Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 22:38
Static task
static1
Behavioral task
behavioral1
Sample
e12d25d9603c5eabf2fcb962a068b2a2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e12d25d9603c5eabf2fcb962a068b2a2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e12d25d9603c5eabf2fcb962a068b2a2_JaffaCakes118.html
-
Size
116KB
-
MD5
e12d25d9603c5eabf2fcb962a068b2a2
-
SHA1
72a82143b1b367d51cbc4e9208d6fb9941a2b4a1
-
SHA256
05f581bfbc013c6868db6806fc4072b6f31afc57fecf7983691aa3dd1e83e6ec
-
SHA512
0882c42ed8e2dafc8c56d27b8d47e5c01979508cd94b284a62dd3d894fdb5e747e2015f321ebd99b065d06e0e00f7dc885b1cef0f28be34ab24392a590f44548
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcWyrHA+gRLn99B8cZs33Hhp:sArEL6d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432515389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10470a05f706db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17731B21-72EA-11EF-A51B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002686f9836119671447565e00106b38e1f3438b69677b149aeb743bf0158b1af4000000000e8000000002000020000000cc6fa75f5127e1cb1754c4e5800566bcf360b6bbe406a269977dd88c910e364c20000000a0d69748cde7a9ede0ad6983441e45b72a03ff686d56b9933ccff77904c63ee84000000055f20fc1cf076941ec547295069a323224decd8a6c36ac450a52cfd53d2d017654141e95df84898c5a2de8d4aaec336c2127f8fb7079b4f98c5c72ba9ae8b041 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2692 2672 iexplore.exe 31 PID 2672 wrote to memory of 2692 2672 iexplore.exe 31 PID 2672 wrote to memory of 2692 2672 iexplore.exe 31 PID 2672 wrote to memory of 2692 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e12d25d9603c5eabf2fcb962a068b2a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2974a69a8a3e31bd058c093549c9c91
SHA139891a8698ca0d01320bf8e7a23b5c5950105c12
SHA2560e67caec4220d82f5810aeba40a9fe22c54c86886e3587a6f81b3753d81c6cfb
SHA5121f170009b25677699fba087a9399b20748b948ce1a7eef21114a7b7386387696ec20f01c9643a05148fcccbc7439d6bca19efc4fbb5cf80f3aef956b3268221b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c437464c62e68afde59ed5e838ab1f
SHA1e8303ac3273d8771044ad133e0a609d4b6ad03a5
SHA256fb06fe8e0211271327c30526b5b41df3beb35ac284928595895e4bf3ab032b23
SHA51241d043f4eef33f85e3f7e2aee97fffd5ce91a642b2866d2349c51ec3a69053129bc696fa4a7b55474c83405838a3ba7f09b09c26876d1ec2b710d4da1d14d317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f7e6136cf531308a3a4a0cfc821169
SHA10bce7a1c0b88fc6df7a187b68cc08bb64c3e0eca
SHA2563e734dca00f4ecc96636b8620d3243cdbb90f2c51c3edab009f494d56d84d645
SHA512f82911224f25ae86b74bf3793daea426c1736166aff6e050b8ef06f730ca18379248ff48b5278885c87a7acd4aec4b1ff30b1a426f2150f1e331e4b74c7ae131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2c60fcf446bf31ab879f5de0b14c1d
SHA145a3576d69010b33c486d25b182defa5407137d3
SHA256204362dc2912890ec1a48d99a2349de4c625c92aea95dff2e6fb7e93b9e085d1
SHA5120591db7ef8d8f6b0f7b87c1b1409ea7ed091a2f2896eed9e8c94c585340e4fd0f23ef7ad0262e23b784ef1736511ed341a713f6c751f662e977c8ee1a65bb219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f66d3365dc0237d84249dbef0946243
SHA16f34562a590b96c2a22bb6c7026a1ce2dea4b0d7
SHA256878d7cd6a1fc2b80b7524a6385d76015c837f3b8f24e16d199049a129098dc24
SHA512ab64654ec74825c88f27c0190e30b468d06a5878570bce716d7205b2ab4621a6802ba55b0ff24e6d2eaa431ae434ef5f60f963782840e04b301f8254976c490e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5860e9ac44b415934c9c2130e31ac96
SHA1ebdd1ae33e28396197723337b27d2f3ecd22c0a4
SHA2568c8a84d265b126b887b3ccbc071fc43c97a797f4faf8ad833c6e31d7b27cb59a
SHA51201c0a57e84a5f21353dabe779e0044bd2b4deda3a3af31361463604f2ea3fc724fae9024c9bb44729ba1dc6296a239083ab84270c9c71ed7eb0b6f605cd74f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd65d9384a49947421bb2ceb9a39769d
SHA1951e7d11ef1bc4002d6d44335b52203f35dce429
SHA256647c8d09454d1bdaf028275e7fb55774e5692df0a5b730fd8f4d4669759ee8bf
SHA512f339142f265317d766ff04c56b686e956301246d2e0b76293281154418734a070eaca03effe277de663f3deca1ba2973472e72fed6accc4321a875063a28d26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4647f8cde965fce0db566099179b43e
SHA10ad580f2663a8a52345787b67826a1fedf599c46
SHA2565e40085be4db8fb7a304ac0ed8fb2a3fd2975bf2d85c5b43e70b7be1930bb241
SHA51258ed71bb099f9a351d53661aa74544ff50a7662b3ab4f287bcf6f106d6ea41ea816919ee51a43918cc6df5d36938ab025b53a17057b8e19fcfa5ba455357e750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57271d46d662e50b98052f593fb148ed3
SHA1c839d2f202894a4b1c1a8589306a0ea37fdd50e4
SHA2568c3b53d4931e59e5b2d208090b4eab35c5de2db2b05d526cf13e0344111d3156
SHA51298bb54cff6fb842cf7962c7dd908adb9f2ac6c8be5c03c7f872cd7d724639f7a0028ed14e0e50e1eb6a357164867bee70ecba03ac685d7ed76b90d9cd6cf6f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f3a8ccf7e22492c98616a409231fdc
SHA197958abf7d1861a9add0716f9dfcf4ed9a4438fa
SHA25664b4d732ae6361aed0a2671525f3c1080ca204ce6dcc154e5cd574d58d76a101
SHA512fecf403cab5f645fbdc93a6f99522112ffb5183e309721f6866b023fc196e770a9816b20d03758aa476de5ed7ec76b8543e21ba9ac79b8fd0dd2dc0db637ca68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b00ac0312c25ec1237e22e476ab4d8a
SHA1ca9a90022dc0c403c9338f4f4a7cdef4de4a349c
SHA25689e450cedaff98f4e8a600d10eba50cc3ec99e322d0671998df39bfbf4891b32
SHA512f9713ec9cb7aef8b0a523f5b09544ca23bc0b2efd662618355cce82025e2a93d42d193165033f3585f32e46e4efcb2eabd82ca8402d8f5e47873fbd2751e324f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1b007d7cea8069261f8b0f22046d85
SHA161a26d05fb658d5bfbb9ab434002710bbc528361
SHA256724220dbb8ae878e0e693b31b507e97b8f0a4a302dff0b660471a599a199556d
SHA5120eb31f6d315d90f5d2c070e215cef58c140ead1b8fafa0eb329c677c7b3d844b079697885d8f0f7dcaaba86b5fb866a4329ea0765ecd590c94d7339accb6a08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f398398d66ed387f0dee37afc78840
SHA19972bdb10f4f29c45356e17ef7362b6657d868e6
SHA256a3b387c6e15bed17c35d3a33c755e638874ae636f6e6ebacc8ec7b7c9825f09c
SHA512b65c0d846238cd6364ba4ad100be9576f6b1752e4db65789e09f19d3fcb707a3ee4500a2cac843eaf95e55f7004e21f71cf99dde8574727f26cccc9720e50070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c702b186083cd48db1f0f7fa25e0deb
SHA1d6afcc1c01b63c835588cc155c61a7a38678c133
SHA25664353271ec754f58b6564bf912a14a657a2a7c2380a85a7887e6683191c1f282
SHA5129619c4cb6805f7bc1c292739aae2a1f3d3c560e2ecb9503580d4738411934c97e55e0326f1130e8e956b7c41357874fa1bd5a7b93aee7fe3e4eacbeed8e9e736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5868ce5afb6029d789cfe5b0ec6720db4
SHA15ba71fcb1b7a9b87eaff755bf463c54d208affd8
SHA25633e0f0658cb04b300f1540512cfda2de4f67e37b33ff54a2c68f228d86c9a962
SHA51201ed04805f58b29e999b575d27a2b9eacd2ea70b43f9d0b5ac5a35a11302856b7656acf135aab3914045e45ff4fd6254e351cd8435105d3094a958635c9da073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aebafe041531681ed8a2d0956cbaf5c
SHA1ac028927d36fa0623d0869687a04618ddcfb44ba
SHA256890b6f028ac842e5aa1d7d9c87a889ed68a1cd52085261f559de082ff0054c15
SHA512aab1697c570430ebd8eff26c4003f3f8af6cde1edb874057fe580850d40ca5409063df492912d4c4c2f3a9185128c2419e00948487e78f54f52a64d07fcd6156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf36f8ac847eb87f2f3ebe78bbe3207
SHA138f2d46fd965e3bb4563d17819ad56128070e9b4
SHA256832e64c23b56b8d8ebff7b652a7afc77765107a4f872cd5a62bf1e2141045867
SHA512341a457fa547b061bf905620281ad984a5ab173dbd45c9733cdc6c9402696bf95027112de8d2dd67afc863b6539c133410e886c01afa7182f701f444fc090fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647b13edba491dc974922ea29238fedf
SHA13294acbfc3307097f7824c3ed924830e0d66a73f
SHA256735d3e3407970523a5743c85c50926f6e2a29269f69eb6d18b6c626135b00bbe
SHA512daf15b12a1f8b0e4b8e3456dcb57a3341540eb9a2d602c5725697b5fa3154de80c948d92f01b5516c4228f3e4b3d09f55de2de5aa5c1f6c3e57c41250567f935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254465db465031404c91211d02c857ac
SHA1fa26f78b855d4214c511b03fd5c74d6c7aa54bb3
SHA256a1848fa390f4dbbf53cf251773a5e896ed0cfc7f9d6dea7a51d2c11134d683ec
SHA5128a2884195b93448ea9503a13b20ece568b6ee7d687f21b459b45f0bf196afc95947d2c7ee0e699c6e308e6de3e30489c8e761580fa746d0ee3d497f884d15998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ece16e314cc894e3a28e565549a203e
SHA136aabf39ce5bc5c865eb29f552df5616ddf659cf
SHA256dd38c88727fa4393b4ea852f50e5f33beacc5f23ff4b62ce35d1747ec5fdc479
SHA512344c8ad8cddd632883702f0cab2be248f6400a4205477d110a6c37d0a3f963b47c539244a5d05c464db565273c8cca130ce5ff42c656ade10c8c5dc1a18af421
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b