Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
eebb1b58353cca5d23959c3eb62ed207_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eebb1b58353cca5d23959c3eb62ed207_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eebb1b58353cca5d23959c3eb62ed207_JaffaCakes118.html
-
Size
73KB
-
MD5
eebb1b58353cca5d23959c3eb62ed207
-
SHA1
b18baec580a855d1d1b98408091dcb2bf23afa7f
-
SHA256
e1912ce1952e0a5804b7093d80352abe33318ea54746bea0d66c8a8f50ee13a9
-
SHA512
f83318f645292c361b2c1541107b5bd5f64c1e2fad36cb5dabc5e6f55108b4fc4d46df2ee22f61f683f3a70d50b6be30fdea619a01d902a98311460f99b51cc5
-
SSDEEP
1536:v7+aSmFuiDuhGJfn9oLNP0h5fi/qzdmGKgA1Gf:bBnCwV9oOvwqzdmGKg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000009dd76b983d85336672ce103b19cfb2af8ac8fe5aa346eda8d41a00c509daf939000000000e8000000002000020000000a20bb3a875560f760a8cc500bcbf1a15cba6e720145bf49a53a1e448048c00f520000000010a2a9355306f5f0a45b663791a00a3f6ea7179debb02a95aa0723b194f6122400000006a9279ac9a7896fce664b57e88363fc2bdfa90b87ede36aa74f0770d0866cc3da90d05e14e27bc7e8324d6f75ace68448416cfad91fb05245930eacfc5e9d73f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57389C61-77B0-11EF-8C40-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7011d52bbd0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433040341" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE 1340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1340 1804 iexplore.exe 30 PID 1804 wrote to memory of 1340 1804 iexplore.exe 30 PID 1804 wrote to memory of 1340 1804 iexplore.exe 30 PID 1804 wrote to memory of 1340 1804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eebb1b58353cca5d23959c3eb62ed207_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9d54fd08217c652859c7402a1b0b3c
SHA1437671a39ed52306edc3a41ec2c4358b0ee990fc
SHA256ae2d459b678b643ca38744aa1b564f0f88b698d8bce3ffeac25fda87be46d4ea
SHA512afe5d03c2c54ca5142a6defef8e0ef5ace450a931f937d3a0a99fef6dfa10b81ae2caff5f1750638970f011e362179c8f2fa65a76367207db0a5fb821c277bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57807f9cfe042d090f373da9c71ce7cd7
SHA17634c68b9dd849118788e8c54afab5aa842fe297
SHA256f139835e08b3e3606ffcc03a345cfb2254d8c28d2b6cff28c3e8079d66cf3d85
SHA512e45d2315f367c9d7d8279c4b087d7278bf3fdec1fcefa074781aa431ddd5951a6357ef36009a063aa11134ac45544949736bc178b837826464711d15c1bd8ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b2dcba3f9ee127b34436a9893db34c
SHA1bd1f8ec95914448983471db323ae2e00722e36b9
SHA256325fdf61b20a90e999765e500677d111d6785f289f8125f7a30ab77517a18ca1
SHA512bbf03ccba51780b08112cf03df661bae4672841c4102c97441b04f973dac021ff207f0a085df3bbb66b8585cdfb05851b9bae446e5990f9b216d86a6a66bed4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83ad6c2464bc6b078e1cc708bfe7748
SHA1ea9385592177436fdf0653b4c37a6713d03408cb
SHA2565c7426325eb8515615699dcb4158415066d19ce01632353b038402f2a65da5a1
SHA512351c12284297d97a77a0ab03e795202f368810981bfb60b52859fdbf7b956e1755fc8bd649fbd65e1e50f14d100a88e2411482b22f8595c61df3db5b9f9a4323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4ee9eec98aa2f951bbeb29e0051408
SHA1b932ab1d55766e747cd597e86bcbb6a54a2ecd3f
SHA256d926f2024fde1b370ab3d22d6ab74fe762b9ce3ca4ee1f938a46e3c70fc980af
SHA51224675be8c497e20931410f6130d9ea784bb9f0c9f7bcebd54a69e9e8ad6bd2f30529ac1f1c0961eca6cd6ddc2141b26759b514e7e327fa8f6adaf441d1ec7e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53864ba3b2c2fd3245a7aab9dabcbe0fa
SHA1e440445b6b56f3be361f3714cd74fafb653bdc60
SHA256fdcb9de7ad31148e2db817a61f4110091db8b5029a3ff7789c934d210b4a36de
SHA512d8d751e6b7d4850c6891912bc804489d06e20b3688240a3f85a5fd925bcc186b2ceb39a118fc319eafcfa67eb73551b409b06e99c6f1237cf31d68277f6d31e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e959f3e282414e4b4d54657c0b7ef853
SHA16b233ab3e30a3d6846a24d3b3b37da5eb1775c2e
SHA256ca0a771aa1f121bf6449b9690ed19794e095e03bbc91f41a7644c623d70294cd
SHA51283a3efa8ed083fd6c305e38a361496a73587ce4108594a0311fd9dbc4eba8a4bcee6be21679bf0b8f84988bed764ebcfbb0ebce83e88c39f59095038775099f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df44275472c08ee88b4948efd808f2f
SHA19ac13430689103d24a8c3b9e49e79e2df333170d
SHA256b9afe5bf65b3611d34d4b2edebecf2d7b4e9594d55d3d2af5aca55dd7684251f
SHA512577bc1d32f70638451344d8886ab7247425d30ebde7b3663b22f8d4599054d181de2057275b28c0b9ec3f95bc11d697b4335a777155896bdfd4565a389617da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc1b28785f673676c86183c3d40d69b
SHA109f67cd889fd23ced0cc772242ceec4f2f97a313
SHA256659a80086282be123a23de9ba0428de060f3716186b2f759a24f9e1f2c39a2d3
SHA5126dba66e629595e9baea66f9c83ed2ede913c19fda859c540181574191a51547db0c3087c1d84421c22c4c79b75a0aa6697401450de1ff1a02b0f4e738340c373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aaea722b5b4ea72a88cc171df2c4f76
SHA122bd1a6c719f3a68d2cd2828022bb33519121b94
SHA2563fa3c7ffddf1fb4dca4e3f4e9c5830f72b6ee286b81f5c0bb173f395b012336c
SHA51298b1af85eebd8e74c6fabdab68b6ccfbf7d489f007356edca121ddf85683558e457431142f5acf4732325230e8f74f12896e2fd424b17654d1407d10a6a6d050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a4cbffb69d34f923ea6e224737e894
SHA1ee7dfd54c8b13b1599cec992fc7df0cadc2bc19a
SHA256c6a9cf18fb573ba71baef547508997b05f44a8857f9b278a12c2ca08f0dd618f
SHA5123f537263b564fdb1cd9cd718be6c0843d0426fef67363700d94820c64838d512b45db0022191a2fa19702bae24d4d9a02de371eefcd64949a4cce15ed2a16098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c90dee1df1170e659c418cdcf867c7
SHA169ffabf34fd5bdf6fa7db15ef09f314f9002f62b
SHA256c5dc0c2213c4091f1f194e1c4142bb780b4fdf7621b49787afde7eaeabcd0fca
SHA512854871e17e37597ea99f123004e973239b804141831c7931e7623272564ab6e8f6c98844bbd3e82148704f77c9deb8c9d7423000b3d20d46632418489653b566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0f58e8d30186e7266bb4758aeebd44
SHA183fcf3b2551ec95f523c455070517f78d5e1007a
SHA256bc08a7427392ce536218c8d2e1e47e50d7ba5d3ead6ca1a584028b118168068d
SHA512d7b1810ebc41ed0f511964c52780979a9813649f2b1c04e343339a9e4aa91b2efb373ca2b9d930c7dc3dcdd7df4a2f6e450174905aa02c864183ec1cea308c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57efb13b0c3721885e2996b3a4b08d12a
SHA101ce396664dbee89e74c3c69011346f749a42714
SHA2562dc2fd7e6531605a06f0b24081727db85d9cda82e2f088f461fb656e79114fea
SHA5129ed61063fefa62484278250d28cbcc3a1dc212f0fab5eb49a26f44ee0a4733438aceec46be0454516d8ef3fd30c189ec3685d7eb17c28d55468f3d8895e792a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4b9763b3f8449d9e2203dda8a525a1
SHA17d731b283815677aaeab1873f35bdf188af774be
SHA256e1d8945cadb0232a81da6a5228cd39c38002b6f3309fbf17680829486cb35b22
SHA5120c3479d43a1896cb770becc9b9aca92b2df94a587eb24bd8ac228d5960fa23362da471db63649769f1d2d6d34c03197732f4b089d05f8d58dfeb4398bb6b524e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac91f769420fa1900b9a84e0fd28f2f1
SHA19384ebc15fe6cf85da1ff4f132ebdd19443e53f1
SHA2567578d42fdce294d2536b492fc74b9fa58e2a4aec0d30f07943d477e77e0e5d4e
SHA5128b0d9e0ca1ac7c8f7c03484287ebbe0839ee087af440772a1552587933888fc259fd296c3410efa27d8a26a3b432a6fc9f20a8f226ac4538f694ff4b94cc4042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c761970c994eb3affd79be962aa763cb
SHA1d5a0b307cd0c2693bd051ff1c5f793d1e8b76db9
SHA25653677b8b205980cfda0f5d461f081a62c60218a255af5143f350f256fca93d51
SHA5129bab7321e8196ccd2e2fafdd593af34be6876e167f934bed7ef52f0c553640dbf2bff7c085313eb0c018a798d4277c7d8ce4362bb5cf0974909e2114332b63f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b2a3f459bc7d84e4a978ccd85612c0
SHA167bab0a167433de7de7b02cbe08c1848564f0c8f
SHA256b23cf3326429bf9c9465ce602100b806831345c5ebc54e4b1641c29ce9367a92
SHA5121446688c8986e62a1ee39e60963a82c111fcb038a8e0c27399f6179928aec9623416445777a49279bb09024b410a026c91eeb157dd3c26d73bba9a6ddac249f2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b