Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
e0ce6a16a78aa29cdb492480b525734e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0ce6a16a78aa29cdb492480b525734e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0ce6a16a78aa29cdb492480b525734e_JaffaCakes118.html
-
Size
55KB
-
MD5
e0ce6a16a78aa29cdb492480b525734e
-
SHA1
8d8c2fe27f51730c95141fc7a16b78ad1e180760
-
SHA256
48ce2261ec1b54c56b19c90add2b5ae595b155d0eec59ea878952718c82765c5
-
SHA512
fc8019bde0a97c69e2f0da3ad5b9a4890e0fbb54dee286f367d50bc75127879b91dec82f3d5e97878c224ef859c64036a59cbc63788cdf191cc88a9b577702f1
-
SSDEEP
1536:jqsIgSbEZddM7reguFuNqh9EKwFr1MXgaHNkARr:jUgSbyfRr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432501516" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e879f74700f4e606d130143076065259c427c313d6c1934aa734ea21720f1004000000000e800000000200002000000091c74d81fba05ed9109cdebd7643a77a8ce9cf03739b259f21508348dbefe4ae200000002edf34893c083e468896d20b86b974fedaa0e82891792d31588e6089a5249b23400000008ce9fd4a064372afa4adfcdc7ffb1e1ec481426a005d219f4dc1cd3848cdf89d619aa34f05e2d6196cbfae2ea51032825e624bcd97887a34db091dcff2847354 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA800FF1-72C9-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1021bfa0d606db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2136 2960 iexplore.exe 30 PID 2960 wrote to memory of 2136 2960 iexplore.exe 30 PID 2960 wrote to memory of 2136 2960 iexplore.exe 30 PID 2960 wrote to memory of 2136 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0ce6a16a78aa29cdb492480b525734e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e90085f3a81ab2b2886001a314e3dc6
SHA1d6da3cc928ffb81fb3638d1d689c5bd95aea82e0
SHA2565d8cc273be582b50b42272e57006fc6b2b0235d7ea047d70edb4ecfbc53d1f1b
SHA51292e9e6bdd37032946ad05d5e4f4a188a9c3899c0114ff474e916717cfe54d14a7b99733a700a9835b55678c5c1aed78e6c9d8cb4b256cf666d2b6e1618fb56f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51849532d4b0a0f01b140e4e10dc229a3
SHA1c3f407a360c5be429cf1714e11f6f0b897c9be6f
SHA25697cd9a286e525cd78f1c4fecf1697208c664ca2338f6db9d20d73b1dad8ae18b
SHA51211de310919ff1cf45e89729dcf360441cc66c5f04b99ea44bd97368471c9c79524cfe63c40719bfe883390f5c7cae21d736987e3d784eb5d3b034efad2fa5aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52521f564545f4bea0318ad56ee74c1cf
SHA1af85001c57ef380f04cfc5817c21977cc4194191
SHA2565166fb27bfde6fcf67db372048a82a026a7342a53b82bf7905005860336b68af
SHA51207c81de3a9b164e5d9784f3513e37f9e85f47e63e17521f798d29a95c1eed3f832b9472525336b4128a2e9c0fdfdf5def2b8dff12f3422c0728f83f4b66c90c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942957a6b6ed3aabc5baee76df9b7847
SHA14a1b28134b66fc309e94adedb2d7b39c0d4eb7de
SHA25631750f1ac324a866a9e73f3c51150c830b90a974d6f6da749e9b10c871da03f2
SHA5129ea6364ede922931675168566b397476837f7dd898a28f64d3d29e2d6f2d5a34a8db71def8d7cae26c42680537d641bc032f9a3440309b0c59b11bf59c02a11a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e286a84b8a70c06ec2b8ebcaf501dbf3
SHA1897cd9ddd65f525d0a188ec95ddc70fe83a5967e
SHA2563fa435af04e0a3a66f786053b834f8b69e91c050d19787b28437dfaaa69a3fb7
SHA512482a2bc526a363b332123cc805d9fa9555a2d70d2cccf2a2945ffe47e82e57e149a4dcfe5e848031c59fe07df84220def2ca0c64fb77b9aafd1d086479d132f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f354d670239f58ebf2e8c4dedda0492
SHA180a7c60bfc1ebe2952a2f02463eb9f5072b2fb17
SHA2560829ec5adefa83ecb4ace21586e78b90926b83d0454b6e8ecfc8074da1bb974e
SHA512b2b5333b99a376124202541eb490bdd263800222b4bb6bf1b2ead2c28218e74fee08d235bdea32906716164a3aca6fd958ffd1ead70a8c7067ea7d503ea23357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59562b0cd8b07ac1cd364dde44ce4efec
SHA18238aec22c0e3e4c3e7df122418172cc1e16a54e
SHA256879ad475fec237088c8ad2f28e53b7e67c2af8d717c157146d4367404d1149c2
SHA51269273e1db3c95f3671e2624927f9a2ce2259ab752564e5cdc8ab39785150faa991ab3d45899f0e92dc8feee6c6515bb56f30d70788b3c89655296967ce9eee5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e5fe95f6432aaa33d07b3a525441ca
SHA14f0eb628fcf0240e6cdd8716bcb6de1418fae130
SHA256feec83d401f74649e3a860e4b617ef808f08d91d090bc15c337d9fb84bdeebb2
SHA512e158b865415fa384039732e501d403cfedfccfc2bd59074ac268d8a13a59425431b257bf3281b578e5ed6423fd42ebf15b1a3f0a482551bc8299cec6a996d6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1dd91297d58f6e950d29f8eeba0b8a1
SHA15c257bf7da313ff361a00cc691a29b51b1ff3721
SHA256aee8e55db89f3920cff6eb484f766ece16411f8a194975c2b5595a6c786d2c5c
SHA5122b07e311d64cdf54f79a391f684ba00dcaba427e63a94174401ecfe9b1cd77ecf7e27cbc755a37c7ddd696e182db4402b7d814bb6a2f5950b6f46bbe63239ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0475d875a8e7cc26917c42427207b88
SHA1a86a81fce7bfe044df36b46ec03decbde6648eb5
SHA2569b7c23e38e78f71fcd38196e4e2a53ba63b88ade638c12621fa4c3f4cc891812
SHA5128854b3ab1e8b041706f21fc435f1da7a0fc4b3d6470fc532e6e99950f29f054d5062253422b21a64ad03edb50388ae8d12f301ee7ef661c5530fe76307227b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f596d5d997c5c2804fd959687a1d4258
SHA1eff0a3b1bf98528c60639e5e11c31d813a2a2b8a
SHA256a802a3516f2db94f5497983127fd9f0aad0f1f936e22a4e7aaff7c383e1ff51d
SHA512a23fe7e98226bf5ea6bbc97a8f4e4b8313321191c87dc7d622d6c15597e57c02b995470a829add9350d45d6a3c1a53da085b0bfb954663c760a4ade83930e934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046f99f008670ae61a8536dbe04e23f7
SHA1f39e84afa1a3d27c98edd590d891d0469e1e3386
SHA2569c09b54f672d87fa43a0228d15f5468f5b0343a196a41fbed5368ad7105deef3
SHA512b5a54785358b41c7c89cc8c950ad266a7ae97ebcf42035a1de1fef4e69f5b66d2d570e69675683cb64705600a598f1d9942643f40f087113054543b24fcce404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d6b3af061bc4213222f849fea2febf
SHA111d03976b318fae6e10393f2d9edcc5ee6a8e5d8
SHA2567228525b049082243acf3aa2ddc9c0657a20814824f7170f6fc17b4a11ddb2ea
SHA512a43e279de2eb7c7a8ca82a6433b2b0d3019b0cfc58bf9f457971827986243f7cf81a4a6ffc9de08311702e731fa8cb454ebdf6764d0245795b458d90a7d3f2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b2321a79550a5af44c22b7235679de
SHA1d1de77d2979c7190263ff58d8d1f8f4974df2fa6
SHA25650f2a723cd07d0482459da28412a60ed830b6d1cac759dc9ed25541faf6e0684
SHA51271cbd2c7a64d66422c32e2073f5a9039cd3c53f0a0e967181644a76eb8a6100cc3093818f918f1a9c87ca7267cee71741e9beab37e7985f2f9a72a4c0014702b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff80805fe430a58532275a1101e9c1f
SHA15a2d543f42083a9cc8d2e24dd83a30d0c65e170d
SHA2562b76d3bf47e0c5901f024bdd7d34978050c099f61cc7d5576129f1c7494636d5
SHA512a58512563eda3e82756bdad0b3e8e8ba29ed992264bf66e539e3267312b9bfb0c1ae35f8923e9425d74e1e3214904b56e9589ee2e0ce96ef020a4a369d66f818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1e4f7abdeae258fe640ba36d861432
SHA1e2299f6939779ba4e046aacf7fa63f3229de78c1
SHA256d617d1e56f363c420f595e9e05f6b7f7b77f71f184d2a73d17742998fa247aef
SHA512bc7299efce122003f6e375b0f634362d15369ea0ad36c60111a0529f3faf125571dd7a3a36bce95e3ff602f1557c369b40b0ed2d0a201f71b87a50fe518de540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e22be32e5f82886e8ff4fd00fe5781
SHA12421417548b0d20722f4efd71541fc03b1e05b37
SHA256039847bf1d38591bb0ab6a1c6f26a909055b1be1d6a5c6fb8ed4820fc7fa470a
SHA5125684c79e751ef150d4511f06cf0288e3e70cddcd23e9bf9d5e39bc6a1dabab557aafe9ab66fa29716891fe3a4c2bbe7d403e67b1e05b304308171d88f47df413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7f5bdef866cf51b226c26f83d67f37
SHA1439ca2de4a80ef2984966a7fa0339987f1c7818c
SHA256d40f35005c431e15127b52f8fb2ee9cc7e3b08dc65837984c8c5b10159afec69
SHA512549496491ecce6a34443e60da1dcb5526ba0267ecb4d7dc3d0244601d36738ada58db5153dbd4f8b269ad64e64503c76e3e8ed3e198f408e4030c5ac8c5ef2c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b