Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html
-
Size
55KB
-
MD5
eebecbbb2ef23792f7bd95590a37611f
-
SHA1
2109b6d63ff40df6d2ac823c0bad48c99195f704
-
SHA256
0ee1e22892eebacf2e217d7737889e24de60b1ed8a6af293f2cb62c07cb6dbea
-
SHA512
67b8820c3625ebd5d7d52b17277b00e6c8638a8bd15f07f756b3bd4460f9010ee704401884b9f5d6573d57d1901aed3d21c36616ab24ae41e6d6be875eea2642
-
SSDEEP
1536:hGsIgSyEZdFY7reguFu5yh9EKwFrdgXgaHNk4RP:hQgSyiXRP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433040955" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b353d14502b3e32d680563d9f0d37ba5dc8f94a8b6e0ca13821df7bcac364c4f000000000e8000000002000020000000775335740f7edf9e0ccf5f8a87bd109cc61dd1f2c73bd7fb688f2be4a762ca3820000000d9a807e9510be4974aab2f58d27f8cb76c99ce39ebe4257e76d29ed1430becc440000000219cb8e289060e3e922c9836881f32f2ef637840ee5b9253cf2eb9ebcfe4483372942052382c7bac3acb2f63cdff8a53cdf55f9f5d1a8c022b4999d3adb0c920 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c098869cbe0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5C72C41-77B1-11EF-9F30-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2412 2180 iexplore.exe 30 PID 2180 wrote to memory of 2412 2180 iexplore.exe 30 PID 2180 wrote to memory of 2412 2180 iexplore.exe 30 PID 2180 wrote to memory of 2412 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eebecbbb2ef23792f7bd95590a37611f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b149e166c744e3ce240e56f5832beaa
SHA1100ff049e46a6ec8676d20385e1129a27bad1d01
SHA2560cd4f96473ef72446ada1f672590867aec2950b3dadf661e828efae42f5697db
SHA512fc0d85b44099d2bde62096997285b7502070d39b237508af18c49bc1ded6ea3d51341db54fe9d0bf7373aaaec17f1196e5851d268357f1368749e69af1cc29bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8f4e4721b16db195dc0dc61f45c858
SHA1bf08c99d24d176c8945da6b02d972a75fa98947d
SHA256038dcbf6ac58abfd7c9e423e2d5084f80a270342588c2181df59b410a5c29731
SHA5127806a8f09aad7f95245276cc9597df18201c39c615d9c028057ba6e045ccc3c61965a9beee13e45eb4b46004f3b578a38a5a81a972aeaca72f2813835a4816f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cb7b30a35a5ac26cbac1fdfd308a5e
SHA1b2aa0bdae271cd0f3d0037b2c4bf37e2200769c0
SHA2560a57d53a9bf2e0f81805bd6f0ad6cfdc785eff30ff3d648d3fb3d6530fcafb2f
SHA512e03c516e8e59bcc84a70e033647957612355274a37ca6aadc32cc34774104196a09f425d0ead962b7fe546c7b844051c9f9ce7fa99b24959b39315ab799c893a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769f0b2df55f138472a76b55380c0db7
SHA1b708849aed3ae63eb7586f9b883f7cdbb81c3d49
SHA25644f95c504ee224acc0c67a3ed62f1caf548ecf80dffae9ed4a1956e10094d2ee
SHA512bdbc001772f3a93bc7778d5123a212bfd07e4b692ddace128e1bc922d280e4a52de2117130b8efca93f397ce844ba60fe579adc777e538d275704707f9d95681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568de89ddd95c086b8d2e62b120f1bfca
SHA13f54f5f77da3518630473956b77a040509f748b2
SHA256c0791b17d2e46e9206958f6b6ad97182323231726137e08b052cb0236d7f0e47
SHA512efad05143c9a6d8603d62a9d481a8f105432a29e7ebc20f0eb400a7a796e23b713361cb991a930cc83a2334a03de90e6f16813f0b8fc5471dce3999f15cc0e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18e042d429bbee7ebf941701f8e2ea2
SHA1fb5c5a7a8748f14169f88fe9d673fd91173678b7
SHA25678ed733b642e3b846c8f07cbc339d919ca99fb44b7ebf6b4d9d54c3f0c9a10e9
SHA512cf9bc225f740a7f3f84a4439bd9c223da963160aee7e08805f08b00bec037cf62dd43b817850ec1afee3f07d9bd974f0773661b8c68ef7f8c87e519bf1119e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591f15c45fdb57218431375e4560b098e
SHA1e8ea6c918519d048a4a90d5c70e6eb89c4b82471
SHA2561a0ed86e8e4c9b601727be252bc66fa7dfa23ecfe9aa8c5ebe2d18cf95756baa
SHA5122bd122e52bfdebf58db7fb1b8309a4ab4aecbc2f9bc1cbb9e4730b52bdf3154de663015920d1f7f1908239e55ca8ddd3a1f2ee7df168190a4d6a8e74ca2cbec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625faa770ed79e29855381bc10dfe1c7
SHA1e003601ab4d6c300d04acd7b6ddfd5cd17848342
SHA256511f671ee80727a78dbef1e54255487633d0d84aa083d793fd306ea393d7c033
SHA512dad3626def05d3a0693d989a140c3b3a7ac0e4ba3ab1ccdf150dc1af070278cb593871bc6f8ea0e32c32e3a777a8f501d7dbacb7846673a44454e58ebf23c978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4dcd14748d2a36918bf963d5955dde
SHA1f7e4794c9c172be45846b338641507dab79d41d4
SHA25642f18cc386083248cda07038171125b936358eb3f47c765afa24391542d39649
SHA51204d7f29cb297614c80904e2810075733734e97f34c205c3dc629fd5a1e04ea9135ba8086427e5d47a0d82c35249ca9e74c015235497e53f58ad76e3eaf39aaa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafcdcffd2656c002f0a7e22b6bf2947
SHA16f2ab7ba5aa0794514575e8ff8aa064f52731de2
SHA256e27cadb91fcc28da546568909fbde4ccd7667ecb29e6d9506a24b034b6923f9a
SHA512ef01b7ac1e2a946f1b25c8fb00751a670c47d60bfb85188d0f203eadddc4eb7983d66d7d5fa7ef96575bf0b27e7cdf686774674ffef269c40975d872731cbf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1a1c6daa9df290095911db2b9e50b2
SHA18ae61e5aef2d0ee38203923271eb7bea558f978f
SHA256c1aced9dec0853f86a8f34cda0fce35b256a34755d23509ce79faa5423073eb3
SHA512fcec2df03573474cd64a527e6c59b42dc7cbc61d80d707c4e625bf1d20a68af79be445cc70dfe4e91781bb74fbbf79d2df52e402530a00487bb352a153807cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f44588e9e4196a1d7e5d01dced00df7
SHA117c024b4935762d3e72e1df9ce40f526fd30c982
SHA2569a8e933946e284e1c819b9393248aa9b36857015838acec6f3c8ca70ba821f91
SHA512c5f527dfdde1373ad1df0655b204f56ad77c06c5e9dc71a885756e91833d04950e31d9f3da0720ff119036e0b1f79681143dbf6d575fd759db67915cbada0caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb50c4db7b853578620d8e85e1789a8a
SHA17fdb80d28917e7e49089bdfffc6d71f6b373363b
SHA256da80c5b4eb4ee346e73499934d985afff6d9d39cbca84c9edb7fc763f2d0a917
SHA5122f083f98871ad4af409a05739e0519ccbdf709254cf16a2a1d414d844d5fe4a42d93aa7bb74a62916a1d04d419f1835db68aa5500dca08368b164eed9ee57692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d3abd5f238ba7f53d5e4ede7f44b2b
SHA1478eef554e9a89dae6cecb5e6ae2fc8c7ed31297
SHA256ad911e060abaebd9a02b221153d000d627534a103704bbb6d267a8db8f83982f
SHA5126ddf2eb7202b41941b9327d9377fcf972a75e8842321eda429d7814b888b2ea1f87015e49401d973526d3b71db0afe848aca3d47097c706e44dd021996353678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcf5c07da60b56961bfece0a48267128
SHA1fc1c407343337cf2085508009d4e02ffadfe7d96
SHA256126ec82357bfe95044c48b0b786c978248315fd549bfdacce94c96ed79ae580f
SHA51204940d631c7020f2077eb1c673e26a2ef639dea32b7a237fffa9accb9bac662639a5d4100117d533843c9c3fd03940eea4265e97e1119083f42bd4d50b1cffc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1963f72e8f76e2d0846de6a26c8903
SHA16dfe992f34ecce5485c25bdb4466d1ab7d78d97e
SHA256cff143381a27e2b390cd6a1477f04298bbb61b6b7b9faa1253d335a7c7210d27
SHA512633c73099b8d6d85eee61d78d41ece9e397766fcb8a1f4d50d3e88251cfde0ae7567780ecbd29a0065b3c615259770d9c95f618c6f8015a57449a8d226febdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98fd1ab60e922733e7fd12886e6152b
SHA1f6c1abba08635f38e6d7673ca7fd5cdc7677b920
SHA25668496f36e1254548e4a660eb9629c7619ca778157f5b1204cd5319015e8999d3
SHA5120ac6826ecbdb218d0bd758d953354adade958d104c6715e8399143a6ca6de36b25f9ea1fcc5b2f80bed88cfca47c495556d4789b77c44212f1bd7821cba90728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cf375e5074f88fddcda58399ad7830
SHA1f569edd993077cdae83ac5cadf01525aa809779a
SHA2564c8defed1a218382d57093673b2be7cf6fe18059540b7546ca73dfea7dd78735
SHA5125398abec1870a3b82099c2538252956676d7f9dc5e63a447182c3af446f791b19d25803ce8144fa122b6f003a68c329e50ecf8791e0dbaa45f526a756e8f6e02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b