Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
eeeb1b961b606731adcea6e5de9e011e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eeeb1b961b606731adcea6e5de9e011e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eeeb1b961b606731adcea6e5de9e011e_JaffaCakes118.html
-
Size
12KB
-
MD5
eeeb1b961b606731adcea6e5de9e011e
-
SHA1
8e4ebf5382141fbcac8eeabf1d2b9ce729acfc6e
-
SHA256
b5c8f14c8925476a73c52c5e077516fad160e84a76e7026559f875ca86b3f599
-
SHA512
3f17f593682955905664dbf7a3b26d309c3459d3df9527061d617c60bec06708d529ed4084da259fd411fdec0231150bda1205783a32637d97f7f2f0b60d9848
-
SSDEEP
192:FJjYib7Pih8RTR94qnP+PM0QJIrU6r0bnbDEsg7hTVnHwMjdb/o06c/:FJjYNyky2MGQ6+3Esg71audbg0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e635c714d8b775db871e1203f285b16bdaf57e504b7d2bd41b4b9854b73b0110000000000e8000000002000020000000fbb3bda6b355974afdbdd55cedce05708267ed85e5b09ee0da1dbbf56df050fe200000008ffc703b201895304a2c16ca10273f3250239d4c5ded257c3df735ca327583d440000000a57175745b39799a57b117a0d5c6be8e13f4b988fd1ce067334d22b431acc65f8385c135f3c94407be131f57f8974ada63812be5629282f58b0ce2ed7c489669 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8072e853cf0bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433048135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D611591-77C2-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1384 2504 iexplore.exe 30 PID 2504 wrote to memory of 1384 2504 iexplore.exe 30 PID 2504 wrote to memory of 1384 2504 iexplore.exe 30 PID 2504 wrote to memory of 1384 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eeeb1b961b606731adcea6e5de9e011e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54648cb37e0827858c2c35e835822b799
SHA147228a92004e8a72ac0b692847cc34718c41257b
SHA256a75a6cecfb82fa22e82bb51a73b048e9b4d49cb3b7ffe2328c8ccf3661c5098f
SHA5129c23d3c2de20a4db66ecee69ba780ef6a90c6188ec283decf84741e256807caee6c9fe0fc96adbbd631cd6e2978616c5f2443e6f2dc9d32da17fe2f8e828f73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac77b1035819684814120671c34c9dda
SHA196db03439822a66c85c4575d065150b96fa70c76
SHA2560054c5bb1f00b0c0225547b8ec5be16d49fb72838756eae5238d0ccca4de9305
SHA512eb8890664dd6245c2742aab99daa5a42ee16b69262dffda230bc0f6b428466b3471ebfb3900ebf8f91120eb1b9bc2f46c1883aead5e50568adcd98652af4f88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757ac0d0b8190f3c3f26c586c8110814
SHA1cf2ef8d3591d45c62e60bfe11add6ec88c61663a
SHA25638c94ec20c377bf313251c0223ac529a7405efd06c35a2b7206c71d5fb222250
SHA512b17b5b809a1c8e940c0b6299a217fae5373634aeee1cb5942862f1990e3a5b7bdb827012be89079c7d3f7dd7778b462bbd2d1056b6ba48196070fb3f2a71c6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1aa35f074f3e6905c17ab04a4170347
SHA110e25aabde1f2f3dba740587b3783ecca02a13a5
SHA256bb2425ddecf61b37251b7cbe5ecb53ea92f5143864bd532692cc76b70d78136a
SHA512cbbad5d7e2d01aa15ecc3c027796795b173d4d0bdca3f3bbec94271d6fcf7f0c93768b9cdfedfef703d13fc74c3555c3dfd7159756deb9b28f02784681a50c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff029f0a6071218f2a9333ee430a81aa
SHA11c8ce539989515f51e89182601a364ce75f61cc5
SHA2562df098065341623ea7f227107b628749435610f1bca42005690239fff397c062
SHA5123bc38ec4bbf520db468747da3baf65bb1c1028ca3a152ac3387dfafb3bb3be5d4378e756277eab448df642d18ae871ec8cbe3a9433b371854918ec2290ab6e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e118f656cc0fd991a3dabc9a58cb294
SHA1f26f904a82853615dbbd6461827285cf2172d31f
SHA256ff5e7189dc2926515747849ed4420bfc6b278405c421f0c11479db52513b1f16
SHA512d99d3160a0df79fdcefcb18524832506f6d71bd29a711595ea730d034547bc92669140735b4992db25d6938047db7013ae27b81f4210e76dc5461ac17e023a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fa636cb2f3e53bef451da08174e14e
SHA192d06ae9b1370407f10cc451aa5236b7c03f42a6
SHA2561b2c8b7194bbae72aa90f78ab1ed9834f46ba638b128e304645a70deb47d340c
SHA5121efec43b1da90f663069bb4c480b37079f8f8965b709f5f43de7b8947075eeb8f26ae1a35088d4debf33e2f44ec9b620f7f1061fe16da54e152ea4c62489dc2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b14086caa3662f8798d8ca2428ed03
SHA1d03a8a3a9aa5aee0450a6dc51efb2983ffd4e0d3
SHA256bb87f6432f4b5c3f94294e2096810cf97fe9bdfaa3f9e06babbfe12e69685b37
SHA512674c5a39cdad1a4d1125dcedcb7c80bace231fbe501d532e6f1f4fd1c8a61447133a9c376dd56bf7424545515c4b6ee3bb752989cd351cec37fe4e82e990cb5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549c01ea277d57d2533c6d6d8b6dca107
SHA1ab53859f83d25d04efdde5e9b1dab07ed6b70c77
SHA256435072f6d7dc4c74470460e710917651c9732559ede0b7fb0fb3afc21cdb35ee
SHA512f726ef2caa5d67d5b2ddeefa3e33dec6adfc47e2798b0ac6495a93c26602ea970d5ace8b1b10c297e45b8692b172c6b37db7b1e8b44419fb2f1275a3d12a0e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55924529460e762e2b41269d559e27585
SHA1da3e9b5a29930b2f4590632a13252e1a6b4a6b43
SHA256d78a0f90701ebc4c17885e07e7ba14f7c70f64f9ca4b6fb5fcd1a5db04b7ca57
SHA51245ffa735d816c1568838ce9d198f3e1cad9720cc595955dfe676095ed9fb77f5f05dbdaf2d72abae805b2269bd7d00f5066128ad8f80a6e79786e86fb0fd67c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5abf25908e0fed3aa771a1e837345af
SHA1a0dc00d431f00518e65cf5d57277a2c7abcf1039
SHA25684042a36aa62fe9ec94e160183067c11c251f54d2a9de43de9721514f9738e14
SHA5126b7ae30564a3f078e8121cade7075c4a312f32db91a16543b20483f63d61803de2c5d48dbdb9df739273acf247c37cdbb119336d357534e2c6dc8a87cff4a74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fffd8a5c675e3576cc6fdc17918e494
SHA13981ccfc3153b928eeaa4064a63f8a40d04b3dc8
SHA256eacc132202812fa3bd82ca4bf5bdf3b4cd2192381d8b4dffaae1ec58cf0123ce
SHA5128fd93ca1f38542c86b6bc1d78778c969cc94f7e651d3bd0d5086bf8697f3c09230dc574086308efc78d7b6f60e801b039967427daaaa4f2ea756ea78a9f3ee65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd22dfdf4a1eb6f2408237bcbc3f12b
SHA1b5ada37924478bcaad7b5488d34ef366ba8b66c3
SHA256472b28a3eb7552ce85cdc7be84b8ff81a576818a0f861227757fb647fabda5fd
SHA512be74ea6b5415c3447832b1e9e3c6fa7e63e4fc5edc26b9b1027eb4cc3211eeedf4ed61e84866a36ef8800522d820efb0e828d8377f1333660200b3f4fab2a7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad656e217cd7c6c335a29c29a0af223
SHA1c96172ce7b6de1c63295f279abddf512ebfb1114
SHA2561ec759c9d2b37ce7886b6ca2c9b531eebbf77482a10e9134eacf1cfe46715a9c
SHA5120c6a40b3c81d1531c59d8df890af61a20c25fd22cc0442593b42f625f1fa95ca6159aafbeb458faa4e458145d00591f86725e44fbd1b68b245a7f603ceb2aaac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d86dd01ed89752abba94fd7c3e24a54
SHA1dc150231368229d3737225c4a439f95945a8a739
SHA256c9b04b30ac78bf781c690966affb3f6485b8a307827c9f253bf28f12a764580f
SHA512ed4e44fde11efece3650b8e615180261ef5db99bd577e779d705ccf8b90b55b873190a7748cc6d3301a793cdea07f5d2813605f9172b051fe47a272ba7edc973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266ae9243036ad6cbb7ad6b299a86858
SHA1314aa75949174a81b05c184439af68b5dffedace
SHA256621759ec3ce7110fd24059958a011645ca863c7694f4926ebe6a5394d655d997
SHA51282dc8d3212be2ad8b85b0d2926e14a7d4ac12fddb2b73730017e68a323d6fea0c3433699c67706a69b0a1138fb5a47028681beca3d5e19102e89b398b99c2e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a693e3ac87902556be70ff7b938be1
SHA1bf7f88936be2b99b2958933e5c3af3c881bb34a7
SHA2564756254d55b015ffaef738e19e97be5c908b4186c945c13b115527075cdc42c8
SHA512d9e85420718f558d9c8cd146f67ef565db3af9085768a18da5f8f92dd7113b95bf5bf5a862d4d8df608d564f67668a82855b997ce5c0710e6b747893ae36ce8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55380276f80de7e4ab1fbd31d7ca8a967
SHA1c0673b2bc6041c87b55edd106cb3d2a4fd0a8175
SHA25653c92927d177ca78cc9713c825b3206cdad02a3f0fa250660a208e20ad17cdbe
SHA512f438fa0ebca3e499b0b8f6a3744d5db01a6c0ba565145fd0e13a8d25ce29550b65fcb3a1a17f3d8fbead34123a4590873fcc43afb0ab91f3729385c2fa26f7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a0c5171bce855e6479954b97c4c6bc
SHA1aed411fbeba1cbab0aef0c1fce95b77169a861c0
SHA2565182ee1e1040ed687cbf20c6bebfea9712d7b9fafa641f8a15a67531513d59cd
SHA5125b76efb11378813cbb3aa13db34811ded726d869977a223cae6fa22bfa4a4c87013e9e55ac8f8f968765be7b1c330143b1fe81f20195d003cb02513e5236ac7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b