Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
e059dd9850bb3b1cdc9dfdb1f42e501a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e059dd9850bb3b1cdc9dfdb1f42e501a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e059dd9850bb3b1cdc9dfdb1f42e501a_JaffaCakes118.html
-
Size
10KB
-
MD5
e059dd9850bb3b1cdc9dfdb1f42e501a
-
SHA1
bbf11737f41796604d7d272c0526114e986e28c6
-
SHA256
15339adfedb10b912a11d215cc7db1f8ebdc5b434f92c4786622afd8ad7c8862
-
SHA512
b880fa454ba1606e0bcf6c6c5064a0845f7f527b34e8b87f842b640561c544608a4c76ee845ab453a045de89a3e97b3d84f2bf587a07f5fa9f39703c716a26e6
-
SSDEEP
96:uzVs+ux7OcLLY1k9o84d12ef7CSTUaGT/kQ9p/aQnfIYPlWNmWNCPBlVHcEZ7rur:csz7OcAYS/H2iQfpPlWkW+BPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d096c44ab006db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75C7A2A1-72A3-11EF-949F-EAF933E40231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009b6f1e1fdb4b16cc9fe59650d6aae503fd730426afef62daab8617e8309d59eb000000000e80000000020000200000001f796fa008d66ee07f3732f9a52daaaf05156b9adc5a17ad660113005028a9ed200000007549b49183f91e7efa8420267eacbd3416b3fd5f0e04625740feac059e490cfb400000000d6edc094fc5f13f842195216bcbd9a8876073e80e0cdde13d920158b383098315fee12fec5390b30cdfa5ff341f28c73da20fcf8684ec9d052858399a0884a8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432485053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2516 1940 iexplore.exe 31 PID 1940 wrote to memory of 2516 1940 iexplore.exe 31 PID 1940 wrote to memory of 2516 1940 iexplore.exe 31 PID 1940 wrote to memory of 2516 1940 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e059dd9850bb3b1cdc9dfdb1f42e501a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1342d1fbc8cd38510fc92588071eba
SHA1482de4c7b302b63011917ee8bcfc4bb85d5408ca
SHA2560d3f973ff2d458feda01e8e6e5d8d7e5ef9a0ff549f541a35d30948dbf688ec3
SHA512765c553bcda390a73b23e8f7d740dab4e43d6d5c4c4e988c58fbc91cf2670470e20c718ce0919c9d0173d55368fd383f3842351c6be619ae00f3a650b66d8673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c49960ce1bc00fb70321b726c6cfb16
SHA1fb3e657e3ca391a837a46e3d553f30c462613429
SHA256bb64e2acc5d520ff0ea389b4157d3b161fee6990ae6fad6bdbd09241a1f03936
SHA512a48f25dff637f57dd91b233f2681c5f07ca3a218ef9d34a70d937e743a20e1051b5ca37e8aa7cdbd0d56f857c183cf1a7384f799b83f871092afcaf538732417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae71f08ff165f06b16105f20fb8500a
SHA1a2b7a602b3fe2c9cc5d8609fbfd91e51fd508a4e
SHA2569c8daa0064643e69a242949fcc9252cbe844a3fadfe5927195c1f550931baf92
SHA51278763a24321e6492ac2f7c3491a098200756170f651cb1172bcdbf1ffbccd36f0d1d883f3f4ff22b85945c28a7fb0e68d8f0a4040463b612542d603486c8ff98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e692267fe9f4ca439ed6eaea46bef41
SHA1e5a83a07fd5c75a9dea8a2c33cca470eec49f420
SHA256772b3101d47c3ee7d88a7f1e974ef4df17a62932c03445ff156c00f18ad4341e
SHA512d6d5f827b38180f66aceaaf643afda17aca389759ee0d867c2239a20a24bf1f415e3a48bd0964a5992c017f572ab7f9a5f880074f22cd1b2e6d6f4b843119473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2104ac5cfdad0b851595e805efb0af
SHA191004aa1278f9ef3846fb0e77701c106777b17f1
SHA25610754d750d3e0ff2bf3b283069b3eed21051d1316ff1bef3462713cac4b096dd
SHA512269da9648b73184ca8535185c04b46edd22dc281a849b0346ad4964c9f3b12b5f10c64136055bc20f46273db1f5622d8f91dcfe71857d38bba7af4d34bff63f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffee9eba0c7ad8bd0290aa77a26f14a9
SHA19a3388f83d6089941d6dbea862a64413189b50c9
SHA256a4dbdcc63a0953843fd82a0460713b4ba7372eb54b50c5ac062b8016ddd00b65
SHA512e9ff513e41e331a35b20adf69451bc1162abf5d5c044ef8280a5f84ba973ff957a1d13b33cddfe472ecdab427348d3aa9a313bd4103a0a5fb7ff4f0da31e1960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4b488ed4fe939534d4425e19d13270
SHA1f021768d1725c7004d440ce26fa503ddb62bd09b
SHA256f90fec06268528a1e015e82440190a4fa16320c6d79695ff85cbf2df2f67e888
SHA512931e521e240c428b988703d7d0748a00a941305b8952cb479ac22a18662a964a3839bc0da24d2c0c3e830e6408d47eece2644d62b48b0f6f63f2224974d1370a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e2c30c1c5e9aec9b39cde62520c480
SHA1c428e4608791a7f6781d84d36b7256393982fbba
SHA256b745583bd380e6fefad705ae5e1647d18efa520aa7391996872040f9596e8172
SHA512321fa91a8e9a193f2ffb0eb585054ca3dc372f2a256376706a6df48700ffc00759063bdc4398ee5687d912824f814446f55fa7e9ea274a170ab4e273b10f434d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cebab5d0fae6546f189649252fabe9e
SHA12463287bd1644dfee0777c15a2e98a4854defba6
SHA2561cfe1f534b44fcb68fc4d6159157d37866c8f3fcf03af5899b1c9fcb32d86d6c
SHA512229a05852e84e5b303551f55c5d7d66e5ed1a517437332a9a3b7004d1a3480bd847a7176b4ea76b9368f26f5e81a3a855a26ff5ea622f5155bc3d1684b3bcd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55916589adfdd8baa76dc21e1c844b6b4
SHA15e7ec4723b1a00ae9c3ea714eba44670cf9e65e7
SHA256dc722f30315d2a8786ab5949b19dc4a00af6ae39cefe8ab63082b33bd1d0a02d
SHA51221421c06d2d5b46747ef558f34d5de275614b281cdab803208b288792e157f8e27d76eb2e64f89b0a636c8f15c0e925655e34c4ab0edae7da8b2019f0632e114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b5e3963d90250b5172579db9a5249f
SHA11d67eccd2a29aec44bf2d94266fb26d6511d9e25
SHA256579f79dd8c7f244ef0f80a7a492901952e4f37cd83165619e3b3cfca00b77663
SHA5128c22e4dd0110b88799b0702662c4bffc6004004fdb918173d477275613a70dcf009d8a7d41ed4f0ebf5556a72d1eb859d9108293c551e3f4c6f4b70ed740955d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623a0b9585ae9f85764b0605f097dbc1
SHA1dccffb411922b1faecd056c410a582470f5ac8d2
SHA256db2ef362a65c44d2da914e98cf3d26e82562deb1add2024e6961e2b2979f3f93
SHA5124c0a41a40b3297901a0c87f893c495eb8c037936e72ba90ef304b627c22889a7bdf02411f5eda86c45adf1c19103ded1814f30d7c2062e803e62a04358709a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336ea29781da7e20b7a852b4bc05ab12
SHA1c1854c9d914a0fe6a673c0453e5ede9bd009222f
SHA2566cbd009959129b829e09811cd9b852d8c99f7ac7677c7232cac60f5dbde3fc9d
SHA512f4f4dfe54f0c469e51b35119e68e939cfd63e6b3556cea9f1758eb17781b0be5d2074dd18a32f2a8bd5f13bc08026e5daef16386b3cc06a44ab79f6a727c87e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52199a9440810eb2e7266398dc8e57e9f
SHA1ab5b48001c76e29d4570d99e976c6a85f28e770e
SHA2565ed5b9191bdca2f2261af88f9f8eeca0bcae979833db6c56ab0ff2563176dcad
SHA51268659ff1e52a66ebd2a9f2edd3276b7a06cd10d44486ebebce57e93486cd9f30ed32ee944399ea6c05acf4836e3babf91d9049cb145fe25e7ff328688960b4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fd157be3896b755b9ef57ade2d4f39
SHA1cac101760e75de73b7c5f58fe432210470db1e22
SHA2568a42eb80050eb4c55aecd61f45628d3e1bbcaf6711bc28b4ee4fd67bbcf5dfc6
SHA512341084932611d8ff98fbf3177d4bd2607485ba16c5ca615a9fb1e7fef1fe9143b8ad9d653a4c6b042f25d3f738259a94759e64410d36585c260ededa53d27326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25e148f216cf9ef3103b7ad4fe1ed83
SHA19ab80bde1b57f90331570e0a87b61bd10267d165
SHA256b5f5f2513784b01a9e1a8f5f996addb9237a4de073450cbe38b928a4b828e596
SHA512a777ba327f50f568b6c3a249e7c54daff6c51820d40826bb35dda7c1ac3a832c73936fb0ed6dd8eafe94b8cb150b0979ba50670af88efb4fa5dab3e7062ee891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d9d9b66848f796fc6ea3e1adff8c2b7
SHA12d3c650519cdd3a1b7e425342ab8da538ea22c5e
SHA2565c95d98dac115ff8c0152fcb238ae7b440ee694b812485c6f9cbb493fb1f0209
SHA512abd0d3f87a9a5ac0883afaab574bb6702368b95f7b871fed4fbce377fdccec961bf76ccb6be8a23a53dfb872f7e4230c2376ed51cfdf79bce1a9a50221a65b58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d07793899610b3833aecb695729314
SHA1276d6ac62ff6ed0305e649fcf8b7aa820974f1de
SHA256df2f30458a2fdb2aa203d617f210af95a41f2c1de8739f1dee19b54724335b17
SHA512bd15daf1522e5465cab5556d05fd616c391c6f98a88adf1d204fe9639e619045c99ef6f483d4789f55ceeda97a1868eb4f089b243e193cbac1d925d2a1d79de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ccddf914a0904427cfcba52c3e2671
SHA146d67103f54c51f1bd939b11f57779b1ec6b78e8
SHA256d5f65b5178175cab89e02f698c69c2b90485ad179a9b2cc32b798738e4b5dd92
SHA51213e4af30495b8fa5a2d078ab76c783f5b3af4d18e8adc97d02e50ad4a4c6dd6e9926a35529750cd4d53263ec28a8db11a7d563361bffd5b96386e88cecf9e317
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b