Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
e19ed1c99751eb6ae56fa14a58cf0ea3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e19ed1c99751eb6ae56fa14a58cf0ea3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e19ed1c99751eb6ae56fa14a58cf0ea3_JaffaCakes118.html
-
Size
89B
-
MD5
e19ed1c99751eb6ae56fa14a58cf0ea3
-
SHA1
936bd9fc47d623681a7b66789f130eaa2da1e4b5
-
SHA256
1442bcff505fb39886f78ede4c9f105eb79827332ca9816bcd9d8dae3dc2d3bc
-
SHA512
8625000daec17a5da46599761728e08fa66aad87a0d422ee41c71ea42c33d022d16a17015261db3cad225ee2218476c700cb362bb218681e0cd765ca1eb1cbc7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA6CB691-7312-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000030a45345b24e37e8f007251cc86b6dfe2a7a7cc2d20fc2b57c9beebc3800589e000000000e80000000020000200000003f2e477e1632faf910ebab6c34aa81f0af88bf033c70e7244267fc3915d6cae120000000dacb6e2d621731a46db3fd3d063dc7792050deae7eeb766e573e989c530e8d074000000082daadcd7a7c0060193e2f5cd9108829bd276147eafd85901728b7b22cbfc5712035d542a91d2def6087cced49da5dde29b6be120273eb056734e11604e69b41 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 508ed8ae1f07db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432532896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2548 2120 iexplore.exe 30 PID 2120 wrote to memory of 2548 2120 iexplore.exe 30 PID 2120 wrote to memory of 2548 2120 iexplore.exe 30 PID 2120 wrote to memory of 2548 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e19ed1c99751eb6ae56fa14a58cf0ea3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b75ffeb98a9ab455662aeb17c6cf5a5
SHA1d7b29e5e6b2ae8f284795b8b6a63a29c5ccb448c
SHA2560f73b532d961cb52e0dea28a24aae8345d741ed3825c92f480db494c9cfa4267
SHA512b6736c52dee5a8f050cc9d6939b869930f0959c260715de52c9333bf3945bc801cc15d648f5201e8ea6d29a6cf2aa17d054f677abe16357e54e1a7fc04442321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58937f4217d7e689c81b70f30d76472a3
SHA1d6d780ed8f64908b4a7c715ba3fd8de01b21eecb
SHA2568a4ff0916704b34eedcc67f1301ddaffcb5fd86268dbc4bc711af3dd3a68bb4b
SHA512208066686707ade9aa85ebc687b5105609fd4a1a99c0cb367ef70443f6ba6deb89636185af5b8332681993bbfb951f77bfb6bf5a9885124a809c4241266fa332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cf70050ea7d5380d19b0860e8b5241
SHA16725d857a2221d517421021f6bbd80ca4bd862bc
SHA2569bd3eda85e27b3d324c4b5c72d1b1dcc9ecf97e2aa58a451489287f758c52210
SHA5129a5b948f0ef7528009acb195cea136a92555c273a751d07cec5c523a9e0521cf3665ac1987834aee274d9548e74c582b6056e8ac29ffeac66b7052507e8f1c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0010a6f98b2a6403564fe0bedc44b73
SHA1eca30cf66526b18a7787ee88c7e0065c9778f9d5
SHA25641f3449f370fd486da654415613e511fee5434870b2bad3705b3ae0e9fa49651
SHA512bf6184e0629be6dfae8d889dbc4da25b08d3602e94216115cddb1b8df988344b3d4daab58a56d4a921528711c95228f84169ae043d9d4da77c681fa1b23a8430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7646945329b0c656c024bfc0cb7f1d
SHA1306e257be7c031baee97afa99738d63dba187c3f
SHA256f1e0ff09ebe64fa71d425ecf3c79fe81431185b9732a544605dc7d60700e2753
SHA5128b29ad32e0292aad4a07c3c0e675943a9e95b5256e126e7a3b88d37b7e67b2393e6c782e56735d7caaf57d271c0a1e1b9086899091af4d6a489cfc1fb7594a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d1811bfc6dd3b54a868ffa165435144
SHA17e0bd56f367e8bbd27f52a09881fe5d27a008e78
SHA256c03a21b98b7a2365dde45bb2bb48feed678e4268a4787bb8814eb821abfc6220
SHA51242ab8af47e83deada6064fc7937e0720a369617702f4703b4b64761746eddf12cc5d006a853f949abac31f662f0d5be374f621c0e1c6e54ab6686f2bc357c89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fc4ebc2f87e96755fcd04cb47e35535
SHA10e8dacb0439f3d990eca97a0aef72e7b4e86c5ee
SHA2564953aa97c1a8ae1be259ad6ca5778a628bd20185b1d7c109e4d87dae5e6280ff
SHA512753009df701e9a12da0b9422dfec51eefcf6f56247bc6b497d54ca05d2129cc7f662dc1c69d43964c88425fdacea30b825d19e62f61b17bcdcf1ce19002289b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f478b674d4fc65c40f935e2cb7ecf5
SHA113a7c61c63f186f4eca7a1717ab9df8fd6decb58
SHA25654869584a199c46f6830683f72049007851bbb57e70057c2d0c4e1d6a20f6dba
SHA5121b8872ce599acef57b74310087a8528d466289158275601a73dd3b143c86d6062fa4be3855b8dec75f4dfda20f340e62da94afa8e5424503197f838182e4504f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e089b8a1e97a0def92af773630f540c
SHA1ed499f67c27f81f3235601eda3e1bad3b276846f
SHA256e82b01cbf7893e62d101edcfaae2258426a5c530dc350ea27cd2ebeab4d9fdea
SHA512f32a78757ba395beb2a7c6a3f6301436c5a35ece2939090927db11e5e10236b3b230a130e49868a4998788eae4936a62eb1033a1e6e15b79e9fd1171988e89de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4378d432b7442e04a13c0183471e1b
SHA140e042ff31622958b2abeeccf5af7cc2c7425328
SHA256f29b91474a15a17af337aca141433e0e3943e8f6b4345f5535321335272813db
SHA51262fafee1974d3601c4bbbfb1a6033e2a39bf48b7fdaffa61e71a8ff64dc91aab24833dc7024b3d684cf91363b3fa59952aab9fb0e476d0b341012f46eb264a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562743df456cbcb806195f63aa7c2c1d5
SHA11e582b33bf8496a5a721dadbdacaabdfca34dfd4
SHA256173bcfdab51a9c64c9512af24efb79209720a9db7b83fe557bf3f990289847ad
SHA5124135ee341d738d628bd07a295ba436143eb430013eecf8c6e0a821cf72651508b20b8c8cd00256317a9a65e9009aefe4eab9b212727d0ac186163b1b9adec6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580bc3d1bdd5ea315f857af17f93bbd14
SHA10a555297767eb454176e5193782d137b067e4b07
SHA2564f8c6ede661de46b91ecca4a3098278998aa40db80c3ff13b8ca1f2911a39660
SHA5122b2775a5ce341dc51a72c607b89245c8f10ecc8e52c3eecc49b4beaeba87c4c8a898830638f16835df9a1c6f549e03d9e4fbd4f7f199300a52aec693ea3956ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd70dc85b1176dade0e25250398fa2c
SHA1983c7556fe9a4d0982e78e5b284137beeb69cbb9
SHA256c34217ce4475a761366ba3a1d8f60bde7b225000e9806a62668335cfa8edbd45
SHA5120a7054bc74b99781a1ce6d840a3de8a881a0665bce3ec3beb832fed0287525996437d48700494f1dc4f70fc70cc814c8d84e1fb4800922a82f0ec2fb2d5ae08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50954aa9ad458df78e5a4eecbe9b3c342
SHA1e502447febc78694e881c2875a36d40af45d3fce
SHA25658ffb75bc72650ed5d1ba40feda67292c0eadb8ad7249a3941fce277af32ab18
SHA5121f14e09712e7d5be189fd617c25cff23672c934f0f6080ff668a6fdf48ea3123187ede125875fe05389241e025e22434b58d3165a818ca1e339dd0a882f31c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709227a443c2851f1e95f840d71c9e23
SHA1300b390912ab56c923b42a09f2d3bacac6718d99
SHA2560fceb8f2563fdf19c557d2202eea0884c6b5e5adf2a3e5c71580c5e8f9395ea3
SHA5124ed14dbf92b565adc7b7a371cd5e34d25ad7b91ae2708faf083ce3f34e1c6d3a5176178c8432c5a96b659f46c4d16b54830bf41fb5f7063c3ebe2faa65c64ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526a549b0ea96a77431a4a1a737f7ba63
SHA137ad32e2bb18c96ac4c684154f1b1b4fb264e0c9
SHA2567e277c4bbec4f81e2d0f680edf172f9d86325d748d2a0bdd0f45a3ee8494cf21
SHA5126b97f251d9a1e94f9b068deccdc8a311d9e952762106a5dfc572e33ae07c25d7b5630b3fd9a183b6caa933bec632fafd7e0bf89a5a616e73d1b5a5273864daa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558470f136f70748aadc6e2cfe777a893
SHA111ae7d8c9c0e7d19c5c51945900222329e1e5cb2
SHA2569247c2c5471867bb03e76f20d06e890ba82e5626dddff6574f8740258af64d34
SHA512137b8177c392031f1225c3936d75fa6859a65b81415b47623c37f36741d999f3b5dde52048431c6b23beeb5ed2e9acdf48b7badfa8bc1eee8efe679c8d7f60df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d03a282596f838c68892683b8d85521
SHA1bd452161ae388e3eaa4c1d23fa278c913a9ea655
SHA256c1053dc224e7f912ea9375d78066979fe836a375dd8b69e31cfe0c9f1d79a9f9
SHA512a92ae0c8a876003d91359a6b057dd9a8bdc8642db0d639fcaf4f77c26e4f1ab6d9e2d7f83724b6cf861b31e9542c08239091177421a8822a58ef107b61d8bee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53214776465e162c317c05fdbc59e96e4
SHA179a9672044fcba51c259702ea51823be78c19e29
SHA256e86ae938c8b9730f74f13667b42387776153e1b50fc3a92037fb6c233a9a7516
SHA5122fc0e7bac8a6089e08a28725ddbe0f49cf06aba0c83ca276c423bb2de7ee417611431f1f12ec1d53911c3349f8e6d73ffa3d0bf4527ba89bce0eb319c67ec618
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b