Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
e1c3bb708b796c60ec4ee15ff9712768_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1c3bb708b796c60ec4ee15ff9712768_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1c3bb708b796c60ec4ee15ff9712768_JaffaCakes118.html
-
Size
110KB
-
MD5
e1c3bb708b796c60ec4ee15ff9712768
-
SHA1
ade1ee4f237f5ec9c28724467977c6be059d7ddc
-
SHA256
52c02451b1e32f8fd8bf85247bfcfb906412acfccece0e9b280a3f849ebee2e0
-
SHA512
11a09fc7c5701fab3bfa26d98744687a4c6a99682bda27e4b312d14c35ef9a5f32f12cd24fe792047c19b2de5abad1e6509084727e107f4e6cbb31e559570636
-
SSDEEP
1536:rmtzrHoEBIVtOX8e2e4z76GmvaNjIbtWBewZc9pndrS1sfHdD0bUwHmE4U+5t/V:rmx2tOVvaxudSoHdD0bUwHmE4U+5t/V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304c22f52d07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{055F4761-7321-11EF-8EF2-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432538983" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000002286d7a854ab87374dccebf8c5b353dda01044142c6b0b7f7cb719c49f4955f9000000000e80000000020000200000008bbb1c9eb385807402e9533a68a5a44f02d3c7dfcbfa47e7e6d68d31ae31d737200000009f65b437479c3d14f6624bbd9ed37159dc0cd91a9299b97ec1756ee2d4ea2d30400000006e4b52c07c27fbe214a709a10eceeafcdd5b8a681d1976ccc86223c69f5945c9765005b405a80fb2a588fc28a4d707d054ed52d8a61f3246902cae8580fb9798 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2840 3012 iexplore.exe 30 PID 3012 wrote to memory of 2840 3012 iexplore.exe 30 PID 3012 wrote to memory of 2840 3012 iexplore.exe 30 PID 3012 wrote to memory of 2840 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1c3bb708b796c60ec4ee15ff9712768_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57692d6bf62adaa1e5cde7061fca6fb54
SHA1360e7d4d48cf07a2312d378e654191571facf326
SHA25622f952bf1945485965d92ca7f4877c9c807bc861279eddb6727b6c973793e75c
SHA512a365107090f31173d5248ba19b1f1bdcb8f66001ec99f43436dbfe26d69ea55db8d3394a1400b4e894602672b80be81b9130aabdae09997e72627df2092e5ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bc7872c58f612a86c5cf42848ae878
SHA1ed6532657b026d99222b7c4830347dc77e8d00e3
SHA256957d9ca5fd6c44558511050c4c71f599b461912bf73d42e4d607a26dbb14561e
SHA512b7f465eec6828ea26b19a08684c992d6e2e65378439a3e5649083a4b7d85647998242cb4d3d5e1eecf71b4dadae2b1d2294b3119fcff72bfc5b1abe1fdc8cfc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598893bfecab0c4aa8bd95310ece026b2
SHA19d4860b666164f4e79e5514e5f87a5d2f961ebe1
SHA25658d2567dbe6c209c8292eb922a77db254c84ba6cc0bec05350ff4d77c54f64d3
SHA512fe4950ba02154f07a301b64c116cbea142d7994781c14e0a61f1e12bfdb2c0d32a1b34338085c7d4c073ae732fabc86edd383301a59d21a4c08f2c82152c29a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d846063f127927d485a6b0e45b2628
SHA1252dd182a7ce9a58dcc0ce5ac24a3c3b14c00d4f
SHA256b03f2c46dbf2fc1543db75cc1c2102f46ff8733674912341b1e63cd8f90c4fb5
SHA5128483197240fe619347749583daa25fe19692fec2ce756e1459ad3f91b227735f515a1111dfc1ba5d6489cf89a35f3014550f79eb74d341c09883e4a2d88da4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea9c506dc7eb82f5c2dd067a966ea4c
SHA137b0f35dc3661a9ab9564bb422d92e27a195ad97
SHA25671828a6ae4be79ef04e493ad988550ea33979e068518ed43807ef95f94d4a269
SHA512181f2bf4f6926f3b74713cc366995d51deb12ba75b0c30044e48c29a702e0d8a94a38562f388078be102e7709c77d5f820d25aa0f50b91b44717cb3c80df1304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1bd3544431feed0eb49b260d38b3f97
SHA1c4de06e57b579503ba680c1fe0299b31c7671095
SHA25603f1aedfc7abd6269414c184ee409b53a6f49bb29e6e6f751cb280c3e091a996
SHA512c82de13f9d8110e2eec0b055e8d482cd07b5638854202781f38fe424601ed6316eb611a327a69f0c5af25e414b355689fb06987ff17f55fc199fe5d4c9f8201b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a16a810a3ab53365b8783f3e840bb9f
SHA137c0b52ace297060df04c9e8df66b41077fbb40a
SHA256b38bb536592e9350680df07565b5de55e2e09833c2b50a04a8748fed8c94ed6d
SHA512affd5e5bf208f8a5e0afade6dba65952628ca45efb00a313780ef40e556c66df81423d1feb709a2c93c8af5a9bcc0b9d761cbf0fe4f2ef1d11e24ad6605b8e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226c8a78c830c4447903f216e6df3c16
SHA1b1624548cdbd9efff2e8d188879f621c19721c97
SHA2563bd424810901a76305ec08a43fdc35b36b4a8454794a917c1d00727b1219468b
SHA5121d4654b359ff9305b50d53cdee4d73b1be1c730e4ff4998d93ec8e4d59269fa50c183ea532c7e988f44dfcaa6a263c4dbdebe3cbfd60f9e2c1f01aab029d028b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ade9e62fcb093f69731255c728dd76e
SHA18d6b9568b93f451e2f9555ba8dc6d9046b092bc3
SHA256107a0da0f422ba9dde7a7107d7a5a98483b4cc3295b5ffa73e4f383e82f12850
SHA5124b4b6dc735b020fde6a47d878b98f8b8e149afb08260c7da0eb16057556e710779b4f0e36cdf49c455abc0cbbdc1f995643686ee78a3ed66b43518290515c743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ef28929a586d6dd060946870b7ea66
SHA1155ce060d978488362825b7925b8fe86efdf0872
SHA256bec156d9bc660d78d6dc5e170b5a06b6fe841bdaa052d0c829871d2535fc3df8
SHA5127664756f644cd5b40b7965a928cfa21a8034869820131c447fc31f9f6e8763214cba6f7962c856c2057cbac557248b6cf5a157cb6249ee43ca2249b6269e83db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c018b8289f903cb197a5db4d01f1dedb
SHA1a90e44e7be02bff7bc12cbc7e96c9364963cda12
SHA256add63b2c3c3ded601646525a49e335dae668056fabd95aa1cbdb5417844bb5a9
SHA5129e6aed59a306a337c585be096b723938c5aa69c83c97c9dbe815c58571f886f904e18c4136de0a71e082004a484090f392c9a467dc318e4454b0a318774f63eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a56fe2808fe396c2819b80d04848fb4
SHA1231f604f307d065f2d442e228fde5dd131498554
SHA256fa55fba2906b2db5ce949e5b80fb1bde702fc7bd1620d1998fbc8a87e08d6d42
SHA5124b1c306e5a773c03349b575153fb405647ac8bc111203f7f351207b47d3c8c98491176f40b4ef362b6fadbf71c4384f5cedbd70856510e5d1dddb9fd038809d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a38522dfb5610be11e266dc58aa3a98
SHA14805178ea0aac59f56415ec3fcc0c6e616307e71
SHA2568da3f0084680b479c6a62d02b75701c74725b37484d204f7856997635fe6a07a
SHA512a1dbe79c7b7d57ce3291bd3814cab35f4377256885e0d312b8167011c0ae6e18c9c31c6ce3e0d8c293b51ca18b72e1315d3a8e20de0208e7f1d0b7dc0362cd0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264ee5f070d1c3a7bbc2f9cc9d449ec6
SHA1799651683d0566d5e9e49a722f9bfaa673dcccee
SHA256d20fc1f8a794d15f844ce1b7b0889971845d57f5e88ee4db5ac545b33d53dc93
SHA5124c4eb5398a5558167fc920e91701120313130e21ea9c3bef0d54e8b2156c2fab73384cfb97334ca3fc6d7294162a0145d1b2d97331ad760e1b5787908694a36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bfb24dcbea91b228314ceb2fe20dbc
SHA189b2751f02e50b2efe9f940838f10096545b669b
SHA25625cb90da5d69f61632bb5e0d07555136ed2ccea1f9e63314604638862e77577e
SHA51256ade5c276eae2974813116452e0f059e45ca83e8e012a8b437510dfbf71d9aec89a7fe4c64ab30f2d6881becd02ad5e37fd74d97ce02f708f536493e9f865d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b41a29e9f5c41b39cc70500d1ad6a07
SHA1353cd31e28ff240cffc121f56523eec826248cee
SHA256c4688f52f4239954cc925400f639abd9ca6fb763d3636cf87530c66cd1d7ac16
SHA512a9850db3260de11cac73e0364602889ca0d8e632218fa7f8c47d5383fe80a44b4a4b6ff4b918143e6667ffb13575cc8677097a5a434385a8abf4c3e0ccd4f4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1daecd744da5ef1534f015643c45cea
SHA11f3ad1c48f31499282bc4b25bb2f5063cf990b00
SHA25662bde1400e9828c825755e48f3267e8c4c608a9d26386e0c73655853e0872baa
SHA5121ce8390e357b962c455fcdfe9ea96cae767f5a5af6b008b55395ada6f8ecbfcbca29665734dbd9d26066f313bbd8a9b14fea4dba0762b863e300f74549fe4cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54faf728e74112ee5046c3a78abe63f58
SHA1114b7d8cc9d0d421fd3b353f5d26ceb82b791878
SHA2566357a08baf931b3a6e9f2111912c5f168991c03fef88a3b16d10e28dab02f88b
SHA512be5b375eaa0b46ecc594d1348e1b011efe93b32fc256fa1cc4fbe086582ca01a64de0d0cb5b47d794084559972324af1dff96de585cd6150dced2e790ce082b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b