Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
ec2c66b00c7f9c71aec18d3e8d55fad2_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
ec2c66b00c7f9c71aec18d3e8d55fad2_JaffaCakes118.html
-
Size
4KB
-
MD5
ec2c66b00c7f9c71aec18d3e8d55fad2
-
SHA1
8270f95026d0bbdbf0366a4de248a4052fec7d09
-
SHA256
7801c1db4d332011362822049e96dfc0eb2f78fef96bc3f2df9a52bda559da09
-
SHA512
dc71772cb2e99376a27c332e3f65ab96b3dd61a9bc46e84714570338c8042ec2eec311ec305aee945746005a925bd30d981efe58f1d888cceebf28d9670e7a05
-
SSDEEP
48:t8ajELTksa+KyvLUJZavtqdVWvupMiOdbX3qQk6kkmkTTi1Nakpn/LGlC1gZy:VEssIKLU2tqd8vuNibX3qM85qYT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440265695" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E6AD4D1-B967-11EF-BE65-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000db50929f41c8344b00530782a00c28000000000020000000000106600000001000020000000cf241414a22c79438da70cb4c5aa2658a5df4e7a4c97462eaff789f48bbf5f9a000000000e8000000002000020000000092bdc0af68aa512d9fcaa70e84714992bb84231e9c27b569cb7c5d6fb18a4d5200000002cbe34e92a79861d6a3a2140e17aca93bd7b9f4709c15bf41e8c83d7e71b5172400000005a3e9b676ab414d722a4894050a44d1f07194018cb7c068aa7c42c6d8b2e557d443fa8d8867dadada912ffdfeef39c2148432e7f3de5db98260793ae6c405f99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05ae102744ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2644 2820 iexplore.exe 30 PID 2820 wrote to memory of 2644 2820 iexplore.exe 30 PID 2820 wrote to memory of 2644 2820 iexplore.exe 30 PID 2820 wrote to memory of 2644 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec2c66b00c7f9c71aec18d3e8d55fad2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ddfa599655dc498883a42cefe9e756
SHA19c98cab3d11c3764dfa3f1d9c868bf534fede4d4
SHA256c4e6abea317e297cd5b09fc30997be2a44be6d8d99f9d5498a6b5e6e6c3c9485
SHA5129dbd51147dc843177531d863d05b9066ed6178ac1b39b28edfe77c2913e1ace5508cd2b22b883ceb42888923547bee8c0ec30fb00542a2e24ba72b3f24f93aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1533dcfcbed243454f2eb200f38bbf0
SHA152d41fb4e156174dff1522d73f9a1bd1e172dabc
SHA2560b8d902ce44b1e2c5833e690d3392a1cb2ac7b1ebdd0a03c29174cba2cfa3a75
SHA5122536ccdf5fa40adb4fe3dac3d65a04beba5ea15d5623315eb5634861d4c4c4df76d194159870ccf1100f07aee32cd93d6b998f417417b713f47d1c7c562e0c1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e01703e7f03dc898dbc37b667a81b28
SHA15660d9b73932fa6673092b8c343f8bbf7a28c65e
SHA256ad526bf1edea475917310e050e972794a20e7ab3dacc04b546f32b7b1b49e9b0
SHA512dce3acd1df7cf31114b20ae3be69844aadf495073b1283e06f3d6f0dcbc5c4fef96c375bfc8c791a4ef2edeb0d1df25286c62260b89148fc1ee179c574461f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da97ca9f14b76ac081bf4154ecbc7ff
SHA198c47815886adbd7a7708c0e4f4baabbb75159dd
SHA256807d4c1600fc617efcd79c57586f2aed3b8b25e698b0abf66b90cbc49e987057
SHA512292c7b6c6f7dedd0b77a5c2d607233fd859624ca26833a9e85faf555b8fe8242e383d7ea50afb2d3a3467313a3809c3effcd9b4556642a7980cc8e0d724511c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549bfa8a66cdbbd67be37ab030b06c86a
SHA1dd0d02d0c92da887b5817e1846e3902e56cf9d3d
SHA256cf215d51bbdc5b7639167d8da0d795d1f28142b8b4999b2df78fdff5090c62d3
SHA512f0b3a1e482cfe2e265b986da478b07624be0c1775bb32d1938b62457cd65d6cc49c03fae5fa0c76c4b618a0266e898194264c22fa7a6defca025e8a55be2baf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c0cd3f4178f1dcf4340f57e4d76a98
SHA1ca060966ac808e3ad83765946d17fef65fb6c308
SHA256afe5707882488de411b1ec3393064f10e050b6609ce3b4eb2d99a6c87e8e847c
SHA512c56a96d2a5758da99262017ea50d49721b1bd822a32d5d0a6e96d677e5357db227e24d72a52b1070c109730601edf52101df88e6ce292ab6c142e0f3a906ebcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50178e057afb5d96deb5c2d3ee3a3213a
SHA1649ed2ea7a9355496968a12f2dbaf055ecd5d57a
SHA256f4c543333482e48bce6595581c6a73fa08da5c1d04ed8e3d88aec3fc20584d47
SHA5123a0284944e7d9753fc1ee35a519008625f6704e85bffe5fbb3d1c1e6e3683fc6ac07eedef024b7b1d75ef7baff5e3a3cbe72df1fd9f6a89f2fb445b83ec39441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adf1b346687609e1c3194ef697e46712
SHA14da982050b12679ba444f08326f400ef09268dca
SHA256bfe17cc7fef08577c23ec7530927132b03059a4948fa0ca85223ac4ec3d114ac
SHA512baa5f6d72ad08508b96ad4285035246bce9316bc41c0359d6014bd524741a1a8ff65aa0b38c24d992ec54658010a72f9c4b74e17ab8dc211a2032d93778f2c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f4d738289847889caa641fe1cfd76c
SHA1a3a9acddf994734b8704a93db33db9ad5b27b444
SHA25662ee4c1f8722f252849f3acdbf33e0dcc1c668bf6800e666c3d3cadf80b1e66a
SHA512ea6c9155bdaab5a680a03dd2ddceea0eb6514ad3000552f83af82a50921a0d2d5a7bc4fff4f27c7bfe098e3a6ff655e7aff2d884b843c3864d9f7df7ad62cf19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0d5f25d3f2ca22719c78408e028e9e
SHA1d7ee0cfcac43821671452b91f8bb40fd12af4f85
SHA256b2c6db8ab099605027b0e839c998ace68f5b6c530da34fad2d77c693c46ef29b
SHA5127b940d14f3b8dc76120208874d1dc402f74f768d0b16f53dff6ebd5d4b94588a033a31eebabe219984e37551006a1b542f117f813399365bbd612e188a245d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26e0974b22c0d88ce885e65ac5a3cea
SHA11e960bbd2df946393b0a5468b0a94f73385680bd
SHA256e4f826856a58264892e7a36b2f9a71d105c460d6af76303643d0e0ab5a80b0fb
SHA5128b58a555e68860d9df5d9807f6c116e2481db170410acb6d07d739c9a18ad39876a0ce23906da68066177ca77f5196631ec8133c33c8987131c1424156096d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52616930c075249522a360d761372fc93
SHA1cad465563a6e19101cf4afa981eaa77a6b786ee5
SHA256990666954a271b4bf509b43ba4a6b2141de0104c63eaf1fa8aa25a14724b2f70
SHA5124e03f254a92ad6e597e0e6b254a68dd73b2e530f3cafe0494bd8fd68a6287879d6b831eae2d3059eb795d6977dda8fd67632fabdd18ba35df245a2f99414fac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599dfe290fa1dcf61e7638212b03dd250
SHA14271d1d5ab535640a909268854301a74d3e8a826
SHA256eb5621c614c545d02b0165c83b74cf1f10c46e4e967d04c3a2a9bf77d1e72698
SHA5129399aeb71b818d375e1cd09dc1718c9af7a765e740164b0db876322df0086d84231c0aebffb0d78cf8fb1e9fbdfd10a5f986dd45c0d24ecfe8636d38367e75c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a320bc1b9db2cd876a4269a67cbfc52f
SHA1b7630da4354eb6ddff56c541f6155cd3a93d12ee
SHA2569c69ba4af247cd7f450bdd7e0ef461c88e8731c67e76673012e125f40745f7eb
SHA512bbd5faa230aba2d746d65288fd5c7e1fe5749a7c725fc6159982014e6034eb1d4e2c5bb0740dab8092a1c9a3355f696f9b6a311f5dab5839dd9787cdecd25973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448a9a3c61030c17e2b350e6cde93835
SHA12d1e9ce297630202ebee16dfedd415971bff4687
SHA2567556d07dbb630afa1fe16805225abe32ff4d614b1401ebf4d692150c2ac221fc
SHA51212019633546ffdf843c4bcfbf1ec1e4d867a19d4aff55ec3482060428b630a96758aabf3c6f8d9cd3457469029568ea3a5a9d10db8736f3be29343865691772b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18483fb30cef0007fb8807c4a770b53
SHA1e9253b026155cea4470734eec0830238e3309dcb
SHA25603ba5f38b4a7197154c085b3f653d5bcde54e82c77a0a9d1eeb4460b37b43b09
SHA512a0b4b982f17e57d8c0a8312afbba658be4c908ff54919f6aeccb3f38a4ff943724a406dbc279c23f63f864a68483a3ca62b044b8a39cbe0d3081c99ff07c6a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028258e84f2312ee6f7812f110049182
SHA187a97e69ca21d5e3702f3ed7762692610fa94cb8
SHA2561534054fc049c184e1e80836fe353be2ae28922301e852598506dcb67b60ce4c
SHA5120b01e249f785cba12fd8aa415bef94fc450fce46e0044e6a6df6a2a7ab337fb356221d4032f6b04a44e3e5b9e0f1eeffd1b5de4903145eb7195067992040d67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689c8c392d548affbf7867c22695e6d9
SHA1d5dc5407649eec73e644ef15dc44e9e53a51a943
SHA2566244c12c0f2a31fa184751d8ca97970a1a95f09759ca97f18c3b38705989e69d
SHA512790bcde5c3711ea142974d8477f5e75496bfab9a3f7f6ce90f1c89c630ff3d6941f7466a01770b2c506dd719d4ad072d32ae369664831e09b05d8b7b8d3f0443
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b