Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
e1ac3d3c6f7cdbeff9e541edda664de9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1ac3d3c6f7cdbeff9e541edda664de9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1ac3d3c6f7cdbeff9e541edda664de9_JaffaCakes118.html
-
Size
40KB
-
MD5
e1ac3d3c6f7cdbeff9e541edda664de9
-
SHA1
b4fc9ffd14c1b454c24d4d0883b045bb02f3e437
-
SHA256
4c65772547139b18fca3d0c888776ebf0d6cbddc1311fc9d39af7854c8519428
-
SHA512
ee780503fb6dbb080beda61267898ae29d4b2692dff7234ec253502748c01f67e6bcf7073f4036a54f3dec4b9943e6c3b4f27fba6f56c7b5e42d38eceea309a8
-
SSDEEP
768:bUYSp7bOiUqeAzLrRTdSLEqJJLby18o4IgLeA+ES92tyP1:AYSRbO+brLKSA+ESIt61
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432535024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000a69acd9fadef005d629269c61f6e6698a68fa813266cbec04b33d604403e9104000000000e80000000020000200000008a867dc55604f90c39cb471bb03687bbc709b8046c163c81464983b907548ec1200000003ac47a79bd737c11165907bf64f2e560a8f9edc4a1b15a78b2e2ecc9b088dbb240000000d48ae17d6bae5920d331d8690d17754c76661a1f95e1c4f1db290bcbef9790c70c0153690b73ce8b9c6e4f36074eb46eaf202aa5153e74ec8c044670561603bc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901defa52407db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF702511-7317-11EF-8F2E-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2144 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2144 iexplore.exe 2144 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2752 2144 iexplore.exe 30 PID 2144 wrote to memory of 2752 2144 iexplore.exe 30 PID 2144 wrote to memory of 2752 2144 iexplore.exe 30 PID 2144 wrote to memory of 2752 2144 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1ac3d3c6f7cdbeff9e541edda664de9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2144 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54361a8ce33ea80ade84b12f14705d1c3
SHA1d55f2b3da52f3e4a2fc1d954aa066896a166e547
SHA25683edef4d85f82cc2dcf09810ccdc7e29c48f0c96c8476a75192a329f94acc199
SHA5120dcb5f58f9b37762ab76ec443663e06d0bb05ef38be957c9edc856a9cbb19d9699c9f2d3f51093747cb0135d28bf6ee71aa4a6b1f91c8351817974ad18d3c98e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf9fe50866006147f5534a96c0d1e77
SHA1611c39dbdb5765e95ef8968ec410d566aa107a3f
SHA25629597f28179b4d601a646a1d9bd75895a6b9e0e0b0424d2fc54a998138f93f60
SHA512004098f35a82988948f92495cc2d60b96262d2bcd1635a5e1a95a45e1e2042f90da1a362bd51a52c3589a0b181477f568617247da86474a99fa4fe9e29b05808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584106c24606197a597e44448b2ad1e60
SHA1b174e602fabb62c1f24bff6684db168d1efb3743
SHA256f7444ed75925dc427247bb842355a376dfb175a34ba2da7967fbe2efe2ed9073
SHA512053dc0a0c92aeb27d5528ca7669e3c49ad6938c6cb4fc1a920bed80c65a30dd2908cfa75e8cbe86af4f2059c8d494c0fb2254446f6747ea6e80a65c332b8484d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c40a906d6f2d98c46b0285b6f7127e
SHA1a37c1448b6dc49abbcf645021ac8ba549cc29926
SHA25699d74d1488a069463f4681258d82bfe11836ddf37354e413c38a20c5584e16ff
SHA512432d165561e9db201a2565cd49d560bf0e78d1a292e9616ad20493fb3883f72d22b88eb662123a0fe42058a2242be0c54b9a31c0a20695e3738448bd1120b74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c38a1dc69d7701c7ca28a9841fffd8f
SHA1d07c8b6ba967f47dfe58155977eafd49eaa0da5c
SHA256e053bd73657a5d04c105ef810bad45b3d28b3f80ebcd030c9abb48b025be0aef
SHA5125144a8426f46f899952c1e9e6a985506b7e7c2380b7b8b21588080b83f5b949791f4af7bc649abf9f5ea4a1cb2f4ad34f31b23216eb34997f931e133ddbba134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6336518787fda3852d7eb66f7e25d7
SHA158b1f4def16e476bc0ecb3a908933df992144fa5
SHA2561252e521f424750e0bd13f6a87461969dd96ce6722cf44fe7f6812804cbf8018
SHA512ce7c82c69e2658b332ec27e29e557feb26d1489b2a3ae038978dceef9131c8e85b3ff436fc5ef388a15832b473de92a414a07df998226bf809414c2d82f4ff8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af984c45e59446fab4718814d581630
SHA1dd2f022ef21b92aebdc5af354a9ce60311e39e01
SHA256ddea8fd975d39d3b9319035a7812226529c11d3488f43f0ef72fa6196f1155e5
SHA51267715071a9bdda36ef6d26a56ae0a67658b5312b23ea9b44b7d764d983297e5f364df6995d65511a4d9e27d4d0846553bca3e00a2f49cacfe0a729f7ab392982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094b0efab1d5a96ceb36272f0ba2fae7
SHA1214e617e00f4c434682b18594f82b68f82b7e7ec
SHA25693544187b8b77307b1f07f044f927e0f874e9ebbe7223eade1fe8d2b328db7c3
SHA5129e4174083085fa715e883e9c952c90f81bdac56fd868c0c9843431956467a1e0017d3173c63200e8077781f4592dc8f79368742d8b110c86fcacfcdd47c779c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5465d7101aa629fc9d99454f7bcd1391a
SHA1a03e7202ba109df1263105d5483af3ce023e4316
SHA2561a89ba0afcd082aeb4deb5b7581658490de622e099418e6a7808beedae0ae557
SHA512e8ae80bbaf333509ecea7c8947f9eaeb78b407dc2ebfa04e59c43eab2129dadbee707f69c8e6bdf8351b1b66bac6f98fc21cd0806118cd89c942784012654575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa43a91e7e142cec292ea3c5af4ee360
SHA1749bdda74e275fa425ba265b39ec94bc9f3a29f7
SHA2564a1ac88c6b30375919894272fd4c9f019760f4a3d99000b662a11f1991d61157
SHA512c23f6f2c1160219e22f632cb8b33a90ab9e48992b05829562ad15b3d39cfacb5936f0029821edd9e05e9e137c5d003be121dd28b8d805112bd03a18374db3d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80a90ee3ff5d53897d189978f77000e
SHA1bcaa511a890c318d5857f1fb4fd1efdac6eb3b35
SHA25692756a20e51620749e9eddb880ebc07ecabed54c53a9fd6bad7d54bde9781f8f
SHA512ba1d8b6e077f03d77e48b39df811e9941714f41795d33c60814a4df1b8586660632346931b57213530f949810ea7fd79f84aaed8ccebd579337f26c5700326c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f6c366ad5045b023b7cc38ae19fc6e
SHA1e609693742f7ed5b96309e7c9c29f758083e68d9
SHA256d1c0561d2c207dc1aa369e3cd8051aa7e795b1f8b6121663f70deee7b53cdd0b
SHA51201700700bf75158c8204c6df2c1f18fd50b41bc9e350dd7a35a4f9f951c01528ad01db8c55f0de789ba980117e19b59b32f797c39a90d0156118904aae4f1f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe2421395fefad6b6986dd3d35e31c9
SHA12f0a1b126d7ed8dfa522d6a9cd99fb935c7660fc
SHA25698c4b40bc395dc08d5521d26888533566f90e755cdc7ed12fa69ebc17efedfa8
SHA5125277583deccc15abe4a6605e8927117af06b7b010efb3ef10111d515d1c065812b772bc4066e6faeb842b8229c1ca43716f13af9fb679fa4a8c094e33997b629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58823174b054208d4051c3bf16cfb35ba
SHA1059ddf8b2a08f6e0b14ee58250de23c5b792b055
SHA2563af31f0366bc2d3528934dc09384229fe630feaee39b81ed6ecd6e7d390156b4
SHA512c06eedc8d27975eb1f79ef50f3cce6416b4df4b0b890f2aa6a4e539833f759003710e5e18ee94fcc03700eb7d7b133d0dab82233fc0c3177884dc5fb1158ed21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5624c20666802fd544edb2885b6d4721c
SHA18ea5e85031bd44d0b06d68f8a8f8c9bd833c3f75
SHA25604b048a5ed3e415c1cca4e73a115ec3ed06f99a081c30b40fc50ccf328d2f8ff
SHA512c039737e4c2d83c1532139344b08edc52fd2c07825a4bd0e2c2e2e3a349b4f676b450ee261a2fa2a28f15c49ba14b1b34264f51297f59ec2a2be61b9d67d6669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5acd3c37545c8890b20ff8e950c2bc0
SHA158e274229b6f690b191e2c81fc7fd1369576bb98
SHA256058a5b160fd2660aeb85cde26bc2a0dee6f7669ad1a47108ebb4bf0857910ddf
SHA512307415fd8ca6eb56df6e598abb8202b2764d0272e7a80e03443af1ee6e3ba6b84878307ade9195dc9424249ac4430844f13efe4da3a474d00b0c27e82c499652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53019b2dd028a8d6029cb6c92914eea85
SHA1abc48cac637a146687cee5833ebc86cab0ff9cdf
SHA2566631d44c8a105e1407fa30bcad17131e8fe15a1c0512f6af221b1aeac5c90d43
SHA5121257e85d4c6973565e429475fbf4726009b30c730a84d35a893ef658552085d7c033e628d2d4f03be350a6aeaeb87da18bf7a5508de4e2ae9279d29449ae68e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56863ed27546979fb357d55339e609623
SHA1c88026adb923a74ef7110d63abf4e190410b0093
SHA256bc11ebb1fdfafd3501ef091acddf9177d761f2c6ecf4c3cf22e36641982ce112
SHA5125c8761a30058484fa5039fa6e8bb3bcb72db61af55a4925faebc223dbcc379b24d364cafcedeac38a6e96d15a69f9698b05db615757e4325f157ff27c8b93a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e47293bd1a7007dee528b90e7e0842
SHA191712cffc0544017fa07d932d5c83dec2db02578
SHA256fbe12d28af7b1f5ab1a2da219d6c21e927883f479fd63bc1677361e09f0276e2
SHA512fa1de4ced26c4c639ffd0ae67296af357f3e8bbb9129e9b28628ae44e0e2962dac52a41a550616069120bb12b1f1e14dd3227191f99b058159e832cbd30d3986
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b