Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
e1e3f6713ad1c4f469339fa414b25c8e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1e3f6713ad1c4f469339fa414b25c8e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1e3f6713ad1c4f469339fa414b25c8e_JaffaCakes118.html
-
Size
4KB
-
MD5
e1e3f6713ad1c4f469339fa414b25c8e
-
SHA1
2e92377cd4e404bad0af48595274fec210cbb26c
-
SHA256
e6ea404ac8ad288e7c23d68cff65dc5fdb88b1174fd78cc06af45f8d1e46a47e
-
SHA512
29f51c0aa82a0b9cbe8842f50361895e7f2294499436a380a17c69b6bd64ca880faf3065b3f6e56ab3e8cda6777a95f1f9afd23d6b26baaf36b4270fa10b4931
-
SSDEEP
96:ziExoFmV4MSEPBDvV0n47ej/hgOKiljXR1QnyneK3hG0snG:ziwZV4GD8/h/KiZXQn/sd0G
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000a755eba5a2b5465b4f86132bdfad71b02c6e15ce1303fda0e790aeeeddf19131000000000e8000000002000020000000d06b39da3cf90fe47c5caf3aa03ddf093ee43926e634b8026428300fb12caae920000000b76d1bd6ca3504ae486b35c19fb2fc8eecb710da643518952a7c368c0c74ac77400000006c37154908831507b756ded17b858696f6446e271196b123847e6dcd985339da3aaecc387f5b9605a1b40014019cc81d6c0629e60f6f56714fe12ba21edede9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03ab7b13807db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED3CA001-732B-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432543664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2392 3044 iexplore.exe 31 PID 3044 wrote to memory of 2392 3044 iexplore.exe 31 PID 3044 wrote to memory of 2392 3044 iexplore.exe 31 PID 3044 wrote to memory of 2392 3044 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1e3f6713ad1c4f469339fa414b25c8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bfa0c984628f2100d487fbf2886f4ca
SHA196df10cddcc0ef9de9469c9bf9e5e336855fca70
SHA256f14a79b5abcbc25ab419eea4ec916a7e1a94b4337c7e6a21b963ad3b51ca9227
SHA5122ed63656c457c90d42583f4baf32fa7ca4f760055b03ebdc3e848cbe5342b1a388a59020fd32a8be68ecc6052585107c704451e0eaf16459b461d33a19468b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbd7ff8e2a0a7a24bdb6d41bded0c57
SHA14d317fefd3ccf67f75cb02258115f75e473bbfd9
SHA2568b7f9a6f75249c704328c782b151bd92b1fbece6dbc91ef2e1e5b877ad25d045
SHA512b1ad8333e18111ee4d32d330d3a68115eaaf638612771b37f5408d83626fd7a3a7969f633050bf9a1d2b24bb9934b0eb5502b845c2c65b3f8cea83690d061917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7bb29de29bdc2ca33bac504cfa3188e
SHA10d25e73e683e92ff837922ec521232c5bb9b0c7a
SHA2569bd3e30bdf70e60a0a02c686c8eefff730a1220e4b4f2a0388324a54410bcf46
SHA512b8fc890488f9b2686251d0c07b5258a9324bd8eae9d25bc802aec7747ae7dc78578a6b3e1f3481661a792ebd8e8fc327002e28c20e70c6df073b5b4fe2aa4100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13b4912678ce602c9c28f72fa59d015
SHA138fff55ee62e8c674d58bb435408ed0f71f3e799
SHA2564df9879f5511138893a5807a2cca77f0f144cc5f042a03e12097361ed0244a50
SHA512551f08b8fe34cfc39ee59d778426bf01595887424cd6f957beae4ab337b665c407bb6bbb954ce8508eba21e5fbe0fea0c8f26c1e479cc2611c8e0a03fd1959f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70304f0eec984216facea9600da6601
SHA1a80a2bd72403f90d26ee5e5ded84332e759652ce
SHA256a885f4ab28540deb8d2cc2d058cc458ddbd3f3a83547d638e49326dbe3d59ca8
SHA512f2810942605e464c1ae37753d77ef1243ac1e1a5143569146ef1f4954b732fa34a16db72ba42eb70c347c78f5611d3c0636ded84ba14b39acf806aa800860516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725eef1ac9cb73852f91976f3a5b6b91
SHA1b8b3ff8e2e15506b85bf6c4bdf70a59310df3f0c
SHA256617e6478ce2994f8a466b4123b3bd9edf90119db860b8e759bb44ecb57d17187
SHA512dc9c907d0c0e3b37f785b558d8327671ad8a34424f7ca9e4ef7ecc58441eec5a668b34b133fd6f544e75f000be1ae8f93950abb39b539582c68ab1e841ddb961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be548966b5a684e6c2ad81f9c2fa3f7
SHA1ccaa33000a2e060c3724119370be97a4745fd909
SHA2568ce0482aa56362537466457c2c93e79b32a8d405238a9196f5fbbee98782ea9a
SHA51270b1a1416398e40f438d19177b816bb88487cf069ca96b2be34061083565f00d4a7494f94dec358448aa2aa7c4d85cdc1bff1744874c49065abbd9e19847747a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be479b9ee2053385ecaae630fc8e19e
SHA168d0a48a60d524ccd34c81ae74e4ce32dbe6a922
SHA256bf6769f17ae60ff826f18ad45f91d640f667d20ffbc4cddad9b2d5fd9973789e
SHA512caece78261a5705c036c9abea8b1fb2e6ccd94da47cf4ff78285b956524b3b1e63b709596ccafa1050d1573201bf31e10ca1ae376e670e2eabd26c5f2edf2caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509da57143431d627c52dc0a55f6c3750
SHA12990514ff2d6287dee00400db1de02fb26b45286
SHA2567fb0a05375d31f9bdf5eeea9e77b6c169551ebee15393008b7e5b4e4358c18e6
SHA5123ccfc20d81cdc9b39cec5dde728042eade9f7d838804d291c9afd108481fd5d15950a0122047ba4a1503ddf5ebf1d7ee322a6894585b9f4e6837ff9409c67590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2199df1b03089e4850acedcf4e29fb
SHA1298357394115ba4f9d65b065f2e0e34116fb3257
SHA256d4a9ad0b9ba1667ecd204a415254af3fbfcf4bf29875c46f623b36bd21382f49
SHA51269d6848b4c26d5b2d7963a3dd9ebd8ac4a565dfec09d038ced7c99c959794eabcbca0e22eff208a1e486e58fddeaeb749936ae0bf2eee7bb5e4e4430b8996029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523acf8988d669cf06febf976b4a4749c
SHA199628bd6c34ad986cdf908bb29bb5f7e0b655bcc
SHA2565ea504e33092a033bc5c8840be9866673806e0090db29a0723d2469b6506cd90
SHA51253c5fa79f9d0853b11cbd37255580aac7489efc681b1b4edd65a1b2a5ab30b23a51c68d29986305896f9f29d04b5784b1c87742f78b576b1d7e0ee22a0b56b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195b729f46a9ca7cb158555cd4098460
SHA1187ae8d6ecf22bdccf7928c281eeb22d799dea49
SHA256446033538d9d8acb580ac5d6bfc1f2919041d1fabd2d049ba21cb5b8b3ca4884
SHA512e8fc26c0b1a23e6add80de5c0502a409774ca1904c9cdb281f0a39bc9da18a0c09cc89c5a5c368ac7cd483d716e552a923c9fb493f5f6e16a980f4865166d10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906df13d2455f9ec36a9b40f534c0f83
SHA1c5f94895453d2371394d1c39332623059bcbab91
SHA256b1911d12eaa0517ba1f8e1eac79dac822f1cb7e8eb3349d8b00684cc66f7f14a
SHA512ee487980f07859b9712991da723f5b40bfe455afa9f9c40bf98b51f8dd72d007e3af1ebd3d544fd3987a76ed8b2432709fb00f4936835647e665242f7c76c9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508750d92193735d23006aef4349d7b75
SHA1d919c1da26b25b15796655d3a6c4cf4e4382a748
SHA2565dbcd1a8bf2ddd7ef21bef355d1524e25b7abcc8f3949bcf5f86b2d8f923dc89
SHA512a598e3af54487005dac50f130160418f5399e67eb0c03b06f6ac1f1794270d7c75f66858c34b54803ff15974ae006fbd78fa14a4ba445bf580d61f9348dc12e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d2ee9d98a1c0b49fd647ea35e3a651
SHA12df2f02686647bd8b1fc5a76466b2f9da809ec3d
SHA256c69b130da22bd7d5e228d0f3973b9a4f11ab1994895aca4de24fb76512dbb7f5
SHA512561de7b03e1f6179d18ee9d1c3f222d883c9d331abd06cd9bd58a865e2f21b00a8c35ea38a839f3c83c03f41a0a8f41e8fb68305a67caf83a3b7fb36b29e358d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d8f94c0a734bb0db7eb7ab107f619b
SHA1ae188896274ccc01aa1c48f27360e84ddbfd905a
SHA2560582e31c8d49cceec185ebd0566c1aa592a9e88b24bcf8cd61538c0d8980ff14
SHA5123a91beeb6fff932a490f0198d8588918fc9b7482dd620bf70b7a8d898386d04e77209e83770e064629e4f56d31cf6c6f451bdd0bcd61df20afdfd89f01113762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532cf5fc0b14e3a47991fae2c8273b5af
SHA1bae3a75f6e2f8550c23871e8aead9ea367df29cc
SHA256a785126a40c25a60f3f878bbaa238f51d9b91871c20609fb75c7c859cdb4455a
SHA512e276a111fa8559f38d3ab8fb1169464805643df6d2c8e7898bde580900306b5dda976e3462f474205c7cf73ef065fe3f95e0b4895eed108ddb38cee7fdca2425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ae0307b8c02e989b491b0f2a4916d3
SHA186cbec15333f1ce43563e94749ce67886f8b6f75
SHA25601c2ea232d47c966627dcc3c8bebd7685445b80840b5555289baf0735fa6a001
SHA512bf865179ec805307641154ff26c2f9b82a0306db066f487046c4517edcca2e4fe1b668031f58d80fd608b7dd7674913aab2b1f83c869dfb7865e1d9355fbc9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00cd57231178b2648a258662c02a6cf
SHA11c2763cd85df5c70ca158db27aae41182c4eb71a
SHA2563923de0bdf37c039e205d17febfe5f8ca6a7ac12f9ccfd5adb0f250137290bc0
SHA512fa8640054186331c5dc6f8f55e642e1fa2a985d282e773233687c2f2500168978729261fb75b5c8721bf53fbb0f2c24ddf709262eca7cc270b2d96067cf7ef5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b