Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
e1b45b769f181b96c99a449b0533c8f9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1b45b769f181b96c99a449b0533c8f9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1b45b769f181b96c99a449b0533c8f9_JaffaCakes118.html
-
Size
3KB
-
MD5
e1b45b769f181b96c99a449b0533c8f9
-
SHA1
2e239029c307ec3faa877953f82f50674dcbebb1
-
SHA256
091fc6f8c87361a5b93e4d3c6b1466b1607fd0e82fc62c1f84281bb038c1ad85
-
SHA512
570e9d707d8705576e3c2ba648637569e36ca90b223e4fe6ab5e1ed6a63b6e1d08e4cf3a46a6f7221f2ce1373a3f786592e8c59ac569c586677e5feec8ef977c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432536487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20feae0d2807db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37740BB1-731B-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000084e546d21a8f73512cfb082091861adb11e70a6fd98018660b3cfd3115a0380a000000000e8000000002000020000000c298ada4bc6e6e09969865aceaf881a6deb11e66bcd699142900c9725fbe468a20000000a5eef44b782dfa75c81126d4ed1af1d1205365684dffa80532b1a1d5a6363ff940000000ecf2d879b80317c1fce93c36b297fd0b9301d6d3bac96f50f9ef8a37391b064ecac251ae372d17f2802ec370cd7d5ed61c84bbca15bdf69b210d9db6d21af8c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2572 1696 iexplore.exe 30 PID 1696 wrote to memory of 2572 1696 iexplore.exe 30 PID 1696 wrote to memory of 2572 1696 iexplore.exe 30 PID 1696 wrote to memory of 2572 1696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1b45b769f181b96c99a449b0533c8f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf2b7b1592f4f047a286f2b1f7aa224
SHA12316c19b4838d7ebfa6be7b4bae572cc6b2dedfa
SHA25673e73e3b434e5ed17900e3ca8d7088a86de935ec79616051cd635528bd0b7cac
SHA512aec9295fb617474dbc6567d7bdbf7836772ca1cbd04a56c4bc44323fe471a92126681a4a45d3129e376eadfb9a6831102c4f4de3b5e91a693bb51ce1f749e52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e0795ac4ac3aa855e40692de5a48da8
SHA18f65bde64d814a8d8a0af7144a35e153da3d76af
SHA256e7f06608bc6f0a1c74e431d6dcc299b53908ebfa770af3e8e851af35005e7759
SHA512aff07900615359897f536d46745ae808201a5ff9e98646061b50ddfbaeab1e140aa0cbb18151ed8280dfdfd4272b54fc20856c1808f9283ac64b205429cbfc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96571dd7665966bdd623af525127e10
SHA1ed1b18b6fad79278eb08eaeb03ada0b83e2c60c3
SHA256f1a5922da50f567a46255b130e0b206303840226492b312fc2295b229110f1b9
SHA51273766736862c2b88286bd92ce62b5d766b8fb1e263b6c2056650c74896178620b4eae3673057b530dcf340c92e549a3461fcd4755caf41196c1987e7c673167f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f536522a31827fdda1d6b94fff167d4
SHA171813fcd215f6bea66c77147f2dbfa7e50d9b50d
SHA2563eb93e2c68d68dfa5039e2d66bb93982dc2974c73383f0f2602955d4b9cf79fa
SHA512586480e9e99def7231352ec23c78f6f68495d0ccda295ff4b6e8ead2d7c52adcee24f6c736be05fd8e730dde6c5f4bb2452b76e20814cf25b2007c7030d4d37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed03217421c03da57f8003aa9cd5401
SHA126df48d7b0e34a40339233ec9ff614ef0b065a1a
SHA25686f3742151999ee317db97f05776b024bab13dcec35d289b1921a5f5bd3d01d6
SHA5126e85ffcc59679e24073949d3ee7682d8b0f122b4bdf01a8549b0ccba545e7c57ee6f5297ac24479c8b197a11c85ece5e587a82f9e49dd16860a6d65b1cf904eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df3990f1fd70935af42456c8f160e8f9
SHA1a3adc10d3d37d692b498a678757121113d750626
SHA25622bdcfbf009e5e757cda130fde3a5d90931db86cc2d6510212553bb6f8a596fa
SHA512a2bce1a2bd4a2c2c5aad9c4d5fc4fec907ff3c555bba3111722a8a8ef3a3a535c91ae8a068540ff7c4dfe968524663e3ee8ef6b8fd73217c5421f2e85bf3dda6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d659c4f353c9143bf58ff8a9a577cb
SHA14764d37df85cace35c6b10b6b7e3cdf8d9c73afd
SHA256db90e291e3e6e24a60e6e35c93cd6ee163bb77dca68ccc45fe0a707da50eb932
SHA512cb6d83ac61c5cdc101392630a7739be2fc8ec349b87aceaf598ab1920c3887e8135a88aeba5553a00723ab76b2666156ddd35a05323d0d84a7fd97e2e5e2fb92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f25141206e0c0c7164f3f811bfa470
SHA19c1fe5bc66ca2b48e9e19ffc8edda4e0a1fbb5d5
SHA2566f1c5e25892f38bb39d82ab62bb7da26081b9875bc848ab797b64db83514029a
SHA5120d24ce2c47f883b3cfe31d79e8b1fa643ca49b9d6f9a4fc71536301c64c3771df8fa8656a8dff16a8be072853ab77590920272d059ba044a59d9828ba8ddca1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd9f0d4a8e0132c13f6ab85979bd2d1
SHA1d9d983f4f0050a1caab1c9e4e6b540e8959377d6
SHA2563522b96a7a5b6d1e458e65a40e46c053b5d09598ee1125165e90b1de504daaf2
SHA5124ab538a7eec697e72e089ebc1ae3c2eea544aaa52a57ee65ac416c5a95f3542865aaa7fe0a5d14ee80de1a1b180a5dd725d3b5dbb9cdba93bd1bf15caef3673d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed14cf953d837022c039f2d68c21106
SHA1899fb15e1a5637b3401360de8a784ab841ea36a4
SHA25617d784c72e6e603182895cf55ac3256bdc1f96e80888801afcd529659239da15
SHA5125fef29079039d285d081dfcc4bc3b9b5922e3c101b6e91aab36922947d1435aeecdba4818ba0f65d7205d152b13916d947fb2f7b197ae0ba964cf2373ffd4071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56dc7f2b4f6d9a48fa2ac78b832cab4
SHA1dbdeef5c9899f6509a32ab4eefedf31bfee147e9
SHA256646f852c63436b21fd088538d8eaf31127157314255fc351a2e2ad4fb0155a26
SHA512d06c6e9ae23e998f27b8b931eb603feaa39f69d61347bb9dafc3306b6e0a9663cb788efe812a0602cf52b3835188dfb27cf1274948fc457e7ada7cd36e33f1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ba3c882db29c298ef6799e4a54aaa4
SHA1e42180a79c5d81646dd62ddccae3909c054d72a0
SHA256a2fd49ff7373dca7dd3140061240bf27a31033e2cc03196eca2165112c2dd60d
SHA51205f7886e4cea6c80d239f4ced4a7476bdc5758afcfdeb27af88e95d86d55a33db80c66eebe725dc8f336bf8fb8af5ef1d754657e68bae7a49deefa85a870446a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265a1ab89677fed9da0fb706a6f891da
SHA15daf43a217ef1795006a30c54085af1e92ecf7c1
SHA256602b9bcd93fa8c51c45450d5c55f66f61b0ba70a2cb88326d98e79b30711aa07
SHA512f5b6069e05d459382215aa9c4efaf9335545e10c720f403a2f15ccc18bef1caa8be8d3c906e42179740a5940bf98acbd437010f6691c6b27ea40dadfa866550b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15f50607f7920d3287ebe867c371f71
SHA1ec75608219c114027f72a85da5eeca5f34e6ce59
SHA2568b82ba7ac79ae0da10e534b4df75bb9172299519497bedd656ea08903a0ad053
SHA51236fac398d247c35ad3cbb91df292cc428072b37fde13597723daa36f1aaf12e66837059788ca57660f269299e667b5518615db9637c2b6a85a10e7a3560b36fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c12d61db663efcc93195debd329dbf
SHA1e12502a32c095cd2e1715d41eb3f8187e9b8fb71
SHA25601abc9ffa9132b9d2e7f792c99557e59edeb493cdfd12fb20b0ba2927f38edd0
SHA5121df1e58e75ed7d453799e893a02e1fb4fb797659af9552015dd8b1fb823199e3dd05e87c037a336d8651ea1d19e880c5ec1a7765f02904b3f846ca8ee9f5223e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8376916397fecc0caf1e2d03143112
SHA1551d769114fb40e6493cf70727f30f38bd2b9629
SHA2566ed3755779ed79178ed7116232d3492ef95dfabb5ff2ff511e464365347838fb
SHA5128e5147c7e492f9e67e5ecce8be3a85a6cdcca2c0201527cd195e083554ceb7b9e6f347e7cb5149a1a28a0577039748472c584a2126ebf9cdfe69d90ef2e719c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0259cca6c05aa1dab5299847cf91db
SHA1b3f1b9c0df2db8827596767ffa70c716fe35ffa2
SHA256be2aa562c551e320d6f7cd02c0adf1367fad2c4a270ffcee4b26b58bcc447729
SHA5126a18473ad2bf907487110dd54e8a6b19f1cdf11bfdb7ab10c2aa75da1ad5bff121a8d85aa27e9c96c4be019c10280d1fd7817e31dd7ea9085f2db272df1f8afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50027fb7b2230c45951ae643a8be4c88f
SHA1a2e740358e842a84326f5325688673a3800de24b
SHA256d5356774497826a70157450ffbdfe72aa5c4932751267e6ac9b39c397fc1f3b9
SHA512caf1f58ed0f2f12d919a36be00b0a2e5290e68b8a46b07e497af48c860465468ac4745afecfc4c28f8dee95d2bd8f81a35e76b939282597679a7d2abb2424032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140a317a20613c998cd76551233e6a5b
SHA168a793f11bf9f1087557c10f3caef592e20ba456
SHA256d2c7a6da06d30ce702336f52f61292077d8ef5cad18e331ae40cf7b9f5616f01
SHA512d51e4b363a52c0f985a60c37887d8426b2c3136c132b03dad9fe5c981f8df9db8d0473fac2aab2f82ff086964d301bf5d92824cbc617bc44f633c0eace41a65c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b