Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
e0efaa69878d683d2ba128bd15ff6f8e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0efaa69878d683d2ba128bd15ff6f8e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0efaa69878d683d2ba128bd15ff6f8e_JaffaCakes118.html
-
Size
53KB
-
MD5
e0efaa69878d683d2ba128bd15ff6f8e
-
SHA1
9cffb3ddaa81defec953cbf181871f6c6788365a
-
SHA256
412d02e4bdee04edb02c464ff3e3ca26b4d1e640e0b872d360eb9947d240fa47
-
SHA512
9679485e5e1bd1e996f87386ec47714d763ec6546309fb83216dce1a3d66291db69cd14d44b5c68d363520a6f1bdaa57ce641e0fd718768a5524afd6c696c066
-
SSDEEP
1536:CkgUiIakTqGivi+PyUlrunlYB63Nj+q5VyvR0w2AzTICbbeoO/t9M/dNwIUTDmD8:CkgUiIakTqGivi+PyUlrunlYB63Nj+qB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432506101" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30674450e106db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005e6a32381c7f27c9202f1fd77c3e41176aecd96689391d23face16d08d008658000000000e800000000200002000000055900dfc6ea4672c187c1204fe6066e2c970ea2db6b01a43a762bf1a3f4bf409200000009bafd5039b77da172baaa79afebf097920de5b658bd05bea0fd3f33b94b82240400000004491f2720373d58ef1cfc67f1e5b561bf7ccea4bf49f17681cc50018aea2f9c4f715722df452ddebd1a36f81d424c2d2d6787d1fc01bdc46dc771871218d94c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{775C65C1-72D4-11EF-8287-5EE01BAFE073} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2068 2376 iexplore.exe 31 PID 2376 wrote to memory of 2068 2376 iexplore.exe 31 PID 2376 wrote to memory of 2068 2376 iexplore.exe 31 PID 2376 wrote to memory of 2068 2376 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0efaa69878d683d2ba128bd15ff6f8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b70e0582a264519575501711e466ad
SHA14c05a029c19afbba25f25ff20a72e1c40c42925f
SHA256eed7278a0a4f867690e32184fd7328062c9a2489f0cdb627de04fb46e504fb92
SHA512805d20d04a5b762b0a2bc58b8028b5d6bdcc1be68dd10f0131212a9294571d9fa376f173533db03c8b4bac701b4a9df90e59422de5081b340583ed77484c9d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec0a6ad31e7e51ab7e2d70324d9746c
SHA16d6d440321286d26d278e73f708d0a571281638c
SHA256d795ffc48d15b30aeec0edc190b5ba85f2d0475eb8c39a029b4c795cebfa8822
SHA512f0e789ed275e67ef010cc097fd9828527c64954684d2fe9be6e5b867201ccff74105a26e06206f1eb47780a5c46785e172e7e32e7f205c2fd83d9cc3c1f06736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446d4202f851db630d1698d2b8a281de
SHA118fd1e812a3986ea262a8e976fc416d03e66a854
SHA256e9c89946c329e64cf4087dc8f0cac38c1d23116f0b9303c5c36641712da13ec8
SHA51240cd37ba4a81a1811d77ce94d88b149745f512f8af9cfe1a7c36240682ea6601ef4812d5722047e6d7e5f817e90de69db541c4a3c224a1790140753d9dcdd476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba7140af399bac1530b51b157a550f5
SHA1d19a37ba9cd0671b7b245802a3a54683091885f6
SHA256690349645129facca827991df5668b6d6dda1ca9b499930584dd1f2852223e21
SHA512fa1c9fafb6e9fe4cfb0eac307a6b6c53a8073b5945e3c560a101bb713d90feaf86b51f9efa00a5d0ba4bf11e4bce0f083d073144e27676495569ac19bfdb8e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e476dd700329eeb8ae91fd4d994824
SHA154455539b41b93e63867a185ef212960acc6cae2
SHA256a68d90de9cd81cffcc75002a1990e86ad64c7dabc3e597b710598b940dc5fe1e
SHA512ebfd210854a48544170b002799258b08fe0b3a1cdaddd63af018b730b2e1195c9e84a86a93ff2e1a66fe8c672df5416115d515d5b3a723ae41b04080abc13ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb5334210e40e0ba395149ce13d995a
SHA16e314197bb5a3c80277b7a15950567e5a397ba88
SHA25689897b748d200b64fc638bd0a9f53549ce91244796f3b8e81ebff9398e3ec67c
SHA5121e244e4fefa75b345ebb9c4122ea788fadd670fa35b98472f26a55a5583be3d9096f12d787c5d8d0b6c8d959b8a17f96aa6d1a78e16a05249abcaaf186576ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6ba8170e0f51b003f431ddb8ebd55f
SHA1e19005d13b45f3b5f78bc36540f1d1a2a05968e3
SHA2568a0f823a59b27ec13a2b2fee446c934acc3af870e0ea6d94149f1aafcbff9d6d
SHA512bc18bba0ed6766e857032677a75d9b55f5614995d92bdb7c2eeeff25e18de2b25472dc671d2fd0c394e6cbace6e4cd033837aaeac313449bcc66cd57247dad0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda7f73208511abecaeaf441e398d9eb
SHA1227edcad458c1d5987efc60a3d95012d274c5180
SHA2567f7346333739ffbdb10899e14055ed7eb61bf20e7054a77ac8ff8524eb16de56
SHA512b708bea0619d9a9eff6dbbd0b4f9360848092f2a11e49bb277db2917abbf88c59ffee35dfc93c980042b3d8ea7919b7e4636ed37d1f39dcb376f039cd3d597b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d600ca0779f523d88e637df7762802b
SHA17b0217deee2ca3dfdf0a5a861db4fe66d3bc5a22
SHA256df9c79f6b45975aa834a6d493d0e757c0713a1676609d55bd5d10e825e4fa375
SHA5125a2869daa517405243306e089726ee4fb8f420747cf4c08a149b82faefe4798fa597449715b856f9c2317263a60d414ad5fff0228065d6760b9ad9803a69f71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c068263b443a0b42ee150505f84e2748
SHA1e22a03ecc8eddbaa8f7344657930d7ccce54e8b4
SHA2568795ebfe0936f3528a499d16a07b9ea77556f5eb28dd6330875fb16aaaf0c39c
SHA512e61438964e4484212cf2eb9e862e8ceb49179986c79e6f001e60fd58bd7a9ae77bf668dd4f5e001040254362f8c7729fec96595c65940a5b6527174d387b4b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0cee7234759ee086700eb88f9c8be5
SHA17b7b88b6ae2c379b74d64d6c1775b8736daee47e
SHA2563a1ddce2f7cb911c10e9ec4df654bcccbb5da4ce7f9433b2ea45953a082be4ab
SHA51282973ead4649fa81cde1044063939b19035824a19d3bdc90202252d4d5ceeb7b00557c67acf85104f94ce8ef2dc739fc7d26bd38c71a1edfaca84bbe77d1bd49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef52ff1ebdcef4191fb0970055836add
SHA1ec7d57ea3f4351f8daf48678500d680d3f2058fd
SHA256fa073df002fce47f78c78cf3801f3bdd976aa94f4cd5e38922c183291d69c145
SHA512630218feeaac33eb22f8c82928ce798103e40b692069b87d66522edf6b2cb42d6bdd835841b2e2479c71d99fab89988aceae15f904d301f41db686c4f5712c69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591893261162907ada6eb1976590cd987
SHA1f99a59fffc8ba3dfb6e5bc969de81ad44f496f11
SHA25665117482b898125ba146b848e536ca1f5dcaf79350a7dcf95de79a6c72c14c4d
SHA512e299170c23e8d9017a0095bfc0eec4f882a9189c511ad39d22c07f5d377239954ec181797f49fbd8a368b427f90ab07390cbaf649ad319c629940655bf1298ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5db9c448128d3c89923765e9c039b15
SHA15e34f987c096320c8d4475bb2a2c49aa2225236f
SHA256edfdf7d9c97b56b5d15626f3d76946add3b1931715b2ed4320fcb54fdb3a4743
SHA512da5cc3d5bcfef7391ebf5332792577185a4f2d758c5af7aee3959e955925c758d67480d950594ecc7617a4f79942d3e538b8b36c276940634c86b6fff9eb0e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8cacbc3ae9f2733f971e1911856593
SHA12253f503163004440f12f53477706fb3808f9ee8
SHA25612e6fdac7ab60f86f1d15cd01e65415877589ef96bae786390cab0f42548f800
SHA5129cc67f5e9c8b34fc5e9b140347ef6209a6d449b84a511e58b9be3da0d50f4bc44002d8ff6f620eabcfa3f8a06314e68e9209950e9fe23ddad2e8c2b6c5aa12cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510128d026b1e0ff78ae2e01e79aa74ac
SHA18587c3dbfa8864fb1c5a1d5dfaa5c4f0fd95276f
SHA25675c5a08c0848046e2e5869806802e3f7db84fceb95730adbda3d8005bd081eaa
SHA512678a27205268f4452627212a94db71d6ef9c72c03a5b09de9eb59ffc9c6931ebf146307f183173a455caff282d6bacdbb74d9e04206b3603bdb62769eb5f60f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5529dd0da377cb41664375a333be3302c
SHA19bea9b0e9c7cebfa538aeec51ac7a78991287dee
SHA256ad0f5964189f77689ac2fb1b0ef7d83efd7c72b04018cffbc8426fa7844d971f
SHA5125d8584f23920ed2f7fc6ef75f647e244e0fb994e452992379bb541eb946ce7e09969e274fa76e9f0b5e663ad2e46e38bc551964395e6ba6064010f6d5d17e067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227f6900266c098c1382b3484beafed3
SHA1aba938765dd7c139c25cf4b85fa1800c458d8c90
SHA2565a1b22113bea97f1b3c81090fafcc62aad9e1eb96f8491d709fbea52166a5b82
SHA512f6a2497054b69d5897065e7b9c17ac46c0d463ab03596deb362eb5a8697794483e5294bbebb5a9a09778adaab14584e88064a57366907ccff7a863d31bfb6eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43a4f7765a983071282eae21dfa65a3
SHA1a901ee531faa39d7cbdc13f8cf09ee689de16e61
SHA2568fab1da4140ea0826a336d8c20bd9dded730844f3d7e58a99190bd9b44feef6d
SHA512a5c5b8c65943c3bc7fc44f687e10e94aeb980af4c0af8094f009cefa7c0f3f92abfdbcf2ffd9632c81a0e03248addb6de519a09b82f0cc45ea0986bf310750ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b