Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
e1bdfb4c7534d5f3d4b8a3b6f9330285_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1bdfb4c7534d5f3d4b8a3b6f9330285_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1bdfb4c7534d5f3d4b8a3b6f9330285_JaffaCakes118.html
-
Size
970B
-
MD5
e1bdfb4c7534d5f3d4b8a3b6f9330285
-
SHA1
0aea87e2b904eb4514c364b644548c2299aa270a
-
SHA256
a708f2807f21ffc8ab57f47fad470bd32ac6e5eee8e268bcbccefdfaead09de2
-
SHA512
68757fc62ce76702891d5d9089d0cdf0042a4ae43ae3439a79eb7dd0185fe99a696c4d026382e41c6bce82587e9738d601e10c033e8a13f48e723cf353c9c559
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000ab79b21bb7083bcabaee5af6e05c5807188a60e7989b3f5ff0407fec89718445000000000e8000000002000020000000dba188b18980448f8d1bdedec88d2cf2a87fe8f41726e8693804234862c2325320000000da28dd7c1e997703bdb7f90eb04af487b9e32484497471e142b5282b01db72e740000000451441132f42fd11845c579096b9c0bc15bddd2e8a5f0f48c11389e2e52812c83920b47a7c28c4b457231f014eb1f2ac3d9776affb5356730f74d30c7234b925 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0CECC31-731E-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432538006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05a4e952b07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 236 iexplore.exe 236 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 236 wrote to memory of 2396 236 iexplore.exe 30 PID 236 wrote to memory of 2396 236 iexplore.exe 30 PID 236 wrote to memory of 2396 236 iexplore.exe 30 PID 236 wrote to memory of 2396 236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1bdfb4c7534d5f3d4b8a3b6f9330285_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebdf1414fc2af72e69619eae17b2ae90
SHA11346eadcc902d6ac88b96e31863ecd91eeffc946
SHA256b15b9943907a74d1146dda0a574af8f2f622f289a7ce92ce4ed94a7c23612b81
SHA51275039e222f56ba08d0c734f7827dba00fcdb106d06bd4def898117000e0e4552b90b64458211d6d07eba976c351547838b14467d1de3aa92846d491b4930f99d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51490aefff578b996ca5e3c75f78c1e71
SHA1f0de743696a7ff89f038f999bbcc3c4b8bb7b46f
SHA25657a8e9087b6169041fa026ad9ab93c2dab6bf2ac01fb0f2487127103472e8b48
SHA5123a6426f87a8e81911212b3c936757096a2045c2c1d08b96c895a51de28072df4c004e02ae46480f4a2805d0f154577f9b525abcc3d18f9fb139dda2c88152464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538804dca6de1a2b4e255f5ff76266828
SHA1665f676c03c76da2c2480af32c24b5d445503265
SHA256e761072d46bc1fb4c1c5645cb1556d3703b618690c316ba7ec9d33462f55df73
SHA5124e06dec24f4976927b9029bd8851a3df71f5a8aaa319dfff744d6dbf771774b7589bc96bc0cba7df26a200b26998f7df34f98b4f95ffeab65cef5dea685aa407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d35e41e64f05f15ca13e8a8e6c8d66
SHA1ad38dbb4ab6936b7655fe5f4c6c5f73187800c38
SHA256527bf560fda1cec9aaa5f49ec95630e8ee9461f851817304b12b24b782c16393
SHA5128667653a10bd33deb66192a6507ef461b1ac04037d037a9797cbf4d1de72eab6fbf0faa8b06ab51291012f1fea00423ac83e583003e7025662a4814333055ecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcfd99346805e1e0a2e24ca89b3cef4
SHA19cbe0e38b1cbe583f3215751b166a2f530d8b837
SHA2567773d74cfadeeb9e64aaa964fb1ddd55a350e0be2716488970f1361273a96110
SHA51222bf639669cb222e79b29d2ed5225dec5ffaef24416cc8a07649a4467ce6c35f863b79a6821bf8c4dad85f6755f1325b61f3ce786a79e854145932d5feadf0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd48acb5c7238dd5e48263b19c2d07f
SHA1010103f55c235b4160b96f266885269cd50098a5
SHA25691e55a87ea2adf9ef3f1eea2a2c18733748a10b5504eae68f6f19203ac3fd74d
SHA512142813c451588f4a85facd03cc7692d787735d4d136b64d118ed55a7774809f2d5d431769380cf31a8f50439710ed86338647c7f3047b57fbc640e978cb43501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a977a626c1f161411633f2d800bfcbf
SHA1ebea75d711bd5ccaec5da38d0b3293a59b2b53bc
SHA2562453650a3e4ceaaaa10c9fd58493d5083e481cbc4cb42f7e859b29707dfa03bb
SHA512587adb542b34a1f2ea73b793eec8f233dc24b5267ad9602ac017db9fa9dedccae309a6520f57a4e5ef20cafd46d81c4b5221242cbbea737b497385a784dd00b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5953ddd72942bf705326a63bf0ee780f4
SHA1fa9ed1dd9217297469d4ef84e8efdb47add5612e
SHA25650b456df067b83e3db2bb66c759f7810acca1d9162ec6b1588d9dc676cdbe059
SHA512f83e4720bbbea17da9ab717e1fd7aece12dde138bf4ae62f5d66f643ff089a4b51ae6a0465ed7bfeda44ad57744e4888a1a58690b3c912d352b3f5106040e3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbfa1d4755f13e1953b9b618bfb2fd5
SHA12c0b7057ed6097ac49652f3113e9695909c67ae9
SHA256f31433906baee8283ce4e19ba8200f6ccd49de8b519ee389d3962edd9cdd4693
SHA512ba73d7ec97f8445ad93b7a0fef0c0c45862bbfabcacf611a0ecf0b12aa8534366798fd9b1806499cb56d10e76ecd8c96f30105c3d715a5c02a5ceb1acdd09d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d0bebda149d85137b4f29dfe3d3277
SHA132def5cf3048e122fea1d8d09ac4ce5396a1b68c
SHA256a7889cb84cd4618d4899b32f67280affbf18194aa050a4778ba3b1e437748e83
SHA51258b22b8f34d062eee26c0eb8a73d740a8ca6039050e44553618d9ebdd9c1a0f50c540b03157c1e050c30a6a5ef4a907d21f3cecafc3f4314540dbe242e4bc5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977120ef7c2b3ba1e6c3526b558fe4f0
SHA13e101e43809bf63e1feb2d0b93cd81b9e9db54bc
SHA25614b0e12d011fbbe0717739d9d526f6852dacc7ce0f00b82ac640b2cc5055ffd2
SHA512bf83bac30c0b37f0f82c43e86971a2175fee0f0702962a0af4a6b7a4ef9ad760f039ff07d765952c4f108ec5dac0a89e60f5fe101af8c0e373da6089f9bc76b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8b8c7ea3e924ab6110e49296bf218a
SHA16ed5eaecc213aa166e9ba6c841258c6f4656a02f
SHA2567097ef4bd4ee62a241fc7fa8b39e0ea022199381583ef399d0a5f134b2298d18
SHA512db66410ae698603c932c9997e3c9419524201722a16dbcd89fca56e149ef05898c3928da335b947aeda0c50afc644646815bb3ab9b256ebd68b8c2cd58fec86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55553c9ebaf439d010496233c4707645b
SHA17f7fc299f6bc0865460fceae98aa8cd1a96041c5
SHA256b4dbcfef072354dac6ce17c88498ae187a0306492f8268f1cf8d51b8d5372a17
SHA51226e072f5b498ad40ff1c78c5cff344afc4ff644791fd6cfaadbb9fb04ef88647e95e2e7116c7f83ba81f611394d9172d605a38ca0dd3d4217cd6c149fcb308c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59753e90ebd9236f0ed78e60cef774448
SHA1399ebc5b4bc1fc9f10311de5c7544d74ed568126
SHA256a4baa6ba923c7db2cc3cc3f4de8ec12f030d009141c67a9036c3f91bea57a3cc
SHA512a4e13ee6035ca8209d3eff19cc33b5cf1952d229d9a8b7a2671a147be76f67d83007d386010f2f30b439810edf62e3bcceb98866d299903b726d3ee3bbbb2903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1b5f85e2f144f5a05884347575f499
SHA10845539c689c3914776a44a8a979f9bded0e33be
SHA2567d7bc4d2da684e82c52cdabb2c8a823cdf58541d0ca5cd3e4a78ac30f3511adf
SHA51204f195a18203256315bf0272efadb291362391f46a3939b7d4068e6fd0cfd50083cb66cf8e4afc0511955481cfc3e3a7c0f41cf5e7b12c3fdef5f836ba416260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cd338955775080d771bf18480c1721
SHA149c52ba93f193e7350b7e0d76fb6f539a8d6a469
SHA256fb598934f264139cacd9cb0be0634cc0e3ea9b50fc98ba4d6ff1561b415fb711
SHA512f30fed5fba787b912a0b98c10a4dd3b21d9509c20545b4acf7f5b6be5cc5e966c89aff04867bcaf01e41b60ae5034f78bfa8dab4ac5701657b96aaf4b770d1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf392c635e8d196b4ef36804a758d4f
SHA16a81148f91cfee5693ee57d6d6e2c4e6009d1f0b
SHA256253462ee799b8ecbeb84d170fbcdc615d0c7028bcb393b73cca5e05c0e69ffbb
SHA51221bf0c2fce1f9ad1443abd200510442e3d1235e33c94be753b8e284b960b4f095ba154a9aa4df2bbb3fb74d8613eca0eba10e6f4191a46972326637b4054013b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f21d9bfea87635cf348e43f6f73727
SHA1dc17dc6e08fc420000e37d1b3711c9a8d58b0d55
SHA25620dafca693b7ec4ee9d12ed1ad3563d056e9bbbf79cc5d3d5ca96df7f8e43b65
SHA5123396bffcc43c1fc00c0219863b7355bb5341702f9215e4edd7bd6c6cd0cab233f2cff2802858211c4799dc0799209448aa8bd5efcc63d6fa2b722366a2559b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ff66b24987ac88f91f243e60bb8f28
SHA1a2ccc0e66a12c20259f24d503169e0dfb18bd99d
SHA256b52be25e179c6444ac488cfa7f7fd21a5130781e6484f1cee7a22a13371e5b6d
SHA51250d20d9aea63f8aa343ac9298e0f098785ced82f1a569948566705b230b1ff1902840b1a88111ef5f5a08acaa83f9c53c58869a4db1edb70c9a11a3e94f061e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b