Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
e079e9d257ba1868640de9069ce3a6be_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e079e9d257ba1868640de9069ce3a6be_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e079e9d257ba1868640de9069ce3a6be_JaffaCakes118.html
-
Size
112KB
-
MD5
e079e9d257ba1868640de9069ce3a6be
-
SHA1
64e0b8abefd8ff42627a9f012abe5839e2a4c7d3
-
SHA256
6c65195af1933268b945597886d03e2a70ade431b613bf62bf89f4fc40da5d26
-
SHA512
22d2191c8b3bc016e7906b6d0b704a6368281a22eeaf688eda5536490674bd842424e1a0a1e98f6814793eef5375a460734eb8961903faac06bbc5dd6e31acf7
-
SSDEEP
1536:SW6cmkQrs5xdSz1zJxKaC+p3C1yiHYn8yjSITb/dAmUf8YlWRbIvWLqYp5+HY1Uk:SVb/dtbU1TdmdXt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432489587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603605daba06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0273CC11-72AE-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000000c561c0607445aaa952f505217c1d33a700732e27b2eabb2826cae3cf4d18dc8000000000e80000000020000200000009326aaa6734ad80944b36e30e27280aedd2512a89c184532cd3aa111b1081021200000006e56a9eec28501d1a5edd1d043584d16fa386b2156aa961edcf44ae9c089eb2a40000000714002e7e498e21eec32fa8dfe008f9a21160a8a2d053f895035f2f6bff778513e9de0a9ce5151e7041d72488e4587821bc330ed373f65a7ad12e340962b5411 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2568 2532 iexplore.exe 30 PID 2532 wrote to memory of 2568 2532 iexplore.exe 30 PID 2532 wrote to memory of 2568 2532 iexplore.exe 30 PID 2532 wrote to memory of 2568 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e079e9d257ba1868640de9069ce3a6be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36b2b7a77182c11855e8cd51ea0d908
SHA1e1e324491ef035bbff7e71214ebfe8166800ff7e
SHA25670e3b9a9d0ca10a9d900b14247b74bafed9761f69cca9f5938c05e5fc11cee75
SHA5127b2d00d9667cd5454214d3fb1a11b2b664e09abc57e2865510dd69636be767b515b6c3c691c27c5b0695af4a4ea57fc56ddccdfca5a576342bcebd84629daadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0291178a15f8005ce911dab5f89b3b
SHA1cda90e5dc444287ff2753e0eb7816553316aa95d
SHA256645214c8b49a5cf8417e47749fecc3e8f5930522b7625e3f1ae7da5df347f629
SHA512945300d4b50813bc2ef6b5f2c44460423d93404da963ad3e0e0a8b3901b04da93891a716c7e1126429a2f6e5aa12d5cb60f770be7fcc1828a98ac779d6b9cc5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6cd54ba3226024ef3eeddee4198bd27
SHA1d58012aafb1193c569a0f44969f7793330be50fa
SHA256a5688c39c8cf5064f4ff19e9840eaaa2e5f0b781c1e4f68acc153c39b688984f
SHA5123896b803229352907dd2fbe10b8cbc32391a3b74c942d21c2f397e06e778f73ede475cab0cc5683df39e68fc87df94c6681c04b5dff537f05c665237d437bb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534744be5e54df2b629a5787ecaba29f9
SHA15054a8d2767b24cef830a7472a91ed628a906c56
SHA25616407bb32fcf06a00918dd20da4f163c3aa41bfe8986bd86e39496c23641e37c
SHA512e00ee7091b41706b9c082c36310c9e243787adf69caefd86d44fad548acbda3472d8dd8b1573047b11dd376ca9e84497e4b2bf7000f87a24e417e17dafaa6271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a69008f8c494fa0d2f66fbc1735eccb5
SHA1319292108caa336f271f62c58e3b4f121e67a49d
SHA256564dcbde3afc0265e5e75f6b753eba35050dff307342473661576e8576938ef5
SHA512f4e6f3b3bb9e35c6998313e91d967ebabe27e1b4d45c01143dcbffb8d440f5b05a5efa7a45fc8015693731dc02ff96b03d7ad79db8eecd91e0345bfa20a77fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655a22ab75a2ec442e27fbfb8d8e7e8d
SHA10af4727ad7e3a2c53f1694ca7825a1e4167f201e
SHA256969800a40af03b39512964cfd50b36c672707d0f5db1b82849a6b1137766e552
SHA5129a1da1327bf1682b24dd96ef13e7b52c6ea03f3ea4b68f8245a70f871233b3257a37e72dd8115b23d6f2267a132070c6623f2b36ecce2443f715426640761f31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb9edce84923d9dc479932a9ef3fa0d1
SHA15e617ed5ec3ebebf38cfc42c2ff6a4b41377ee7e
SHA2561ffd5dd67563df7c9517951b307b304e12e68a2876e58134cae69f5dc110889a
SHA51248f2c43d16263c5e67d43dab7589be3a4e8483ea4dab76cebbcd0b39c80e625fd22309c01fba690a87cc3f91b30f015369eda581c4d52ca3d55ff5bfe48d6825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1ed0c9e5a3064681e633b95ac51e70
SHA1de41295cee4ee339cbd708f82014d1e5ca4fa21d
SHA256ee836f22901f7df77e133b07da7ee19722021db877645c0b7a67e3d8f725c91b
SHA512ba154a57a90f92d6a864d37590b602a73bec99a8ff527da4fa94df31f41c6328e49d39aff5a691cb13a07c5806bde793afc75c29961f68bc9955e71c4e17d92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac4cb3477f1596c772346d97dd025df
SHA1a39494e974c75d09d4c16f5ca814bb3c73159d86
SHA256413cd822b69df206422d987d4abe35989e271ea1fab8830b4b842a97bd864163
SHA512393196175224deebc4f554ebe7faea018cc22ac946c8a77ecbb31e8d03a7711570fbb13283aeae79bdc0a28b5a4b1379aa324121090a97e20c4cde3300dae048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4dd526fdc1bb566dacf03f74d913aed
SHA13aaf316972a1f8b568128a89a8f9ac56c3719370
SHA256b271c99cd5c775b59c4f53193a0f14d95242eacd99d765f6ed3a8554e2c8e1f2
SHA512baab65ba1a74a9feb670ce87ca3c36d4362d4c143e718f3505e094a2a26f34ba76aa3553c1fc42dd463f654167858a212f01df254b561c3bcea132096ee660c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca108b22f9af0bc59fc84a9d681cd5ef
SHA199ae77e454cee42890aba2209c35f7563b74cafd
SHA2563d0a4c089e5c25228acaae6084cc17fc621b78ad89052e289a575bb47643d68e
SHA5126b2be1d32630a96044e45cf13c2ee821a94eea0b2bdd869b6c5cb90f3be9e4ec87635d4bb19afd65eacbbdf70ab16f166e0a1d72bc6b405eaad8926f43926e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb260c2f0bf8f25d0216f6f45ad5cc1
SHA10e8dbf8e28fc85159f86df61b404ccc6f8d7c14b
SHA256a8105fc6cb78dd2c2fd6ddc1fca47ff790825da3b5762907cc81652d48ae7f71
SHA5126f66391f8229bbdf0bcd4e8a48b09e777c31e8119498cebeb01c86ff8376a845e813e4e3a02a5bc9c1afb2162433fed297ab158f1d0220b088ac1bc4cd423b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0dbdd0937956aa2b6703aec78573006
SHA1282e5e3dae050a151b50e2c1f718b03d1819a7f3
SHA256fe336c942673f5f749c91b7068510e1f03b44f163e2fe154f226a84bdbae56c3
SHA512dbedb8d2104cde411088066875db5ea8112289305862d2132524eb213f39c628647c5ea3773d1cbc781050ba823cd3d761bc2ec41784f4c138c537f4e9c59398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005a7e300867e8610b7cd1302b28782d
SHA15bd152b1dc6c79bc8d36845cd002895b262600e4
SHA25649f2ed5bd9b92838e3069deefb36401201a44984ef25ae2353b46786af4b60bd
SHA5125f50b8c8beb3cada98f7e14d66489a65f767f71efa8ddb0cf1b778c74d242660ddede4619f167652806f6222ff5e52e42848b0c7eaf27859c0357e0ade62f2da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b26e11e6fcc69b5e60ae7ae3dfbd26a
SHA1c186312111955ccb6f7013f9f62a150d9e1d8409
SHA256ffbbe1717bd73eef289f4a9e9ba8a1450960bbc1b691c1ef7d2fb84f44f4d898
SHA51205632e2ffd2bc828fc36ad4d384f45acc1424696b86dc0a6e129d09d78faba7b8722d61cbee83cc5dd8ab877e5afeb97f22ab1c2054f0d08fa0819b93ffb703a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a94e1f29fab66b1471e77fb53daa93
SHA10839ff0743ba5386ec85bebc5b645b2430818c71
SHA256e796fa971695e24924bcc4718c2688b9498492f525542770c20f215997f2ad5a
SHA5129696159240b174d3843b2536771c0912275c3877d0a8b2dc1476a21e17812913c7e888cac7a94650bc935c29a764195bea23b98712121f003637eaef558e0a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51951dbc62261e874626c838525e9c6cd
SHA1afe0154f89a42f072fc8486f8b5dd7cfd8e7c67f
SHA2569ea05ba9b0dba94cbdb56ef41ba98823e890e666a7686722884107377e795d05
SHA512e824644c4b096705031dff96ac746c8833f2801ba4e99bfd56a93ee2e770f4a40fb25c917f2e74811f43ee9ff8aef6c701cafe2e48afdd61e200cc5fb2f8db3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291a19baa75f35b7401f539db2f20824
SHA1850dd2c049058bf62531aa1d26f68aec5db5e88a
SHA25651bbb97169a61633eacc420e70ceab521325b0245c12f5f86d3d1ac4088a0fe8
SHA512700f33579d1a8c77ccab5200bfaedcb733003708d27f74f1f7f081522128e33df56773f145fd38ce986aa1933bcfd8fe837cbc510e38cfe09eb9bf57118d79e4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\f[1].txt
Filesize182KB
MD577fd53069188986ed769fa9f38533b2b
SHA19e7f45fe0fd292423521bc8dbe43a2904865ab52
SHA256d122496a73fa110e0e4ac009afd150a6208ad0feadf5235debf6c2fd66f1bb04
SHA512857488f0f831715f6dfbe5efb55f3db75fab64286aacb0997e9bd916bb8668453d5369c8e2942f63e27977d27d17f2877418142cfcc25cefc97c22bac47af3e3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\suspendedpage[2].htm
Filesize7KB
MD50c96095bb3e7c3a9acc089dee542809e
SHA18881630b22f0fbdeb6e5b0aec5f9b359625304d4
SHA25669fba24c301099c229ef6d9ae0e69045ae76eb1611adff722f384668558dadc2
SHA512652ff68e06b2a57d5cd6aba558f366702c5ab022b12fc4eac0b3d0002c05d002da8fe46d4cc613aae335a8df69a25b32b5d04c287eced70dea5c6d3c1112d7ee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b