Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
e09242f87f7191aae4f4385a86d64148_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e09242f87f7191aae4f4385a86d64148_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e09242f87f7191aae4f4385a86d64148_JaffaCakes118.html
-
Size
12KB
-
MD5
e09242f87f7191aae4f4385a86d64148
-
SHA1
601ba0d5ca593fc294ddd7c6f49c56d0a5e99047
-
SHA256
5c0f9d7087ab81a12eb246cdea0b4bb8c35c2b7935b1f1ef03b5859718b812f6
-
SHA512
1114aa74629ee9760452fcc68db870cbd66953585d07191302afccd7cef76e91b6e25e0284e8976365cecfd52ce710dc5c07fe0f4225be1f60ae25912d9a34aa
-
SSDEEP
384:4okUB4UCD3z89cQVtOr19gdX5xHL2s+Fz:4Jdm2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000009320c7ca73f1b05ad08f11451cf0281c93b8dabdaa9f3df6fd846464abafbe7c000000000e8000000002000020000000316a3854fe27fb8fdf0a931d35d58ea6edbf746d04df9d132910c40156753c4620000000346019abb16532ea66932ab5f4ea83bc9b11ab595e2c96a239c84d521b2c602740000000fe8e34c8af49e3f219c61f1b5b3a7e41f60dc46040dcb67cd8ff3e749b32e3a25be99c300adfebe69ce0200480885d6389ec659738feca7a4223df6981e6f6e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A45CE41-72B6-11EF-999E-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432493033" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6053b2f8c206db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2776 3040 iexplore.exe 31 PID 3040 wrote to memory of 2776 3040 iexplore.exe 31 PID 3040 wrote to memory of 2776 3040 iexplore.exe 31 PID 3040 wrote to memory of 2776 3040 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e09242f87f7191aae4f4385a86d64148_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d3aee07f991061e5800d356a300343
SHA1788542ffbaa5d6013a637f81261fbe67e0877008
SHA2565867f70a40777541f4fd0136e506deea3746fc9b3ff11f2c6754f56b53ea8cf8
SHA5129dffc3820314e266eab6845bde9bc241f716e490436325433fe96b93cc92a4f74e23d89eef18be7fcb00e93c00dafb1d7fb686444a2f2129bee46c24aaab8de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa54a6a06d7f9efdc7eb17ddfc66d1ec
SHA1bd673860c5b8526e04ada3bf596435e1656800c1
SHA256cb62f9df4d0b06d81e3abbb1d2d627ac11ea10811085ad66d43383315047e276
SHA512054e622542a5bb3e6758d17ff9b70f3e4ca80c71641809fa269f115da273288168232c3a7ced69515dd71a9a887daed6e12b8764ce3cd00656ccf3552bc1aae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7289f2df98099a31e4e454660babc8d
SHA10d4b172f3a242c16f6e530061e411b5a90b98759
SHA256a82422cc647c4f22ddb83f0034bfe9d5d7e0d6b50b3cb2dc4dd280a85f6ab52c
SHA5120939930428f54dd2c93a3d36155af91fc060541b995882629084267f78b161cfab0de6582a88077b2235cea5581feb24552162769d9fafacc7556572ce9c60d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56897fe79684a5a763ef6ce8df00317fd
SHA106805bf3d10f55c955a3a84a5bda6af609e804d5
SHA25622beacdb3ede5452e3c6809bcb5e32f3281ecc46e15304fbe9f2dd29c128de21
SHA512c94d8d843acd638fbe6a2b8e8256495e04cb1de8fded3cd588a75fa68096cd7a451bade83a188a711e515f995de4f5ff94e5079e30e9a16ec176451682b13428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b72322d151c119f23cfb1c92bc9a11a
SHA12e29f3850b5172546d414e2a59d0c651bc6105f5
SHA256595053aa8f40b7c9919409233022c5d2c980d3cea5837836ec5444ccf9319623
SHA512bfe556c8e2d09727a4273b2959172758729f20b20e85d679e92b9cc0b6eb3b93e73fe644e1a0d5e6d59062eaac71101a757ce6c325c7a506a1234ae3e0cc70b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5247e3abf93f7a414aaf4adb425434
SHA1a3bae8b5a07b57624cc26cdcc6e8b968e8253f7b
SHA256265e584f92837213d2253ee4d2c4f8a0120f04616c70254bd3697c727e481b57
SHA5126ba8d0b3cc823e9e2f9db5639d6183682a167654f5d0e790209482246f66150db0ecea8d3b77c50a49b20fb2d764c1d760878b5c968990f6d160e1ff5c05f227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9ff9cbfdd6a3bf894cc30ab578d3e8
SHA1229b6b151c80f3877fb4c01c917d45b1d9c6ca57
SHA2565885b68d08c9566efd33180ab61c10f3b4ab5a4b2319f5460de344b60adbb416
SHA51224d939286dddeb72a4a77581a97853b47bda56a70aa0fa4f7c786c974b00a82ef1939a015f60affcebdd5cdf18e52d98cf2f1e7e03a0cdd2f4a1015eb529573d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3b0944e8c104463241a80f094e79c6
SHA1f5b511c324df77534cd33669c299d2c5158fc6a0
SHA2565872e0c98f2f52ebc1eb667759feb96abe3aacb574c48f2d2d4e8b5f9ec324de
SHA512259b2ba71257a6516a2c01c6560ad0058848db69de760594bb53ae68f4fefe8e42754bdc94d7b8318c8ef51bc50af24425d7d86e6f2ab90d68c38aaf0f71eaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a68c476ed6b8f795233218980b6408
SHA1189fd410dab3003ef8badf02fff442df4fb83ccd
SHA256eb25dd09adabf5372058b4c3077286c9ce6bd653fe345146c8b304a1a9d767fb
SHA51268cae7b1a40c433169fd66be7959965eca06fbffc17f4183eb2a9bfdcdadfc20249a442b33cdd1d833f28098369a7232a00f7774330df0f788b7129bc5f7a8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a52dce8b4ce52cc868b815f784908e90
SHA1df13de99cc17d0cf125aa20a1662d01d40087118
SHA25616f53910ea930c554ee714c3b5368329add593b2665b143f95f3dbe9412fcc06
SHA512fdfae990e715656711be52d9e8502b157b9c951f30f114ac9e5f960e1f019c831a297d4bea3adc19da321e99c37d8356a439de8e5f274f6d369550e658c495e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57debf5c3e1b0fa2436eb91092c2cb05e
SHA111255eae037363c965ab7d30a18cf81c319d8b83
SHA256ba3ca2c2694322e8805444d158218088486a288c2621e19d9f4be49421519f40
SHA51275b6a66305605bbc5d4b169b2722c6cc938fe8af180f5a72692524478e560d5189e9865b76256ce77889049e9ebfd64177e516ae311236641faf8d9e18f47eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27629adb1e67aacd395f56aaa38cc49
SHA12f6658c3ac40f4089ca57beeb1b5b454c8afddc2
SHA256f19d8d611ee31f8efedbc795b96e286ceba16ce33caa30925567c699c87d38cb
SHA51281f71d635989d7c42e920b365184317baa1a5fc6a85ed984337ad1ddf33606baf247a7752883bd674594e7ceb4b7996c5b6c058e588c4090d97cc3ccddd1f753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59080e007e410f4bb5352e76083346a64
SHA1900d859c372a63b6797a2233fa1603911f3639a5
SHA2566a454ad9041fdff0397c8e8cf5ae1f8cdecc28fcbb71fdbd5f8ff08e0aac7ae5
SHA5123e088f113d34776e371248ad2e3bab76590a240a4d88c4365c808a0ce1b3d0735c65e889bd6ba99373ca05dde80a3f6c7620192db02959a4984a18cd777a3785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db365a04325d17935a3442d6c6d96dc
SHA1301d74fa6d5ce7fac9d2a91cd2d70d9823bd744d
SHA2560e3b31cfaf0aa2e8ef5f9876221c97c3d5b3e21b1c0a48e7d464f9d2b13682ae
SHA512545e87e194e54f71e5d92ccfe184eaaf8d5ce0f0caae2a88859515aec0f64e9c8881a2db04ce1acce0badc9d15a3320c59441d4499550b167b696a5be2cc11d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011c1b7e157fb6157bd296c9884e979b
SHA108a9102651a73bc92cc254d354f08d305836b4c2
SHA2566b4e670a63d011cbeeb5f3eecaa7d8da0e4821d25aa845de20de5770499c526a
SHA512ba2031604be09eaca25b2498b3d33ccd2293549854ab14a9dd70b70bb10af389b37a16abf88310321f33242b69c38d1345dfa9d096364740805b8cf51e43f7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c8cbac128624c8870f0179732cda31
SHA1decdf7863afa527c6f9880e1027f202963d186be
SHA25697470ea7908b0a3dd0eba4e581b035fdd7d42d77864be02ecc3b1adf7c04f4c1
SHA512293ddd4e4353b2e22015b6e74af26e4907ec174ae28d14a605a84a71853b386c86852a9bedb1715c8b04ba5d63908478d0947fa3df4ac4b7e8798bb3775be361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1243003c219ede4e20ce230a9fb179
SHA1d47fb741b7e45311bc5609ffbf635e4369d03576
SHA256dd52897566a76b2c694a03c181be8b6b968f152e1e3d1829239c44a40718dc32
SHA512d96083924dae017a37fd63aebc30851531e2b3a3d34cf2e04822a3e3768e810a041c40efea6cafcd5f90612713a06b4edd916fc8cdb74c37bd647b225af22e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e766b24ca9eb2cb6ea56fe830b5f1f
SHA1e37148fce4f6ad6229b6206840b58a597abc7d70
SHA2567bd02535aa489e8dabfb9e48881f6830408f3ebb5a71a13c60d50cd4501a1114
SHA5128b046d48b0feece56aede2451fc3722bc49c0d4d5bb5b8c93a4351673aaa82df097f4ea6dcd39c8c08e0a42d480ebfa84f0ed4eee3f8a471d5d3b7b3e108829b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b