Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
e05991d55aade4bce20b0f50dc4fd778_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e05991d55aade4bce20b0f50dc4fd778_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e05991d55aade4bce20b0f50dc4fd778_JaffaCakes118.html
-
Size
29KB
-
MD5
e05991d55aade4bce20b0f50dc4fd778
-
SHA1
16190acf8c8bc24f003f8e440c02fd95a24247b9
-
SHA256
f493b6dd1ba4218bc039da9e19196a604ce9f262fc211de66a1943df43b05cff
-
SHA512
4e06b729f3b785b6c381801e4cfc39ba9f88fe2dec4b10e298764cea0e32bddf2dc699b62aae0f5bd6dc84736011761694b9daa3282796d1d56598c239ce6f66
-
SSDEEP
768:/hSeE85FW1Z1TNuxMwkMsL02SXoSdhM8k7zBAvgkRC1X1nzK:/hdEyFW1Z1TNuxMwkMsL0XXoSdhM8k7Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432485007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b93b31b006db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{599893F1-72A3-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d104f81e9cfb663db0b13c1accd998d03c64a1957427b70ad51826695d809462000000000e8000000002000020000000890bf5231256b3c47155ee8f2c358142dc61d8bd3af94a64151d743618313be720000000ceb6febab1ef5dba93fa5185959f1a45aa8c2f5098851625c5d25bf87c8eb081400000001b86323ee19459efd4e1c767f2692e678eb2013717debfd19769f8d44b06031d6d0ad43fadf0033c55f3b525da32116f8b4fbff15e11256d73d16ecc8b42f330 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e05991d55aade4bce20b0f50dc4fd778_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d537708f1a4116dbbf12c3545e3bc650
SHA19c37fa4fd83a5f4121edca09fd1d258fb2888063
SHA256ac6a5f966c2a881bab1b8541645736be6a931b84ad22d5df67d10a9c784872dd
SHA5126a3d0105137b15ac3564a052fc08c5e5a0e75081e7eac8e7460ab14036e5614be90d26968cd36b3e470603fa568311d35a6cf9c03344f5b7757ef4351e7de6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58907a6665fbe13baa4ead30b2b92a820
SHA132bf61bbbf2bc38c7e437ee7ee84efe3d731a4b7
SHA256dfeaa371175967a44fb0214e306c0ac6e0a8c993cf49de509653626e2c75799c
SHA5125e28f9a1a1e037be24f9cb2c97f0f13913d50f28bda43ce87c8310a38c346fa0f19c68816bf54062b39bc5c81ea66acea026e0bc4e1b666a1e1196e1448611c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc50221c0ded121d8f7e33a39f432a68
SHA17ed5e4ad94bc880bf1146ca9449b5babf5eb11d6
SHA2566b4b407e0a5ada29968157b963f11b94515c53bde2af7d4972645ffea992f106
SHA51279c68d1420391b9d103e85122eb5f6994ccaaaf008ebe69de309f6c1fdc9afe0fbc011bfe0a8817c080736cefb7a606c844a2b080061b8d1ffe2264647a0a14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d11d5fcfe3f7c0429a45e5510805c5
SHA1a085d71ae89ca666034ac87b66b809522427ab76
SHA256fd49430f06c8e9826dcb0fc128d9ca34086c91ebe73038bb98ab43a226a6a031
SHA512320b623b1b648db8305a5e2f6d37023e695b5e56924be040b6b1a78b50c9e4da1192d759f736828d0dabf2ad33d904f08d1ba07d714edfc53764d8edd8d3734d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0407a1f9227e9cca0a2e57e0eae4d8
SHA1575e0567de3701aafee6be8c5ea5a0717e102423
SHA2562a7fe7350a3b2131ce7af1e69f74e7efe30952dc6e61208d964d4054b1613f07
SHA512449680db9dcce4fb0129ae8db10d667284a312125928b98dacb6e74cedac64556f7de192079ab7a9888feea41cd84974db136fad131fe1ce132e8e845f41ed7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebb6fa46a435ca98bd5896030e84634
SHA1fb9bdda8e48a816f028c18c880bb11c9aeddb8dd
SHA256f572585ee337652134c7d1714ec1a6c9ddf3e4df0b2b54a263ba315314e442c0
SHA5128506e327b2566d0e3a569c46b48fd9b93367034a68a0ffdacc97d3fdc8b38258da936b70e6369f16b27402682b48354c18485834e043e176dd187a756b5ef23e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdf5f4c623978635bb0a8e4220625162
SHA16505a434dd231c689ae9db76bfca230eee456b98
SHA25670c97635f7948b7c46c5a6e75c2d6ff229c6b0a58e5c2dafbf7e91e76d4c23e3
SHA5120a1847695485364d855a39ec1a7b3c4c1094b79865573b7212aa61a2cb9a3c60ed2b06750af8a0b560cef0c240d1baffc88c353777962a9ac0c1b15536d4a072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535d54274c89c3fa4e6c1919c2fbd82e
SHA12d8b7f20ce5d99af5fbf45159200c9b4a4b93827
SHA256ed544f9ad8322b2942fe6c8efec018ec2185fd69fcd633db6c06ea4b87e8b870
SHA512f8db8c316b9f17ea454943f9dedd1204f4a6fcbe54656d227a0dbd09bd2dd9a2628b4a9f0d70951118132830a9cf59095d3b4c915a3e2c6c60f93e5067a0e8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505659651d2c37c9d5c4ec6d8e452aacf
SHA11b0f7179747e6809f38b886ea1a22567d3ea91dc
SHA256b3efa466795a9cde0424a5242a668a7b7ffa0257f8695fa9c10f3365fb9f739d
SHA512561b96494b3d583157e08b418ddd80f81dbc3996bb03fecab882c936d7d01a119af97f99aac6c8cf49c0b3892d780eec6173b9845cb90568ab3f930ecc873abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dab3f5d1745ff542f51cd52eca16986
SHA13d038e1352dc7a018e9b6359ebacda971becaa8b
SHA256e41a24de75422dcbb0a5c9ab9d82cd579b50efab036703f67cff22ab1e0f4502
SHA512f2f03bda0eea45452530de42561f9c3c3e8a8abcbed4e652e58217b8014a9dca0df975838fa78bc5e2333cc1fbc46e1bd86ba8e1747366853ed6ca5422b302a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8482c9736a4420718853575e5006632
SHA159da392c33fa7ab3b07d007407b968459ff73c39
SHA256cc0d5d7969ceb3a7d4e0bf02c9a22236b8cb7d9a36b12d9c3322a2e77559dcea
SHA5125e008e73575e696ed3c2b6a033b336e172d04259250c3c5e3b32fd778b7302a1ac6114824216a8a9aec77d02cbe2992258b2038eb7cf290bcc502d7144bd5f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be95ff346f061c63995f571940a264a
SHA1c7dc52ca368e173d32fc64c3bb7efce8ba6df9cd
SHA256db5228659c87ee82a1fd8e165c9e0909de49186c726347afd06a818a588ddd32
SHA51235ab1330b07b04d6f4310191572d5dc2adb37cbdb684937bde0b561a9fc5503f4bfb87901565acf9db52298655eff16d599069cb781f4a6c0308b5d4760b631f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb2bc5e21c3420c3e18636a0fc3ea14
SHA1e9b0931d88b9b53f5ba985965680bfba959fcbb9
SHA25629316f40c6a728d637a35d3a96ad9989f6f04ddfcef9fe657f6a164e9d009fc9
SHA512f97f0c0a0f7eb26ac95a6cbf2c031fc09953f0e6d699691cf4107eaef7c9d8a3fb318eb6af70eb6ede658d2fe2f3d5c1b9ce72597a7d25923aba119c3360e2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f1c75dc063eebd74fda4edf8c46524f
SHA1fa1b8424fd674a6246c8f4ad7de2d815d908e98e
SHA256aa2874b748da6b9b83774b3c40d7cfe9713572355ff6faa4ea8d88b2772ed9b7
SHA512782d78ebf7857e74066cb240220f288e6ff3bc1c3a61ba9bc0bc8c87463f0105304972edc5aee99a3cb691c7b0d95557caee7871836ef1fedb01c4b647da695f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283b29bd78fef0ecd450ef2eb1921435
SHA157d8b816dddb953d5f002987e00e4d6ccb2bef3b
SHA25680f92d4d77e8d4a0d650931f329315a5ed2192d71132f9eb26c486e36bc4cd82
SHA5123778c4cccb1f3816edaf292c69c2f12ea165eb81272af58a7f2e31b5e3ba7ab7c82d69778c1fb658b977f42adbcce3173cdc8d6764bb21455fa09c655192eda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8c39973ce663a3235745c44fe56540
SHA1f86f7a7cff100019cb4525ceadb2714906d7d61b
SHA256c59ae411cb7dad85ac6f90178db273e04193441514d68b7fcf033f8dededc366
SHA512ec03884242c4a19b38b076b082a00982d83c1c2ae91e2645722f0377160c157035db35dee3b6e7adc25552829d1fd1dffe130f780498d742fb27fe3f02979de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d867537588f2b3cfd950567bb8a66a
SHA1773c39821c02e14466db68947c1cf928cf7ed2d8
SHA256f97afe04649697ec9bfc42d6746594c462ae6007bae0d9661bf6a01da8ab5721
SHA512fea44d627b39414255b213be992f22a343e5e1736d23b25667596359ae0f4e1d4617a2c99853f514b29214fdc1d35548c94a9a63889f1310bf352a0f551f992f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cbf766e6367bf5e1458225ccec5ee8
SHA1b01e34c5a9e91fa62431e69df38249d0a02f64b4
SHA2564b2d81ad7dd5818dca88ae376425e520ac374d1f0fbb1ea311d5b95c714c9938
SHA512b28d4554f342eba5af6dc5316c8094801474b8e40953359fcdca51d07944f0f1cbd0792ae26edf23049a111ed787cc72f066f1ea19ae7b35837fdeba5ed1c20c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b