Analysis
-
max time kernel
117s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 00:25
Static task
static1
Behavioral task
behavioral1
Sample
e15645a95df76abe8de6d08287e4faaa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15645a95df76abe8de6d08287e4faaa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e15645a95df76abe8de6d08287e4faaa_JaffaCakes118.html
-
Size
12KB
-
MD5
e15645a95df76abe8de6d08287e4faaa
-
SHA1
e32686059fffcebbd4731bba7fcf6f60968f8a9f
-
SHA256
d56964de5bd8c10bc6b885e80500237a0630464ae31ed3aab1b561f2ffaa9ad6
-
SHA512
190a13ae4fe642ec168ba31daa6c6819c0fd4913c0da4ba42a7d50d7a1d3db0ad168af21ee6a38ca0538688474d3b630b782935f23760ccaa9e620b696ea681f
-
SSDEEP
192:2VplIsr0KXyJMVCbN5Bi8k/w1whqJk1JBCZ6n+zR6R01y5uBuLbdU8d:splIcRVAjBq/g6JBCZ6n+zR6R0y5guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000cb848756aaf0b10d14d3fb653eddbffc7f390a13e730546198331098a4cef3c1000000000e800000000200002000000020853fe74c813058a56dcecbc1db8f22057f6257684dac032d8dc13bb85993ff20000000f20d62c4a6459003215ba30f029d33030c7780d7b151d307b660d4c4b9ce6738400000001b311c998b5309c0cd6b5b6b49916ef6ae3057731debc551731019db1ae3b0c046799ace6ed6c9009304519edff101b550af6c4bf5a83ad67576e2bfeb8870ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432521771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F36B2D31-72F8-11EF-81BB-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30202ff10507db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2392 2072 iexplore.exe 31 PID 2072 wrote to memory of 2392 2072 iexplore.exe 31 PID 2072 wrote to memory of 2392 2072 iexplore.exe 31 PID 2072 wrote to memory of 2392 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e15645a95df76abe8de6d08287e4faaa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51809211e0c9da493704ab8cdbca44de1
SHA1a052d3db35169a4e58144da4894afa35d0f0c8d4
SHA25694eea48933fad7afa542f876c039226b8b3523182d1a20824d26a6cb6db1d98f
SHA51255260318a5e7a888d7a9f314267b11945d3f2dcc5eb7db3b555185b9cfa180f70eafd100b99cb7b3446eca91e04f43108279ba511fe47f9780a38cc572fd25d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73f8f37f099f17197746c29f0f2e9fb
SHA1c0e894fad1e3ccc6f0215d35d5bae074f3a2e885
SHA2566c50c169ad792e65f333029e386094d443bfc595adfa349e7f09a27bfc094805
SHA512d9bef5575e68130bdcbb11356f508dcf2789df3152600c09475ac135aedacc1ab207273297849cfdeb628614a349a15d542154512136ec63df51e5f198051d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be461d13598d115aaad6a20ea94a950
SHA193186422ee4ec646fd5b387d8a54d04ff7842712
SHA2564d384efdf65af5f7b33a48e126351174acf2e1928bf6caf1fd56b1e7d9dc8217
SHA5122cb6ac2b8534c3bc1ab8386aa00bfc1f9d1575e5bc3088b28767c0eadd7185cea242a6f1e5c7d3db08e88ccc892c08be195182295590175e6b211dc255d448cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072d310dcc11de1273b8cef326b90f8a
SHA11d11b163a9b821500b697a92bb0b92ac792f7906
SHA2566ae6deeebea46488d22001c1157823e0512ff77d6ebffa9240ad826b2ccae095
SHA512ba79db58356873a218a0214d91f13b8e9747dee901694d66003c67ed6dc0a6432d09ca903f3585ace39ced5dfde15663d700afea461e474c84d2c0067d739dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af747c3101e84227fb0d42d5f3427a42
SHA1e33a407fdbe2661278093e36f33a3fb239b6ba57
SHA256ffddcfe8aac72acf65a3936bc6346a15a25328cddb86087b4bb71b123dd73d73
SHA512221a7ac6eeb26966761da3ebb526b44d55d88c04349b038f6d9dd0a428dfb8b355d17d5aaad3a94802af56e79356a5cc622b2f54507009d2566eb2346c24dfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f4fe3d90448b6b2bf2f32fbfbff862
SHA1bd27c6cb30d2213611a8bc4c8a7485385389e782
SHA256bd432eedcf82eeaf7ad6c22ff74b9ac73665b6728fe873f383e75e31de7708d1
SHA512173c156ec8677b512821f960db4df300e1962cef6df047a1850e2c6d0a206bb4c3e7568fb72288a7e93347273733c3c273d17135c1ccbd46bc84376be5719c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caad544f6b49d49f49dcb0c4cda20b84
SHA1b193103a0cb66b6955b5fdee3c3d7d9924aa483d
SHA25619c430b07498f41b1b2738077bb06af268080f870c40e252ac774e8033c82326
SHA512172b3e6e78e335cc0bfe4363e97f3a7265bf65dd7f1c264e44aad4f7fbd83f789ed419a40b01730f4b97a2b57f5d4035b3e880c256f28e01ffda414fcbb30334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566318d964e24385afcc4847b0e098eb1
SHA157cc2dcc9d5c15523f485f417fad3abf7a6969cc
SHA256dc67885804cf0c68d9a5679c5f9b48abdba37e7fa2c5c40775d7fb32b89ab244
SHA512a31bccd694f5bb7536afe9cd1fe850bebb901e6bf3bcd32e57fc2a6dd5a51a2b0225c18e2dc953aeebdbbb7442a815d439f7aa347121211c2ce294b7123d59f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572021c4b869ae360a013405ce6eb5ba5
SHA19eff7fd2d13ab2e090c3a3953163c81b76d670e0
SHA25699b1cf42d6aa1fea8944703790e32d2e29998a6aa0db12126401e06bf45137bb
SHA512946de9e4f0d6d638b9f8838a37e3d6037c4b6883f355853e7cecdfe161954f754872a1c952eb19a281775c7c0726447201912e4f18f98742694e693635aed15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b183a814abc650bda1220faf6b34b8de
SHA126f9c701914f500c3867b8d674adef033bea7997
SHA256f6b023d792d4853bd89d4e8332783120e2b5a8e96d8d94a9a468ffc94300cf55
SHA5129ab6c9a1f3f10673d41405653a6a0fc11b10f1cc384f23fdafd0904b79848518931fb58b14b797c25d4a5f3c42050488a31b615d88ef1d050941f2d5dbda3102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553303adde68bb504bb8d163048ee0e49
SHA18d70d6dd7a461a95a0c927143681d69e6c822582
SHA256f3d550dc46e9a7f155ccba1ee069bece6f2cd8654318bca65e11fba15077ae6c
SHA512c930ee370b961c6fce539d67c2285d6cc63c38d26ff7d5e85f4344c82f98bf23d722d02b6cea1d73640166364e49f398b6f996bd044129f8e81cc020d073e956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3031969e5f81d1f09c9f9c6f864f38b
SHA1a64d71b0ca41520280ec426a7e253f6db446e9ae
SHA25692457b6b05e1be834bc280bc827ebc092cb6e185604261c10eb283e24da1e4e5
SHA512988b5196b834f737b852585d9a3c82ab1f99debd4259be9cf57b7930fb69c21b3bc48c3534adcc4cf5432205c0fbec1f47dfd6ca09f28b115b8ad9a578b38a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c00fbc0674b51bd42b248aa545dd3f3
SHA106a5e8b261994d8a3c6055d182f3765cf3f8bbf3
SHA256dbe06d55600694b80a435c09ce3753a5080d8c037ee47ee7cbac1e683977c13b
SHA512b006fd03f29791d03a4163dbb87843985ba8c30505779043b9db5de743d51501c3faf4b578e8835f5624a2f25b1fd8f603b58734fa1f0c408e4ee890a13355a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56743c507a6c0a8841db16e61db3f2a86
SHA16363e460e6d7d15bd386aaa2ab97b9043542b9c6
SHA2563e12b964dd4c49f7e54c7cb794bb16c97128f252cf64d8c8a86d20161de5024b
SHA512c0ab763774a9abd7790458869b73c42b3fd0bdb2594ddfc536b71cfa1ae7a7faa0fde9852a79b21aeaa7bf24b0faef1101566cb358dce53c8af86ae587233b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ee9ea20e6c7fd7eead4201ae70e3e1
SHA1845a2185ca8f1b48860c00c738aaeef0b1a177b5
SHA2564f7ef013c59fc176d6603576fba65dac8bc0910fd9e228b3e2d517279645dd3a
SHA512c5fff764b5a87f9f62580251b06fc63f4d00c88a35ef7ec8fda0eebe4723904028c505398c6e543da90ca52ae8d5d07f4f077b755387751fe5e869354e2b33a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231d1d65855f21caffb9b3668b4b4b8c
SHA103eb135dc2d27ebf3a8a711c97de02beac4d4e8e
SHA256b54e90f4e2dd51f78c08cc55c6778819fed8679d4668b5b0bc0e5316b2892117
SHA5125ac6fc864b2ccfb2039a9551df1f4348e4ba42ffe025c516fe25c4dc6a499c6b4a7e28c0225c2ce4a99247344a0e88d8bf5785fb445925f0005f07e59518ebfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e5b549034750de0aa5555240a7ebfb
SHA170ad0cf093c91697f91c857f0588c1ac93a29929
SHA25695ed1e5a3232d1fc93232b10c6556243ca483dc74537e915342fa03c832e2303
SHA512d7316f5e4dc8ee3f2b8d8210b2971c2ceb788809f0c89ea2ee190fd5ec31c71103c43f02f32e234ffb427b8a2fd5404b1291b8080e729ba2281b6aaa58e04158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c744436a948bb2df17b610d89b0bd77
SHA12d6d4fc613d5aa07b7d5c7de63ad5594622e6753
SHA2566e7c81f8753203fed1736326809b11070d92ddd90e9dd0de724412f8bf20d2dc
SHA512c0580801ee131eee65295f1eca7779214257ab867a288b10309ff705f93c56a4ba49d151dfa0ed98045ee295c2695ae2ac684d1e242ec90c6a25a26399702cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d071bbc74172777abad579597e4eece5
SHA1fd04686ce2278929536aaa88c556f2f7f37c0669
SHA2564b53c2030759d670ab2d12199d6ca3f880c32c4d0b359f942f0b1d820ebf9f23
SHA51201e59f1926ab180112363edec8b6d7dab2d3a6d828ec1e70dd3c030384831fdb54561e32c69180b7b9acd96049718d6677752b1d6ef46afdda13591c2a6a6e81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b