Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
e15aab214853972da83944d2e812f477_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15aab214853972da83944d2e812f477_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e15aab214853972da83944d2e812f477_JaffaCakes118.html
-
Size
461KB
-
MD5
e15aab214853972da83944d2e812f477
-
SHA1
a31b487e53902f7006ee6265b7e3748e9f49d4a6
-
SHA256
be67c73db0ac310732984287226842f54ac985b047b45d10d22cc2060cfc049b
-
SHA512
d55500536c6c13ad759b41bb79cd9d91c12f2a42e083cbd66352df7dc117f89a5a954475c9d5f5fd823c79c751e821a9c888646ae7b4fdb0601e1d13d71ec246
-
SSDEEP
6144:SpsMYod+X3oI+YnsMYod+X3oI+YA9sMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X355d+X3G5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432522408" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6FACE131-72FA-11EF-BDD1-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105cd2490707db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000eb40d9e1b5460029a593f0a8d30ea27b1337eab5448d95c97fc63e9be31228b4000000000e8000000002000020000000ff192a2530c5e7f85831333be01ed71a308288880ecbe24c49b1b2d41eaa151120000000e9025421fc823391c91ea124496e5a005fa8a2892babedaa51a732fecf3510d740000000ae249444f18d6530ea5e114997140a549978a8feb865737f710f543cad3a4fac6f8c4edc1cd0eddb950f72f84bd76258d42967a473e5229110a70b4d7ec03a10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2212 2492 iexplore.exe 31 PID 2492 wrote to memory of 2212 2492 iexplore.exe 31 PID 2492 wrote to memory of 2212 2492 iexplore.exe 31 PID 2492 wrote to memory of 2212 2492 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e15aab214853972da83944d2e812f477_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b63a103a2b2fb5b9263a5691e455ddb
SHA16f999c988c893ba5c4ffa3b6b76188f72b9d8eb3
SHA256d5c34648a5e3be4c4051e4d9b4efa553456845fd7086d7c5dce74241971cddb4
SHA5128a18ad63215cb63fe8f7e2cb1d9557dda4682b0216d53264663ebe95bd95be34edc0ace8b6b27d7325bb0927f21d8b94b1254b710e21799c24536d01d902f1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f318597e9a5ebfe2860bc3c262dc35f2
SHA1222a8e7451d3275b724262174278d11f8827a62f
SHA2565f045ca226c1f49cb9bac208e02b5707a5e5c185821331208ed97cb2965f2b3c
SHA51206335e2a41cec0b038d5a438c18d16a0c7f024a100e21486175cf1173ae60b33508a37067f6decb61c90b3da2ffe16c82267fdffa79364a3f76b6cb29a1f7a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e3d6e877c4c0dc13435e34d372bd05
SHA17c0fca77312e1c16068e954b875494de0f987fbd
SHA25699a40f28d16d161142b8cd6c3ae66700641788f76b7c342702bf57a4d35e2230
SHA5120b70dee0a26f3fb0a25066d9923e82beb28abb7d8bf537e5ba66ad958421f22f37059ad11a8c01bf0141ca478320be0ae6f1670c7c904f1449f5c647fa2f0cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a603a6eb746203f09d5f7c2385f0665
SHA13b951e9205e175b9811e48b92055352b783f3d9b
SHA25601fcc38b5f5512e50a11ecf86ea7be012299013e554282a21e06d4035e0ac3e4
SHA5122472a601398541c90898f311c21a06ea9dfb5ca73996389aa0ac30467cf32bfa30d323c2a602114affec55d69b41462c75fe88d4f55a53b53f0416ced4f8c949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446f249830edecfa6054d2cae4c436dc
SHA17d7bcd51b76af2413a5338a7b1ed21b6ea398c4e
SHA2566578137b7e4d1c8ff0117d31cec3b60b5690754952cb317fa9cd9f64c28ee97b
SHA51233fc72641db3109b42d2c069c1a0dc20c321598d1f82f2349db61c39b7171d344573b2f470161b077ee710524703f72e60284736c0f206941949483eb0bc8d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040fdc80661ef0d2b7e409618e70941d
SHA140da45b27aebb8695f62a4d9c8b9f173f738147d
SHA2565bcbb5cbdabe0eaeb40af3ed8737491b9b4081e2e5f487b31a616c852ed54c0c
SHA51284ed8efe1fb7fb2aa60d559e9f6666027b879307556dc9c40d1dbd0f4c56b78501e50c3d749fc4c05527c8574ef477c1169bcfa59734a31ff30d61b0e0432d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd5850bdd5492b8f001896b176d386d
SHA1690ceeece1aeaf428c1a4d7a303834f49793361c
SHA25689753d15382a4138b1cf3cdcc9381b7d562cda4a98885011cf1d529859766e71
SHA512dc3ec90ae62d850dd7d3d2007d96450f9362470743ccdc562d2f66acad47dcbed9eaa8c9f9209716d189c8e8038181a61a2130e56844d6db22a8e18742c5ee0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b02e4ff63136926a28d6d32e125fa65
SHA1ea54098d603ecaa4938ee40a52e001dc1b633e4f
SHA256f7aab31bf3eee9d1878e110475c76920ab283fbf7307339189c67b93acdf7dac
SHA5121f14ff22418cf9cb0b7f45d87f18dd01378827389c1f47046c59e4485308fbdfee3ef2f0a981972f3e38cac3c51ad7ef1631a817bd91382fbbb3b6819d3e09eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ece35bb95fdad92677a65947aeb29bb
SHA18b0173c5148424c2fd4f1ca3c49a307ce60397fa
SHA2564f13a48e86f7a426120ae6fbe71e2ee4a51a9ccdc8c82fc5b1700bcf20938754
SHA512974e3270e831d4ba55cdabb75e9bd0d05c5036e9ad6b8f203b8e8567a50b581d106ac415654e15ae29a76a749531903394fd8c5df95e5c3b545d7298ecda39eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54086d2dd4ce41299fe1f4d5a7c91e31a
SHA1bad950362af3e4ec1060b1002711afa7e07a2db3
SHA2562b13c317c2666fe5ef2295f64c6998a77982115ec8aebdecb5b8b65968d780f3
SHA512b9e94be7fb9405458b3a96fa23f84d71ca7d4be10575c8d993d25b4f9114ed1b41bcf6ac9b048bf3beb92b7d8c0d93cd9ccfcb9461e7dad5dc0ce2caf5d17a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252ba60eafb6a8df4553b4a3495b1c91
SHA1f707ab863e9a6e8ac95e5005ad6f70368399fd6d
SHA256d68f0b32b36486ff16760c9cd181cf9bec53046822e6085fce4864d12c60d394
SHA512267b1ada76f5ce2b75bb0abd6f6e867496c4c370fd432348cab4c97bad8ecc7fadfea4a8525fa41bb1f1de86836f8789c077d8816065c9d98febb69267b0c9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a3209715da4c46ecefbdd6e3bbd675
SHA197d762d567853e53b4caa07bb2c917c282a8cfd3
SHA2568681859602c89c564d0840f2f02764d9be0465c6a50ee9d93d919bd47888c673
SHA5128c43f9970660464ddb2d2099845dd596b0d39ec44c626e3eff3de00d574aaf29d087a3c503d743cbb399b60f3f57d04ed20a6384b92f31735347f45b737dbeb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e89587ffac67825037e97f087771dcf
SHA1a7b36f3474b35ef6e891137a8d11f758655c151a
SHA2566f5633455be3365f116cd723f318b014ab78039c101bb94c922e5fc2b930cfb7
SHA512f348ec4820577784a696f44bc270ef25be92abfa36401340680bf90d3c6060f939fef86aa35a64bb61eae0665abd7ba2d6fd3ded16c237df0484e9168c2e0410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8430c59beb4e09068fbf1642f6ed86d
SHA1a8178d2fffae5f90367efcd9089e6a40294000e7
SHA256db2876d4ecb687e31eaf9df3cb5a7f6aa10afbd9536e699ebb0c9459788ee0c7
SHA51257b1db90b50b50fcf12c70954370451fd125be0d8398a43409b1a7605ebafec54e3966dba4f8de057724c36430cec60ec838396c278853a72ba6fe9fa56a0fde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591450e2f6431d0f6f2172dac3bec3811
SHA199523b434219b688d7811ced6d04c97684ef660b
SHA2561ba0cdffd1b463f01a11ca3893c26876a966e30d0f1048c1b6da077d88635888
SHA512cdaf79eb758ca3999d9c2925b5ed4fca683c1fc40f4cc88c0fea4a777793d8c613806551177cf8f416ce08dda0fc0517f5927d6d56f8598a118d8ebc8fb4a3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779ad45844e454f66fb0909ab6692537
SHA1703c5be05c4a2bfc4394b9dc59ed533ba8abd9e4
SHA256e3f10b8839dea2d165f27f9e9e47af1fffe84725c07f371157af1ca154257a94
SHA512b89d31da8a2e34f881cf2a34fc2cd02cadddabba7c45c24d5983e63d8dd0e20319fc975a7d7068ff783fe767aa4009ab7a245812bc5abff73a9cd68ec54b7d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa310528e8c13c7162199446fd329378
SHA1130a3715c0eb34f44836201ca58354ead43598dd
SHA256c5c00cbb3422eabec058b7071803720c86235f7c4d0b80f69d1a1b333ba5460a
SHA5124663c7f1a058cd4f5ecbe15bd3fb8103eb764b117cde0a9ddfd4d9db1baa696f8d9756f7f9b5c5f2fa84f37eaca73bb79ab49a7e18b1adfa85025feac7d34015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d931a05e63e2eb7f81ae13b620bdf8f
SHA1a47aa546901faac854e0a32f95a5d311306660fa
SHA256ff8aa9eb8308a9f0d7916f32cb398e83c97e0a0cdb7b631e70ac087a3a525c44
SHA512c2a6b131cc5ca7619831df002c8379d3e6b4962ce7e35053d46e08fa34ac14d50accad49dcd0b4abbb3f7440073aeb16e8675646845e54021f08d459328d9ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fe0c88d69c293194c07858eb30e337d
SHA108333a83c296cb2fafaed3b65fd1b84ae97f58af
SHA256dc0c9a3150985a32627e23cd55898e8c8ac9fa8fe667bfc6a930b542188a1c30
SHA512bdb508a89094ce1b17ef8491ecccb960b1419471325d0644fd424aa8560a197f1ecdcc8c0d7768bfc2f2bc89e2adb533cb34b7aae4efdaca0c5a6b7dd4fa23b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b