Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html
-
Size
3KB
-
MD5
e00c4a080b787ec4adfa77b93643f0e4
-
SHA1
2a31a1f2d0e13d5dd00b515dfb17b2e8292d427b
-
SHA256
a45624193f03542bf16587dfae125b7e9ebb6f685a93e104cc850d40e16d2c4c
-
SHA512
b48ac05179fad8f94e0f1d1e45ea3c8df7259a00cc4a479eaf5b49cc32db2ee097e9feac78c890cfef58f20d8b287200e9cb79725ea23a8b3e9adf7d82114962
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F5BB8A1-7288-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432473421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000023925ac8e07a5a51b3a285cb62d7cbe33392f6655203ef5a07454422d7275565000000000e80000000020000200000003b9546f3f26c92ae1f84d0a204538b6750f812d39485173323b91af36ebdbc63200000009b27e8b87ab52ff4e95eb9fa9d29723e314176c760d744bb43c5f3683b22e8d64000000052467c3b681163c3006cde21c844b804b9204f4fd0941e4beeafdf5f334e498a815ba87deaeab28ce88b83d2aadd95ea28162a6482d8be2b8da704ba266e8a81 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05098359506db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2156 2860 iexplore.exe 30 PID 2860 wrote to memory of 2156 2860 iexplore.exe 30 PID 2860 wrote to memory of 2156 2860 iexplore.exe 30 PID 2860 wrote to memory of 2156 2860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e00c4a080b787ec4adfa77b93643f0e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ffd2de60a2aa0b4d99e0b5cee67408
SHA100ed96be7e90e86bc54da9661e2a0d2d20b7da91
SHA25633a5c778e48c84a9432e8133951f856689c061ee16756e60d05ef03a193dcf1d
SHA51210d01c1f3d07bf4dcd74d3499ba464c5067096cda6a682cb68c151312b110326a544495af5b9724efff4783707ae075c3ddb41d00f115b0e5002be1dc2116acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bacd05993649b652af52a35c13d5cc
SHA1dbdfb8c582576466541bdf4d54847c849dbe8082
SHA2566de5d2250e9a8076dd6d95bd335e9d89d45e4ce7f05f331fb31782f2f095a43f
SHA512b04af05dd4734d2d4e434b1b4b764456c3f202b8738809dc4060fb08e9dec459e715d2006bb810d8aeede45d5cb76618be4101535dba4ffe61d0af4ebc418874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf10a5040b0c78b3aa30675978bf2cd8
SHA1a165847bcb849ebec2fbc1611a38b9d4bf9c175e
SHA25619450815585082c5f7fdd7808a58823ac3398f019e5a8cf7383abb27cb92ed4e
SHA51282a1bb3d380cfeb94991d15f01a8eba1d3e23f0df66cba1aea29cd901baa036d9b3ed9f2d9ce2b6202a73f70f3b0a339d994612ca0f338084ecb82a19fdf9bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4b0b04147aedece8bea4a482640c29
SHA1d27a5b9cb920fe8dd1c14b6736442b2b7b91de60
SHA256e59a2d8bcd46cbcb1f6c01d6e62afc34639ecb6ebdda73ec059bf4153920bf4a
SHA51269fc1cee7a4ce11909e1a346af8d608ae99e64b6c9406886bc0a8ec4dcfe375cfd7ff5e3d6173cd722fd085a8a64f2ce39ebe9fbdb56de614bffbbd5685e667c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e342540694ece97ccf941aa694e3a769
SHA1804dda4b8c4a469efe8eed3c16867d1804f800ec
SHA256233cdcdf535325fc6b7667e3662ea3688bcc0cbc4749e4be6440a7c47c3904e0
SHA512584c9a75b1276c1bcfe1427dda7108e393b10d51ac33493077e46923517be8ca332cbedcb3f28dfbe55f625165f94eba52181dc5c6c9214eb442b9def37edb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578322613f4d5c6e3e1e6facc91ae9724
SHA1bf6e9eed6398449efe2c22df42cc01672ca79b22
SHA2564d5459877e02c6fda15664ec2159250ecf3445996bcb34bb25cd8902c3fe0052
SHA512fd8f7684a1946c79df577191b7c0b8a362caa9839d0371bab4fa46fa7952ff3946c3ce4aa65598c8f035f76935f0e35d8df62724099ef8af3063570ae1b77ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150eac5ca8816089a8ff484edecea302
SHA1845cc2e9cc4c8145cf054b3684dcc76f4b696753
SHA2568139452c3d46ac4fe0eb2a9e33d09106aa175adca32fa6bfb3bea3359a104f31
SHA5123fde0dde3016e16515fb70f38f0cccf5d23a02f34be14a8e9feb627a02e65861e08b1cce1725a973e671fd9258b45dff70f81cbf29ba65731abd8af6a3f4af93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffa1718506ee84fa3b4beb8abcfb9d2
SHA13bc0e14391fe1b1f654147628559164b963b195e
SHA25687ac8c806359333fbb732bec3f5eff0d9858bdda22e425edd9cabf8c94d25974
SHA51254841a7b56e377d59efbe7975134a6860f2689da4ab845f6986dcd562f2225fad0128c281f45ea0bf0e7126611a4602239715c5ae72658a3ec3f08e08a05d42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd70f6f56b755f0672433f2dea6f3683
SHA1cac5c372f2c582be284b4d0af79d57154097c6c6
SHA256313e9aff538d3cbb0400348d97f06c163582954a69443766b9460faf7e6ab539
SHA51279c690656b76236a449a484695fd3353f32b66e36133f811fbe96868f6662e89b84d76070d412d79219e6d45666cd7815a6045c7d7bb6e590bb62a309d6b6f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5903c03660062bfaf3be5d099360ad9de
SHA12b658cff85904ad9c0a0181a34c2f7a290047f09
SHA25610298d6468b3366189b7815ebe1c6fd3f7e727274a9088c3e1875261ca5b9544
SHA512da777e72fc054e222b2fb8a91f87f18184877415a541df4ea5dc6408a468dae7b46917e8a5306a3ecfc964f9ccee447a637f61f299a154f3a386d27182e7443b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6899780fae513e42982aff3296704e0
SHA19db25521f38ba81627e51b40b2550f926e8c1305
SHA256412d04c83d9b7aaf3b3cbae1b040a81eb489c33f88af2772f8e7bb05e6946ffe
SHA5125ec7dc397f7ec5f138d00cf12457185b9eb6f0895cd57377424349bd32bd3decd6f7048b57912c72052a94e99cc89a0b87b470e217d7c51a10e725172c449109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ab1c3d688a4e15f251a9369fe917a2
SHA143926cf3d5f58ec70fb037142dd910b7dc430d04
SHA256a64f87f3cbc8f59821ab80eeec1d295e9fa87142a5ff21c137d051da04a42ec1
SHA512c4c055fe319db79a645310e7af517e41f0cab292711e3c174f11529f3dc1a92f09068d371022bed2a08a0e3e305f1325c8ef9637129217269072575edd884a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56617e8209a85d0541c368218a3fe6609
SHA1afd1231925ee19d1823ff4ff50fd7e3d1c4d24f7
SHA256fff4dc990b9802d7663480505cf1c7dc5496983fd359101436c70acd4d77bbc9
SHA5122665ea78cbc30597c98f72b555f3889bb05e68b5cd30a9e45264f39e05db34c237ed8f624616a63f114dc777e0f5bc1fe54b723e036f41726acd2fe47bbf2ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543148e2478a37f46e69760a74f36156c
SHA16698db61de9ae6b2ad2dc9fd12958f80460e40b5
SHA256e40552f5658d724dc93f5de3f16c3765dfd6d1c81b601284ec38236f2109651d
SHA512731e589b9466ba98b60ce3bc2aa95223c23e0d94b6521edeab6c51fb55ef4d86f5a14ee03d1516bbe0a8f9dd451ac435f6f152a9375a3747decee47a7ad1284e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52101c211781181c8709837c5b0ff4b9c
SHA1022301897ca8a3ae0c6ac6dcec1695cb0bf9b8fb
SHA25684189638fcadd0f3558e290365e172ed1b5492196e2d57d6e7f2632f54e0fa62
SHA512ce75e5d8ee18fa8a5dffec774d727577def25cdd021cb3c04acc9a13019ec07534427c87bb1b57c4d2d1be323fd7cc94d9ed9b91ef56bf6090c027699606f2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559805cb2b9ae14f1562bd7902d69ba06
SHA1a9eca873e774599ab8dbc6214093922522248460
SHA256c60821fb5c05e9dc8036faec651deb9a6f081170494abe82fbea4c1d916aec8a
SHA512ebc403eca5d8ed4d72fa77acd277bf2b4f2775991bbbf400964a90924be436d0ecf60e6e635fe76d1c8f7990105f86549e76c62d8fcf1ff53026217e678419e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523def4c18e0daa4433afaf8fef4c68b2
SHA18dee185534638d19576f2c7a3393ba0b9d84e14e
SHA2561cb10b5e2c721e5fbf205abf471c5cdb4d3b089448033d9a094302eff048867f
SHA51296d11ee7cfe8d4b5f5f46e53aa35d52a851fb1f2d9f24b23b904dc7ca98c132c2b04e447c96a1d48130c13a13881d34c2b368da0aebd1e631feba858017af79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59808d36f7fadd95ebba2130d30139082
SHA13585f26eb09ccd33ff63c01dc6d2311ac0167553
SHA256196b3e4b67550f03729801dc42b485f1ccacb5ea474dfbd1a1fde2aa11a506b2
SHA512180d55c6eb3a114c0f7e97d9c925ff6741d4f915b1d9a064f42d48bf15d0c73e630b5e67534e9c109fc1525b4d6657c11ecc3d8fd56d3048b6aa32fccf43e994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54971cffb2d5d801a9f4e471a0f74dcbf
SHA16066364595517efc7d5bb8a415e79a1799fcee6f
SHA256b930d2c40f09014f5c6a35dd1e94391367044f02e5b96113f3ea05095a0e07ee
SHA512c5606ac413e275411e95d6d60eef61290f454545b70ecb6c6a3032f8e246017c4d3d6c8fc617674fc1c6369a7bb8ee63813633d6d94d8b1816fe08de8a565c37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b