Analysis
-
max time kernel
105s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
e1d1b10b944b1d389a8a78f16e31a241_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1d1b10b944b1d389a8a78f16e31a241_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1d1b10b944b1d389a8a78f16e31a241_JaffaCakes118.html
-
Size
11KB
-
MD5
e1d1b10b944b1d389a8a78f16e31a241
-
SHA1
bfac29113e019b71594b3acd6bc62b3ae8de106b
-
SHA256
95aec319d9c4258c3328d3c202239211372bb763435d05455b72631c60118edc
-
SHA512
e8788686febd2c68c7828c4eb2eba7c10444ed5a6989f69485641ddf90632fc25c6f2cdcce59eb65692fdb217bce50edbf8012dba7570c426f18145ed1ce812f
-
SSDEEP
192:2VnlIsr03Wr8k/w1wvqyjBtEnQ9Lvlz018LOXuBuLbdU8d:snlIcuW9/gcjBtEnQ9Lvlz08LOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000f2304c74a1c3052acea510d41a93f9a6ec07a415441bfd1e98968da6e04cb9ec000000000e80000000020000200000001e671ec357c8a0dc643d2efddeb13bb88b51f7aa2d3e9fb1fd9ed886afd828312000000042c35c7ade630f6296bf273c25717e4e8901a8f0f1c4d07a0d233166b23036e340000000112d653e34e725981b9537cf84038a9e07439bad8680563095c3b48434efe237aa00eba916154d7c744f198695520d75f610bfcf8dc5c47dbb252bc9b6c9adbb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432541079" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d5b6e73207db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6CF7311-7325-11EF-9218-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29 PID 3060 wrote to memory of 2744 3060 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1d1b10b944b1d389a8a78f16e31a241_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506a0fd2ad08bf153267cc5500732bf5f
SHA1a06e7d3b499600175ce9ced6918c9e721caec61f
SHA256731da1d2d3027cc1f079231ad8858ba71214fe5d8749d513a55b9172be9cbbde
SHA512acaf4598b6531bd7d399885ff0041f048a9306e7ed5f3e68e1fa6e4cf0356e95925372a8fcf897b6c57254400a1941344f79e564e9be9fb097ecf3140b09b956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5427dfb18bc7919742a1f69ae0ca6d
SHA13ef0bf05029c07e6e767bb3905d83cd4787ec069
SHA2569a9792c4e2a3bd7e8e981709990b50f4b81737d2c2aa45a7daca7890d4a78834
SHA5120cc110d5e1abd574e10958dcb9a1a79187f267fce5de37ececeaff307936d85f74fe4103ac3e10a44300783e8e4d575c73def330bb6b76fff042f9ee9549d69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f12d59b6debdb9c6948b02438f5260
SHA13b08df0aeb9e3d0073baac3d6bdcd3e0310aaebd
SHA2568ba6fb19a7d1705f232618b9014a8d5a51e07d511b7fb41a9aff1eb192a1facc
SHA5124f9f93cf60d2931ed8c00522af4dbf12bf766259f9f3d61a7afde14443bf95654219208fbd3eb2bb48159e2d0bc026c0b04e8e234fb9f0e1e82b48e0263fea8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eaf839548675920ed04513e420d0981
SHA10830b5428e388622d30ddada09c2797589eb0786
SHA256f2969950d90d198d0ea545fd4b4e98f0837672396ea8131b0e638d9ad1697f41
SHA512489d73394588dd5531a2d9b790aaf471e3333287ac5508d38fdcc745bdab0aa7f1c5be4189c4d7ab4f4baf66046a49af053c7556f6860813920df180ab9201dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5aabe55345eac5cc9383b348861030
SHA14347bd79c86106c12003f61540c9ba01a23c5a53
SHA256afbeb06dac50f6ee5f851cba6a672edfd91f7f9fd08f6350d5f0ce79b96dc369
SHA512de6269ac1ed4e47f427ce58fa98264f1293711a1381a51c6cb8250122aea2ac6f6fd858ae6627f947cdd47f6a5f8b70da944f7d36541354a1ff667f09acfbc8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dee41c370f21222ab98ada24badffac
SHA10643735d2ba0438d8e2d66e411cbd182583c1c60
SHA2567ef36f1272c440fcc06dac780b6faf546e15fb72efc0aa0e97655457ca3595c6
SHA5129ae3046e6a8f3cfec1a5d4d9862f991b99227a367a63b94d36841706e1074b463b57ba82d0333ddbcc30b8cd806d079a865efe38f925a9f7d8b4216548e94593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bb21789ad2c6fdb2e699605e574b74
SHA1cc43391025af494bcb61ead6bbf0332fe82e562c
SHA256ab00b17deae0697c31af69ea26ceb6b3b77710f6498e19a7035735918fcf1e58
SHA51259f75596849b748f7c36e4b906344927a6fd9aef3a48cbb0c3fea185051b9da3b154eb703753f5662995fe6bccd4769001c7248981cdc5014fe080876c42a51e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af06e260b92ff071b8de1d04978b3ff
SHA1aa522b35c95e208054665d341b7a53050ccf20bb
SHA2567932ea79fad43511d06a78a84af2f74333ee4ca0dab61619b1afc3c243b68eda
SHA512ce37e15c3b53e3c0d00ee212592513022a3e7ba0c2fefb68bdb895d35e8cb4f8caba3214087d2f001e3e80a9298c7b994ee6012c7c45abd11fb868ea76c4be85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63f000523ed7928dd4cc2295406808a
SHA1a39d3efc3ef793c57258122eb7ce4ab84db78725
SHA25657842d94986fcab9a5de1e4a738707f12f2ef20bc80635fa38202bab44983efd
SHA51296db3dac82f3b0cc27f8fe9fdfc62a88d0fbcf4351fa034c6e20d3e262c69f4d7420cabd973f8a9409206e03f6861f70ddcde29800b96a09cdd4e160f4df16f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e5e39424719d5e3a07598161019c47e
SHA1f4ff6be0692f3cf962aff714116e5deb1382b13b
SHA25673383e0a451dd29e8e0e54d9b0cbb31292850a79846daf3159053b009966bbde
SHA512c38c983a9deecdde1da54db07a81fef93b89ac0a08137dd13fae4da999ef7c699b6bddb90f7abe403ccbc8e9da8f406765d82e52bfef37c22de18251db3f498e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd9e38f1beb659d4b44a4441958b183
SHA1c6c41538dcbee53bd00fe6bb7fdb6cf5e042e6c1
SHA25611b3eb0fc13f89098c9eb6abc5664377e3dc793a470e52d56067e03db2f0be11
SHA512bee0a4b8c02eb6380359d92ca32e60a239d335ac9e0b96925d723bb4ad277d00de1a242f060226a0d1af959b01cf5272daff3fea5de2d8510eb5e465b8a9cc29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee4739c224d5f59dbe6581af97d6c7b
SHA1bf7aa553200e4285d85275e41a991677daa9c241
SHA256e563ab0319dcc681bc8fe728abf97f5dbae42bf550befb411c341d4461daa6f2
SHA512d1f10c3897fb8e19b9d6c35336cc69ea4098b88973b19cd9a8e6b1afdf06c1aa1a052223991b3e85a563ae4292997e68c1c5d103d69a59c7b60d88889756f5dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadc7f35e7e6fea190bdcf1f2545bd76
SHA134c5eda32a7f5d4baefda13d46bbc9152a7b4807
SHA2564fed0105c800457b980e2b3459b2369b9207512441af9a4dd8c7d0fa555d9869
SHA5120f90284865c31bc00855f444575a83a67ef41461fd43aa6a703449771a8dc89d156f8112e9fd30f8fb6857208222a9e80ff00c3c9166c802de83ecdb6c1fc84e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b1a88648b3513c27f1d10cd5b7d423
SHA1e1deea6bf548d94befdc2bb26dbb3938ebd39f24
SHA2568878868367a4622aafb710f4729aacff936ec91dda7d975a719253b5336bd44e
SHA512825bbae0795840b0f71bfee1ca798f6e51781a3a5b787e51e0ad7ebb91c116c68209e0a397b90a235af5a62e50dffbd0075303ff8b49173ad5ac44b8f0bf2fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e72e9e8a9b56681e22acb943cc9aa9
SHA1830472bdad7b33d75714a06b82cf343fb1d45ed3
SHA256b6d31800eb6c7eb16bdddb67f65c5b37ec04a05adaa477f6012d8e3d497a6b15
SHA5125dfed0183aa95568ba79701dcdc7071ef241f7c673cf7b4c59574514d4b6b03231cb8e9e7622c54084d1c1ae15d12d536aa2f7f41f977d3c2056305149afebc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e69e75d67544b0d9e6ff7a0f6958f9f
SHA11a44cb913d6b23a6c7c2d133585aeb377bacbe3c
SHA256ac8790850a951af4686d344e31904dea1a1c756efb17889d7ee79af6ac4a1507
SHA5125435a5e9d374113c57e35b7a3948c4713c82cfcdd987e6f7609ea32ad469c0a7658246a02e94c0059461ce3eb1c719e4c4f54388da90fdc2076340ef105b033e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756ecc5e5c0106db05dcf0cf87f6db77
SHA1cbf9830eeb45d156e4acc615260725d73856bb48
SHA256c540a36b56ca32e1ff1d771971167ad57d968fe9d39df16f08da23eb66180f7f
SHA512d45c93a4cebf333bf9515bfe0b7ad08c24bfb9bc4f5ab24a3c867b9a051f3b4bef787c37d5bb3e5186378c3faa3af0b8cf99eafc5db4fb28e64cb2003d41d38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c5f9f7cb91cf30d19f658239e1cd782
SHA1bbd9377cc1f0285f681d9f20ad374eb5d9b5a352
SHA256e79cf0380a4ab05c91c6ce542ee09e48b629373ba64f205a97ca730c21b3ea82
SHA51282a085cddcba751f8168dcab04af7ce6f26386151d4579a488c9186fb5ecfcfbb9988164f5850ae7c5cb8b3863e5ae8b131299aecff500a8ebd6ce89b295321d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b