Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
e106ad37a7123971c0ec99eeadc42eba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e106ad37a7123971c0ec99eeadc42eba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e106ad37a7123971c0ec99eeadc42eba_JaffaCakes118.html
-
Size
915B
-
MD5
e106ad37a7123971c0ec99eeadc42eba
-
SHA1
d3936d96a55e29603b4d52d2a0f5ee4551525ff5
-
SHA256
187f9a4baa0ffd819ea365ab2ca64ea5bd592c180d834e4b2c2742fb42f410de
-
SHA512
00bb15217c1bbc6e720982b0252235e628269836a7adada47b22ccb6471bd74e5d21eefd6b19f4d2f6fc80fa2cfb144a2c6be04dc1a634a679774c13158e3f5b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e0823fe906db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6ADE4591-72DC-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005207a22061ca65125e096848f47484eaff8165f5553460a3b81ade135f18c931000000000e80000000020000200000002bd7152a71ace38bb7467e2603f5480119aac03a8284757fd348c388256fca81200000002167c7116b20b17c6833deee3a2b068b852ac665aaa56556d31e583dfefb8f1d40000000312571968189f001589674dee6c9515f39427f5cfd73099d8474dc70093e313e1caf5a82d2301afb04a8931a13d0df0d9378bb57d6d4897d91e8ecf54232a2e0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432509516" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2792 2932 iexplore.exe 30 PID 2932 wrote to memory of 2792 2932 iexplore.exe 30 PID 2932 wrote to memory of 2792 2932 iexplore.exe 30 PID 2932 wrote to memory of 2792 2932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e106ad37a7123971c0ec99eeadc42eba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c7071399e2ccb283dca1671a0da0ff
SHA1fc2cf9c7fbbf2c1a59621865d11e2256a4dbe5bb
SHA2563484acecab8d41008793a088575c019688c8082bd26330bd52294002d2518890
SHA512ef5ce53e4fb72f7628510e319fcde8760cb6f3ee39751bd7cb7a211aa8818b3840c615b76dc0a10d35f6a02caf8fff16025674258dd0b530395773a507f5ddcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555d396320d125f0dde0aec32816eb7de
SHA18a322652d92c2fb8662dfdaacc7fddec58f648ef
SHA2564268a463d9ae0e6df83ede7e4e7032dfaa653cfca982a10a4fb5a0756dbb96fc
SHA512d4e9a56ebfaa504cb96e21a0b5c6b40fa6c6143935069b6945eeb6e186fa403fffb01ec85a28cd1efe4023efd188629e34c6fd26de9800a3b3fa6f23b88b13d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a9c2645e971a8d4ee751d98680251d
SHA12e3e14227db6518ce14a23e302eb6078fbec960f
SHA256e766c5a2dead33a99672e58a8f88be031cc48b8c1940b1bf56aaebffd2945117
SHA512c70106c88eddfc256c3a160f2f10a3dd6ca88f18b2290729ac0e77999a854c564b3cd6983ee2f8220cd59dc1ce6c621d34c3e49bf6d152a95b1c075656cfcf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56592126ca8bbfa630523e90b9153b992
SHA18792f68f36a0a0335395d24cc1ba0221cecf5ec6
SHA256f48f7b8167802a178f4ebe274d3b0d147b7ce6a3206ad2bcde3235f0a0919a54
SHA512cd0aafe0feb43cadc4e873414741facaec2ca7fffef4be9dd67959342a8d332784bca69d3eb0491a40920a2fee511d613589b238d28577962a63a83107c3c6f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffdcb21103965b7675c40d376fe3e486
SHA1f713a88309ced6a84c9c8b637d93cb13e80bc530
SHA25678d2be3b11448d0f8603509a0ab4b772384b5fcfe312f7d1dcd81a1fc08f6227
SHA512c3a86c5f6352c18bf1afc84346e3ecdc9dc3ddbf362a136b1deb8cf00a55660c08cc16ad9072592168020c6d568fc88a2feddd158154d4cab14ddb61ca9ab3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec201f5a9c1f9839a15e69c0f2ab4ab
SHA15be03236f19d7dfbc6b708e927fb3b25c3dd944a
SHA256f9bfe814b5b11a20049dcaa7b7c60d3b397c16a7de2b98c2bf435d23ff059de8
SHA512a14255bf468e4f5a53554c30616321464932033b83c288cb642cb9cbe90aeb086e69cdfbc2a68a5c2b5a0c049071fb9cc0264bbb931bffc635830106d2f5caa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c186cff7f4c648184ba998ec7485ccf
SHA1562630b0fe39781fe0ee27a7606f5b352e3761db
SHA256bdecde17422b0bdedb32791d80bbfc3dc367643c89b0049310893137015f4a49
SHA51298d93af1bd5fbfedd10d3509491a4d59071f9e1b3221f1c36a8c6e004ab4e87a5785d0ee1d54cf528ad6bc0071cb330db32b2c916717f25b25e1ae8c1b7546bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f7f3c4137c6ab27bc50ecf4464bdd4
SHA13d6db25f24d8ee1b7bcf56b780dcc4319432b2f5
SHA2564e7d3b7a1c6c989f3d5016886ab5c016f028f5ed06bb347bac05fe08d3169a35
SHA512b584bf2810909cd54fc9e96db5b595118bf6860f0404a0412df0fa8d2936f14158163bec632b46537cda6f9316ff59729a726d95b14747f6d726a3e8d776002b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0ca7f3d4c08e3beec65970f49fd4b8
SHA1420089923aa0cdc67f56b9fa9f6ef17e436f7a78
SHA256f27b7ce9748c114e80efff5525c794781752d1bfcded8354cd9faabd5833a175
SHA512b22091a5e91dc85deaebccf1c05bd9a069d95858b1c931e5c522cfc67dde91928de30e9343bfaeaa10c9152ab004e148399eaa0c8c3c8c47c5a0f22aa50c3981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5fd653806a8aeca984d8e5d428817c
SHA1eb6c28d7676efc0f0f5c9cbc422e98bbbbbcb543
SHA256d9f37adfd8331d4ccae3243d68d7dee428cd5420c0174bebacf520f6f6335ec6
SHA512b4f83ad62417801c7e8305371bc242cfeedb53e082a8715f21af61a3a459ebd1b094a9d6c07256a341d3afc2a9fbb8bf311038db332f0d0f931e985f851a860f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6b33abac49fa3f8609d6944c4e875f2
SHA1040ea22b643b01a5412a4a7fc9c2eeed3a48fbb3
SHA256c1dabedc3dc4415faf9ee01b7bffbed1baa3db8e4c81c818ebf6cba343864eb5
SHA512863643eaaf8745632586d32c2394b3fcb0cd63c7dd020576c1b725bb490f8747b274ba6040e06359ab4c1394e8226e490ecdc9958ac765b39a51153fd6272212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54821bc3ff12c69b2e07dd7535eb09acb
SHA1aded0c53e6de1ea663e6dab67d5d0e2393d5fd06
SHA256d18b3b11a072c0a16be11624425e7fcc04304fd9f49ad2718579c53a3703ba28
SHA512cef698a37c03bffc80c8873c9d2675b3d73b21b1c5e538defab2918cd0dc2b525db5cadf5e56e09329a88f56fcf2c374cf224aa8f1c4adb29fca012ae1308937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf409089bf9bea469599e42b1d02606
SHA1b4b961c046da6029c365a444692dcbc8eff42178
SHA2563b827ce9cf8b4cbf893d9e3c9c3ffc32aa612abf43949c9dabd5a213ff23c8de
SHA5129b0a5418e591e4c31c035d747034222b3f3b1451b3d1e2930bd42c10330eb20bad866c3a0c90480c422f9b8d3069577b1ae6f507fcf52c03f261077c198b8a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed595555af93cd4eefcf7096ee5b3f1f
SHA16b53f5f2353b8303d56d4b472a383db0dbf20697
SHA256dc283b6edf76823d27ef0907874fcb6c67cd55a4521e9824e49ed64b10747938
SHA512dead7e62818bae993654604ebf81a915cdfd61b2d3abc4cefc807424db2ffe82b4cff9b978b49c1fa0c8f56ce4f9ab46c604b19c60019208bf125ee9b8b092b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595fc7f99e93c733dd5099acb544db8f1
SHA14771490bbd4f3e503802a53ce7acdf3a5d4d4cc6
SHA256370f4585d0687c7214efb690212dc04031f5527964f7f64a2157938c20bb73c8
SHA5124bd606ed3fc0591b4e8c669d7c750b1b5ce7e895e263b4420067bfa89fd92b46057b3bb4ec39e9329ee81dd6d855e064e52aff13e5020f757868b67ea91b774b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90c523ea41206f7c35c442cf3ef0848
SHA139f0e04ecce58811fe245dc1057d3e5c9dbd470e
SHA256bd74ae9e196fa8de535fdc0e385c524ebb1947f1de8e3ff844830908df80b3d3
SHA51211c2fc5419be70959eabcb47df14de1317f2c3f98c5a5df32ab3c1ad0462d6c14970b4a40d3c164e5cefd3b5a691b0f37b8279efa13c5339f4bd3357710bd15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfab9d73202717eb4e07c8254a1a581e
SHA1cc24edb8e137e0bfa2fd85a98c16d88b9cc185c0
SHA256f781fc432d36315a2f17886649966af477b69476c05ed838edf2ea5bbd138c13
SHA51221e3ae62d1e10eeaf9a5e09fefc40b53db6f4f3ad13c926a84c00471aebe86737d57bdfd6d80cf686182dd075abbcdd1647496bf7bb58c673b34a9ec553bef66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b9f5b9f2ec6bfdc76dcd9b69c24a17
SHA1d9d2da52700e971910748c60a36567b486df6f4b
SHA25632ebade92205bd885763c72b1ea7a19d39209b2175288321d6f44efc000f2395
SHA512e81058f2b67af999c584b5c88a96664f5518fe0bd11ffefc52b8a29b99ad1eaf4e693d01dc32d6ef1372e01ea81ae5cce856c012fdc2e39162581eb76d537a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f3844510c766f3cee20e81ae21ebd7
SHA17aa6a31f55fdba4838bb49f4b58ef0759e352c2b
SHA2560e1a0f6c65cfded7b7bdb84017a4ad8e295da477cd4107251dcc41cc58ed2485
SHA5127a9484d2e06aa294dbb6121e240fa2a716068cf63db3f500d13d5a68c74a4fe58d0acf6e88ae763cc0acfac7a138ed01092c10e3300442bc3e9c674d3d170946
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b