Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
e194a1e12c71a1aef32e5ece3c2f4d94_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e194a1e12c71a1aef32e5ece3c2f4d94_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e194a1e12c71a1aef32e5ece3c2f4d94_JaffaCakes118.html
-
Size
684B
-
MD5
e194a1e12c71a1aef32e5ece3c2f4d94
-
SHA1
2da6afcd06a782f11a6c4b3fc554d3a12281c4f0
-
SHA256
692ddefee7d4579a569bad6ccd38c7c866587206f5e6d56fba2894c97dd8707c
-
SHA512
a739466cf56c4e6fac2c33fa891a83df14ed281e68c0277e91eb35ee73c8ac39d15deaf7ace94bb4bc60fc3695858fe4b0d902c0921c34ee6297fe2655d2a8b8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108adccf1b07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000002c396c5ec1f0561400b88c266bcf42cf5cd152c6f83749c7fc365babc8858c4d000000000e8000000002000020000000d2f9bce3e4246b17cd3561d7e7adebedbfd471a32cb9c49db16b2cc2db3f9dd220000000222f7303cfd0d421a408bfe855323e47bdd040795b7ed0e38412a56af6188d79400000002e366755cab9935bf03567d1562064ec7572b154cff70192133b530134e9bbdc808ec258b32b8056fd803b540b5686bbce4c5786a4d83c85aa282f0f58a6f06c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432531233" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAA86111-730E-11EF-943D-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1512 2784 iexplore.exe 30 PID 2784 wrote to memory of 1512 2784 iexplore.exe 30 PID 2784 wrote to memory of 1512 2784 iexplore.exe 30 PID 2784 wrote to memory of 1512 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e194a1e12c71a1aef32e5ece3c2f4d94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d59100526a87150bf28f3f524bfda4b
SHA152f82edd1ff9211a009e739e0b07ef3a56aeeb1c
SHA256950092aa55860156cc673d985b83e2994cf9f100cb47d4715e4c0525a68e03ee
SHA51274c64c1cf96b7feccdc9b36c7722fecfd881cfc24731e43c484b3aad9a0e3a11471896d585eb7cf914efe320542f361e7e325aa8017c5b3281fa7515c53d3b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155f057b8158bc829859ef15571d0f4f
SHA15774f580c5c7772f99afc715f3ed0fee8535341b
SHA25625f2feef5274a2a29db344af3943a7fa79478cf8ab7c159d30f2c5380abd3ea7
SHA512389dbd75139b7e50dc534d891e099f550d99e7143252aaf84bef11c60998b1910f08ac801ed576b2768862f811fdae008cc2d5133c14b20e349056bc56dbab14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7368439d05213cf0c455481c431deb
SHA16df04bd0d22f6a3a6e7917770765823d11bd747b
SHA25649eb2ce0975b3b8c0c7c4466f5d3b0cf17a787df08b2c4d8e71ad9523ce72eb0
SHA51216d60e75dda3c6e942ff5a19190ce5660d9f83bf08657ea34b31a336f0ac13eda6374ceab0f733ee528d404fc06d20a6e94fd3ec3f64384fbd82edfceed89ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b204c19291ddfb842d1a8fd6c6d94f4e
SHA16c1c3022eeaba8be96c2d0dbef95d8da462bca2d
SHA2562abb727d6e0ea92da9b892a88048f05785906601e3ea7af8e3f1955ea54df724
SHA5122541d2355d0c04642e841d24e5d836067755d0256ba422f12d38908b8db42e18b37f26d3fa87a87bc09230cbd44c18d9ab9a0397e8d5b54ef2989a877d105a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036d0bb4d98163f9d1a06bf49f9ab510
SHA170679287472f76153ba1d98f8caa58d1706c82d0
SHA2566b98240954988de799bc874292a712b4730de82ce9d2039759bf5ac69271360c
SHA512a5a86595fa88b52efb06a380d1b7badcae88905be9394dc7cfac92843b0e941a17efba8227e7aa49bf3c182f186f022cc2f3419e512603548a77663828db8830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56110a1c149fd107390800131fc109ae1
SHA137fa806f302a518b0cced91a0ef395559491369b
SHA256345f5037ad46e9373ec247f3e782267c99c01f363a3365e014f2bf89225cca04
SHA51290d02259d3d819ece191b91ec83423c87dee057dc2218142be136c0d91d455ad54db29ddf1541dcb5f43eec71cf4acbda2b960308962fa713021333dae6dc008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97748fcd64186e472828cbd2146408b
SHA1d9e5d5a86984afea9c020b0e854de742119097d3
SHA2568cf1b34a30ccd676d7d2aa10845e9f050d266eb2df2307a8aab844456164c423
SHA5126ad45ac8980e90dc3cee7fd2208a1422ad92d705e90072a585190e6f8ced30d3e956b3743e9e02490490a8cd1bd74a7bc7045447dd630cc633ba0deaf321f9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2fc2c2052a7098f2a40cf801efac09
SHA1083a8d07c031a6da409a72fc76faf11f42905976
SHA256c3569d60c73ef21a5ff62efce2875db794ebbe7bb8491968fd55f59e2e1f64cf
SHA5125077a445c59178c57065408defa16de0f70e2f9767acbd893d81fcf508644f552bea79805bb657180c92bcb5061089f6a1ba288f5b177e627fc47bd0fc090137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55798ee5243ee5683cfd6276c045ed986
SHA1381b0ebb85492a55185413c82236d7b1b4bb83c1
SHA256d288f9157b0560556d3fa8624d3635d326f2f39f875f89433ca2896b1f1ad8cd
SHA5120e504a3d52ab40de2669a698125727d27641aacb29fca5ff1a5fe087bc72a568804790a16d17a1b2c9e98d33b540cdeff59f8741f6b09c7dc031f0f221cdfff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ec93f20de78ab328efedd5f79c2cf5
SHA103f4441720b24138d9da1fd289388996faa2015a
SHA256ac93d18bd6b3715ea35cc92b7c3cbe20587b93cd82c4603177c2a88811f303da
SHA512507d3b9c24ecb8c10c592ad3c7eae62aa99a6cc2968d59b289abd22a155bbf68088f0f3f8386cbc05e7667267af75cf86e4239c1e1144dff3dc5386f066ee949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52121711ae0cbf64de7fd24c10221e1d2
SHA1af03e5b82b755e25c849cd1cab7a6ae6841ddba6
SHA256ca37b526506ad4e4ada25f6da3ff5591fe1a895296c51cf1e6814a0982fa9985
SHA512d94714f8bf68e40c1b93c543beae25220ab37e5f2d14cf1d82a8d64291ac43da46f9cdeed299915d517ee70e8c03f7f74413829d6ad89617c962dd8f546d194c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6d2796be2eae3381c592db96502cba3
SHA1da4ebf4677a94a61fd7aa3f39cd92c136c3394a1
SHA256a084a2df7946c3c214615f728e0c37e8c58c7a136df01ea7f7eac070960a8921
SHA51220114a14bca9ff48f054ff840450ea6db432eb1c3380bca97505ca19580c157911aebe344d903c531acc76b4058cc4099980779391ee8877c02c86dcfcc8c6d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535080b12aa21a828bd19b56b98d15a2a
SHA1aa786123ac4087c79b84916e549d0fa80f74a18e
SHA25652fcaaf5f6c58aeb747b3694c3e73d99cf1f9172110cc556ad0ebadb2fecd633
SHA5122ec10a02a6041c5347ce21638358bde7d675486b69d0444cb41416ab4edabb206316f9bfc1cf14ba68e7a020cf117f88f4450f8de4f36e33d0374bdb396a1a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad537ad4989b6ba54051c44439150a32
SHA1629cd7ada5486cbb86f715ed4179805af802025e
SHA25696457d4875b336dc6203d267f47cb44ea3779c93bfb7277991cf1c3ca998d763
SHA51218c9d62e814f6009624813539eeb9e73a3d641cea152493c837a95195f8cd6e6d4c9061ff3ec099e6cf4e597323c5c2c1d6d17dfc2a8e9e4f7aae17719dc0f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749630eb69ad3abf18362b3a4139bb05
SHA1f70471660f16eb38cf7f44346d322c064ed606c3
SHA256c496b54b283c65027d419f88414217861c1b5bfba114a625bfa153ab880739a2
SHA512c056c79644a4961dc5ec7aa4983b3f6467253165fff8615cb865c3655c638106feca874d737459ab5e55d567dad90cedf488a08a6bea780c0570e7d4a2f6e7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b2feaf2713a424ae115590244fd4f4
SHA108a014e433f63c2cb0cea27943798e1ac7fde95b
SHA2563cae31634afd1d6072f156440512541b9c868b0de928117f89eb8d0abbf59c8b
SHA51246dae7003c648b957b400a297f55f636313d44d26fe8f5d40e97789b260899960b3b57a4513665c762dab9219b30bc1b858a91cb5c4aa9dba8e6885f3039df68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008f469b133dc7997e305283db54d005
SHA18569b38152ee2b536ff316c3027288a8a1736e2b
SHA2566c92c1f40ed59a3ac6edd9dbae6945811d71e6b0d0fa71762746eb2b01a2b58a
SHA512e830384c11fb5bf8083939731ccef3f3771dc865a053774e411232dfcce267818db7e1ca699e4b391037fff5bef600aee7262c6857ef9342a778c0d42d4562b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cdcab90720ee00d007dfa3bd56300b
SHA1a2f5c55b6057d3b992b970193064bddea4e6315e
SHA25646b0b222d324b5d3f3c67a3fb9272af839fea2e967a23af7bb7d6520e34b695b
SHA51205f006a4efc64d369530d8c186a8ae5793e63be57eabfbd321fc5192fa7cc822b80d1f61eaf05ec467c52cc0659a5bdc1426d1818c60e7dca5948ed3527b795d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f80399c5142eb21e1f65875c5065f0
SHA1daefd5d937599036a4fa27815cd50114e9d2d928
SHA256eab0294e4131c938a4042226e011667a1138a4bd71ddb6b9cc781e0d8664a17c
SHA51279cb76cdf226347cffd720efc49d49e0a7c2f15abf3a2323fab63cb51b20c0f9709b33ed76d8487152c2f425fbc691d37af4ee06188a78e25eb90cd26f4b1ecd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b