Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
e117e5522de029a896c9c8145557dcd8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e117e5522de029a896c9c8145557dcd8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e117e5522de029a896c9c8145557dcd8_JaffaCakes118.html
-
Size
6KB
-
MD5
e117e5522de029a896c9c8145557dcd8
-
SHA1
bc46bd999e249d661d7bd03e6268458301f1fbc0
-
SHA256
58c77ac9b4403512ec2e075d6a8dee63912c20782cc5854d98ea5cc82a55095a
-
SHA512
e90893f97a8514c204fa278f4955794f908c3712bf44abdd16fabc71b0b74fdd4b8a6713632fd0716a5996c923b7f97998bb928ed26854ca692d788baf77f9fe
-
SSDEEP
96:uzVs+ux7jOLLY1k9o84d12ef7CSTU3wrHcEZ7ru7f:csz7jOAYS/uOb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1C2E9931-72E2-11EF-A444-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432511961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07bbff2ee06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000034bf0b4f3475dc29196a1526c67ab64c2669a2590f724e8e1e07ec77429704ee000000000e8000000002000020000000e0d77729de20848b14c2ab445a2f4c058a134dc9158f039133302aa4909f95c1200000009f41e8f71b5ec4b3e09eff82c91ff867315eee010605ff7eb4d64bfc86c9d0d9400000009bee8ce846b8d6b72ef17cc9d8d4dd5c70761fb9ee8b45ab2a3214d85d77f84b094d5e5d89d1a98fcacda9ce79e6f13527dc2f4c26dd35e0b4442daddb6c942d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2408 2096 iexplore.exe 30 PID 2096 wrote to memory of 2408 2096 iexplore.exe 30 PID 2096 wrote to memory of 2408 2096 iexplore.exe 30 PID 2096 wrote to memory of 2408 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e117e5522de029a896c9c8145557dcd8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c320060fe3920495d15b9f9856ff07
SHA1f43b9b51a8e4109ef9f36eb8f146515ace964c12
SHA256d55e92fb10b70a508a8bc7e025bbd54e85f9b327c05cb2485b7606c22e8f5870
SHA5123efcfb847c0fa62a6deedfd448f8e5165e9b4181ea135de330f1cc4e81c5ed8489e715a10d7128e27f022af061b547dad926c9721a91e6b5a0a9776eb511e833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59388c39d7c0693d7b54ae60f7edeee7a
SHA1d27446427ce783672f240fa373ad23aca232f313
SHA256d8fe9634bda0ddb8c81d24a3c4b69aa56d6e07171dd8ec9252281fb7379dba1e
SHA512a3f716fa67e3cbbb47bafb4a82878748e2777d5b27129c972c939db85f4663928ec233313cc14de41eeb7302014f2f00e42c2403a1add1dfae6fae03a91a7060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43ebce1950fb55033db2d40842fec2d
SHA17619e011cd03d9042e794bb6b5deb93829f37095
SHA256a23921eb81796da13e43eb9606012f5980c7988d536e2f18956fb1a04814b372
SHA51249a2e7f95f6006323f8b3864b66e13076e8724fa7963d3dd754d3fcc9110ee16f750ad9562066e48b4f1dccfcca5fd347f4d6d2fc3cb30adfe33143f81995da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc13394278d54e759dc1a8d4c9214c2
SHA134e8654f665b937790b20cc2c6becf9fc17b061f
SHA2566f084e9bf1219d9c0cf552cb39ad209e0c457a85926bcd9ad41043f993f69eae
SHA5129a9d51cc3e291f82542cf05466daf444c74b2fa136c4579cbc350cfef18b67ab0f199a9f7c3adcae4478ec0a9b8baf5ec09b69a301eabe1ff077b2ac2799a9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f233fba9298dd7ebf77d0377cb8845d7
SHA17e0eb4564ebf84fea7027f0b7c6b2fbef1706976
SHA256860d6e063ecb1d6fa8292234e9205f1c55feb298950b1ad62c8ac59c3cd40b94
SHA51261183885c50635bf22aade52887563ebeda5739a6f26f95a7741dc3fec2cd7e27cfc876a8d855a74194763de543b201a4db290e0181db6ae44ef126cfc81684b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a80559f8762c4ffbcc60a9ac352c893
SHA107cbd4050b68727476db27bb906378717c9e5576
SHA256b9db34ad4fadfba6e98b1638af955c921c0e61f5db61347a61fc276a6798edda
SHA5122e402b9482dd1f3d1f2e570659b0041dee844612821977e27e077bab000b417b77f58d94ff404be24d4a556b8fb2aca43301441899ce7dddcae1866df19a0f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2fd3ad36142ea602c5d78293756068
SHA12923279a3274ef55c77efc32f1646d626c57279f
SHA256164516575b2279b402ec8181d71be7c2487b5f4a9d8055d5559049316fa5b654
SHA51220f53415a44b09b14f9e04454a128b4342bc2bac87dceeeb7c816671e2cf40e95eb722bd17797b5830566ce74c20f5470c9079823f8608f00dce8a1d4884bccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb58f3f6da4af6ee5ff57bcb94fbdba8
SHA1a2ac253ed8ec00e6d64aa94351a80af966d6cd19
SHA256bdd953dd4f158407317f4a17b2e26c358e7f6e2fd970577059b55c07be6f693e
SHA51298528d90c08bdd503d4015c6248cf5db7c7331c0844641e635a2a9f2f117625345a1e638668242946c30d7ac27968bf1c236755420fea56c96984fe9f94844e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c40586e9ac99cc88624364a5f42bc2f
SHA18ec19527726eee857f0ca8537a9bb5aff83ea8c1
SHA256af4fcee36d2bd92624368feab229b1fefd894d24a771e87508ce6d1a19f170b7
SHA512f16e57114362fc79957b695544e28962b136e0dac9fee9b35e3340a57245b8eb32b2de179fac3e08ee15c2e0459cce32fcec702d265a8f546ec2336b56885cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6530bab37d6f03514cbb424e062a05
SHA1fed87f8dc9562e8e923a0914ad2b75b3e4b15b69
SHA25612450ec9a8384e0b07677a7bcb95415e8330f02279d7d03f0515b0110b4003a2
SHA51247ba76bf179d17e0849b64b6cf1ab9a80256d0ca9b666539e97d2b81eda1916e443c878c69557c59c44d1dbaba3e18fea204ec17f275ea14989d9d61e0923fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce95f66f2f07bdb59c8bac0b8c5f0f2d
SHA164712966ca3db518eaee7a49f1f33d1d928e11bf
SHA256849b01d0cfaae346a5a1da9e63b413c4546e85de49b5a17f5cd7bfb9c2d69f01
SHA5128d675cbabc5247711ffc320d9c3b3ff13f88d997a0571796524864583629aec7d231d1d26bea4118c27aa8e1b044b30964ba0bec41711b888eca1128b960888b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb42359a9aec721ae503a5c5b0a100d5
SHA1f12e9b5ed2abbee5065dfa4d1686bb594d3135e8
SHA256028c67ec592c238110b05f7903a8f99ffdb91e7fb60b7ec3e78bf644731450cd
SHA512c034df5c49e25e3ecebb020dcae25b5286063ad21ff83ca21414ab8db87fe7341fdac5aeed54bb13bd0ec9cc2d1c44b9c0e0e62147e0452e1d26b7c8ed6f26a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56481eb0439b9b606eb4468932646ea38
SHA1f9faf455cb542ed600333ab6d107635bee7b66d5
SHA2567438e1c2d4a883eda2761c88e96886eb76105ef2ad363e080f73e19b4ab21af2
SHA5128aac5920fe0c1ae0fff96c160a73e584985539ad19e50e52b596ec69e16cb0b633e724cbfad6f5c57d33ceb9b59b1882f996ee51065ece0224174650ab9ff3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e381995678b9a76b13185b63dbae1652
SHA154207eb4c92dff107c625cad2368ca93d1cff50d
SHA25658d7f6f6ab64fb851a55c43a8b5149a389f665b4981463fc1f7059d628dbfa0f
SHA51263c5a7d93c236c961db4147fda5444a947a15bb6c06fae846dc1b1502bc0e2e5b6e23a0e6656e88c1c9c6bf4f8ed1622795f11680feff18c42bb27028af86b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535951255960339055c3b4e156055e3ae
SHA1be835c371d9291314ff2673acb845ef9efb4b55a
SHA256602096aa3079d5231b560da01a845d49e1dee251b09bb4eccdb118aa4a9d93d0
SHA5125aeb0ca34cabb836dbd36329182ebcaa739ba81f88c0a54a94b506428ac701ca88f149bfac04793233edf9aaba4085e6c0947ba48e995237d543053fd6386d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525b9af2730cadaee91d10d806a98586a
SHA1aa20d9a93bffd48e45c89f027721b7a68634c73a
SHA256e1b39b8cf14603b0abd79b64cc15b21a80acc8f54c5a0ffc4b385f8b56912b25
SHA512df2e0e735f418c11fd65e2576396c8727b80f879efc4e6e0b9025870c330f1cf089da18a35f3a12684b4e8b760be6cf7c35f4b2aa488d72111c94f6df5248c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f61ac898a5eb785e56cf5be374eb6a5d
SHA16df055ea5a41b2578d8ebe04a567433a9a4054ff
SHA25691159115fc0a0bcee900d11802a0612fc649317331113b0d940d124578ebfec5
SHA51260c54a9f3d5fe41410069ff19c6fc3517bda013299415dbf29a9a1dbb0d8e8d6ad4f8fbb70fff8d62698910e068e8b02b22432d9416d69db9f44f42b87066cb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde6cd9b054d89ea958b0cad26ed9786
SHA1b55bce0f8b467175e688eb9cfd7a06ba6c7a7aba
SHA256e4cb96559eccf5bd3f46a89e65f026f4595d036f79829dd0f26de7f125d1b5f8
SHA512a53f10ad7bfdd9392a657f48d2fc60b56418ea251267c56070d5b99d067922da830da8aa623e20cd7e2079386d57b818a912c92942b2ba1f5022827b4095c231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564494c569a8b680c2d8ef8de646caeda
SHA13911f084d1aae560375628182bfb3ad377c592ca
SHA256b6ab78acf1da37070007c8c35692acef1f0ff6becfc602031e3adaa04da6f804
SHA512da003434b84269966cc4a8d81383dd55ee9c157a4055766bd8ff22718050853c7ec2d8c49d31cb86190e06fee91c213812744b97080c4ee6e118f41ebc79feb5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b