa13996be9b5fe52c41d67fac5650ebd1da4e5ebd3bffa727e320000000076c1558b5cded4dd04bf92a634810ae1bc81c0f2eff05e9d2d2c9cf7a83b57440000000bea4e577199a51b669772c9f94ad614f1e4bb22ccc90a9ace49f33f1cd5e1e3f2e926a2bcfd4baaf1668536adfab999ffdbb897b1c23820f03eebbd1e6242612 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2392 1644 iexplore.exe 30 PID 1644 wrote to memory of 2392 1644 iexplore.exe 30 PID 1644 wrote to memory of 2392 1644 iexplore.exe 30 PID 1644 wrote to memory of 2392 1644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebfc9b62e79cd80dd340db5efc34fa93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bdca3f8218c1d90fdc5c9354a770933
SHA16f1fcf24ccb1669ebf226e0655fc7a9aa25c9bf9
SHA256956b45b13b987a4c267428fcc77c5066398ef7e1bb1fd09bbce76dbdf706ffe7
SHA512c667e1d74708ed865331128a1539130592b9c53cee103cb2cc3b054565ad34454614b1e776bfc4ca3997e84a366d5bf2dd89be8c109d994a898368a9936a68bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff9e2abbe03229328a5f2cdeb7115e1
SHA118bd1fbeaa940a60f531b9b8f6b6d223bdc5ccc1
SHA25673f300f27ca880fe9b932b453e75b1f2bd097982ff00cdf19f1b4e3f7b4bde6e
SHA512f044c484965fa698c7df1f03cddde7391c5b8285438182b95b94651f80ad3bfd579d0efb6cce003ce3f88ef9b498da8d12185027953dad304b07c4cc907f88b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abf80eb52f5cdaa77c209ad0d23bb97
SHA1895a77e03cab0e77a4d4bddffb3129a81aefdf06
SHA256c36c74e974384c97557d2155fca41f07b29ea810d821d6d08029f4b871f41092
SHA512b85663aba538fc9f5f3ba21a1617c23128e625a1e654aa56b9006ea4942c9af913e982d18dcdf9af401c3771fbaf8c3a5c01c22c0f12720bdb7171669d1c3f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503299628cc3281e5f7aa23575f772a96
SHA11ae94360409be354238f14d3be1f55d87f0fa315
SHA256199d5f9283072a28938fbd7d1d80498859b331a70f9470349b2bc44b1160f8a1
SHA5123333c741ad9a32ec71aa43e31e3c4d10437cb4d36dce195fa72cb4ec76d351148f7ada97c9328a84a8b2358e345775b35d1cc6c9b6c54c71ca3308ee452d1a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52816952a261c6acb88c1b9eb72f3cfa3
SHA10f58c30987ea33af8520df3b6d0f7b3a70642021
SHA256ee46c593a9825f00645f35e828a26d452136da7d9d63d43d41435954c6ce10f6
SHA5126b9a110cf46ab9c50b92bcd3c6a99a2039a249852cdb67efce6a967dfe49e6ff6dfa6deb5947ac0b216929745e121df2d581e2a9eb930f896d3457c48a2a06c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb8ac47986593ac1ee0785b2741982b
SHA16f3aa09115bd586cab278dd335aab7739d58c92d
SHA2566a95098b9872274fe265e9659944c10043e57839b91d4ffc68a4e5f17992a70f
SHA51257609d043b4dffea014a5403533ecb46eed896ea6a0ec44ce3f566204dcb04ca6bdea0ec09f1b3c804a4af5d8224f9b900c1f64a3191861569d75c8ded394ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5035ed8d238ce8aa5921362b6b1a371
SHA1fac9e0f9d6b2edec3a1c3e165b4b55534a6febb8
SHA25689d639e61e1b8e5d87cf0dde87d4f1626ffdc9975a6f52bcad6166b000bafcae
SHA512a4da348fe03eda65b15517777d7c8ee5c3baea747d04bb3d37a487ffc06ace5d93ea1e45611594c58006cf437e95d04a1aa408b12905e2eef09f378c12c2462a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac7c542a72f163ba5fdc7fd3c961ea0
SHA1701e54c6867ffee8ae05b0875d3115ac999b7d13
SHA256ba98251c615fcab4110b1a864d6669391b7c65fc7445d5bbd0e387d9520ba059
SHA51299f49857698b57cc9b5ec8f9c9f50a890e44f077584ed715b1a136aaf45dc2f58cd4e1690c4b46a65a3368c6fd8b380c1a6e2e6ed8f8c708e18abad6fa994f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544efa22fdec422d45c2286325e1e0ea8
SHA1664e94de635798634e1b8398433876638f946bbf
SHA2569b2e23ad5d81eb57c979ea99ae75aa32bc1deedc20edc7528215054bf0bec92f
SHA5126d2e99e3397f6f1e51cc92e6a66cc232104cefa60bdf80e680ffe8c9f331922376a31b2f922a0ea7705979ac533d0b83e40d763d1b3b2307c57418380d0adcd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ba39757de60711921938be3a9d94b9
SHA128ae075ba9c752110f9c26d2c0f9d2389612a6d1
SHA2569231d79562ac01c7bfc2a528b5a0accb0c579cf90261c32e8b7ce5fcff26e4db
SHA51221dced8451a74b26b791869edfd59905f5b87e34870b9a14c939edcf1efe43825397fb1670afcb653b238410175a6db862c55de40690b0ed71b7f545714e2b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce0a6cdd13cb25b449fb15b671fc22a
SHA175e409d075026393ad5af10095156b30aad4a093
SHA2561d7cc80bb7508f052c28d150d1b064172fc88a6a81693435ffd2a3e71af24621
SHA512b3addf30bd3772663a5d0e1b84d9d9e2c53683ce5d100847780180af8d364ae043abe3d3fe078e47be086b7b289c9daa5f5885ba1ba6ae1e6db3b418b7137e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537fb50e2d7376b89b04faf56b3a44554
SHA13e3efbc678a58c987059fb1c66d17b3d586522b6
SHA25644a616d52aca395695ec162e3fdc01948616c55a5bc908e8905460c9791ccf0f
SHA512ae83550c0ba8e4bce683f6d751a0b0a58651733553aa18b7e972ec1a9a9ac680f396125de8dc6d24b9e951681f9f1739400e190793d6f2dff72766a87aad68f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298e9da0be36600480f15436105dbebe
SHA1d8f3eb0b3407d17ba71de5ba2588ab223b6916b5
SHA2568df5430f1c24ac9e72c081df1e9de061a616f968484b9bbd650f032822dbddb9
SHA512bb0ef823b548bd4970a3c3e0f44bedc87a03964f03a1d3898ea3cd73aa72f56e3aefb7ca63f0aad1d6b5917b830f3223e18d084b1ef2da95e5fb1c578beca625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506257af04ecb0fecf7ac5e9800c867de
SHA10f6bf0e8f07fe61adee6e7b505bb040b808e1a42
SHA2563ca192a0f1d3c145a01ee523aa25789d45e8142567cc3e0665b6314f0e1e1dcf
SHA5121fd79d0cae81728f83a60be886acaa698a09ca7c9a40baca2e1acf1cabf6c1d0f3321a7296d14ba13a747e44d39389195455bd9afdc131841ff1d29a0653cc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ecf142163e99274dcc17b4772ac2d0
SHA1b8161328226bb9c1c20993d4e94008fdec9629ba
SHA256a633b0e91e46ed28f25535b06587cf2899ae8e579e8850a7462cd0ded96e4fe5
SHA512dfaf3ae0403055919dce3410d8d4fdf9b980cfdbd474392d12cf4296b652e43c1bba2ec644f37f8e4ceb04133307282529c6119f0461c2be074354160aced397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506df893ce5a1a454d8e3a7cadae9976d
SHA19b340c3db758f5c135e5cad0e9b8e64d7f1f1d14
SHA256f9d824060f925180da847883380d00ca859ba42ba66109b397517d8444f7e3af
SHA512e5dba5a170a1196f3ff3470df1b071ea6c531d0fdb9ffb8991c053f419e90115d711ad51720e46568ef7fc78e5eadd8ea02879358fb8c9facb447f18774488cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef412193d97c531e0cd32504d4de07ad
SHA1508eeb8fcd1d7a825603c460a518cfddb27a28f9
SHA256f90626d33dd5574d2c6ec2edffbd1d24b1bba08509a12734853273277aa91bee
SHA512ab262c54d6e84b136db73d9ec1d350b9325d22ab4ef2307fda6cdd7d5e99655012af67eb8c73e501431ee8a5866b451d02899211c835fa4cc2db1eb9d366d45c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acef444ebe9af59d252d216cd8b009d2
SHA1cda0443ae78946df707ba8e5233585117c963355
SHA25612b71b8b0822d529615fcd3aa1daa5cbfb71c8bbe1f7dc2de7de44cbab5b4084
SHA512b3dd098f7aa1d70983673a684f09c54da7b3da4315cfa56c54c16ff138727b5d5040cdb4661fa4504eb7fa5b7d28d5f8b8e7805d1a07a42b71c2b83030a86b20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b