Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
e1ce320b3bcd6fcdd40b8e3578cb4bb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1ce320b3bcd6fcdd40b8e3578cb4bb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1ce320b3bcd6fcdd40b8e3578cb4bb7_JaffaCakes118.html
-
Size
50KB
-
MD5
e1ce320b3bcd6fcdd40b8e3578cb4bb7
-
SHA1
89645a8a45deb29632c6092e08b83caefdbbd893
-
SHA256
ac04cc2c0c8a882879abd13e149058159c51b5c2bb74506e0d452e06e879e9ed
-
SHA512
49af32d6c2e99b83104caafaaae6fa5827a604673f5f1202ab76ae44e50cdc44f059f4a0138f7d62ceb4efe6be667aa7efce7265c015ace126e2ef94c7e0ee45
-
SSDEEP
1536:imWu7ZzWy+oM9DARAV2inW5i5q8MHyGoM9Do3AX2pQmo3Ax2q/tEQRAz2lQnoM9t:imWu7ZzIoM9DARAV2inW5i5q8MHyGoMf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c075ad893107db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432540561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bf7d5a60382d179d70322d7a5493762dbaa6cac779b3ab22a74a7b993f7add8e000000000e8000000002000020000000d166420bda97bc903136ed4b73299a26b1e4087979317e378dd86be86f9c5e559000000043be1630b09e9ad3cbea718b6b4c7ef371ac700a33eb7aa1730e767170ae1a8b9f0d02bdacc8741b0c73d0cc5fd6b9ee66522aec6a1ea2200a99e9bc47e1c5da073d4a4c01f81bc934d17864f6014053385c3aa4159025becc0df3e41bac65254218d6863d896aa50d5b753afc3071370b44c40a9c2138e3cc511f61a50ecab17e92665e1c5001efecb3a3912917374640000000333803832700b1e8beb668b8b44d70d6dded9cc4e4ef7e3a71777eb3aec1cd2002e79bd195e2f4104e40c3f46284b4d9806e57f0412a30abbc9ced33a5132773 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008280583554e3427bc6902c7cad1259721ac6bc1b327fdb70531f2bdc8bf9bd21000000000e8000000002000020000000d888191dcc9b172fc5f306f6d77e96f40173303b322e489e81ba796c2b4fa8bf20000000db2e01c0cc8f2b9353fc72113a27caddf218e27e308d81fe1b4d4f17270b21a840000000fbf6e4902af4fe36e48c0b071d11dbe3fbb64f99983b952333fac08d28fe7f8ccce131ada245f7e668287a0f2fe579ac2194099d5dfd20eac77fb531092e1e2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2867D71-7324-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 iexplore.exe 2396 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2128 2396 iexplore.exe 30 PID 2396 wrote to memory of 2128 2396 iexplore.exe 30 PID 2396 wrote to memory of 2128 2396 iexplore.exe 30 PID 2396 wrote to memory of 2128 2396 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1ce320b3bcd6fcdd40b8e3578cb4bb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44acfe460af822256810d8b60023f40
SHA1b946326e8dc207d6c6d03dfcc9365750ea8e32ea
SHA2568395b9ae7187667333ce7230518e4ed73105ec22a2bcc9b30c148a5f906e5624
SHA51289f5814f2b9a2dcdf05d6f8a12d39d579a3109cb8533c984ab4449ffb8b6d66e6e56bec838fc71ea3d97e148c63bdba6a81d788889e9173133b8f11ad6ec3e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a5a59ff43f8646b2d278fad398be16
SHA1aa2c297c41641f6eaa9a7ba11aaf1d38ae162f65
SHA256b53f83fbf47b28f264ab0b30e855301f521503da282a0ab724b000dfa7b57ca6
SHA512c53be5893f57b69429720ed6802cef86d84587dbb326986985c90db37050391d980e599a66b765e828126b14334065d2b468ea4c04fb2f6b787b91ac28e4d740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae98cf4b0bd83606ff2673ffa0a65876
SHA1a8296012ec5b8465fc21eb98b2d2a03228b6bc41
SHA25613933f56303e3f6966b3e8167df4a89a1cc976d5204a746263a97745b52da861
SHA5120ff1dd9804d7d8de1a84186b82922f62c1b41a581c80ab9c3925027c899c0f2759ba2af1aa3a6f4e9a6cfd15db1cfc6e2c4181b3a25c9b823c9347f60fca3939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56221796912dd1db2e0519b135b98a162
SHA1c5fe4d559fe6687a6d5b1e044e454e5d43260f1c
SHA2566ae0878e16a12107dbef91f21c332afca6604a23b516fc5c529a479905af19fc
SHA5122e15b31ef909684a74ab71bf3ad29f35e1bb43c02542151c3d816c2d3371ae54f61067755af9fc01a6ef69d9ca5020d1c299b4ca4c56c7c13c2fc685dc6c294c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b3fb5816f1ad1bbdcc56542c0cca08
SHA1a749c28dda0370bcb42a661aa253a35697613f53
SHA256d0a7ccf73a8b8b9422ec3e345b428f7ca4051b524c3211338be74a079e0f33d2
SHA512928e63ae08cd29226bfd4e6b76a49b25399c91d8c06c4f7ee81ba712acd2ac0aeacde8d31ce8f91fddfaae9967ab82c4670f77c1f07f7d33ecec6ccfaa1fa778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1e147568349f316eb44e074a890f70
SHA19e4379c2995d331da18ae1febcdf73c642cc20ef
SHA2566456373c376f8dd4e98de0d525e75ac58278d34e8cc50affbf24676aaa183eea
SHA512786dd71d5250bbec25abca1791349261757b11a213b30df9d055a3072d0b529b4ff9f856efa3bd29443dc87dd2f0b26c39a62b3637e209e6b98dbfabc870e3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43c4b4d13a23d13a8785d58b55cb2ae
SHA1fdbd134cc916defef300dfcba7cfc37f3021e584
SHA256609fd7883eeeb556643df725bc3e8af9f5bec2db0e5e775c16eb424e101907bd
SHA51299fa7875ea144085cb20c3c929593d2f9e0c69f79a727acd1b9ce5596b206c77e0e49e7041747d2e57a78d85ea9ec5fd042e89d38fa781cbb57da8d24e920c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88ff152dcc30804bad7baa94a1f76d9
SHA16c1ee9b31bca189abf7e592c6f51b5b09cb44948
SHA2560158132a051cb469b8a51b5ac68e0a433a1f596e26a82bc8eb3acd88076f3aeb
SHA5123111390af257efe5761a4b5e2f3eb5164deef6ad8b5a56834a29fc16fa2b0ffc031fe4169a3b713a9b19342d54e15e295a700a1a1befe5fb5d19232518584447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0c59bf723149ffa974b33e7ad9903e
SHA1dbbf6e8ce6e361115b1c3c8ff0dae6c39c518930
SHA2562ebfe66ff86a36508e500e9cde294e2b68592be6cad853d66bb049dc6cbc7d91
SHA512c78dc257ed8c816150511cb98e4adb236014a67dd4a9cfa554b48c9d288bd23832ed0bfc37c9ea6a657372bc5c2c51eadd11be8dd961f07af7ee41a29ac14aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ad31aaec179e6c011bebccb02abf61
SHA1f3fbb84dfd84760896e7a0b56ded760b5ec28bf2
SHA256e3e7e75e7384f3bdfbd1eb301a1cf1f0aa9018bbbbba55c609c9239fd7884314
SHA5120a2717414ff0d135e7a8a9d14a957af0c0ceb9d29ff482782b1f285f2a69428e8e579bff21570d6c073bed5e6218053b4da3025dcb9ffca6452fe953fb5a1e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b1c0bf3f0f995c917bf259ca764b10
SHA12ef71dd389f32935a38c937c01b0c6f10062429e
SHA256d3a84ed04a42919f768312e05b57723e942d7a5c6c72684edef88f561e817459
SHA5121669c174c04c442d02466d309ada3876820b20b83b17f885f97e15f777faca8c4f6ad41d429d8d133775e7e1aa51d7b789daa5326543f1e752279b70a5fab80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e43de00d7e355f0361b03944646d45
SHA13557652e1e3fd94fd0bdf06b45ed745ee406311d
SHA256fdf8c77eb4d62960f7525fed08a579aa2405d3b064bf7396d91e791554e62fff
SHA5124915a4a43ae22856009e86ff86b3f355dd0889cbacfacdc2a6c78121277064a461ad81bad35a750d9bfcbb066d297184c250edce6ceffbb37d09dea9d352ddd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b110bb4113976f49b1da0447cb4525
SHA1ec2cfe6792f850672094ab207dce390787e5d553
SHA256c4777bede1756ca4f5f634d3a7898f0c23c76b30a3902fb46a5c36093b3aaba6
SHA5124abe9377379f7d5892abe76349a056c3b51fa3afac98447e2415c1c3c4bd026d7d67cb7af1ff0b05f67cc8f209a2938422e2950997be1d1381edceff45ad4122
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390c895ff5c5ef4902fb71524e6f10cd
SHA1a613d0b4e927eb4582be1ad6adb1d1db8346ee83
SHA2565765e27219a40b89b1c4bcad72503868b269fe3caa7c60274a9abd186edef29f
SHA512039b2332c9507d1e24d2819bebf45320d2f33c70f96dcb2fc9346cfef9a3f7467fbf024c0f3a8a60bc90277152804da8c92b07cea1159960bc0b28dac423c57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e36ab9aedce0a14f8933efbf97b5a8c
SHA1f1ae6a4e0abe5dc65f7b5573b1b10618f6c3ff74
SHA256a6228a4a1edce2f6e821e61e5c2365db673ba74bacb81ac011185c9eca1e88fe
SHA512eb553bd3b51eceac71d62baed6c211c1f3e25a80e2825f9ddea22a58fa49cd144c10df6cb7662bb3bc8230f7b2a4df42a31c8c8b815348a1c044ef7c0002fc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a649ec76f6ae71aa22cfc8e5b904f9
SHA1978dd3ecc69018028d6ebd53988fcc1e1fd81112
SHA25659063befec24fc4ff1f28b114e479f2c6bcb9604cc2f9040bc30742bcf05b3b7
SHA5125f50d36ab320ccdfa9e3864f3a29af8ef0123b80e63cadd18fa2c6cae551f838c1259997706260766491a9c377f92b52990cd233e3d4a99b1ac755653e7c3ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5639bf6d5e6c1aec439ffc5638d18959e
SHA11eb8e482fc653a1b82859cfd1ab6cd54aaa4f4ca
SHA256d50c0905ec3e94a3d199b7ee5cf1cb7a0122a97954d11d2739afec0d4abd928f
SHA512b934c6dd8b03e28373610f68d4540e2dd706177d9f74489dde3c8b86364c63cc16aeb0482d909a8151b5a45b82185db1207d6ae84d29fdfe33fa08bf2348c999
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b