Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
e0006a1c33135a65670a10a1419187e6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0006a1c33135a65670a10a1419187e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0006a1c33135a65670a10a1419187e6_JaffaCakes118.html
-
Size
74KB
-
MD5
e0006a1c33135a65670a10a1419187e6
-
SHA1
8687c00bbda2002e23af9948e569279f76c1461b
-
SHA256
9144ab58bd93bb164298fcb0f80b39166b72b72605623823c9b171797699702f
-
SHA512
88e34e60186b21aa5bd59f696a786a90d14d80d0b55cd9005631f6cd585072fbd9e5aec89dfbe7317b1df3f92fccf31103cebee91360f6853fdd66f47ce86b5a
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sP6fVb0y5py9soTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:J3H0YTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000037e3b8431c41668d274898aca0b352453aa7ebaf51e75fc198a1a0afdf87b51d000000000e80000000020000200000001e405ca7d800ddd2d5f31726599dcc3b6d2ffea113ebe27c1434383664d8889720000000cc941c7018be1366c20666c15d0a05584414e48c03bd8311a9bcf123c6a94260400000001f6bf596eef79e979d52ef674b3460d013374f14255aa469a80b449827b9570fb072cff4f01773d2aea825292d2c7f73dcb6074535b8ccd53ee63b43ef17753b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b97eb59006db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432471486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF3B5AD1-7283-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2508 2972 iexplore.exe 30 PID 2972 wrote to memory of 2508 2972 iexplore.exe 30 PID 2972 wrote to memory of 2508 2972 iexplore.exe 30 PID 2972 wrote to memory of 2508 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0006a1c33135a65670a10a1419187e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdbc18112930b7105057a3768d36d10
SHA1a4d2584e2094ec26c02633e8676f01ef560787a9
SHA2563b9acec92fcc02e8c9b5c9c26b51e9bb68149269c0bd83cb839aa747ede8eac3
SHA5129cce3aff5a7ad14bc494ab729c9d612dc8946e67c5c1ae61edf1b69abadec4a9ba2205a389c65a11eb279a66eb1c6ceef19396494ddb63b97a56277dc0ccbced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e4f89e4171e51cec92338bf3f80e3b
SHA1795c2ede70317683bf078f15ccf90c1cd9344da8
SHA256e6ef42f4b7de29f69336b9480ab5f98528a21512c45a6291eb7c1ee9b234f477
SHA512b45e8fed4b726ef8ab1a03ccc9a6d66710b20dfda17c0bde5be44d17a8944a046b4a4fe8126bb2d35cd562c530ad64b390cacfb9210eb36e537e7e312ae68d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52893d42ce5d5024b6737e9d5f816e4f0
SHA14a3c9a289c1b4bd8c5685b9441ae0b438c3b2a9e
SHA256b61836c76882c37fc014294cfedb16d11b27a5eebbcf3c7ed3bbff6894f17b51
SHA512f21b04deeeb2499aaa3cfffcdef8a4d19fee52148cb919eb301ec1637d877cbc38b39189a6781efe45113c43edbef89a5b6daed4fab022af5ac60221f305a8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56494257f9815dd59544a12c117c04824
SHA13c49993392242c8560461780473d118e23ec1f9a
SHA256dad26251da0d2d04d80a5296ffac74c0b8d11010b0ff7e2e64cd6934e6a74166
SHA512e9f285377546015f26e4fd501e0a9351cd34f598751155a072da40bea216ff2850cbed8cc0d4a6eed25d550c59c7f03509878e5c5ee60819f0b901c24f3d302f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d94a27f95cd13d7b6ae17fc6e4f83d
SHA1782450de510ba0e860231b849c1874e65df4f8c9
SHA2561f26c633aadc0bc73e61653f09f32468d08df6424a7396ec088d6e5276805440
SHA51227697ce61dbe633d9cd1322b74e0972e31a86f37b5f7d14e45b650f0819ed8a2d2368b110026e5a5420a29d9ddaaa2317bdc71623d2728cf2cae59c029960ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d028a779b44865cc8bbec08c07738509
SHA1d840060fabb21f6a64086c5e825457941cc67ea5
SHA256e1f467a42f0d68602597eaead57829b8a8aec0db7392d00ea6b2d424e0da6a23
SHA51291f0daf0147f4367df869f906515eead764011b092f8ddc6da63a4dd683ff581e8ff136c3268d3719922ef0564577f8bfd722cc32aaa016161aedf1f9ec46468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b82d6e89c2ac5e38dd5fd8faeed7f1
SHA1c3b33b85a9dc5e1c71613976045b2e26130c4670
SHA256ac1fe03405c41be6719428206c19cdeadce9a203dd8eeebda92ba76f3afd5763
SHA512e97e9ba3186b9afa02ccf226e4ddda8733ed5f67519dbeee211f34574747a6e5f46d9a85c24c1ac4fce79e5e7f0466b1236c3efccb6ce4466d0771b2ea43aa06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e72878b13072e603a73357db0fbcf5
SHA10ae5131b32e02aa750f301fc0ff9c509af445c52
SHA2565c4f60b89884981bc1f18936e775c2db61ec76d4ff132e7acae45e8285885294
SHA51250b35f67503032aad0b07b860115245d12b34888986f682c67f7e68374d175dfc09e001cea6187ab468ee949e5bb20697082d5f86fe5d466acefd70b013352f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a3b40735b355643b2d74fbc89c19bb
SHA1ed09b8c6138cfef29bb326d15bdb3b0a9716d798
SHA2565d515d50455e2ae6213d8485bf3845ed9b5629a5746f9e09e092b333916fa630
SHA512628c2d5a85b276de51f9151dcfb48e31e707632cd1a53b087f7903a26eb9a851e3b0c19020d7583e81c9c3eabdc64bd48636cf18937fd67c2ebab7afd9c90edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3fa06452f33567783a863ce068e0ad
SHA14b2486b01a3f6c1dc287cc581d06839b85c8d029
SHA256adfd8e0695a75eb9e0d6200fcae0e5b2b95b545c049cecbb2dc667043d5a4b9e
SHA51230bc55fc9b2210cc2f4394049fe84b80dcba49d6c6b4811601e65e8fbfd65905080c6573451259845b87a14c6feb1f7935d4071916bc4590f9a2c71e811741f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d766deb69a53a370595651c29ee9a8ef
SHA18bd196c5224d91c665307cdb98aed04a2715c434
SHA256bf7b902a7fe4fefe45feb03fd28517036ab01184f625cff38e59d9f3a1bc6bb0
SHA51273bb00eecabfeb6c6a2dd31e3e81448280f04afc5081937225b9912b716a8c5e009ce2d63098ae9787451491e31592c2c8f510566dff22b36a007e18c186f958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51175b43d23ee30a7ce2f350c81cde8b6
SHA19a65469c82c79e607830f513e9f0bc263c014b0b
SHA256fde0f7c6c42deea5d7c86cb2167c65ddda4b2b3a37fa3c7c4ae11378b99d952c
SHA512106113314a8e759f74d276ce053b3d76e26dc5337ccd006e67cfb65fe6a4d09c9fad3436a1910b228302e7cf8b436db3bdd62d894e7ff24b3c620e2f891b6d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641341a369c94db42ccf729ffc7ba4fc
SHA19bdd311cf1276e730dc0246c6f9c91e3039c6929
SHA25641ff1416e13541ea15eaaea4afc6635cf00af049b78284d901cf932593d40cc2
SHA5121f2975327654a86d652ad0c13f39f6cc209e24fb185328a18d0f68fc4b8722f182a7a6dc808d2f59a1b9c48ef455d5a4c984b798319ddea42fa740d0cc9f500d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af735eb9d0a70bf7f67c3eedc500f4d8
SHA1b462f247eaee78f876184e5c9622e9034926ed15
SHA256f08f61b36e7c80f1edb015191a833db9b6ba6bfe1203c7b6919f2f8c7ce0828d
SHA5128c39dd976547dcbff11940459a3d8dca3add895617e1206d55f1c73799e1e1d5367941b5aa1c472519d253f3a67f1fb6504319024e026041200739316ef3bba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea541cf3143e736414af7c548e2ace5
SHA1b957a9797caae8330857994838eadb6d95c85289
SHA2564e22218ef937333a54777c259cd9f84c65e4ac22f64c38374ed583aa45e4c6eb
SHA5122353ded4fe5fdac17f3a9dac7a3f5131e376415c9853e71ee7dac05104b2ddcc98bf2ed57098e983f7cac0ae1d136add053ba3ce751d47e91519b87b1175cf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64381dd02b86a33fe0c0dcd900aace3
SHA1b4197f895e7dd5ed04eeda34fdc3d8e0691f9c60
SHA256917d41f7b2a227cab104b138f0e985287aefcb0b4df61cf1f1221d161ddff703
SHA5127ca6d969c7d3358046095871d3d5dc6a65f4ba115b0d94dd1d856028fd8f27415cdac538133c17abbb8edb2f958ba5fd6bfca48d7edcef6aa7f2da88bebb0b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638e5f35a146f543a82d8732dd501386
SHA1d8183c3ee76a04efe99ae0e49bebb69e56a9debe
SHA25661edd0773d45183afae8bf9d05937ec2aef6bfdb7d7836ebc4c9b2c9e9fcf0a4
SHA51252bbf71ba6d83f611b2b981e5b4e044954838fb77a98551d3bc4e14e268ef238d00db04ad6b62ca2de73e4a94f2c47e21a62f8473a4708cf3b99291e202710b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568beaa7d83636c636a753804329b8052
SHA113fc058a745a3a4601eed11065a9f954143d7378
SHA256691b38c682e7c271e0f778461696995a06cca4826f320dc468bc9d555d97fe62
SHA512d3aa08cf29871e94baabf7a88fdc360e20258581c7a6a506f5ebe550a597cc70fcbaa879ca1f8008bb084fb2b5262fd785030cffeb359c89e2ed14e1ae186fa2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b