Analysis
-
max time kernel
66s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
e123de5cca7625ff902e2341ebb6682c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e123de5cca7625ff902e2341ebb6682c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e123de5cca7625ff902e2341ebb6682c_JaffaCakes118.html
-
Size
461KB
-
MD5
e123de5cca7625ff902e2341ebb6682c
-
SHA1
09193481171282a77647e3ea625a98ec7632f32c
-
SHA256
e38190c78bd4a92dabfd3052c9f47c310cb2d54c6d1148dd3f054888d0cbcc0b
-
SHA512
3af5440ba58e7b4cf9f66f4a9862126a7184ee6369a67c2e5c7062749e92da9a3a150192e058855a5935bf4411152cca3087f7d860669d806caa15bf6daf12b6
-
SSDEEP
6144:SRsMYod+X3oI+Y+QwsMYod+X3oI+YMsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3u5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000086263f8f2634e3caecdc7f9ffe6b1d454b657aa442e65c305c2e5af026677bc3000000000e800000000200002000000005b6643c722b8d7fb2d2d43fe5544b97505baf682efdb9193c2bd3577e4356059000000033e2e483da3b07090a18936f41c627b5f1077516236e6511da449ed624524c24f557dee7d05afc2d704f33988428f24e2403c04b18e342ffd2c52f6d73cc410a6095af487e865f8dc7cb69a59d7bcc869acc7b04c89de1ea7c5eb695cb929856b427accdbc8b5853a666b23672796df73fd1417ff09fd20115307aa147bfa79bcfeb9fcabee60e4022ad58be26782d0040000000e2409b29c552d8fafc810a02e501e49760285b89cfd0874b30b066f68e663f3d433fbfebc51ffe1b5bd683075827746599607522144fa9cb54d07ce1b1574472 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83F75DF1-72E6-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dc805cf306db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432513853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000fdc91c0716907e2ce217bca498e62cad201c8d80022f971aa6b15f65bfd55f45000000000e80000000020000200000004a8225d5d63d9ccf1f6ecb46a3ebace0f1fa1e6633c659344c9b790214a3e9a0200000001ec04a4124e90c38a329cdb8754f3096e342ef37f824aacab7b3ac557dd59a9440000000c6bf35de3bfd192f789010feb55cff49a6b4649e9d476f0497997d2a85055dc664a5640f9f6cd5a3b58360868c18dca7e59125a6ef0ab23993f576d413c00719 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2788 2208 iexplore.exe 30 PID 2208 wrote to memory of 2788 2208 iexplore.exe 30 PID 2208 wrote to memory of 2788 2208 iexplore.exe 30 PID 2208 wrote to memory of 2788 2208 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e123de5cca7625ff902e2341ebb6682c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6bed375f62ca6d6f88182993837ada
SHA1bb78d9bebdff3b506832aae6b282e8232034e015
SHA256c37367b0b31d8d49fd9b1dc8138b3a96117fffd98a8d6e8f07e210c67e5fce0c
SHA512893a534713c70e8f7c637195db3314ced3b5be1be26059227b372239f3ded7ea4bdb60602cff31387eae00668ae7a43b23610375de43341d13a9d155bf2cd0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53011fb0c5439c971eff9dbad8765653d
SHA1323c14805f84e9943dd1a7ed411f1bd9a17ee431
SHA256393a1e7fd28a99febb2eb828bb7c01b6a698faa80f57f152dce9d92420b563e2
SHA5120e45d7eb3adfddd1d5e7ac3edbcfd3d344a005866b487068c6152dc8eaa5e5a043f46b95b46afe415ec69923e8a5b2df7580cb467007707932a9be4303fd5060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c0fadcb26ddc8cb6ffa019b82c793d
SHA17fe18ad1c9fd9a5f1dde307baa43af471bf2bae8
SHA2568982fd03e59ffc9d5f8729a821afc132f3b8ace6bdef36c7772514958f28d60e
SHA5126a02881d5a6c64ff54ee84a45ac9ce12b8bf65c4644572e3e7c914d2c475faf84df110fab67027a734ac382a39610520cb3a553da83538ebf4429a37ff73d7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3b84c0b8dcd4ef7d70cf2b53c18ef6
SHA101357fbcde0b065777e960555f26a1ec68dba129
SHA256e06d4287085da68b0622c08243fefa69062ced9935cb4f982ca70cfbced4eb58
SHA512a87ccd3442758520b61d26bb611b18a4bd2907f2db87b2762e2acbed9764f3b68d666b06e2e1cb9759b6c18d0b5c49bf77f1d0a3e30b0a9c2848cf2e4c6ee03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b620d58b9b9becf0c9f5469b49e631a4
SHA13d69e0912c4ac0cd3b76d50cbc7a65aefa8fc246
SHA2564c361636228f75c6bd657f1625fcce58b9f5c7109580fffcc5e147e3a919fe7e
SHA5124b31255deee1fd979544326306bf6e5952a426a77172a85483055e4525f684f4348f305ab78451d3c00c870dc50de863dd4dc1b24e985cf210cd67802a076084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e05a91d42f68cb6dbcca03071d0209
SHA1b351ec373eb03d7698c0d19f2684ae79bd4219e6
SHA256051aecdec5e464c902c3305485f9af22464ec12b19963699887255726e141070
SHA512229b72a7de9dcee70c035bb739552c54f735d9002dc7f4d9448817a82d12be54a0e0a2f03f6a486917a6675d2e36138d15004a6cabef5a2da6566b7df10b989a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542d693952622f4a33344b44ce2036bb3
SHA1516f7a7f0860f02db064decf97ebfb3fbf294a66
SHA256614fd47c6eb14dc5aaccd5fd1dfb1dcb64f829681bbd124cfbe9046d76fc82be
SHA51295eb0e7b5dec02ebdbba1ead106d3fa9023e4aa7d20481714f60fed3f0f9e2b07d908061a38d4c66f98c3d143fa17f772fd32fe4ece76bfddeeab2a0e1fb77b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4fad41bdcfc0fe3d71351940fe549b
SHA1ea2c483bf9fbb27a58f143df0f0a5172baff790f
SHA2561d0c140531443082c1dabc8457b808a74c6b93e7f1498c16911942e8407ca778
SHA512012fd9718b0bf613a94636ea77e4c4ebc242c6d45e354dc0abb98de4f156c4fbc96cc8255a094dbae9bd5528ceff0de5d9b3299fa1b4b7a431d604a2f8db83b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6b86e05bd244cb5959fc3cf5c486bd
SHA13d3f0c6123f22d12ad416aed1978c78208ebb2d3
SHA2563f7c8aeca334b5bfa2603ccfdab96f9f824e2aee95c9d6d985b9d4b75bf5c106
SHA512aa540b8f6def1b23fef17a54695f821ce7c14cb4c3a683161ce23f3a872f0fb8e04a290f5dadc53dea37468282c53853a8d7ffefd76c7f2d96f56703ad16e3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5f60675f3579cb0bdb9571ac15e183
SHA13cb0d8e40b3818dbf60466572712ceeb066fef76
SHA25673b47d7dbe29872b0eb66e079d0a5e8bbc95460bd66c3b2e39cd228287925c3f
SHA5121e62ab4197f7a6a9eb484c5b3b9678a9f90f2473b7d4494b8f9d82aac57730126f41d46d6d0dec8ec0e82390a5d68da2b69a737613059ab46ffb056b3d0abca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb35cfc3160e918d2a28135bd01cea46
SHA13ae5e8339538f5b7c0f7fb040098f8f85f0cb8e1
SHA256744d3da822ca34366200dfb84ba8ae8d41e38bcf0e1c4c681f988a3bbcabd6ab
SHA5127786573c21562b6d44c58808deb642d7e76b533747ec4f1c46a697cb21da51b2228d6f1e389e961442ebb96628c7242dff41a87e8c34d5e68da2aca6156448e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f12eec3b4950096689ff0d49495bed07
SHA1c9ce6df62abe28be5e7fa356576797e3a700ae65
SHA256893ce0eb639d4c8e9b1ef7c32695b2139c859493cfca1751c573236187c74c6c
SHA512aacf71be8852eb4b5e23fc158da232ba6f82358de29255b5b815e2f75beee0ded179c75740043a638be3e4837df0d8566b29f53a1e44bf608a21d5e041eae795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf5e1862f80495bbd51d9843e1fe4de
SHA1e35dc15decbdf722a07fad9c8aeeb0f58dab7778
SHA2566e74ae9fc7e450243f9dc7affd124b418b3a805fca099437328927771ad80089
SHA5122f57ed4d5e5e96123904be4ef416be9303c19a8ed9453c45bcfad33eeb43c48109ee659f91e71e03ee9cb4e35afe621fdc736120e547fae007fb5f6f11bca433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394439b3a15c57f6d5e6508362bb85ba
SHA172f84522b683b234e82664c55424182501fefdf1
SHA256362d1e93208fa0e130ac4f78590900080c1ce299f2b0f7ad862ae7cd0c8bf2f1
SHA51270eb0573d0f754f0c6918f27aca3bebfab5a1aed36b957bed16f6df5152906d3f4d73705617a2dba6c2a03c35b774ba29344dc877734705ab9af01534d7b6c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebf6bb1315ab2a4da4928286ad18ba6
SHA1d602be571a58bb984ab7d77b60d58015ff640e96
SHA256bfa966fd711aeac493b5ba1343b0ea8eb37f5efcb722d4e8d21fc14e01fbe310
SHA51220e6ad929ec1b6d4f02b4734cd11a10f5c0f149c6ff45111091fd62dd968f08854ed6413e7f91bff24d33e08a970b643c497f74bb162aa8e914f2a2f8431c462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af1a2756046abbae693871c57fd600d
SHA1c925849fa10f2ac2c574b9d50d4afdf053fcd0b6
SHA256296d95683393aa669494c76d6aa1d740800950122a5bc9fb79c4ca7ced9639ac
SHA512307798cc606cb2020b81fb2723aa0692ce72dd1ed4b6761cd67aece9643d9c2099a438842f2ca66f2e7473be49e6a063a9383c871e2cba09fd12d945515897b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f062a34e0e886bbcadc1c014114d8584
SHA1995c28b816b760184b8b51ef973f967e2d604c6a
SHA2563d2edba626049a1e784377cc5ba108c8c6527f0540007ecd60dc033dcc2898b2
SHA512f02a6da9cc43a2212d1b97c810154a2c9550c42b3975cfb20804e5223e310f5f4200a5a8d2c35d337e26b200e4aafeee3563cbb74d9ff0e555e6daae9cdaa751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f24a847900108bb7381abf23d73d540
SHA1ecbe1b81e506e2111b74ea20576f70aed87f0b49
SHA2564aac554efa3b1dfcd98e558dc4240995673bd3e178a6551cbaaecb1a9e1b3c3a
SHA51238d987c392fda6918b8bef69145ce7ebc88019288a97b38010adce5967e07507218b53c2f8580211eef95dbdfaa4bdcde068c001d7717e31bb7b82836d87d676
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b