Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
eee1dd28ae4b5f25b3964343d998f26c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eee1dd28ae4b5f25b3964343d998f26c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eee1dd28ae4b5f25b3964343d998f26c_JaffaCakes118.html
-
Size
119KB
-
MD5
eee1dd28ae4b5f25b3964343d998f26c
-
SHA1
01546a1ff9278b5c89b2342334f3551c269c3534
-
SHA256
135300260f8296ceea268a5f3b1c0dbe06e96e09cd05f5db18c8af72d1a056b4
-
SHA512
e4033d0bce36fbe92f0f4875ff397064bf217e377b266c25bb13dbfe7b43e6426c56d14fcaaa51447a61212395ef733ae81c92020aa5fd739a0d81c10947bea3
-
SSDEEP
1536:eD/uqZL7JYXZ+MDuX8ZVMDQwXZgMDQTqZgMDk9UZVMDSVAZQMDFOmZaMDf41ZgMB:emfUrfUrNI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{362E17C1-77BF-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60fd514bcc0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000af9333d193f0c5affadb6db0aed24a339eddd7fe0cd162a84d1aaab5cf1d4a0b000000000e80000000020000200000006a5ec74b709e6526ab3d0cd4865f9643db3806075ce870a0199dd9bc2ce920ab20000000e5c4dcb2e12fa83286593d835499bf67cf0426e112c7e2695c581795fc50fcf240000000d93e0034ec675be6e96aac0b6427eedc34ae707d889fea27ec6a146add4c96de9d4cf4b7e57f356ed698fd4ddaf9fade8147e1ebfdf944a9897e27fb2d5697fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433046728" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE 584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 584 2464 iexplore.exe 31 PID 2464 wrote to memory of 584 2464 iexplore.exe 31 PID 2464 wrote to memory of 584 2464 iexplore.exe 31 PID 2464 wrote to memory of 584 2464 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eee1dd28ae4b5f25b3964343d998f26c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92e3f58c3d4052dacf70365976d1eae
SHA10109db579ae86b569bc875494e3766ed39c4be18
SHA2560269166e2431ee111976acff2bddac8979de9d1a00cfee7993d59020c4244560
SHA512f89e06b5415cd1d674f42d10f465e6f2803c92bce6cf82903fbae0679136d3624d6e8d6dcd4bf44aafefc206f5944a2df7dbdf1c8bd8b4b0414210a4a466302c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f7878814598339fdf2f23daa76322b
SHA1eadfc1174cdeed89cebc02b7e60740ea36b2f53f
SHA25646da8595e305f1f7591cbd03e4eb513fb5b60838d85c51ec71c49bc3a9bf431b
SHA512da38c598b7d52b9a1491c0d4f1728a4991f6ed7110db31eae6e949e40beaf144b3141e9fa7f4c7ba6ae8812af6ac9ef203635bcc786a17511a1cf98b45f7d109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce727a3e5610a37383ee1e97ea13e5c9
SHA1e98cb33019386183ee30165c082912b09193e47a
SHA256321061f051f5c7dc5947b0036f28cad6dfb865893bc1df6f5c2710eefe0d17d6
SHA51282ace47017f70b6b40c941cb3c750a23043827da9e582bcc28f478e8e32c65125b756319ffeec2de93bba00e07162e8f808fdb673bb497d41431d2cd9ccf4f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c27136eea050f09afbf54a05c8e39c
SHA151947df27df51b41d1ac02add99dcc826823ffe3
SHA256514d76f338493813952a8a9daf7fa31ec4ab168b90c075d657f3454d2bbc55d7
SHA512b2ce0548cd1752d3390da5a1042fd1667e7cc7017f148cedb85100b1f6953ee36a86ff7a1796b97461b9199676d51b99e9b9cdbc93df9a50478ebe7427472728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223cd709527c1e7c2c08bf7d7ef208af
SHA18a0e1f7bf60a2f243f82857202fabf6c2a4c2066
SHA256cd52f1647759c6d7b83018f9756e6ef3c43e62e63d464f39d3e37086ad6b0422
SHA5128d5b85f78e4402fdd09f4a4ae7b1b7662a60bd69c29d555d5049658b63cd71aec1894abd56a74fd976932208dd148b8c5423fc18e65485b3a99bbf0f05694bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5fdd9be646abd6a90817985fb1ef319
SHA12cf31ea9b94510436ed11f6359ee15e992abae7b
SHA256dfbb97e92eef34c40a110c1d3f775b4302b44c6ee42e8f83acfd0e14ba99fa24
SHA5126511854c8d67352b4813376affefb21ae4977c7b69450eb93f87c2c5406cc5a230a799b07a6f20547c9e7b96072e7fd43a1bfbc8c020df4ad23b1022c4222f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbed1f6c6bafd4ec44e620f602dd198
SHA19b646e70c83b0dcad018d5ed665d437abd23324d
SHA25636f1b9f0c5d3997d324fe4405359bb83cdf87b6c643c894a989706f2e71b191a
SHA512b03a0dc202bf1425cf46cb4e4c563e7ae0eb1cf70f8f6279dd760f6bfb1cd5bd1838b1652c855f277010d8b0695f417aca6acff48d135d1126db11600314857d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb512c33842c5b61b798c422b336c78
SHA181a5ab7458141abb7c60b7096e11a7a739195786
SHA25648860a718d01135dadbb268a566c31ddd53ad87f196a8bc8242da9d63602dde2
SHA512dc2c9abf492dd53af0f71d16dee96ba68abab29876f5bbdba86e1f7dd5da48e3fed44bec58fa3b0af4b298317ee4cdb308b18494d4be802c7b61e00de7d9d03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ace8df31dfc847bfce43d48eb2d5d7
SHA19b45f42eaf49bdaf11b948ca04cdac262923c946
SHA256cd3d2caca1cf59d98fc2c649c1a1b16e415b7025ae61fb3ae8c13644c44cae98
SHA51209eee292734c107bdad667d0e8d5700728d441e45d79ed9dcf735f458d9a3147e6e2b70fc95cf08092e6f6a63ed896cbb5c87b4707fac995478d6a587a4730e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5c596fd32d62e567f9ce70324a3068
SHA197eaa6492d11749f62b1d0754979ba6d20899bf5
SHA25674121ad5615809e978733df56a5c1001311572cd4c3c97a3fe627767dd307b55
SHA512d078ab0fb0d419bd6dffa41c39fe7941f874cd9473ad4983e0e7472170b656b65daf430cfd9d3a9e77d5e3d5ecb93c6ca75aa70d43edb2ff3cd61f562870b465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a817452ce1b56fcfa81023125d64b4
SHA190330bcdb0c9293dff74803027e7eaa51e467b21
SHA256d5e3b7686df802384f93f4d43e93c1634f839a5485a3d059a56aee854ff40512
SHA512bce8ddac48b27000c1c6346c86e4f7021a858b0e61ce0551d510b9c1280b1cf5b5f591b1e95a429dd36dc51806a4a9ae68f5358895daae1726832981ff0ccb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce6110a9efde22cc8c8df954e978676
SHA1488199cd298b25d88014c3ca999d394fede6fa5d
SHA256e14f83ab265f71750d211f6b1b2055910e7c39d83a1890fb13d9c3459858193d
SHA512ddb5bfa03b5906bdc3421fe03f0d9722bb678fb86d85f5b9381485e9b74ca9d0e1107db47bc1b823f310c86b75d80552918dfe6492fad7e9244d93df5df6c0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de29131b9e705eba9585b760b7241d8
SHA1faaf69aa0677e583d674dcf77c280c5197da7341
SHA2569ac54a732a93d620a6f8e55773094a29f7e25b5807aa616ebfc9ab2a63ae9fd6
SHA51205ce46fb8cd2b98d989972ab0ffc52620b9c6a418e82659f3ec43a4b6e3b60985f009949ce93cb7132f75632b52c0c9d78b97d5c36a01d4840a9fa05d925bcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb14ae9a28a7a4c5cb4afbd43a968a7
SHA16da2952db5346311379f0b9dd1bef92b418d6627
SHA25681e97209f20a5ea8299eab3b45aecb0961c6885b6ea7a53a161f4921906a9b93
SHA5129f38cde9fe933847eaa371de7657018cce15bdfa2a03d5ad89bae05c8cb02e0fcf4d0547ff48bc81864a397ecaa4a969faa0d3e82d9300314caf732aedf6adc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559adfc39ca15ed1127918c04629d96cc
SHA1719f547d1dd9269012950794bc46d6eec547a541
SHA25632529226ce786f65fd124114e115b91a1f6803cc398249cf256deb193248f258
SHA512cb201ac7e88ceaabbb61444577af965679bab0979ee29cfee2e2c45ec82ebe0652b359b06c0a7206813cd4e0d818e532ef863fe80e340a8795c4449f53c48481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189d7c3efc7dade3a08a8ad730680403
SHA1cb83b4afd8f46880941a2282e1baa9bcc61a663b
SHA2565c242f01fb6c5a4497b1702b377d3e437da941c16c68c49df88ffcd9b8878aaf
SHA5124dca167e036936614700a2f85eade6fc11d2f16d8879a2b22ea727d5f65fc30d923ad8e5819106b477be3613035e12ae364db140ebc2ca8dd77e6e867ce5925d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81d3beb42b97f0fa58f5abd1e6f69ac
SHA184f322645dcde0894aef1be3c44324d83b53b8f5
SHA25623c0b796ca88c5515aa94b32e7b736177b8eb99ef80ca607bf1db9bc8a3117bf
SHA512304332bbfe5fa4e5f47d9b9a0bc72a5daf392937bf0d3d00098e911307e5589e7106e5d2c3651980baba1d7dc769a99a1e2e8536a3aa6ac693a2457fd9b2c5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc0a6f581021cb373127bc71037fbb0
SHA199345a8b67064eeb5ff789251d2e0862ee66f3ef
SHA25613684dcf279e4dc143aa7ec97234851ada492f7cb79d1991f8b775a253396d31
SHA512910999186f77ec6e375c7faa9f64ab7bf75161258bd970edb1c97873c463e1f7fbf07ca911e0335ef39785b4291cd86fc365db6008c826a1e7d05ed4da53677b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f5c57d3be2c15f3f466f7c8b83d2a9
SHA1e1c47f83c6f82a81725e7338c61324873dbdfd29
SHA2561f2ce99ef3857d2a5ed4842dad2d5ee3f1516314eaf55f163f62d0e44f448b9b
SHA512fe64cf6be2c9724ecb0095efb97d71831d0352dee340c24aec94742a8704faf2f59c55324c14a1db3324fd6e11d62b02dc2f3c0bbe0c03aad573d405486281b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b