Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
e18e2ce3935c906625a837989d0c9656_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e18e2ce3935c906625a837989d0c9656_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e18e2ce3935c906625a837989d0c9656_JaffaCakes118.html
-
Size
26KB
-
MD5
e18e2ce3935c906625a837989d0c9656
-
SHA1
9272837554d8014475a8e9cb22184711fefac078
-
SHA256
f5ada97db489152dd5073816299dabbadf648e59668097eb860c9673dca9dc2f
-
SHA512
732813833088a6ed4a6640e4e4bd80de8712887d10fcfb76d4b7a9edf25f03e7acad1da9e0f645afc77dea4a6cdc268064a8a20b43fdb4cab5d7e8240cb8439d
-
SSDEEP
384:epUR6Soen+wQmbLthAq9caLHZKmAzvDZBr+kSI1bnK89jIhuh:epU1j9HL/AqOAUXbZ4zezK8VN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d095726b1907db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000de270d5505cbcf79050c195f7fefa899d67f5d55ff54080de1424d106eb8f924000000000e8000000002000020000000d7b3eb16c6f59085a62c5f10674ed6ad2994aba9e2fc33a0d4e48cd10bd3cf1a20000000217af021199444f959c4e63b2bf5bd1214054caa5d1c229e59b78243ef8721fa40000000fda1c4f8d1090ff9ea0a6f7d88a26163190cf30bb8e448251fa8234565da834acac3e84984c7d88cecf1e74d6ae492518bf7f7d2f3b41bd113f052667c46e274 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{965FB841-730C-11EF-BD50-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432530207" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1348 iexplore.exe 1348 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2420 1348 iexplore.exe 30 PID 1348 wrote to memory of 2420 1348 iexplore.exe 30 PID 1348 wrote to memory of 2420 1348 iexplore.exe 30 PID 1348 wrote to memory of 2420 1348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e18e2ce3935c906625a837989d0c9656_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297c5bfff860322af28ec8e37fe230d1
SHA14ef3d7f749382d2906b37c658c36917f43c5ec55
SHA25648958efffbcdaca8a2633757af299bf603e013f8c4aa798875e45110a169fd6f
SHA512747f1dbebfc6a28856c800db63f4f0d75d62a00ee16f18f96b621dd245d944180b03e9c02b3c92cf72477ace421586b4deffc74d8cdb09b17a0d6582ee3e708d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e4e6cb36e3bb9c65cdb283763bc646
SHA196d9bbba1b14e644295776746b1c507e6aeeb736
SHA256d49ef2955968b281df75f25970e30fdc3b01f170b02f5b40936ac43f409067a4
SHA5125326aa54ab05103eb086508c02367e1a616a9c40df09edca5d16067cd561660a3864a5323e7b240a15376f744c097ec297a4d5d42af1281df96f92e71a57e505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50024b026b9809a724b3c04511f50624d
SHA1ad510f73b9d20eed50d29a8786d8f9a9c74e5c35
SHA25610b527788b4a1dcd13bfa848ca6cc793ca114e2df4aea1ff3015d627059be385
SHA51207158f908891bf5a1a9b4b0f233ea1202cc54afbe17386ac14d3335209038000351c93d74c94f57ee62d5a0a874d71d84a8bbb9aa4270ec4e62e63b8d2e97261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dec56ddb159cc79710d1913fdf5610c
SHA13c0d754ee75dfffd5c5a7a817d46c3dcde7798d9
SHA2569b9fe243d57c149d96d4695fcb317320faf35f275b29c09c26972be6b8a630aa
SHA5129c8530be7650585581e2b678b359ca27d32d9a02c406cc2b2b403b51e0ab401157f9004848ed248fbe9deb27b6a3d88950a9ba6c3bc8f85f442a1da3f0f2d16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510d77b516d550ab036159ebb5f7b5973
SHA1225ec85b8e4d5bc3f4e923030478782271fe635d
SHA25663ef3e9c9c757b90f09f4a02af513b6cebc10938beef862a58b99883a2c5ca43
SHA51263ea56d40d4bd02d56f8d42afae387c4b7fbd162bb7fe5402f86e966852fb73026c8f7a5a737ed0a261f69406c8c4e0640b8be4bf7bd45980165b21491bdb5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5c66d72f3f6231eb0b0feb966730f8
SHA12fac9e8fe1a4f551f7057dedec62a8b07d8ae93c
SHA256e06a2df767bc65d3e67d785b0be20b9184ae552f39523f4a58c38c8fc4a4c475
SHA5121a390af257bea5d79aed8a13c3881cd7e060a800fa5676b87b54e040ccc568ac93bda9c9a8136cc8d8560335524313cdde5e55fb50ba07520efa70e170681762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87f4e85c7d55980aa8ecf0fe5ffe9bf
SHA1783767d28acb3682ebef9541aef6b3358944ffa9
SHA25676db37884759d276332d8849ca51bab8cdf748366b832ae7daab7c18154b512e
SHA5120bdad94ead10c57b441f012301c8cd7a9c40a55f13a13e4ed0530c2efd8315cbfcf7f5d5296ba652b826d9b03796ad0db1b5dd741f853db516a986a8951c550f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581142670a633ea002530f6c344c9529b
SHA11af65a39715684e4441b7d84ed4ebe07a6546d00
SHA2560287fa93a08a17cfb15309b05b68d6003cb3c2fb3fee3d15b1b0901940539f2f
SHA512803a5163f26b5ea2926a023dadec0129ff1b2afd046051a21143fa516efd7ea34eaf302a43e0ba35c794a31ac826c64b5d559cd4b57a593306f89a659de8040c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3daec128878b40e8129f03822181fe
SHA182e22dea4a5243b6167327f99e7bde3c6d938f2a
SHA2569b8a9a62cbd65062c291584daf4e4252a13ec124a5bac310e3aa24e09d792b24
SHA5125e012977d61580447f11046b05b848c7ac479c1d7459466d6d750857954cd0045167daabb59668e754622d8555120b6757b4bdfad5a438d3823550a82821706f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df7105a02e8b6ad939a02449f4adfa5
SHA16f73acd82bffd2295b8a63845fdf8beaabf1ad47
SHA256fff518d55a166d2afef9da876d91ff359ae69896c05109d78d5ec1e68dd4439c
SHA5123c2e6d82fb1480a2dd5265f381d864ffb4100be62532a373c76fb45c9a6033f0ddc9e6a63a6cb79344ffff663fed5a345501ccbca4cd822317457d6eddef2755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750e41b5c70c652a52ca8cc75aa05183
SHA1a5acdbe69fdafd73b3a8e7fdd8050bd37e5bec3d
SHA2561f50f20f99c32d6ebccb706fb25d1e6edb70f70f96db25e140ea642d8b26d802
SHA5128b22b81c6636702cba71d9f13cbd6c96a9f6be415d5019208a7b5a5d722868e5b53138bc29c54c035e019b4d9fdf1d1d6249fd8b2c1c7bcfc62780fea60d744f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed06d701e254bf618c3932a13e86b4df
SHA1a5acb62f6d9ed0ca6c8faf2947b2fa18807422f7
SHA256aa58cf18686a56fd6539e55eec49938c81b5bed1c3391bf845a7278674eef4b7
SHA512656487c75c152fbc84d07f393279e7831898c758634334218a6d511f3de991f992dc08275fb39cfad78795f45702e506a68f53a51b388e5140aa259aa150b7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fd98cffa38d351809a954875c5f1ea
SHA1154af64adbb94b1883a562a64564df1d9e62c61e
SHA256388644c445d38bc5085e506b14c7e9f78c8292cf517f1a1ef10ef94db3d926e6
SHA512df8e5ae0fd797d490aa6267bb9edb364e39f0597e2f00da4c7dd844503f2047113945ef3ff84e8ffbe62d14aa2736ba62889cf14f848ecc54a841ff7b5d47fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5215de9a48dc730ef51579e51b6b88bf2
SHA19d9ac486415f668dd90bb9296e74d21f724aa1a1
SHA25653adbf987e14f1a3a002c27d8be100a257387c6c892c82887ffe4ca26157cbfa
SHA5125fb07fb1bcf4a825c9d9209c4bea40ada092dee3b53bee9ac4086a2ae764003989a244440b098f195b1acdba9d24439fefb830e196c6e469600474b5535735bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5087b139620c9a2f584fb38c4bb72ca55
SHA1e615a236da16cadfd8d2941a0b861b183e8e0ece
SHA256915c8c98d912a0e7f8db939967d344434de56857a14a971a213ee2a3c2ec8612
SHA512d60877fc404b307451a80a1f2fe789c7d4e05e28b66ab156fe756c3219d4bc89a5019ce912c56e01772c6023679fd12d98f46a955e6bcde00b989523e7685084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8de2cdffff0db3b736bde644452b48
SHA1581e93f3a84e8ac93c37fde305e2806bfbe476f2
SHA256881a822ddf628e699ab073a8598cdd1bac5bf652e029f90440d09f9da05a2f6e
SHA512a73c4670302ae439c5bc4b8cec0ac7d94d96d12df472797e703f103818bc0c839f98aa7f9234d57587faaf45d652665a8652c3e35b76a995f4db1dda2dc124fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f234411767a5302dd0cb4fcd28a9fa0
SHA120b3da6059abe9ef6bf96459621a1ed091a70c29
SHA2567a9d3471d3676218e0b812d37f90b5d3ffb602be9d261df4ccbb895393925151
SHA512d79f4b273944e294d881f97beb86cdd4a475d17a00197b29fe6816642a0ba862562a7eac5097a67d94760797d828908ba2bc40d212df44e012fc789b2096fd33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba17db57668f2f6c80ba08a4bc232323
SHA1517791e444c6f6342ea634c58702f82e652e0886
SHA2566847b6bf090181e8b0a28642dfd6f6f616560d6ad379cbdbef7595429dbcbee3
SHA512c0918d395a8204a651c86963214c6b1b526c16a786f933b9e8ae7ff4a4b387e598eb4085d5d98b7d73d6250988f26c460420e98aebd51c521bff588656fc4ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd14e47621c89fabfef7ccd490a193a
SHA170c21c0a029f0a6a7fec187184bde79c4509c54f
SHA256412900d1ee65bd9a6094bca54756277e3425ad3a06a7e581cf6b385fa7ac7400
SHA512f219d2aa2916bee2d1edddc376261c150c82de7f0d145a16133df81d2a48ecd717fce13f75f2bdf4076f44fa37140ad6b41b4abda69521155c46065c4adc484a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b