Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
e1b878c2195e3011b30b4146a40a0d65_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1b878c2195e3011b30b4146a40a0d65_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1b878c2195e3011b30b4146a40a0d65_JaffaCakes118.html
-
Size
6KB
-
MD5
e1b878c2195e3011b30b4146a40a0d65
-
SHA1
8a410cfdd3240dcfe483001f939f354927f918cb
-
SHA256
588cfc7cb8becf99e67248cd480c80bd851682348548561833ccb7b60a02569b
-
SHA512
960259803443f2818bc5f63a0bcfdce98fc10449394ce5599775290faf95ae5d85c2d585bb180fa35411d9d39302aceff31e798a528e98a641ab46cfc9de63e6
-
SSDEEP
96:uzVs+ux70ULLY1k9o84d12ef7CSTUB9/6/NcEZ7ru7f:csz70UAYS/c4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04acb8f2907db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f15d23d58df6ba29e18022db1f324aa8a52f77af7046c9873219a45bfcaaf188000000000e80000000020000200000007c49b612c17e46f3879d87c3cfb629e7f59618f1de8a8ffa1a6770c7c0b1625b20000000011626ed195a8fa0e28811b7b4027de7a1db9c604a3ba92b484611de420e7df94000000015bd0fb06af1562a570dc1159e79a6106c7c43de6b796198df7539e60a463fb34d71a6470f9ced201dc7de0873307540bab07fcd98257299b6ec80fae1d4afc6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0AB1D71-731C-11EF-837F-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432537093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1424 2460 iexplore.exe 31 PID 2460 wrote to memory of 1424 2460 iexplore.exe 31 PID 2460 wrote to memory of 1424 2460 iexplore.exe 31 PID 2460 wrote to memory of 1424 2460 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1b878c2195e3011b30b4146a40a0d65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a260cc47543541d72f9d857228ae3e69
SHA10a1a4b490183109e5be44bae9c4b21d9e65f9e9b
SHA2566189cc1212a1917967d0076c7d4949c7915b882d63e7e8ceee025cef9a6b9678
SHA512a5d58fd44d37f462904017e68c9e3bc6771cb6f13ad8a4661c1dc0ed8c9a102756a79154de4a9964efcc132ba16b59b09fbf05f5260faeed54d3e66b986d40d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0fe1cd82d245b19e2b144c2bf42cde4
SHA18f84223dc1a99e5d06fc31ec9ad8785a1443595b
SHA2560eaca6f446a5d80b3d03bea53f5ad3f466a35bfcb9844092ac60cabfcd76266e
SHA512c7dca32ddc22ad9873f6f94da39d3c4558d2906f2debf82c2c1c2a1793a7cb88f54db9965d4db01c984f46431b5789c7e2f40439b80ff0b8b79910ee54da8722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ebab7715beb7c78d9084a73ceb385a
SHA15c391569328b09572d3e0c87694dec982c8b6078
SHA256fa6f968333b654025206aa032f311e1b59d3cea1afe03c90526ba3f4ab6f2e32
SHA5125ae563bfb3c7af7977a6e46f9c30b792428644fd6b7dd91b6b2ad64f262cc6b923c2466f3b174392db94aabbbd68b87e41a68e531f6bf7f2fe0cbb89ac7154dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3d5536650d023fd34721375eee9da5
SHA102de8d61df38f3a5f058d5ac58df7c5741f66e46
SHA2563eed010b86fcb002e003bc6ef57b0154e2ee96c425f45e3195d5594a70c0f55e
SHA5121cac8338f2d697085381148d7432ffb8ae07eed931c2be7a2d40b548440b00d341a5716b8acd465463bdcc2acb4f72dcff5dfc4805c45abd1376a4287c5726c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb7d22ad60b3fa70e9f18096dd892aa
SHA11cf500bab284063ba29672c0a286dda204a0384a
SHA256e74764a2f48537cfb56c680b5232e5fb2387a7408c7c027fd09287108a1d6db1
SHA51202ff0f10898232c4a32d68bc2dd8fa860721ba03ad1cdc057962c0fe58a117dc47ea5bba4cb3f9406f789d60145cefad01e44a69cb30426aed38858fd5c36b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94c1ba6671c941d8da3f756158b59ce
SHA1571a0946f2e90b4cfbf5122f5324e4e8397ba942
SHA2561936d0a920e1b74ece68cb2820f796bcb2b34897d3f82fe26cb62e2e8c1ee77f
SHA512f8d6c53c15f9463ea2cfc5802e58b5575964d703437d3994e3359eebf930b1b2a24956774b5ae909688611946c6d1e93954775d214b912dc351d2c79e1c1912a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51740ed79a37982a9f068ebde1106e619
SHA17ae7a1a0c74592940b4a1c8aaf121da2b804e46b
SHA256de0bfbb3256797f7187fea1d9778950eb41c6dd9a2e4ef95720dd798a2345670
SHA512835c1f8da1bf739b5167c316ec2bf181cbadb14387e722f14eb31e9ba6aa5b0c757f31d702d6a40c3eb2402a4e4f014c7954627b00e7bcdfd22b4ed804ebe0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60e5196fb7b3a6e0b4187c7d478a852
SHA1b86d5b1a3a36ab7e35ce40d5ed2dbebe82c0612c
SHA25617ea2752c77e3ca01ba27e799c4fd0a840bc624761cb00e8103c8609d56d8409
SHA5120b5ec8ca9f13738633abf1fb862b22d1d034826d2e8358ee065077a4735e2d4837e988552eb6c14db00515c3ef59af8f1cd761dc91f5f2b5b421a17f1cef42e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ffaa601eb35f3faed9c5477aaff2d8
SHA1789f62aa33a751701407e7cddfe19c759df21fbe
SHA2563533caa0a17465afc35afbfa133ba5d8b98b0ea632b844d11f58942f2140b25c
SHA512ab05a26041053fc2db1b3daad74f3cd3597bcd7502d37528e70e68bdc12d48ddbf33a9569442516f12e7359ea270ee3c13f35cbe5aeef38b1d43d38270e97615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53488f46d0491d1c299659a2e58031bf8
SHA1c31c420dab031d7b0bc3616299a02a7ec12e3679
SHA25627880c8044ffad72fd7d9cf59afbc1d42f33a5be1edca77cbf1a669c7b656fd1
SHA512fa7fce8386a82a743387588ce6c2d1044c8e9064ec9b48a4c8c867ff8295e9f35e4d17d52b28a7d85327c575551a0a59fd9686d45afaefc1a63e11dd6005a3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5986e8baa9545cf8112ad3a03546c5
SHA1c3ae68226f4f5a5c6a3b78c98b21e8b890feeda1
SHA256d368728a12635cb35c8e6b42d6de32eb21e3fc896a2a2b7e7971979378f21b61
SHA5129b44e5dce819d9b0057e6e586205507007b8fe4e93af2bab50e06bbe0b72a0bc5fb2b6b520e2fb11924e480b2c2ad587d3fb4feb9605016a4220c8cd646cfd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c231811b420807ac0a1217ec91da8da8
SHA1f23353ba72705f5626aea65e6bfc36842a6d2239
SHA256e8a4b5658c8089a1e8b877ab68add2060ea8fecfd97dd62c01c484e661272fe7
SHA5123bd0009a88eaf50b5badf85ab50ca2c4725c62f8ac311d6de63c69dcdc0cae7fba2529afc40c15245d13dcf76da0df879cf3f1461db24042f6a02fc823e64404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a359a5c6626eb5ba89e6b5635ae6bf
SHA1bd3e0e01ebb98a15ed3c728ce801deb6c875a551
SHA256c2cfae187f4904da14566b785ab551c48b8f28da8cb8eae08c62cd71d36d5b87
SHA5124eed15af5631cbd095b1b33885eab12b07ccc361cb5ddfda7cdb97a4d52feb9283796b36e47a8279bb65484b70b1ffb18884c899426f23b513d11012ce159aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e584208ac87b20a4000aaec35c7fba31
SHA12bf12e9843d1e43b641cc97b4d433a4eb98d034f
SHA256763b8c2107749519aae46bf74970a428b2ce01806be754e1778514612c221f89
SHA512fa39035673f74624856fef9d2d8e8e7b376cbd3187f07cd66d7580af3d92630e18cfde90e842e8f76200dcf195f94357f28f59e4535eb749ee7fe81f30dc14db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a88246b1df3ce54aed39784ef051e54
SHA1f53fa33393cda7e2844591d85cf302589c214dae
SHA25659a99cac41f9dba59c792afde06354ebe6b0b15ca6d27085a0db4fd168cf9768
SHA5127bbd8fa9bc2ad3d974d8548b6f87ddfab46d75d85af10ddb15d6d7bc4211d4e6163a47c8d9279fe8334d7d633df1fd952572bcc74e416dd5e7816b4635d4ffdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f189a79f7b9e0a8b504080965e14f77
SHA1d814fa4d0e35c5e560b1a15e0cff726fe62e08fc
SHA2565d247ee4bb9ad5b0146b7dc82af5ecc39d8b3bfa4746f9ea8e286b17a75d9764
SHA5129cd8f2fb41a91283fc5ea0fe6469a9d16f6bbdb42f3eb28926c10974f16b9e625b33fedd8dd49833091793409054b0f3317d45a1533b0c707bb141afb76d380e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64af2bab446ba592eb4bfb4c76a5e00
SHA118c2a9cb74f3da6af3a8727ed50d0bf734303711
SHA256e0ed7c2c031b7040b50849f71a5a0360461ee8121c18990bbc15a098835ec037
SHA512ef3b8ba24977c4471295c023b8fb5d07c78eb2a0db6efd6d3fe8e1fb149e52fcc68733fdeb1b1b8a926197089dd0c795736f9b22df640eeb708b8eff5d903f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a7eb8c782f4b4bce3fe8a7eb17bd2c
SHA13896cb65618ba9dfc3da644927d78796726081a7
SHA256d8ba90920f7ccb5348f9a0493535d5d933259cc548d404dbd0bc94a75fc7634e
SHA5124e953ddc89a479969f1b4e474b2bbbef9d765c6c85e68571401d02facd59f545a890a88a275967e60ca04dd542c3e50d53bf1cb22e708b6ba8f615669af5ec4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21cc9a7ac61240cf0fa002b3ff7ec61
SHA1b9b03ca179529bdb30c9e2375483361fef2b9e8a
SHA256229448eed9a937ad5c38aca490091da006e2f849bde1b3b8ee85b2c0225f96e8
SHA512485f747051a4b983de637cd9dbe99539f1d73cd22c6cd0687a6b87aaff111da862f4b514d001d0bbe0691edd9c31934b3edd0398527098d4d1023abf4d71f780
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b