Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
eeb497993ae98986ec92e6b088a40623_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eeb497993ae98986ec92e6b088a40623_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eeb497993ae98986ec92e6b088a40623_JaffaCakes118.html
-
Size
108KB
-
MD5
eeb497993ae98986ec92e6b088a40623
-
SHA1
346b71e4dbedb4666b85578255fda1426cc988b2
-
SHA256
4c5686d876d98e5ddcf0b689b63dcf55e7640de9592dcbd8d2030c422d03b249
-
SHA512
b99284e89537a742b46161faa80c9b2642f3505ca8babd0903d0c51077e897f55a194551867686722f84da45bdf40d50403344d0ae4cceb6c628ab488128e125
-
SSDEEP
1536:CWO16WL8N9+im7oeghYuqnQjC0lvuQzUG4p2zatMV:CZ1JgNk3iu0lWtczai
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0200fc4ba0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF7BFAB1-77AD-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004871c61e3baf9ba72b825a21fc1b3981b9f123b33322c2098b438e58e7196871000000000e80000000020000200000007fdccedbea897e5cc7300001937101f19b51dc70599dd8bd6e02a24445a0c22620000000eb6e5bf7109c7dda2f9d6ec5fcfc204b1cb94a9a43f945a791a95285c0315d8e4000000054be2c9176e24e2429104136f80ac66392daf7ad662b720672001d17b5e00ea31174bb9bcd173612da2fc4c1188d2c000ca399b0c8dd7ac3b09efe3851de184f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433039307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eeb497993ae98986ec92e6b088a40623_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b6bad7985cc484a2a2d627a485aafcf
SHA1108325e4fbddcf1a16ffc091db5e7087814ef631
SHA256bc5b977e3c7bade028ee478d25c6d4a536f03b8adf4731f044038a7a08b286c8
SHA5121bd53559c9d980af4094d3eb6ba94a5ee77904c9ec5c4893724f695841bda688d3361f07ad5a09714480433661b466382fd0cc6fae50c3cabe60f8aa850951b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cc69fbe299d790ae4fddadf9dda134
SHA1ae208a4a4f6f30e354baf09e5ad9992a5ad071b5
SHA256d1ef47d18491189c370a07e8bd2a806d0fef75f42b0e6b2fbafcb8e72f692243
SHA51250587c04c8286dfca321f57bfe3b74d09afe35287228204fbfc117dc65f7e8f6e3358ef6e364218eee2da351f2eaa191daf850a57d6990132fe48377c44f56b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53898a3403c91011c0bbe9c01127bb625
SHA1ba9462ea0cb7c53197909377bce46bc7ef118512
SHA2569d3ca154454b5ad51c1aa7b45e90740762e87d682f1b80a0b3be192380970e7e
SHA51228a9339e98f5c821fbeabc8b1c2cbb116ba0a3373f4b32e7e756efe778d06d558709c84cbf01536d41e37572669edef05c6c645f032d0bc3587d4d76f43ed07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe25a25f3016a6f7b942b8e603fb02b
SHA11164083a80719a7bd86cf6b98865b406d9232c44
SHA2565e7bfbe4e1de2a082de0ab7dad645bf3c5cbb75c11bd088e84c960e2a37d7a22
SHA512d547571a4dfad4030d4ce280a046026b9fdd2b34c8f13a9b3a44550cde55229244b6b568470f706b9c2dd76b0c72821c385f738e17685d5cfc3c95a976c655a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24bfdab65cb63c5f7b33e8014376a16
SHA126515869708086a2060094dcc06ca0225dbc4a6d
SHA256958c63e7f3979abb77d6a025c6d0ea556c5aeeade68bc8026a99ef467de76537
SHA5123edbf859d2d006a197f104bb575e05640804543eb3ec687af947b183c3976e74f3462ff0f6b8b42cd9c778b7fec2a3704ab5c1e842e30fb2eb3c571559a794c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ef10f9b8a89bba9c8850efda6ca5f4
SHA1f112cf3f9ccb2424e70ce3f42dcfd96048ade433
SHA256b2f1db9f4e8acdd7596f419992f92b34eb28d41cb6926d859cdf72e1d6ac0ce0
SHA5125db781fa70e4a951ec537ca5427a624798f20e049a73ba86ac12d380db5712cf283734d16500a106170fc1eaf25f179c3a878eb33952994cc93bfb011f3c81f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ababc2985a4ab8bdc868a251316b9df7
SHA1689488f2e9c6c2210c1c7cce2726de787d6e897b
SHA256185219de91969d853b0aa37b54f6796f9cb4682877b96d202d3742a6d1e8b106
SHA5129441fe744eb76793ed33b03243db89be426defa7326bd6c8fe8b130705104764751e895a80175e87b9bbe95b2a734e01692a77dc02dc8a924e96d3554b2aee53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e424886327db93f9724b0094983d28f
SHA1cc90142019f224d82a7dfeacbd8f7ab60e52ab87
SHA256666465a16459a7c380875063a3ddd245cb582ea7cf550cad3143abf4055f2213
SHA512d7f8c1e4904f4f77492232a8a665c8bd88d0d90b7f469d9e33013253eba35fd0f5d5cc746f84a835826dc10c8a8649997eb4982890559a0eeab7b900a771e9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f509557bb816f533ee1b0450eec658a1
SHA181a54750938fcad7296d08b24b402432c6ef1ae8
SHA256349579fcb9d7c76f58d78c8bb122dde5012d7670aefd0fb8ce91cda4f76df01f
SHA5129ba0ef01bbe1b510f45e4292413cf03f0ab6f81c1d070d6eac4542377c8bc9cc5f2c399f0dac6dc59c571a5ce18a2ea8eda5338adfe384d60a466eaf136b754e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c11f3d2f069219b9eefea951d515d27
SHA13de381aa14f5e1070616e8a5af4ebd55deb1c74e
SHA256acf92f8a1f0abdc2b80ba68bc56c3599498d3ba7d4e5b5218137367459ddcd2f
SHA5127e7efad921d692c3a20ffad4248158b301f0381f4e5540ee8bdc70ab947fbc77a9dd4d5100f45e190f683166c544de67ac5d87a252e2bdb2f3ced83e66b8ab8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f7274268eab3398724f13b402a6278
SHA1dee8444a0de5a37c8c824a0880bf82ca49ecfe71
SHA256d8cbfca6672955c7a4abf071af1556e86bce05e0cc88a2c1c78992a1f0fa215f
SHA512eeba7dc4a62fadc9dd8ee5a18e0d140431af31f710a4768a05fc139e0834ca9ebd65db69182aadefaf95c79e0d74be2dabe0162c7be00e77c17472dd5d27f418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f599ac3540e7103bfbb593da4cd1fd
SHA1ec54bcec059d36ccf051c6c19ef89fd97fd7e907
SHA2567307d32d75c82c7a759893660ce409227f91d082f996fc6a242a082823516392
SHA51293c4bd25d749b622a4bffbf10be9cf98344d705099df68c8e016375637a4855c324bc2f4a84e3b081098c4e16df95b9a6ff452c7887c45c60b3cf770aeddafba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6988b5538166e6dbe2de3a4be833a9
SHA139f164aecc37ee9e40b26bb82599abe118f817c7
SHA25696122fb706173d55db25840ffb3647fcaf9f919ffca3244ae1c175910869dcef
SHA5129f37a045a25ff5e89cd8b1c5da0a76b7579ddc8ec1b3e8a51bf6b7c88764a8e9f5d128f603cf828d460b3319e56136a9d89fae45da61e6253d1d5875f1ade6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e1f213f37440a0febc276ec6755070
SHA143a6f325159150b553af8bcdfc24ae5cc255ab32
SHA25635a4db59e7b5ccab64621dfab9c3c8b8a4921ebbe83bcf16c7f7d13d3293f683
SHA512f60aa2e57253c7fceb9476f36d4c9653072f9d5330313816d2f2c230b0169441f3080688307e76ae5d2d93d82c223a9ecffe3cd3e53b007d32f52ce61870cf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55077bd70de85d582259002963dc17e0a
SHA1474b8920603b668438f8685388849679dc614ca7
SHA25671efb5ac91dae337e5c5ba0dd473650fd3742ce8da7713e9e5d5524aa2b0c421
SHA5126af2eecadbdea0042d3af28d67454ccb3afba185a430e9fa050d87d9459f54fa60c62a4f0dc04bd3f91b8d0fc87467d6496422b494e333024510471ab9cda8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50a9a32e65598e53609ec5b2bdc892b
SHA1743765ca871d2bf0e937c758a01a12586e31e1e6
SHA25660190bb9353629ace9edbde0b185c29d35237dc33d518bd622e48d766bc14b9c
SHA5128412f99f345a5f2b99eaaa7dad7f801c02abe1842928fccbd0036573763c7292e8c299677ec59aad55e9292b8743de1d457b8163651f85fcf2ae9c4c19ada5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2e6de757fe35f0600d431f8ee46f3f
SHA13fe29e28b9bebd65b3489ab6866f5913be90f9ea
SHA256ba567dae6886c431e71dc3672e6600b975dcd8b2d769b0fa377149f03afc2a79
SHA512115e06f178dfc4246a10b70022c1f55f72b099e82b25e44c194eda5a8264c4d2c1e823a0cd48f284cf46be73d28cdb9ff99af1cfb53cd315e518a9aaacd21646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efcce12a0b7407a032f2b6e0594980dc
SHA1bfe1acf302cdf82b6af66b235361f391049f9f0e
SHA25674d8871f5e7e22db6dbe46b63b3c832517a19a8df452d00ac2387af6661ebf45
SHA51293d279b6ce38a206875023d67382fb3fb69761f10fa99a7dd274d66d713e54da357c7ab75dc560478fa3288bff8fdf0b75b4d2ee4a5041f6a51f6cb7035bd731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155dcdd8b975c35e379c82fc6097b37a
SHA1badc043b6a7e7138bc87e3b7dab37fe8d98d53e8
SHA256546181e88006ab34d2b911925dc9247998453df8ff3e6f2aeb097653ac17a244
SHA512dbcbe03b4a4ca136b051f7d78ff12aea1dee710b4ef3f10b3f9b3f4c3241a106913f92ed9544be381f2c757a3070a79fa4c0624990d7f81f4ff0c28eefce7f6c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b