Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
eeb213246581e6978265aef82cb7ace1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeb213246581e6978265aef82cb7ace1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eeb213246581e6978265aef82cb7ace1_JaffaCakes118.html
-
Size
460KB
-
MD5
eeb213246581e6978265aef82cb7ace1
-
SHA1
72b6064eaa2856c956f65f43f8d0b7936af990ed
-
SHA256
895978b8422efe2a9b49924ac69cfa4f58ecf7ce31d4b7f9b25502338946f876
-
SHA512
ba165c36e90b1a1a1f1ae03ee128a24279466c8e8a509eb1e376fe943192d4e338197862dbf2cf0268b544eb4fcb1a835e7111b3d9e6c6470b6d984eab07c1ec
-
SSDEEP
6144:SCsMYod+X3oI+Y9sMYod+X3oI+YSsMYod+X3oI+YLsMYod+X3oI+YQ:R5d+X3z5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05368d9b90bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c690a2cd87155098ae4ee38600d236441cf711b254fa12299059e59903eff304000000000e8000000002000020000000e58054d4ea8dbf94299f3734da807e23230062f1664c7376e5440488db587155200000003b1a668fa6c6ff384453cb8c0f6c574bb885ad25e4838f1d11449a2c3d97f258400000004ecdb6a2618da73c1857e9342d09fc4577df583029ee994bab957c54e22fc5a4f8a910885f6b97463e4060c8603a1389aed58e1842c89a54f8987fe34baa99d3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433038905" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FF485F21-77AC-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2404 2388 iexplore.exe 30 PID 2388 wrote to memory of 2404 2388 iexplore.exe 30 PID 2388 wrote to memory of 2404 2388 iexplore.exe 30 PID 2388 wrote to memory of 2404 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eeb213246581e6978265aef82cb7ace1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c93cda3f3f6169362b8f452d38e084
SHA15f0b9e864cafd18fe3fe6770448f3bdd7f0e97bf
SHA2564d8b245f27441758eee5944e6b54bde4ed5a671f87ebd43a96527df654918ffa
SHA5123f699ec46fc8276d05a82294d5d56ccd6011d0cbe86de8a9aa3233d407640580acbe7b796233a5a5e9a6e7833c192c97b65fe9cfbe87c67a089ad41812c9a315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54daed05bb578e729a143cf0188431d4d
SHA14043bdcccdd77d4a9d0f157d0ca151c257b051ec
SHA2567e1e65b1778caea96f59c6dd0b14d81e8fbe75bdacd9ce2b887fe06ff1d19d41
SHA512a1080ecd6d25d65ba8079add38c1c22c3d268dc47aea7d909d038e002f66dfc094d59c2025eb0df2cda04fdf215a826b10dd885a3afe93fda317dcd542a4ee7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55154bb52c3ac36f534ebc3dae0ca12c1
SHA18f6076389f27b0d7c6fe014c4206884e816317db
SHA256fa4d2fef1778db8b19cf14b1af048eed011009b288ba519cb478e811c35dd36b
SHA51235bbd4e50bf5c43b7365b1f7794dd137f1b06e0239ced3132e2792dd0cdc6312a142a8e556294d696911fe4dbdd6f2de1ad7c26170b5fafb8f44c4b2615d0dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a33126d343b83a474ef061453e134fe7
SHA1e6289ccccc0df094ec893cd6938928cf477f82c1
SHA2561051c3fc04c7dd9fa411713b6722172f4b143627aca4696374a8d75a6d600181
SHA512f8f51fb4fe43309141cfacc8f0df9d8b54d6861e438bc39f4575dc726a8b9baea086d95d4236e11b4f164067975ae879276167921240854b64864242924d7506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c7c647a9c68cf8e3e7bfcf90289fee
SHA112d8fa27f2ca588578a20f6209af490a47d9a5b9
SHA2560d2528318b72d1dfb7d4443b0da1559230620500ba78a03ace0b17c50d1b6ae2
SHA5120e52bc8bb993728308d1a452652abcfa5181072d1583b9a673cd5eed450281917ae1f40755727f5594b6fdb03b1d024ae347274a83476ca1390bbaa614824dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30f2244c94047f40da9a93eed4ff5ae
SHA12c3b216a33ce96ea06b699024fb4c8f927a08125
SHA256f3c7e6a4f964bbcb20a3adac2dacc5f370b952a4042c683b067776b4b49be8c5
SHA512e6387863852b2ca11d1a9e31727aa4bb44f1be9490702316d91bea2e6b2d85b82840e5ddf1fb8fbaf33bde6a2e07e2e49553d3664c165f88210f855d33feda83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415c4dc840721b4bc719d555de434452
SHA10c26274b63a136da69da352445485d39c81d9da3
SHA25692740292d5fedabc7a7d533b66daacd483c5417a8b33a8012da8882158b2f81e
SHA512b4f976013c1afe3c9f4d59a4fd25246d838ccfe6e09bb76042749998c251bee1dccdf7c106cc39d1a46d0d9f65a058205d51738e29099f08212172b7b6cd37ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db778329d37f1f04bfe7583b1f8bec7
SHA19292e2baa3775c5c34098e70b3548be7733a6cff
SHA25605e47741920812aefb606897515770831232cfd4f6a6cef149ae88c71cba387a
SHA5123d57ba94fba30d30299a49d7b14daa81468a981aec4c3816e0efe45fcffa81699b53563a8d36b76a107255e24ae69b721386f8e19a298c5f6f4a75ad7bd5da35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cba3495982583218598566cd0b941b6
SHA10ffff99d0b246a7335a91b786cd917065d820571
SHA256577df05e150a94525ca814367783a949b27e79e863f42bc719adcbc6ef126b22
SHA51206562a351dac8e31de894a2395bec76970f9c421386940f0055d2c4cea9f2f67eb15b0a9fb9921ce1118699e09a6e12c6f4f338991be087f8e4dfd4c913555bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab6424488d82ddbf61df88f83bc3675
SHA1de44ef0049e65c1932bff539aa3b32f840b39315
SHA256f846aced14ae129349bb73b3efedfc64f60efddd00162c9ba234ce62b55af943
SHA51253ffb4983d0de06316a81f9772d1c9563f245976b76cabf0634b59aa09b7df94ac254937bc4bcf2dcb28a6a6994a64b69a4a2760e3217ab3364f2cc25c3fabcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc6834ce316ecff6f5d8676dfe287a2
SHA131a88f7146d113dbf341426205fd1e708229bddc
SHA25695aa55ce55eee9b4b60bd817748b9906a45432574b8a0d9f7aab6f662881c8d4
SHA512f4d563afce9317f5b1eb738db16ceafd774269c0af02d7e44d27e820fd51fe8d42b4a1e51395e258761d513816ff1e164c5e3bf32d1b8f051ab5f18181ffa9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a9b164a16f9ce3ec2f0205f654d844
SHA180d9b46eca27ff6a0850c5b505aab90315eb4f90
SHA25601b82f5781fb810357be854e79af5fa65e83d7feeb99d052a86f15363d15fdc3
SHA512cc37ed815db3523e58282c2a66aca05bbbae69cae28c79377d57640a9824d342a769e8697d406902511e4c491bf44eb259fa91fc5ab9deff2224b7f4c2c71e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a0156e8b19515019140bbfc41ea4de
SHA161bf37ce85a1b1023fe9142c520e90e2016f5a62
SHA25605669fa852160ce10cb8e22631c76d978b498737b422bb6a184bb23c325cb09a
SHA5121134f89d5d86a80dc1b1b8316d7c3d7e02fda8f3ae93694da96c5c17008aeb997465fb63f3b73e295eb31e1171aa7ae5299e112a35abddd32ae54207fe487428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a0d1b5dce7374cf11ebce743491a64
SHA19f2822e56e7a1acd9b3795f380968d6a4ea2fb0d
SHA256c2ff54fc59b87480ff1e7d72dcb9c07090103e9f77f098c8af1877497ef74ddf
SHA512f00c793bb3e8e6d159dd7f109ea05d0dcd57f8d674ac4d097b230edd13ae44435f9ed9774f47ea5d47e125bfcb22d10dac2e2e948e98b2a1ff81cba16ddfa2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b224895bb72c57f976942b58456ff21
SHA13ab333a0c34ef711c0b165195e3fa655211e7bee
SHA256fe8ffcb23385bf2d638577a867831a81fe0ad612723edf27d18f3803981c63be
SHA5124e2f9246502d5a0129e501da0099a7673ccad8f1aea8fddb73c3bb36c28b9486b992b54f808f0ffd7e51cdf4a8676ccf046bda0c542363005d94fc492a7c0a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f3b9c7d36b31253d6ed63b95c9b3f6e
SHA1330c042a65625c212ddfe9f4fed4d34fb152f4e0
SHA2567ce0622098ea317a27104f67cb7d1f6e1a13e54816009b410836ff7e0c0b8ec5
SHA51286a08e3549a6317b08614ed7e34339ebe6414f34adaf386e31b57058e017979599823547f6efed8c91c1a4b12748a0cf75d30df6350bab3a78cdf58ba10953b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8dd318f1dfa0032aeb4343997be17b6
SHA104a2b361b15e0c0d3fa8ed222ff12b603e800119
SHA256284f43f8d5de7647b6c706217b1dc537c69506624cef483596bd06fa28542b81
SHA5126c302da0853ce7b2b918592a275a1939c47b6f91d3de60bac34c42446862b3b94f7b53cd662853cf450712c57080f4ad9bad1fcea7f25efb02d132cebc0360e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f00fdfc9479427b650f9d66684bad0cc
SHA186954cf8c2975d6d79845444ede3b6050455205a
SHA2560b1b96fb35728a5cb1739d49cbfd4061b24bb72f59f42a057f59ddcdb6b736fe
SHA5123f1cda84955c5d5a30d192c5058b99612135aca1ebd8115b0a54f43cb49213c8e8e43aae315c1809e166613ea78981687872619cd73e2b54b86e16bb26e1d32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c6ad323438cc18f79a1f76edced58c
SHA150496d63f1bda76a3a10f8e57d292c64d0bafdf7
SHA25646df713220cbbcce716e56f65067cf03fd06eadb0db9f02f7b736bf4b4f23540
SHA512799e03ec5a28aeb78a770b72293015e4eaceec81c7f883fef7fac2cdc69d9e9824e0d3f28fbb0d189cede823a3c564d38007b2d3b41fce8be8145958f2e1abf5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b