Analysis
-
max time kernel
68s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
e10595dd457e7c9998806b23649e8704_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e10595dd457e7c9998806b23649e8704_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e10595dd457e7c9998806b23649e8704_JaffaCakes118.html
-
Size
6KB
-
MD5
e10595dd457e7c9998806b23649e8704
-
SHA1
f6f43ad270f16708206ee3ae8a9996d9f8d11484
-
SHA256
d4c1717c9c661406bfec352fedf938c28a9368aafbe432a10fb4cce3e8fcad3c
-
SHA512
1dde7cf6f53390d812ae39063666172ab86bc42350c6cbeb0e8dc84f74f9f3431b916083e5c8558d7a0beb3c394a1fc3772c4154842e8393194d7f635f791372
-
SSDEEP
96:uzVs+ux78lLLY1k9o84d12ef7CSTUTZcEZ7ru7f:csz78lAYS/ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 600d43dde806db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000afef4192637ea4d0da288b131edcc99ef7bae6d94521b95378926315075d1dcd000000000e800000000200002000000070955d95008bddf30ef0a71ebb8af26455f40c1540cd594d992e5cfaf66ec1cd200000007503ce8bb8049a76741cddcdd4f9d4df6f269ca6146e568a49b43569e8b1908a40000000e7ad1ebecf72ecfbc6e0d0f2ebf984d557d0d24f4c39ff4b18486405327aacb204cc023c890bf6da762f0f9e99e1bdf7954b8581f7f797b8f25548f33273ead8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432509350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07B041D1-72DC-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2172 2280 iexplore.exe 29 PID 2280 wrote to memory of 2172 2280 iexplore.exe 29 PID 2280 wrote to memory of 2172 2280 iexplore.exe 29 PID 2280 wrote to memory of 2172 2280 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e10595dd457e7c9998806b23649e8704_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e24da29141ee632bee83fd9d7fdc7c80
SHA1e8e427f0d1feab7531b5385f82e030baac28cb1e
SHA2561b0c6b0df6681f06aa4f92f9536e93a8dde385d7e21ef126d0054f745b5df434
SHA512087f9eacc3ed6f8bdbf7144cfe138c1be24ad13e7c70f6425ddeb782949db494d8abcff8c03adc4fcdcedf11f704d52b0ecdd60750cade8177ab2d54a65c9db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d492381d1569083ceae892d15939386
SHA1f7f58ad9a1c522895401af997611c3d22113c8bb
SHA25614daa8eb29044058653c6cfd0bc1a6a86b7a47a9c5892ccd1f418c7eb53f91af
SHA512ba4ee8ad13200b3261486c925522ea439986d02e877ed3341484e36a877182ff95be48f07ea0d32070501870071910f22823e091571ffc0ee8c1197e6830efc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53235f458f55a3e1a35b3ff379022a7fe
SHA1218a4914129cda1cff6f850f86a6ce9f6abca276
SHA2567afd3daf9f542ec0ecda818aaa84c2895f7df4f443c97b8984e70b160b4a7634
SHA51238119f23d8b66f2ab67d6879339d7511af0a5086b88258a9662296adaf103a70bb679a08a4012e128c2f8352fd7105530b4c3394cb68c3b28823d91b4b8edfa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58997bfcfb67e1a79390075dee7a0cae4
SHA1a2e0afa0285ea99b93e551646c8e84d2c43d53ff
SHA256ff7c73545c5642fadf0accaf75142fe609463343c84803622628cdd8777adb60
SHA5121d99f207ec33a571c188801c14d18eb1094c61fbe83a13c81fb9aee93a7b3504e565623ce585f427707d58ca372cb5ba8778d5912cb67f1c0244b196196efe28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075bb3297bc18306d5c6a3507e87c5af
SHA1133cd5e6fbf6036d35371f9ce2775ece0926404d
SHA256be864805feb310ec88ca846049900a644b3047e34c6e462568fe7bf01afecc80
SHA512f8c5334f359296f9a34244ea48b6c612579dd7826a813874d021aff45e2d1914c02739135ce74fa00f9bf81a1fbdc71f2ec5046d6b55a35d2af9ee9925aabc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53358eea320de06d091960f3ad178efdc
SHA1d059cd7666ada0e9e219af51ee4487c8652c63dc
SHA256410a4d4188e0c88a7501c1d3cb998328200746d5558b899971cbb28d33a3950f
SHA5125c10d3e8333022c16d2b3609545e7fca6fbea3211886b54f2e380452f4da225240a1a18695acdd89feb7cbe1bdd5de3da9d50faf0f3d9ac383c960edf1feaa49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6164b39dd2bb9fc8461f25ca701d627
SHA175ea80c989b0a8a08c0e0a107d2a67e5ae3883ba
SHA256646b5e1508908264b2154d7f631eff8afb20315cdd1a7d00bff768d0030977a4
SHA512d39eaafbdffff8865567918387309373e9003aa30b14c5e51226b994989acf19d489a6d833a2aafaac838651a31decaf90266f494bc455b8645e1789023af74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4163d9c0222bde8d31ba1b62aecfcc
SHA1828596ea28b44dc649fe7e3c51a56303116f4fea
SHA256a4e35cafe8dc9c6773743ee772af61e7cd7b9ffb14d4024b841cd494fb1c37ce
SHA51205642ca5153fee2bd3d9ecc25f7cdfa543f59c720449e2e0660c8324a05b5609a084ad75adad28308eb1a17e9719912ae6ce2faf178870e66c478879ff589142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf47e25de0a720b937c471302270e910
SHA1c9114c24e59d694abb65c0cbff42f8f7030edafb
SHA2567648346c74d762c2b0541d41d32354677257137e4242690dfc2d6af35aba2f7c
SHA5127d34497acfaa03dc92f562c8283f2d71766d1196ee091441ccaea0201cc93df1822fd335d5d9ed42d14e647b22510cff674cb5d905730d907af2a6c3d455d7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f77e84f772487f18f1a10cf80ea7061
SHA165946431af3e4d3090a463902eb74edaa20695c9
SHA2569fec4fd50b06fb11e049fa178b76b38fa177357d5e4b4b2fb398a831c77cac4e
SHA51276b3a39d51e6e7f7a65f05ac3d0cb1e904ec762100fd942466407b1ab8ab1a89d90aa1d007a29bcb080c26774fca80e9f4d6b9ac0e653cd1fccb87bb62d73837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500420f974f01a3ac3bd0ed640a48f952
SHA14716a939d3883e43bf324357664942a29180940c
SHA2560a20c728c44e55a24c3bde941f15c09386aadfead6f7d7fb98f0d06c2bcd44a9
SHA512cb9878907de33dd909a8a22284f839ff2ddba75cbf050a4b2c7548da6760a8970766b6efd2a3c70fb091c46109cd2ffde21b51fc59d2534bbcb9ed0b5bd9cd25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a4e3f8927ca3023eabf7088e310098
SHA12fc9154fb003d3fa5aa83a98d47782cbde9c2f12
SHA25617c4c1ac268289a32021a795ecf0765d6383ee655b9cd7e047d78da6e7c8db10
SHA512b9d30b07ed7ae9c1c14a361e02f2b1a50fb07b29d2cb1eb98f77440ec52e46c271b50c4e9c596c4875f0887fe7c85def26de34891fe2690594c5bf389823158e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d14fa93f02edbcef0da018da14f75e2
SHA133254de1c7acbf302207d671fc1f658facc074ad
SHA2563e82c8c1bdee81740c230f88761c2172d57456f49142c4fd95846ed1709efd90
SHA512155909975b0738e230583ceded6e56c3d12e87254fece8af47153fa824017b657ce2a5a57136517e9cb43bcc659d672cfb529267fafa698b258c237d96e376a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf8ff911d8736cffbf1c008e41c2a9b
SHA102c8e246fbecfdb3f1d7708d7d512e22ab1ea113
SHA25662e3457aad361d39c76aa6e30540efdca7014bd89f2d7e10ab549239d54cd853
SHA51215d352a742d912c570de0838760a072d1fd847c06a84f93cef7ed6559664b51e650a29afd1695cfb167e923b7c46bcc51b8a8810861b5a963d19122d94fbeafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586492127d7a470493ae20d20fe200863
SHA1897c9a26f404eb0045da5238efa4fcc4ec8b31ea
SHA256d8498e1ee24a62fa5ef915c9ab4cdd8b43ce703c05cd367a2f01568a3e94f0ac
SHA5121c66c49f14b797fa29660747a8a507cb88026a485c27a0091c931f9bb34706742204573a382053e02d7005ddfb9fb7a4f34fa1fc1d176032b01ce186b95b7c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cffb32a3da90dfb69633ed9a36979e
SHA19a465f53324e76372c22377d32d7695a53142905
SHA2561b259b271be25085a96f48752c09f2451cec83940c3ccf1b2666c4e590cdd514
SHA5126c94cde1d6785ef3fc247f0d785d4db75176d69ba2c9ef151eed32a6d57f75d5b0faecc29b019f943da151671c54b924a706db31f9882dd8d8eaa00bed6a967b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e6f580d7adaf2bb9bd1423df6fc1d0
SHA1695af3a7586fffd61017d7931a244b50d21b2379
SHA2565804839696a53f3d18f411beb40e0a0c3cc9556396bc5d9d50f93d604d29989b
SHA512c88e84386bc303d887db83af585a789eb99102de25f021648843f3dcbedf77c0555464bf85ab1baf8e6c9f494b99ddbd4495de41ad8064f6e5ef6810700eb4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c8ead6b1860ba34c2ca8ae62ea8d6e
SHA131dd17ff10fc78d7efab72c975b25739a0038958
SHA2568ff17728f01236879892966a5f9a764798502533ab88420f92cfe6771557dfcd
SHA5129c805d2dc0682b0e3cbfacd43276fe051e416fd6fec67369d974a432f3e97320226d8ef55964eb3718ea9a7c3874109ff8f51fc694074d3445358f8418cc94f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d53a7f561ac0ebe81ac87a2fc51b379
SHA13a04435a183c01b7838a3603ebfd769e20b8a9a2
SHA25620560d0da9392d93fa360d29e5a460d975fdad8be379753ac4a71143ea983c5a
SHA5126b2fc3b9614345b85504c316ca6b20be2ed29f2bdc0d9e6bc384c38ba5f81a81051c63e8e9ad0102fd0fede97239a2a26c7905557293ee9394d080b13d7c9b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d3cb0b420cc22c8d068e4aa65270fc
SHA1e72c751db469437424184e8818d058f9c8fdb7fe
SHA2561dcca98480c591c3e811b4dbd87a42857988e4eef5347034e1081fb4bf900e5b
SHA512e14688bcc284ab0ad7eeb5e038463097856e9a5b250ac310f443b9378e74904c863450f20f919e5fc539fc9601c41cf1a642e7d0d0c55c0431132d35ce60f791
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b