Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
e1a73f6a1f87b1c57e0c9aad3d6cbcc2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e1a73f6a1f87b1c57e0c9aad3d6cbcc2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1a73f6a1f87b1c57e0c9aad3d6cbcc2_JaffaCakes118.html
-
Size
922B
-
MD5
e1a73f6a1f87b1c57e0c9aad3d6cbcc2
-
SHA1
b4a63d354a72ca026b989ecb9c0f428a2725da5b
-
SHA256
dd415d42ab732b5aef973e893c8ace97902d1551b18a1b4029b1f0b6404ad5a9
-
SHA512
a89fc0f9af668947e9dffdd5bcb57fc89dc295120923ea601d351379287cbd5c9408d73cbf33a94578f45e5522373bc2dcf687f92805e98cd3b4f72461d4fcd1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A1B2921-7316-11EF-97BF-72D30ED4C808} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a09dfd2207db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432534345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000046bc3786701517ee2e271b0c42ab994a948288ba2f571ff3753461415f637a0f000000000e800000000200002000000082e7045ec9fe5486891acaa33d84dd555857618bf7774f2312638c2c31a72d4320000000b5984945ab3299c8fc566cdc67b4b073104d4c52876bf45ababbdaa7a731dfe940000000d00cbf5a7798fd54971d7b8aae7a491075f185bf949ce3f39c152145ee90c7689c3ff64d0a6f8f8a0884c561e3ff77b9ceed902e0f7b126befaf055f7b40b839 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2892 2876 iexplore.exe 30 PID 2876 wrote to memory of 2892 2876 iexplore.exe 30 PID 2876 wrote to memory of 2892 2876 iexplore.exe 30 PID 2876 wrote to memory of 2892 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1a73f6a1f87b1c57e0c9aad3d6cbcc2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62b65973fd9ae31c5f26898e408d744
SHA197bbb98adeac4e26600085168ea4f09b7a693809
SHA256efb0e80bb7f0c3743d153cee7d16167888b380f5f549341d560e5f965ca82242
SHA5126052c75c75e7c0c05b7f002113db461f1b118223ef6b5eac0dca1b19bae8d1eea8265675d4bed1ceec452dbc6e523dbb5eb93b0611787a82c1a64f11609a7062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5759896bbe425f93c963510bed91b2960
SHA1c080ec7fcdf1d66aa0a79da6774a505e8c58fa92
SHA25656c76a7c6c1710334370e33e4bbdd6a659d8fa210e52d3ed60007853f3008e45
SHA51213e04a7dcb7c1a865ba40f0bfa1421df21396c54b3c9f1095cb59c66d7a17556ce0fd6e46e9cf372b2f7790d88b9d46ff21abfb4fbb7cd3bb469df3142be8ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580961d41b6af82a7fe7883808cfda560
SHA11541e5245fb9ad371202199e137a45d59a6e7917
SHA2560591dea1bd775cf03ee8c8b17f2779241524508815acb41faa77820fac0bdb70
SHA5128b013b0dc1ec29d00ed6272956245d0773f956498a10636355df8e3cd41c7f4c5a6021dcc0bc48212184f784f7e397d39831cf1e3fb36c61325270c2a4f167a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e81c4e7fa46760af95c506518d4cd7b
SHA13f80a87f5d69469e59fe13001bc23023c1b88f37
SHA256c00c5d61b7cc0e2313cf64d10e5f9dd04bd45ddc5391b96f099de40dd8e752cc
SHA512f8d00f6498aab174893cf8e21512f3275922f1f58f15551c6c3535b46ac38fc922ba76f5e77a6d2e287431fd1b53ac61b492d078ef59ae12d8645962f09cdfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500333251e34e7d111ef303b1873ed867
SHA128b67643f1543b1188286ff775813a9b146ff0e6
SHA256b8dbea096e51b5ea979ef115fa4d5901cc572f48d6594ab5916b6ae606738d8e
SHA512d3d9e9371a5f8cc6750445d5b312631122d5a098ecc5c05f8b0856ca2778ae6de1407585bac44488c74899ccddb7f1da637872d93c29043bfd47191ed38135f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567514a0f8b282f3ce38917852c3b87c4
SHA183236364ddd22ae0652a65a42f739a1ddbbf0c7e
SHA256b44fbdf5a6575cd3903f3eb12297aff345d755221550127b41ae2e2f2952bee0
SHA512285379e0f8cf2eb9e5cd578b2406353b5395546a32c2ab471f41fc7459a28614bfe0a21a6b5e41cf2ef43a580dbc21ee4cba07ab7faadd2f8c6a5f3c1f07390f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d38ce58fb0687ffc4587d2e4d2404f2
SHA1ab225b0976c9c2df31a4125af4958aba6d8f4b9c
SHA25661c15eb62f3a872f93bd288f3d9b198b1bd96260b7eab374c59dc69734c24a14
SHA5124f0d65599d0b209a84b97c0e092abf770d0200a1a280333d99aeb093df998c1efe086656fee46ab1dbb5a0fa3dd464445f5716ec771112ae20048a16226508c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcab5ddbdb8d6c3f31e5a46cba0ed4a8
SHA12ef529500ee0ed82d779b023127f85331ac15b12
SHA256dfa8c5a2ea13eb1cad66e93c85b612205ba8dbf26e9be1e151c05fc6900d22a7
SHA512d1893fa137b3f746b2d28e5516af16f166a4d8c99d6dcc5139ecde7baa7924a7a9ffb63850f21a1b5175a6d3ea69db66e3d08fbc4c6ae6d0dca418e3852fd9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac5a94cd458286a14dde15714df4443
SHA1e8986dbba920dd18529555e47b0b31a1d912b6f8
SHA256ca14a4b3dc3684aaf5276fdc464d35af5c0b81e34df7ed3a4edc87c86c16ca10
SHA5125cf87844098ca5dfe51a14423dd14df5a93b39769cfcb510a415a9af7a565da44b273f50e902271b81d28b1a7cf462810b4c32b340dacbab7e9f86823202c7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf71ec29a4d7dd33911531998cbdd32
SHA10f234a6d980048c097cd59a342b4855eb5b96e48
SHA2562301a4e805a1eff2aa63832da6fbac811052fbffeb23088a7519d121d462cb87
SHA512c75365a8076555e2eafed6532d1f6fd6e20de15acb29916cb58fb92a7e1e4baa5f6f1c1627c1404686fb9f0547289ef5041f91949c9b352f827f6bdc391624c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f823b23af78d8683e40c0a62bc02df
SHA1d80e80f7986b35bc40a201d2b975fd63e31d9179
SHA25664262a4fe3cf5955b6536b9e299567379b4ec6a86b89838e920043b9ec0a1975
SHA5129baa12549b8ccec0cda8c8051c6dea9b75b6adcbcd86ce109103e5d04c54b92f8736c05b6f6e087b567b2d59e0163d21921f2681c5feef7530cb34cc0da509e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0177dadeaf862b05b8da24c3216e4c
SHA1b33cd6b4d45f6e64a3676c27e1ce5c33eb0f1b3e
SHA256d4d82b488802bfd72fd99e330ef7929011b4e05df8d649ac65a8fa3df1ee9879
SHA512cc3a19cc2efffde21efc5e42037bdd6c914473385a31ba4170d6fbcd97c1ab9b6325e0b18d8bf784b7ce150c2b91a334ff4cc04542751763e00e147d04f608d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a76f1d69013887484a3579d19fe623
SHA18bd762943e23988d0527996e600f91826597ff20
SHA25693720f31e1764a59f4790f29f43f49d75bd2f1da4e6488b994c84e6ea6c48076
SHA512f02ed410720e5128e8954291201688f263b7b5abf9e881395a00fa0261d10ba1ab30f5e9b7506d8303f431de9be4f62b6ec909acb83a35ebc8c6475632a14da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e6fdebc29734ab6f69d8453367d972
SHA1a0650d2c3fda60d9fd4f55fc4cc23b5aa6d925b6
SHA2560bce0b4572b977c2ea607583f69532cb00d904f996d0cb0cf37f9f632977efc6
SHA51266b522b5779bb3a191e6bf06285d65e385d51a1496de2c1544bd8928c44ec422e5107b146c7f48b83a69550af233f0ebd8a2d87ec7e4c2a4cfa5173da81d1a0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af72853617cbdc098635665890c66a7
SHA1d32d9d27fe4da162026ebc1bb7b4839e54736c96
SHA256e3a59cd980e15a0ec16fdfb4a2b288dc1b15a922b777b43345adfaaecf66d5f9
SHA512c6bfb5406621436c940ad5ea7665346453303327aacc28142245d9ebbba63a79d06371cb8888a4077049db63aa7d378afaf5319961fdf8891fd44be9282f03c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8601c1d70f5157c5b7036f6e4203a2
SHA1f6b3428ef3c3f921db425b3b2a6ac3fa0e4c9ccd
SHA256471c4c3fc0f43677cbda3151e2967e19bfaee3e2d42a565ed4dda81e182a0253
SHA512475c9c96022e0e38fe4b5f5094512101b3c513f2dd9233e63eb617d8299dd7cdc98089829c9e8a53e9da64e30db8c7694ad5b65435be9014c0d01a297c1d089a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb37d34b59ecbdc5f56f24349f675b77
SHA1a5277b3170c52d64c43255ab08d525dcd3f15ee0
SHA256d6610937c6b2dd74f177b74caad14915060b5256dd530945d14867c341b0f20e
SHA51223025b6671b5ace326b11c9dcd17351969dfdc17b4f7edf71ed50660c8352e0a9a9aab9c1594e2d5224d9028aabcd1556e5dd1c2b3b5393689d4e662fd0ef4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389221ba06bf0dbc1aaacbd750710ec6
SHA1004fa11ed94849c47e3334c1aa7d7643f62137bc
SHA25653c63b86a914a1ad895b65e75f7d46a72d142635bcbcc8d46a8afc4be29e5310
SHA51272bb2aff45e9ce95cb591df7a3bc073fc893509e8f0555ad01198f68ff2316377872159fb40951df894f9459eef3fa71cad0b00f637e356a3499f83298b62b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d05e618c2cb5b894587e7308d8646f1
SHA1a7caf93ca801f0454a8da7ce287a36c0f2583d5d
SHA256ae4738b15a993cb493679d2be53d2eb1a636c2c4f5e08a06698a4b47704796d0
SHA51243673fb5b9d02b27b64074953f539686539144f54f4fd3a379d6b1883ef660248d81d28702bb3e37bdb44dd2f996faf0fc59f63b8ea1789da4bab504088faa44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b