Analysis
-
max time kernel
108s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
2eb61da07a0ef9b41391164313d00702_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2eb61da07a0ef9b41391164313d00702_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2eb61da07a0ef9b41391164313d00702_JaffaCakes118.html
-
Size
18KB
-
MD5
2eb61da07a0ef9b41391164313d00702
-
SHA1
5f579b66dc030ca005ccd88f0fe2a789ed8e858e
-
SHA256
a76c227298ad68a4e06a6b862d931958d60bdedd670b5d46e30778f4eeecd325
-
SHA512
31664e6ce2c26c7bee843d75cce45af2f1c49aad1b125f8667c7e49222d166c6b2ad77306db11dd3ecc0da00144539cdfef1d1145ce490ac6d390087c6b4b210
-
SSDEEP
384:XqlIc8tio4FkGPNGTHfSFLLkkfe/gRTmzguLZ:KP6g96xLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008e3e465d397891c913ec111717f151d5b2565d3ef6ff605090bf9620c357b44e000000000e8000000002000020000000bc91283ac2691c1a857c2f85ee64bd0a81f3eb1f0782b5e180ea9dea8126445120000000588c5e95dd42c12a715b6078206c2cc9c73416c995c4726f2383d6d00aa0c961400000007b7bf466d847e41fc9079efb24263d54cb1dac59485e1c2c892e2ce399110a11be775507bff74b3db76503895e4fd2ff721c9234da65eea064efee1f9788e343 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304a5c53981adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{511F5A01-868B-11EF-9704-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434673708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30 PID 1640 wrote to memory of 2372 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2eb61da07a0ef9b41391164313d00702_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507796eb6d526d8763f1627e789baa902
SHA1532f929ce95c8b63134eeb36c5c0d99714618da1
SHA256c730a5c149dcfe1dff319ad6323621c48ef259440f2e547c505c6c1d322f9c9e
SHA512ab6cd92228c77f2f5e4d5d74d113453fcbb6ef15d24d863ad81913a1866c8068a67fc35b2e6d1db606c0ba1058f13f422281bcbc224277f6b911090cdba8d5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5944c8f9c7e68169111768b0a2002f
SHA1ba3e646a284be6daf7735f67c5c837ce59107dd3
SHA2566f02bbf2fb0a902a0bf0f1ac2a0d92906ab5a65da92a9a04a5b95e38770512b8
SHA512011298ac57cdab1c49173e022f1ee8fed5ec5b09c0ab2a105189af44da822c2a77b9e72069257e45e2e35ddb57917f3e5bbd7ed7d984164ab06a66a31bc8284b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c840f5f138acb5049d7081541e7d72
SHA11f4bace4965a37fd44d6332b2a14a11584fe875a
SHA2566a1fe4a5b3ac8164b5dde5c5f394935dbc47042d7e95c56182c2a08e8c48a38f
SHA512c8ba010ab5bb02adc470f086d25b15081e28fdfc09ff6abff2ddaa2f57a14aa4f0d826ae5f3a44a76e5b9ee49060661b405ca0859a784edc1824abc65842f979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd808bb2f6b915747500776a18bc093d
SHA19c18a8b5764d86eff45845ca960f7c566b44fbb1
SHA25657f1fe1d7c120c5c34843c694549393c632ec79384df73c6079fa629fa537ff0
SHA512b461f0eeded851aee70d6f44fbbde3cf399b08db60e80c23a3a5e39396d948dd9570570947670e432b1db39d8cd14a4db1e21108804660736110a8c9f2b7d8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3041e547a30d27798f4da655580fd02
SHA1d851f9bf2d94ba5754ac0f25d63fe26a5a031703
SHA256d8052e43eb5df27596de7aad694bed0a411156669e05def1a35576fc7e337aed
SHA5127358f8c99bda688c27349106f7c2dbbafb93c0d64cf3aa5990bb42ad809c2691f49ffc3cca65ca58d068deab0529ff53a63ecd5dd15f992a7b3c7addcad935fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f11a044a6ee061f74fd8df10ed7d5220
SHA14e7bf622c151d261bb7bf856839a361c31766c6c
SHA256f04649db02f5d37bb5b0bde1522592b9bf114b93155b6f34a6f761d151189fbb
SHA512d85bee222ebe4578d48c5362d4ddd69e24b051284a4909a9bd227f733adf7aab2c66ea8db961ad927c383e2363c3d4e47c9f3c124a2904ab04efcac4639a2cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51889223e66ead1f669e544d8cb4904ea
SHA1d1eedec139203a53f8f447f709d187bf218ded83
SHA256440e0a6f2351c80af2010459f463ea3761f97379342e1583b18ff174b176b23a
SHA512ee4bf0160fcdcea19db7026e77dd91b3ac520e112ee608960cdc07e48331de891a52fb34550f6adcec9622fe7e42cf2999cb4096373ecda9b63159b27f26c620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7c33e012a0a7b3ba2eb70d82664008
SHA15901d1bcdb846246960b495cd26c6ee1ff01f9bf
SHA256418df65b1032fb51b46bbf24774140061c4ba611ed99fe1f001adfba3d2a8793
SHA512c4a0b828618e0dacb74865255b52d388e41a6911bc64ce20988ae19b1d5ec2fc7655c4f193c306cc8d420226571f21989caf285739a8c42c25e973442aa96b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8b6b02804e972b3984c48bdc67cd8f
SHA1b8b914a976d9dbbdcf2a2bb9bf7694d948fe67bb
SHA256c3f6a6f81611262a145e92457ec4c098a5825f6282b3d3f27dc302fda2863c73
SHA512bc3eab3962b3e5d7557180f42a8e4115879201330def5580fb0ec8396259fb46c546cd18a865e23da8cb426f1df8c80904c143bb27a3b797ae7f1f3b02bfd5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4de9e7d91381a4a23a45c695375d41b
SHA155c06cce13a6e21b7298562f026e32c0323c1a5d
SHA256dc881ac193191d4b4b255260ef012cb417d9d33f80ff34516b297cda7df2983f
SHA5128e760a1fbe25254b6989b46d2020d4b4c4b6b50874ac7f1e5d9d0aff4185efc403677d5e7d164395332fbe8658122f0204fc0ffda490bfb0fb3827f6f870a710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f1ff3ed1d2ae70081211ad19ccb9f6
SHA169f5e038feda39bfe3a7b6a2d2a280e23214f0f2
SHA256c0837727cd804173a06bc5e02a45104a6379a06b368729309fc2f4954c768a3f
SHA512c068cf6c775221b7431b314f27682e98492b6a181338abc043cb08962b5dbd1ebac2b41c986841dc8864d5a56d31a5219caa29609942cc78d964c3b6f1ba9fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f31f259cbd186bc58747ea6e0004491
SHA1668351179a426107b968b118da97c01ca475ad6f
SHA256c3cfa8e231e5fe93fb4fd93a56173d963d511a3fac3676da1bf4fc45ac02ebf3
SHA51242a5077d63456105af4ff5adf0a4223e9d501ba4f8cc1b05121d07ed1a70ad4c8d93f6027478f81a703a1df1b23cafdbb1aef61c7c1b8bb70d6dac38027fa5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e2b03ea1c1fb531a955e41b6c8653c
SHA113d15930b06aa5337692c600706c371a3a41a58b
SHA256d01f1427de6b9d5f3056c71f2919cf54fb93c42b43f9bffcf4d5245958fd4ffe
SHA5122c4d04f66f8a8878544447b637aad1af284a655546c92888ca4f80238d57f84769a294aaaba1bdf09276f8de347a43bc08b5b9362b25bfa73850475ccca3a93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2445cc7b0ae0ee19c2f19e402cb0ad
SHA17d800cceda33bed714cd9d63899737960939405c
SHA2568d8ea64f95936cf60a130cba495e04bb9d65b2e6b6d80cd6e27f1d38f56b0e91
SHA512e529bef51d7aac1eaf08af9e4ff63408eba441ca1c1433773b422ce9ef9bcb035bdd51e9b0cf15578fc33dcf1d44315c399c5587536fb9cd343fa3ae1114fed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b69a9c0716f5e3f168c1ca730fdc35
SHA1a9f7fc69d411e7c4f8475e5a45fe0b4c8713b821
SHA2569185a194c59fd86375316750e1072b672c33aef220a119e7e02e072fa4266688
SHA512c462cb76e5d4a9b9839aa8eb3696d5cf031d0055b328cc5164f435de433980f4dd5b6ba9339d69ce57064d043fd860b7becf6203f24f2cf23e5a836555b8515c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1665a1e38280435dc429f1127ccccac
SHA151b46190d1dc0b9faa0dadb712170a348a4ad37c
SHA256093dc4050364e03a70a805183966f3368c5dd061b06480a5956b8270b4415bf1
SHA5122e4c96b5d034ec4e9442f4816489f4fc6bb0fe3b2fd62f55abb14e4e78a05dd2f8ad8062328e2f749fc1917c5afb1bd8397e9ea6db7af493663d6e37d56b5d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8e92029ed0fbdea9b0ecf83d9003de
SHA19ead5a7e482c3004f18206383c9b87c763326bb1
SHA25689dedf604026b1aaf8790a0cd2f9da7c87f0dde3a686eb45f64110ac323b5dc7
SHA512285040fd77215587d13113818b3d8554393437f04bc23bb03e5d571003529d219b17a7bd23a9220864003402269e689a3155d2bd352d209e41741a4d5271b0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79715db6ce14d483e8faf045606a266
SHA1fa71785d26e75509acedf7f38a8f4b7dc52826ad
SHA2567117d9e8de8f07f6d8eb9ad52cc3741708954cf507d50a0a2073f816a2181174
SHA5129f30fb2eb572af66f60fb265e67b596daa05d557ad24a05339dd221b0ea71052f4430eddba13e2a5890350c8e05cb284f383476642e18c62a62b6385b7b23c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f3fd9ea90ac477d96ee37aab37b076
SHA15354aada459c549813752c1ef2753b1584a0c9af
SHA2569614d48b79dfea832df8878c2a42008ce8b028f93ac3c73da7797ee15d230133
SHA512dd215670104ddbb01e55f787cdaf087c4f76d10d594f20a33830d8f2a0b03522acbcf8de3e0e268ae903d6dd0bc9b84040e8705bec3e8c396257a82695923523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d370d5471ea899d1875ef959b66d5d45
SHA1082ac13fa0caa615d0acd8677caa3df26106c546
SHA256df141177de7b898b0e983d892293c1838fa9c3d92b076096b8ddb156363d0b0e
SHA5126186029364e030e3b43373ed1ce7c2339c193da6b8664aa85f090b31832436791bb7876d17858f27056393d005d2d77c9767fc840c1827177f9841bff5519e8d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b