Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
e18e57c696f62a3063ef53e7a71d9d44_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e18e57c696f62a3063ef53e7a71d9d44_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e18e57c696f62a3063ef53e7a71d9d44_JaffaCakes118.html
-
Size
69KB
-
MD5
e18e57c696f62a3063ef53e7a71d9d44
-
SHA1
e7244bb9239deefd5ead652d913c56cc823694a9
-
SHA256
48467098863920434007447961bad2cb3f97ad7f1f0eb020d4f5900067aa2809
-
SHA512
76e588e477d911c001e7a2f2150217ba1ccd2b81d96f4d265c8ee36fedeefe118c9d6e722acedc393b9390c656c32dd21ff49eef182a586a6bb7c735524ee9f4
-
SSDEEP
1536:SsSsXzPP720JSWvuIkVkSK60e94yS720JSSzZ2wQzRTkuBFmTB72yX+d0:SsSgP720JSWvuIkVkSK60e9tS720JSdQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000a5cf2d4fe8caf655b678a7a56a7206d134d7ed61cb30b221552facb7cd2a532c000000000e8000000002000020000000e1e222bf69288e110da547ac537fafbf30f4399724bbcebe0a357c4af7e28903200000008f1e18fa1c61d592221d1d03fb6d49d181733ad6f194c1fa6a2f8684d701df454000000059ec150e4c5a10039a39c1e2f531debe4ceefd4c3f77b501d3951917af64064a9bdf9e22a6d43d1f673610c95c5186cd7fbe7aa2f9a3e0c57edf62248a623771 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05e627c1907db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432530234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7C04461-730C-11EF-8E45-E699F793024F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2780 iexplore.exe 2780 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2676 2780 iexplore.exe 31 PID 2780 wrote to memory of 2676 2780 iexplore.exe 31 PID 2780 wrote to memory of 2676 2780 iexplore.exe 31 PID 2780 wrote to memory of 2676 2780 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e18e57c696f62a3063ef53e7a71d9d44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec14d9c110ebac36702c066a782f9a0
SHA1804124f75504b875d4f20d021760081eb8453a2f
SHA256d999ca28d8768681e61f1b3f43b86376fb55943d1ece4e9896b8184e25bb110c
SHA5127c8782d883ba865c13d58d4395acfcb06592e9fe3e761fbbeae69fbd072d327151ef98a4e3df47ac39cc776f0358e0d3c68854e927c854b73b4c6c161ece8040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6f4ce01bbc5f97077e377c7496ffd8
SHA1ec2f2242b2480735c122929aab2ee095a71e9a09
SHA256b135e41d06f19c976969cb3f76727baa01140329e11ae475b8d95b63b87c6d4c
SHA512b7e3a9f56959c085875e9ad615928431beb0553888acce6a2e321ef691b4903851538170d423c4707dac6d00dccc73707284a083e197ee5a8768374b06f5a0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff14a9b664cf8ec5abc7cbbfcf3c1b38
SHA1623bca9f8ae7eedcba37c2e1c695262ccd4a3208
SHA2564cf190b9c02c9f19717755dfe65887d328924fae369140be600fd9aad16322fb
SHA5123e5a0ae5e92dc53f0b7c8447189639dd43d919d7a0584ae0d4242a5cff698cabf6232e8dfc7a72dd5bc8e2547988eaf6801d87a7342144710d042f18d36d2686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64604afbbe9a6bbdd478e9737018f6d
SHA1bdbd3142769ae797a89041937309703f1105da69
SHA2567f7a2f776ab564796b1a9901ab6972328bccdae5510fdc0e2e1f5ace69f89501
SHA5120c3da508dd137d02181076fde60c4335008e6bff36dedae4c2d20a822f8681a47607fb097a4e793f47a923097d6cea0d1c16a4812147ec663e35fbf7a6e3739e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac1781bfc38ab190ce5670cebb51ecb
SHA1ed2cdbf6139feae10156acba57a159a53683b45e
SHA256348ec7e61cd5f311f68a5d43951052fd5f9ad4395f586f99f6fdf7b1d936b5e3
SHA5129c946e2ff54c500f32e65a06dc2ee93cb184259a949b0e05d85213c599fee4c9f3bcfcf4905a6e989b3a4d3a016e1091b87d061b8029d5470abea32fb4a60e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889881bb8cec8b023a874aed9f0bede3
SHA18982cd5a639bfacc82c27d852b2be743835b4d3a
SHA256f65f126ed77ababb616ad7803798246f3839e3bd52df9b8c5a57cafd5a432669
SHA512545284cc396e192575ed38c3aa2cc688f92291b7d7ce8d5747237087ceb66763d83c1313c40b7c926d155d0b969a70e64e241c9f778a91a957c03b47a835803e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312f919b632ee624a1b2647087c00dba
SHA118bdba4454c4616697d5e00f7e893915f10d7782
SHA2567a141ce9fdf3ce176a9bfff7c7524d24554bfde898042ef16b9db35b6961844f
SHA512827142c43c97a9c26e9873ace147875f3311886f18bb0c7361a2c85daca65bde79d5d23f543225452406ee9469e88d48626fc82ece50657efc1493cf0d999abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32d07b3c985a82f78f774d12d01cc8e
SHA121e0a7a07937699ca9a0b4b081b28d203a216e27
SHA256b1f380701a91844a9d71f45220c4ecb45f618a71e1d50864eb38a1053d2ffaaf
SHA512a6517a30d16c774578701eeec437df69110b5211e0aa7d9ea90cb6ac5122889e4ba892665b8ac27d599f69c78fc40418964192d53c53670f9d5a51f17d6541bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbda2d713b276df65791e6eacbbdc57
SHA1663289485cd00d72020510817cad8d1236ac7efd
SHA256d5ad2f5458b40c31f9ae4188e62e23fe6994769ffc33e778e0369d0679e25fe6
SHA5122d10238cff9303e263099a261dbdf28060844203e0b53bf4168ad82df8c295aebef267a70c6db67682ddbc1adcfa0a2b89164850be911a7e1c79760929c2d2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42bb61ed852e77ff887c1d519e2f5b7
SHA1b7bbc794c3a2183b640ae78d21b908ea01ad6fec
SHA2568bfb4a5eec004c13d1a721d2fa8f54e98be8599d5cea5a9fa8c9fe08d6ad06d6
SHA5125ed72ece1dd58ed1cf6e0db39208cde2109c955c9d8cf6f34aeba46ddc8e82aa76f7d5f7cf94159c3c7d67708d1f78416fc58db04f5ca172561f7570fdd9c5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539404537435b21790da6ce6858480b99
SHA1d2801ec117727f904212801930194e883f987964
SHA256a64dd84701eb4eab44be05ff48a47dc8b6e822e6518f0f0b9a087e55c563e756
SHA5124dfc5ddaf1125093cb3b51005d300327b6b363b7776b6e70dd7bbb316202f4dbea5884ccd5d701b448724c3089138c401ccfdd7f434e02473c2a6e125f2926db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1a81659d3d0bcfb73495fbe643a29e
SHA18b97e89d2e7605c6d6502e63b006a04d18a00083
SHA25648b2910b0543f54abb2b9f4de95ad37bacae296e64cf859f837cf8fdb47d8b4c
SHA512ffb8913419e826dc4bd504542cf8d1917917d4a951cead769d1a9532b7343173b112d4c8018358a0108039c9050ed96d6a1a124c3c7673bcdfdd898abf2be4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce03e193443444491f2df3ee71888c7a
SHA1dde150184fe735f207950dd8d7cc517f7d066979
SHA256447ab240805905d2a64c1c7225b84e68b8548d95c2ac99659339cdf06238804c
SHA512b0edf6f01d6c6b2d9a3c551ba893616a05fe54182de1b28e3beecb2db51ebff5eee9a1b5aaf1e68e15d4dec398b43a44fc458537f31c5692df25844089ecfd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e565865ea14941c6d5c09ee38400e09
SHA1d0244063c60ab3fe9224386b60b9ba57d0e17579
SHA256bc482b0dbb4e3ba398ce577b5b25b3fe707739015d583c612eeb478f8c3bf08a
SHA51261d78f5bfea4f591448183fd2c79cdd5a5a2ea5f94606f2dbae91aa279e3be736e3e29199b44e078b180a68a4bcfb06cef6ddde60b20e0cf5df604d6234e66cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564d0b1b8b5a14434bacce11d8afeac7f
SHA1e2c74aeed0cae1fd3899cc3eb0fb284ea9417f7f
SHA2565235405f45ff006fabb932ded3c6ef4349355cfc02927796a46b28995c4e4e41
SHA512d92801798b3dc1cfae4436b11baffb8c4e2f74a9b2c38f1aad85c7ca231c37cfec87b2434e1efb32b34cd120139b2d78e4ec816b5ef7ee926788b953db8ea7cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c2a73c20d6d4e74aaa004500bfc0f7
SHA1c84668aa1f2e3bb74adf5eec31367dd8a0e7afa1
SHA25698df989d478cc402a54b5cad3efc27731135fc21192f6981a3aca1192e3501e5
SHA5123fed2033f5faf8c35e390395e8e1bee7994881aab979e212a833991b887049d6fe96e1ece40f6aaeb1a4247f59cda27b3bd6d44cf894460489f7cea5477ad8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407363ee6e5064e654356246f530ea78
SHA19b0b32f138b3070d33dbfc3c309cf7f4b8b640ac
SHA256be266692d02c78eaf661823ecfa5fabd29b6f0231142ae5066dd1a97edcd201b
SHA5123041465ca39e10f3e9687e625841e5efe9874190706d2e5bd290cc74bfa3591eb3503e14c3ef1426c7137ea98e013065d57aa89ebe54dcc31650747242dc6804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588eef8463305dfb910cdc0a39de944ab
SHA1fbc86b6eab2ca91f064b50fe5a53f97c88b870f9
SHA2564e9e4116cbe662f1fb79be95771f5420e26a1b549c4bea46f8c7b251a92a8d8c
SHA51234c729594caccacc6366d3dbe2ce8420e363226fa9ca7050a8ccb6e3546b28a74b576d411059928453e07859e7aad07bf0056c037437284a43bb3bb054144d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c289d164579d9cc65097628f3db2638
SHA114dcb4622d927da25398913f13dc98f62f1877ab
SHA2566bb3f8d9ec98f1881fe097a7dcbaf06145ee984c36c27bd00d739cd86929f7ca
SHA51261537cbbf03035cfd8b6bf20eb6757544ee3d862ea23a9dbfdf1d8333d7489dd591e4a993f42982826c4bba27ee8c30d3039ae739d5a849b964fc70e810a0ec6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b