Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
e02e60d98671a2a23460ab269560ed4a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e02e60d98671a2a23460ab269560ed4a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e02e60d98671a2a23460ab269560ed4a_JaffaCakes118.html
-
Size
11KB
-
MD5
e02e60d98671a2a23460ab269560ed4a
-
SHA1
29aef0356481e38442b40e646787aadf781a7c77
-
SHA256
d7576f6ea57daaf8bd82e57291a4d4fdb0cda18573fcf2eb3b67e2328c9653aa
-
SHA512
7c0c40aa3494520310357356d67dbf40648187badd9751d94ce1d6eeef5af41be9ba14271055056d8f40803d34027eab1b5b7f26823c89f3577dbc6b411b2ebe
-
SSDEEP
192:1DA5z9EgY8c4utUzqtUPit3i1PMXV9iMprRJa0ulYeGrZuCKGb+lIxliFxFM78Wc:1e+UzqM43i1PMXVcMprPClYBrZ5VWIXM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000025ff1958552582b2ca5399aaeb7e8d0a7efe40e8bceb0286b4a0cb55c99c27a000000000e800000000200002000000068b58e70dd9581e8a964106771f72d8e639b2393ab342e04869da201cc51181a20000000b35ff1183e84b83c455082de3720cf3dc345922207035348bdc9b6dfc04d5596400000006178ecab8f98fdd4c6abfb417907dad4c02153c3055774d513b48708e173ef729097bab57d63719628cfecb24c43189f1c0b3bc2dfff905773b02cc51d14e677 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6511281-7294-11EF-B17F-465533733A50} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80dfc37aa106db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432478691" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2848 2756 iexplore.exe 30 PID 2756 wrote to memory of 2848 2756 iexplore.exe 30 PID 2756 wrote to memory of 2848 2756 iexplore.exe 30 PID 2756 wrote to memory of 2848 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e02e60d98671a2a23460ab269560ed4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56028a6ff8d8bb635c74c7893c40e12b1
SHA1cecfa2cbad047fb5f897ef62635cc851069c9c27
SHA256161616ca104bb36fd5e1bee318defbb55ab1cc2426271dd1f4d370817344cb68
SHA512e300e60671295e1d79270190da3ad445a68a9c6be211a076c6738d9f53c6f981537fefd6b077fda44f2127c4f557b14f796e578ef33fb20a59f39b02518a9c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58145c8cf6e51b8ef528a5c46451d1534
SHA1c230155771002a0722e57ff12f9da5e270b0bdb0
SHA25676d973f2e06fe8463cb1e16d07c30ea18f31ef326385c42435b1ec7f60b8280c
SHA512ae618d82153a4cf404052ec1f148d0fde220e68f887a8a16d3b2d7e91f1077ade1381466c85c809f5be1367074ab930ec86e5a2abf5ae868402af8069ec0c09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc5aa63e185e7d9c693e300fae7950f
SHA1a217a12675f8d07ed3420268f240aaecb40ce1dc
SHA25671c2695f45f97f59ee67492582316dd8e2cf724bf1b695ccd1a05b333132b130
SHA512e107ef7b7b551066f66325540262ca837629707c153546a469eebfc758f0915991921c6d34d53648b048f843042f3442b584516805393a28e35843ea1cabb887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b1ba639e052bfd1c23aa8bd508bf0e
SHA1551e555c55b057ec6db5ec322fedb72088bf792a
SHA2561b823b914eb4ce4b590d97a8905c8d20b91f92c64c4bb25057a7e72edee95747
SHA51222e535eede559d9f546df1331c5c40f2b22524a4a8209f05069cdaeb43322e52b692b8517b0a863c6c411b62a5b708140348298c7fe384b6e0dddf545ab04079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be2f859d26ad28e11471f166db7c2126
SHA14569e5ba94cd6b5715b547203039861db95030b2
SHA256f741b7dc4da5a4e6a54870f00fdf48b6f14abba3cd75b62ed5ec57547a4fc242
SHA512261a0a383896f933c9b25af0ca9d525eb6c200d8c6cd00554e97172229e48545e1d07b0c0d52ee3da71daf7174492206466c119306d1e1704719666042db1fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b75634052a32ffb3d302a7b5cedc765
SHA1a67f9d587e420c9190a5b416bf02c6e2940af508
SHA256b9ee9802b7afc88cd13fa82822bc015eea3127b6de3466e6df655b3084ff5084
SHA512dccda4c43540942d2ef46c62255caa1a3aedf5e2754eee927229ad58ef62b68991e9f79e41c1d8a222b3ecbbd86d45de1ca394c644567addbef70ed2f0684ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1478bae265c873b77c811cc012ee3b
SHA1c7463a89a79757eed422f95fb9b32bcd8b4021ad
SHA256954f0d10c034a3195804e292ab19e97bdc9631e673c421603d0d25b6a828929f
SHA51268fbff58c804afa09a1c5d69138694ce2330106aa0bd18235a3ba050789e384612c899865c1a222695ddc045325bb657d3133109fd83bb11f94e024bb069376b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e74b0f8c3690182040e658ca1eba881
SHA1ddc05636a65d9d39a028b9a679f55f9600e688b0
SHA25607b8b0ba77ad3af7aa343f56177657a8be6c3eab4b8a89a57925f3f28200cdad
SHA512399dc096317be2ae303ba1d856cabc536cee1533f660aecac032e7558f42a2a180efbb239b1d45c15cac9cba4a9617a85c5816e798aac69160986c316945fc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9299b1cd29518b33ce61164c8109283
SHA11ac4fd44f5231946e04d121aea0dab6455975620
SHA256ca3d415ab27b07f60a7c8f27de51ac9291ca9591e2578fce5a0b694dd2d47d2b
SHA512194ea90c17c3d39d299e1ae402cbfaaa26511f7362fc9191e4503f38666e264a1769303df192d9c86490a29b83381ce452f6cd043ea3efab66c167086b56032b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4eee11b8568570d18043ae5314747d4
SHA12212e6cbfd5e888e07fd65ac82c7acb18124c4ad
SHA256f2ef84176d985fc287001bb65d23e9b8b54e4b0b379597a1136adc90e6f04005
SHA5127a7de7bb95f62f11e380199c658d5037bf6af4f81638c18879675ff085e8ea2dad67b169108b6a78b0049a1c8c393f03bc8dcf73c7c8d32d4c1e5a9354e53fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad06a8b60552eb866fae4f71f07cc89
SHA1fef349659f8fd04b744d648ece4d4ba050adf5f6
SHA25665f466316b47078145253f41cb768e51364445a670fc0313d438a43f07568e73
SHA512107ef0926c175f188f5e1b96d73471a6ac90a454948067d014461a993f8dee0832c01d17c3f1210cc0d42df8e83d9bc3b27dcb767bf3d4bf04e249cebab2ffb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ac5877788348f38af20b4257678d92
SHA11b4812066e37564e88c847d692adde2c54645502
SHA256a0a3df9eb862f24db8ba96f89fc82cb2c49ecfa540dd73020f97c9cbc1ab1d54
SHA512627e3bca6799b7465449ab763eb9994955b012925baff7c1eb435e1ae6770da9c1718456e23042198520ad0fde7799ad82ead1b7fa6519b8fda74887247814d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f58ad7a49d0ae66573633b43aea451
SHA14dcd181bc7109755b1dcc3fdb189b0a60597cb6a
SHA256f70c7cad227ef1acd440d40fb90424e215eed400c52cb7e9f85df373f9a92a07
SHA512ab6c6b273a18b7370a2b3bfb091b036964df03a42386d5ac98cd361abccb644da69c41abb352f5e563a720b7f28aaf4bcebaf8e1d70e5c95e4f45a612f30906b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29a14e34172d1f3272d99a22b4ff596
SHA1a4f27aa300240aef1c0bf4e2de315f387bc52421
SHA2562acc438560ec860be66c15a13d7ab3bd7870c5825b3263634ff6345e8c7f2699
SHA5128b2cd1e8cc6ef88a75da6b3e41942ca14208fa3f7bab42ca28833f714f7932626e22688a9294314b4eb05e329561ca4432eb712b9b6efbd1bf7ddef92bdaa1fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a8c11659344f49ac269939a7eb0f92
SHA1b1c26683a89167805b2b574f74f1fbd47bb2c4cd
SHA25622f5ca25a0adf43e98f4ece625e1fafa1da01a8418852d68ff5e291dfdfca580
SHA5126e04b0e453020b89cfd538e99198f8bae22a258915059160bfb6859213a6d81280ff8557bd0deeea02e4435f89e6337d666c310143a821faba3c2262f2eb2bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510cec9b26d920a528d70df922a83c591
SHA1bc7eb61c238e8f111c73153d6baac160b1fd72b4
SHA256a5a324e3d67d44b1c0689f4ac34412451742b152af1fe699f5ab48c1a0a12554
SHA5122deef54c2e2b00882ab27888dd1ee754355dbc6df819fae776d69cc5696e75270cca53bfe9e9fd24ee9f391f0bbcdab6701d0fc5b600ff688620e2a8c4c64fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d0c72b45fe5c8c95d56682c9d23e8a4
SHA117127f9596a38d6fb6a7e8116a533550411431b7
SHA25649f13bc1c535c311df2925c8adaafd2d7ee122d8a4b079cc1adfcdddb5381e9b
SHA512460f6a64deb61f8b08dd8c413ad365d83279c099704ce3823b0a4ea695f370241eae7d2f6e1fc5f0f8cfc1340ad6b5df31530d2ba4dea22874e34c9171f11da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58185a31ea4d1906e30e322e0a493d1b2
SHA194f8a0a94aa08ebb54b84e7b8953d8ce70c8660b
SHA25656822034f63763095261f1aa81f58b4651c921ddbd3c1169ac415ac0e5c5f632
SHA512c801951e58d3e40469b1173e628ec9388a5e94aaad98fcff66c692324ee9ab99c1f94f7b9c1286647ad5595e99fe7419e73c023c402cd481bd6cf5e3505cc87b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b