Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
e0e5b8bff6457f8851a7ab02e8b2a1d1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0e5b8bff6457f8851a7ab02e8b2a1d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0e5b8bff6457f8851a7ab02e8b2a1d1_JaffaCakes118.html
-
Size
33KB
-
MD5
e0e5b8bff6457f8851a7ab02e8b2a1d1
-
SHA1
4e6f8e9ccfac8d1505e11c8b834177181461117d
-
SHA256
b16513daf6ce8b3fed1037e76828488bdd6a3e8c10d12eb68da8554a4da09ee1
-
SHA512
8bd6fb0c993987f4ac9966e0ca081b9f4295ce2fe8fe2b25dd64cdcaf9be939528dc84748164062137aed8294dc07cd2dad8b834557b19b7af1d562fae315b78
-
SSDEEP
384:if4JEh7SdHEGRtzPaB4BwPtqkRPaZ0PdxfJ0PkoVMG:if4JJPRtPLkCeRnCR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c69bb7dd06db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432504561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E172B5D1-72D0-11EF-A0B2-6AE4CEDF004B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006c0e1f8dc60b4f4c27c3293d8fb9db5406f80c1e768395e6d996000e92fd4360000000000e800000000200002000000077835637846dfab3dedb82c7d4fdd15d567ef5f0b907e8ae389a7285185d6dd12000000042156f99ef97f2a571ad38294be7f523a115b4f43782a9231d62c7e6dcbb14884000000024d76d4d5803241c2ea701f3ce3d04113d588ac076e4df73ce76fb26a7f9305247e80b9f486527063273178459f4ca0fa85e8835bafe47cd9552db62f3d88ff2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1964 2420 iexplore.exe 30 PID 2420 wrote to memory of 1964 2420 iexplore.exe 30 PID 2420 wrote to memory of 1964 2420 iexplore.exe 30 PID 2420 wrote to memory of 1964 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0e5b8bff6457f8851a7ab02e8b2a1d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bcf25bc12ec07c81e670868164d95b
SHA1a37e4c9dd0a6ebe3e125aa10d3c42f439816504b
SHA256bddeca1b281b293dae68f27d1c5d7688d22b5980064fe35ae535f5f1445e1f7d
SHA5120c2bbc46cf1d368a2758e953d40f68f3a2ae8d683cffda4383ac6045cb6cf69713ae578c3113bafb3859ae1f24596feddb6ea67a27066b056210c2c5ee4a1cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e27bc1d521eb4baec41fa03b9d7a4b4
SHA11b6fc72d0bb8544cef9fe4a6bb542cda19b25468
SHA256c9c0306c8337651b8bee108f3352371bbe6adf105f63d91c4b49bc5c2c633ff3
SHA51260078e0b3ebba4135e3a0adb26156fe367f69764aa535168e39f97043aa3a2bfc2ed8d27ddfe86bf3951f2240e9604ef8fcbb748517a8fe6370ea31d6630b6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fff3f58e14a5b3162edcb3168815c47
SHA18dc929574e76fc8dd18a221783ba28474f4b4b41
SHA2568e8424be3bd00a012a48a3efa9b116eb89b1625281445d87c7eded232f8b2415
SHA512c865f2ef6d8965180e7b33c893c8ef8dcbd5e90b7190eaa22cde3c2b5ccfc7b4b602e10dcb933ffc9b8a8292832753072c91f16341f47847720af3cd65414e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ce7519671525c907ef722967201ecc
SHA1f10507424fecd255c3e434d5e213ac7924e8be7c
SHA2565331b5113ba2b39f5d9407ee6331ce8d192ff4e6746675376cb5df785ca4a9db
SHA512b360c683e2786b7dc3cb8f86dc9e53e7e08946b0a6658ffc66582e73678ca17ded63c5970a5213411992ef6527d3ec3c2eaf81ac5aa14286ae4ad46e793c0d2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a402edd48a3fdcaadab7885a1c3be279
SHA19c226caf7deef10c72959c97d9f95d3d49a8fcfd
SHA2564c55dea00b5949f92d8472c0689bbf367de7f7a7dd85c13744c4fd57f6c3bdb3
SHA5121b4deb3223a9a68bd818a5681ad76e0c519974c515bc19c140670ae5f3eda67f0fd37663b647491ac0caf89c4be4a4b048dcec875b722d0b362f2666054f9e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2316169269624f64b1296e542e095a1
SHA1188cba21ef6b639256f8d95154b452b9fb9b7435
SHA256a0dde3aa6f94a689ec3bd222504fb2f180125c5e59cbc94d72403af8a52f8e02
SHA512b8c53f84c18613f2990baf73d921b12c18b40f96e5d832fdf001a69708c74b9c8d520f6917105bd0d003b16af91e6ca9934d3e1365a0cca586949e8723f4ac8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede8364b15166f5af21afddae5a79aea
SHA1b93dfc163793a92257d21cf279d6fa7901fea376
SHA256e7ca4f079d74dd619c0f4322e61095278705cb5d1f0cadfd6116ed9b4e32f8d6
SHA512cac5af378434e3f8e92af66887914843366513cc95a442909d0af54056301c203cde976f99934bd18dc29e786bf2e353fe4526ef7621eda6b1ad5bda2a7dcfa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860a4cc627d852c9671ce1bd80a695f0
SHA10f2ca8442b3ae91a074949c67976c67a4fefb6dd
SHA2562d1fbbc04c41dd2028c0880b571dad1b5e3c3d2f98aa9ec556e6e85e0dbfaff6
SHA5129da565a7ed6c5254ccccaed05b6a961b3bb8dade43c61ee4a45b078fcd0f5f0ad15b8a79e09d1e0e1508a09eebb51df9c2a1fd22d05c27b83fbf44a1f4545ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288cdf20afb9c18aa6cc83f5be6ce158
SHA146a7152aa9df6d10a25bba0d69356e51a4941bea
SHA256812dc7c39505453e363a54eb23b901c2b5e0a437d8f3a020500b68924fec192d
SHA512a853a4c0dddaf2af41865e8bdadaa9de38a15296344f2454c47f565526936f94fb1889c5a71cb3ae4968d3c72127f510e32cae2801ac61ad38f726eb29529a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba9d23d71b70d188ecd3122bf20e2d3
SHA140fbf19de40c6834564c7a7e72287b6e4cc98ca2
SHA2560438bfbe22d77f632bee936b86b1ca5bc941f445bf62db8c43ebe202195693b5
SHA5126975508fa5798d14ee64f081581260d6ee2efddcdf9b1c88c11ca651f84b07845ab037824abdd348308fb68bd65ca40dd09558d6e8e674700085a616ac3098df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5137eba8363bea9ab6a943dd3f288f257
SHA1429a58a0e18cf42747312fc85a1a23ffe4dcb872
SHA25648dfcdd816e62b12769c68308253b80fec251e47a8a677958e4b6512acc2b2d1
SHA5126f550c78c704f04f3aceae05fe1faa59d02a2ac54a5c2487fa92a335142c597678653748c784dce7168bd1f9be751b841414940bc1ad0cac9d48581f37d64738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb20c5939a6ca4453a463cfe4c2e5bd
SHA10762c05a3f7c3e884aea8e68da44908b123c4e1c
SHA256dd3fa09f755368b0164fbe0b4ad6137e4cf46274a79f14efdc01de92b5e51473
SHA5120fd7078d5bc61351180f15ba421920c8b307acfd10d09982ddf78d11dd16463abd3607a72acd1f6909e8894671af5d4d38424e57407988bb033b797e7d7f8552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908a8bc64359426ece24f4d1b35e84b8
SHA1ba10de421fc5b9ce52d03ddd0e7ddacbb9833631
SHA2567ec2fb80f4fb16efdb0b9baf6e12dba4daecac9f0b456f690cbd4b0e87a21c40
SHA512593e203ece942e8cc0d6551255dc77f40484e2ddf0a4661dfe3e185faf3eef7f2d6bcc29bdf233ebfe4a90abb9af1d3b782cd4043a63dd0f24df36e27b4d742b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5c014eb67c881f40c7e2e318a8bce2
SHA13382fe9c9328565b71a8fac30a1bba861fc07696
SHA25648bbc2f5ba20d82fb8d0a686643549ea4859f3d79a9b8bca812559dfce0f3e64
SHA512fa87fe6ae09709b7546a2856abdf420f206872486b4757a524ff6e47eed4ac4bd3198b2eae310b16539128dcce4ddc2546692d6c8c9bd4ea66c160e088ccb61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d73c3faf51bdb3ad6d260cd06cec784
SHA1f2257000d984a22beb2ba355188fa906fbdcb8bc
SHA256db03801b768ca59ed89602619c71c17d34aebf836b3c6b2aa2d85dc54cf148d2
SHA5129e175c932d219426b6e7257b717406ea76b890d4634136136f5f6a8f0493496dfbfab5d62a756065248d988b7e28f3825552277930b33c34d8d558c69531700a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496697bd3042802faa3c1162fa34970c
SHA114e0e90a0bb7e52462b4266c391dd90b3a6951ce
SHA25657a45c22eb6652e990cad7fc5fd00b743121025dcfac332ab758679c81d92542
SHA512c3794aa0e694866669064b84661195301af10135085e193af373bbb6d14395d6971fcf4767690bc742f237428398aae4e1eb32eda5faf5a0f78b75108fc98a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2dee8ce48cec7d57155f806d580c37
SHA1ae31de8f669a153b4d74ee6c4e34340d5535d429
SHA256ba8c9b41e8ef206c3357561926af33dd58c0b401337b1e1b485570c5e60c61fc
SHA51210e9e85e81f2c0810d39cc7ef5d46684ce1aab2d5e5972640cb81ab07b3a6de1ad1a30a0cc54fdfe83c614119fe40a8c678c81a4ae82092ef1362917fdd820e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b0fcfcead194dc1ddb145b1c19eab5
SHA1d2dfbe07f0637f185f5836c8ed1dcf80a8590b7b
SHA2563b9b47ae47308c482adeda9e1f488f28c97cba405e7bdecdb811566ed4290653
SHA512afc0e8177cce9865d4e86608f43727213f2ec831976d055b0cf70265addaa581cc5fabe9cec69f73d77b94e41c80dde3e3ecfd64f7e660b47d38a600fadf9bf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be427afcac43d90663b01385a81b0ae
SHA14d4e724da32c02ebaffb90a99237691e382d4d07
SHA256d43bdae4fa16c85f11a11f3103e338f9bc1a6ceb54cd16740e0e5e3b3309e44b
SHA512dab8a3e2f395ef86668c3f7ee4342d282a0f53d0e7f682101a5de3e53316143c36d5b182a3af32eab967c0757340b23d0bd6097e7f5e3dfb29040daea9686d7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b