Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
e134ab999c96935f35b306ddb2b16608_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e134ab999c96935f35b306ddb2b16608_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e134ab999c96935f35b306ddb2b16608_JaffaCakes118.html
-
Size
61KB
-
MD5
e134ab999c96935f35b306ddb2b16608
-
SHA1
165415a454fbd2904314427b82ab4a252dcd2bf1
-
SHA256
d1592786f7bb1aaf8d50a4d266d5f3a3679c5068d994a76c239e16a31b5eead0
-
SHA512
ba8aa1ca38c8aa6086ecf2f799f04ca4e9dffdfff3b687c6ec64df3a7fef28b5780ba22c05cb3aa5763bbe3fdb04c6a23ec2259f5e41e870316f183cda46daec
-
SSDEEP
768:JiRgc86pGrbXWYbmmpGhAmp0oTynC8koTnMdzbBnfBgN8ZKa64QFAG/scL/Ijkyc:JFwUA3Thpc0zbrga6vLNniK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E34B2DD1-72EC-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432516589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009cd3fa8b4d7a2ab715cbd2fa5753305832171430da9d23f1b89e513ff1889229000000000e8000000002000020000000b46a193ac4eaa16a116a27f96a1c68f8d8a9135fa44d4d1f24af4f81005d34f3200000008e0904bd73166f5efc14add13615cec5f33e70bc4232e503b494bbdcade12fb840000000152f1c15f1a36ced525c3fd79668652965d57be2f7a391502badef513e9aaed9cd4fc15e98a18fa770e1a373ebd8b8bb386bbc6ecf513d889a50cbf7d3bf596b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02c80b9f906db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1228 2364 iexplore.exe 30 PID 2364 wrote to memory of 1228 2364 iexplore.exe 30 PID 2364 wrote to memory of 1228 2364 iexplore.exe 30 PID 2364 wrote to memory of 1228 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e134ab999c96935f35b306ddb2b16608_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ac9912b88e413e2b4bea756223e6f34
SHA1f003e2eff5bad89afec3567b9abc836e77e049de
SHA256b16168701772d1bdbcd30ba33dc52da1927a4cd51acf51ab91f4f87ea6cbc9f0
SHA512d0afe2991338565f7eee68f6e6ad2f86b38b47fdacecc752d23c6bd38931be03f4564630f80d1d86b2ed0ac1f11989b24d95e481a0458f339062b25ff04e2130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebdf00a1cb575d49baa5f6a832af258
SHA1f6b4d2c226802b3f64e57f1c6b97d0c6ec2cdd09
SHA2561c59d54580793b3dca2374f475f7b4e868f6a430533fd369e914f8f0e4adce8a
SHA512bfbe479f5e858ec035677f5c2c7be803b0b980b0275d4dfe3900d1a98c982529307a289b9e8f6528c2fb270609db8d5f1f64c15c84be8046b6a5a2704454fd75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b48e5cd720e36dfe0bab8a260e33f10
SHA1e707dc7aec9d68c79376dad36fe443c2622f69d7
SHA25683ff702445884aba50e2070fa246690f029a27d1a2858a1edafd84f537cbb6a8
SHA5123fc7599776cf7be363fb9babe5c28637a3e7c2529bcb50fd6fd16107be53c99fdfc79fdff33f08647da09bf81a85a14dcbde5a0be0f6d692d5ea6a76cece068f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fbffa4ac96d3ee80cdedce0b4b4868
SHA1fd6dc7311823d13cee0becf6f0a674782842dd40
SHA25614e9c4832228e961489e80a38e5ff0255471a1e944dcccad7939d157e323c4af
SHA512a3d5270d70a716e22cad0e3bf606f905a32ed33b3bb672e1c76d6aea4c653170ddc97681a0f9eb1b133ef566a5433462dc92d19060e7466a4c7952d737babdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d12526543ebd3445e0f4e1f1733ef6
SHA1a57ff9d285f443248f5f56d3fd5ef77ea05d5985
SHA2569ac57a1f60e0855c68fd170458d9934cc592bd462384e94d161f1a2e3dd781e5
SHA512687d82ee30247a0fc019b91df7a114a26446f73893ef3b4d04fe68ab3eee99b998e6f504cb898febcf1dfc397c3806a1cd03af30eb35f45c3cc87ff15cdc0e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f2b3fa9215ead6f8323aa51e2ac678
SHA1c5679f78767df0e7d071af3162e03151f497a4ea
SHA2561091d9a9edc3f6913bb2f58079e1ac6f84f45a0d9a8e5b26968ddff3dcdfc8c2
SHA512404b555839672dc21a4c3eae765ad07c121d695d27ae78ce27a8464e8e78eef7317f80e147fcaf6ce9d989783c1fbc9efb82653279ca47dd0ba94cd413c96587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587638f08968dad4c103f2c8f94d07389
SHA195f3cb3179bbb9f3e1ad120761ca9080ec26a8d8
SHA256f13f2668881f613e204999e0c24cc09cd044ba279451ee39aacf96a16be5bfd2
SHA512274c2b9456a42f6a6d33c44f2fc48564cea41ed40a9cd51ddd559860f88ac4cf6fb937f17b599e1c9e57f372a191d6b53957c25921e506f34d729a647562724a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bb44573904386995e41f2946c956bc
SHA111a0cff423707fed69909ede9e4bf898f5c8239d
SHA2562b2f46e83bffbdd07f01545f65feb7282d9e6d5dc0614f1eb9db6ab6ecb6911a
SHA512bc164ae8c68ce765b6e20e96bfcc305e2175c46d1aa267f39811cdbd0a22400a6da0f68a90aaabfe29fed217c2909626e64f7495e4a3f36bea56258de2877b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c272685aaba7600009237e6040ce72
SHA170d551f3dee2af93e55a7d695de01203591fc56a
SHA256f96e04750fe5749c6ebb95d5d8e0145379bdee1ebf55c5d453ee37f116cf7299
SHA512f427c24510f1edfa45ae9fb739faa04f091b92dce618223e78840ff61de69039c8aa0f6ecc03d48cdf31ff54062554bc5584b784c7d6521070e2441af9e67dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf281ed1e4f7d1b4bbc353b6a24c38c3
SHA1263cc32ba445db9a513c7e441d3e1eecb72444b9
SHA25609865d4c19ad3b450be6d37b74d5b68f01ee35092996a6c78ed53b92a9153853
SHA5124264441fd2bd6da3225beaf4f9fc6be5be16e204121590337ef3aaaa08448ab9a90fc41ba220275a00869b174f5aaa2f9bb0e62c86882e465a22555ea7e14b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef4d8a1712ab1aeace66bf95a0bcf43
SHA1ba8e05ba4d0619cfbfd6e3de7e7d979db95c6a53
SHA25606cbd29294466343f38e4ed78d405801d82fa68398b24a6f77ec2901e2db870b
SHA51220c795515e658fd45c6f0cc41a830e9285cbeb697c9145e51becb206824b0a35386e9aa9419e0cc5185898b0648b52b3e537e3e68c39c7d5dbfefc15231f55cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519cdf989006b860b9c13e2f4a6436d2a
SHA1ccab1287445e17faa08f6d469bae052012294272
SHA2562441050258209cb58a4368638242d5793ad84b94d409cb8818827d86aff54df3
SHA512cd866dcff782966b688ce1980ff6bb0f0cbb116afe02979a52014123b29c391daccc4e3b3e7127fb8b6c9d267bf3dc2f04e1c26a18a6872b312b8c7930b3d505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a114b7e9f0ec943808187714f25fd6
SHA10bca6104eba827e8691f4999b0af64dc5b6ed1ec
SHA256eece6fb30343c8bc8321ec54ee36669704948a8b2574b015158b096431d22f33
SHA5126c4dc2ce68bf26530ed2ae54b313b187d650aa111b1f9c580fc859dc84ae11efb3b9f568b9baecef9de9537f001d9a17a844a8926733fc2c902af989dc661fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a5bb3617b84b784e96741a13b689b6
SHA170d6499452558571421402b2e5c0f8ca6d65f20a
SHA2565759613f423eb51cf0b86aa9390105a36c200dc5c1d54b89fff4aac47593775f
SHA5128e0446f07883300d5239e122a6dcc890c6530b5de21182bbfa7fa50777854da277423a42639d268499ff46f015af26e7ed7351705aff763b395433d51acc7ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523df24386bd651519c5e86cac96e29be
SHA1a408073ec38f7649fa83ee4627196d5f193ff055
SHA256e367ceedc2f9a419315134de04bb0388b5f505a37b8cbe1765d4a8ba30c91bfb
SHA512b4b0609c6c6ab45779096a7d936b23cd26fc56afe76ac50aaa2155b624e189eb94b3a1789ae43d31028dcbfe142d14289399d9d461fef2ddfe00f80001d00770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbda605f1bb01063265be7f2dbb73f0
SHA12bc502f73d5536e8f485ec30bd0d1cb440df15ff
SHA2560153d5ab9c09d5c3bce541f0649d5e2732f44ef6d108959e1b592356fb633934
SHA512c3e94a6c1d08c2660a204dba2b785b95f6f2351ba4970a8ed88ecf20fadad90ef2b9f78f56e1d86456e35dbd67c2dc7d045047aad8bf1bcbd0fbcb34c2640397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c90a643c3baf67151bb7c797dbbdefa9
SHA15fda22fe1d1f5e7ae64b381b9a5ad45f3c3250fc
SHA2560ff04d7f67a1907af283f8b89f88c62f490ff97e382c96e8416bcbe2503baca2
SHA51273d3027838a3177dbc018aa6e876f27fc7319bb22b62f5034e5989256b1cb77145bfcc9901a044b1ac158e49348e7d734bd5d93c1dc6c1b8185af0f1a534c915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2fadbb2d78b6bba647f9ba5ec3095d
SHA1c59c002312d97d4badb24e579ecfc46fd65c28d3
SHA256e4246400bf7a180a7e3f5fc29bde5808e978066e5c3e3a6c9cfcff7d37560846
SHA51217020caf4b45ece4b3eee03c8ef668d1fb55dfb92706fd445beceb60a277e83165dc430eeaf96f08eca625035b929caa3fe2444bd09463fb7266e1c2a9a919b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6e870fdb9ed7b1702ca83a54f25c11
SHA126661572b25315e881848aaa847732179f306296
SHA256aec6febd04d88e1cdfbb711a9cc62340d2248870caab13e2545e0ea23af442c3
SHA5126824859787edc51a99d3c38b44f0df03ca432af7917dabf15c7f203b5ec9c41f8ddea8480575e095042e1af29972e9c0e89aa27b83fbb07a95740a8a8de32474
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b