Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
e1faae23fcb821f2644003b4242102b8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1faae23fcb821f2644003b4242102b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1faae23fcb821f2644003b4242102b8_JaffaCakes118.html
-
Size
70KB
-
MD5
e1faae23fcb821f2644003b4242102b8
-
SHA1
ecfffa50b1421966b7ff26d6ede3aff0527d97ff
-
SHA256
c47d0c054718b402e0040618abb045d45d0d4007f9ac486e5b30ad7eb1cda101
-
SHA512
77778f76ce002a1e045bfa608bc6d33188506ba8c92d9f27cc4edc94e64fa5dd5a31ae50c86b38fa711cbfb87ecbc0c07da6a93700b10dd5880d85e4669466c1
-
SSDEEP
768:JiIgcMiR3sI2PDDnX0g6s361hvojIsMoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JSxTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b172c94007db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F33B39F1-7333-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432547113" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000b320f8a9753a9475d7f9325f365b03f6cfc81f38f4b008f94896625131176385000000000e80000000020000200000008c4cea36b6ff45770674cf8c2d29c11b45e83ac044b1e6f850f3c6b58d4e2786200000000bf2317291df878f445fbff0de0ee9fa6e5b93f3de1a553d9e31c768d1670457400000000d72f0dc2871f77530781e08702ff30c6e0ccb4a9e32d8fd51a2de08be008f2987be1feaf1011411d630408c79f4945bfee9c3c5a393f2bdf8d40667d7e0e306 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2352 2072 iexplore.exe 30 PID 2072 wrote to memory of 2352 2072 iexplore.exe 30 PID 2072 wrote to memory of 2352 2072 iexplore.exe 30 PID 2072 wrote to memory of 2352 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1faae23fcb821f2644003b4242102b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf5dca189680d673554e7d90f630c81
SHA1134b75a43ed641986702a95748d7622c7040eda1
SHA256c527c8124d8e39a6335bd1fa401c92d1b02ad87a69d354cbf071fbb5cd43845c
SHA5121d89a0c8adfb4de39c75c6143dec7bd9c39af6c3c9aaea357c1025a791afbdaef2dd10c1794c602490afe7131dc251879cdf55fdee6efcf4b86406576e5e16b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59462c5c50b71d003654099cf125bdb61
SHA1e89d294648b6614bfd8e62e26ec8b6df68b21169
SHA256d42940c4d5d05c927340208048a09ee6890b725940cfb90ccf0cefe8da807503
SHA5121c2a9a28f394d61deaee3c78f1c036308a18375e6b921bb46a0b9a5d492ad7102b6c4202e8e0a55f4854f6115e77d0f7e215681d58d45e2e64e8de07acdc8355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da24110838b450f050e9f64da396b6c
SHA14f4631fa848d2c3f593a67c40de07c6a611babc2
SHA2562d37467fe29267002245df9dd0cc9ffa4d91c9a45d8fa6b4870b878b36de2c14
SHA5120a8c45a2a46228348d3c018a9ddc2e06e45bb98a60a060cafc9a148c2076caaa3f4c894df6ce061f0c417a3a6a4d9da665723edf98f061fc23d9dc95b491f366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8d51bd779a63c2dedcc4f6dabdb71d
SHA1f8ffc4c50a951ce3e8dd4021e41c4dd21241985f
SHA256a374dea236317f314c3b735a6527ba5981b581812e10bbde1ec5e0c62a155855
SHA512a1737ca22af5d63d7cd60bd739d79c87f0f3b758570a8422e19758be73e38ab9dd305da274508125da907cf5c967b8fef0eb75b5695273c464f1391a8a073647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ff8954515ebf09b4fcfcecae8e67f1
SHA12401370be8c2e683c09e17b69d98bf757530f960
SHA25647747ea5001251ca39f72a6b5df5201275bf550ea3138572e8a7aef177ae831d
SHA512c1a900b0c3b54797a43fbd08adfefdd6fa1e7af3a97ca576ed8e47cb87c7315c2b23384af606b988602391989ee8b05bcdb1772771b08c5358f22554cbbcabc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0158e09c0025a7e97e482e651fbef3
SHA16e8b0a84578a3061b94f06be47213a33128f6493
SHA25636f139ed565ded32f8832ddc7d16930bf247b34ffa46bf10b41ff96c548f9f47
SHA5124393fa5b1e569e9cd6f237e59ff6156f6855156dd0993ff4160e1384380408d92a3794371a1f413e7a58ac25eaf919840b9542ac296e42fd85fc95fc292f66ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2978e756b0e754ffa4cb0b57387d7c
SHA1a9af6d2daecf9a50fb25dd9e42d520cf64ec2b10
SHA2560b4ee20f017a4417b361ad0502a7b4366677f56a6f751f01622efd92b33ed405
SHA512350e02ca29443305c2ddf62023d594cb3a2490aefcb83bcbc9c29dcf4dd6027e65783ecdbc27e3827ce2e31513aaccfe110d1424c4db5e62b93e069a6a8aa366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528693a930de4870774ab8c514de81cf9
SHA1094fa21d9cfc0ebcfd7f540e17f8446b0c64c093
SHA2566ba01ff9c4f88e7daa7c743ebda462fa0a3a32828b17bbe0aa2dcfcd17f20cfd
SHA5129c5510ad12bca456b1af94d3181e3328d70cca566ca2980a4382f5862bc651a0c5d78b83ceb35b392a9b402976d7d654b6466fed32c0fc4b2f2177398e186462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ac3f4ff9744730d23870a0601e8428
SHA1747a55842fe2bc9841d80f86e44f32ed902aea17
SHA256028ad7bbff2c2b9b0cb404316ba7d9efbcb36a2e0259ad3092e60e3faa90f0b1
SHA5126f44fb648cab17faf179bf04903f27fe2010e59c634024eda7a8507a87282a8e7865b4f5130dd7f102139f24cca3cab0c86c166c11adfc1685d89a723e12bf52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af0829f99073bb56b5984b3e1ee3dff
SHA1c9c60ab3eba30bc4d7e0e33991d48e73307a53a9
SHA256fe8a297ae976332990f366ce46a659398d8e9d6a91817a4c05bb1c8a166172d4
SHA51285e4ef8c8e9f9cdcc490eec6dcaba63f8544e21ca32dff72ab3e0e822b1b4c80c1591fa3bd4f510a3a9ce2c3c2070783ed81a6ba044a5dd01dde915cb42b3bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed611a68c45e01987c89c2bdd0d82da
SHA15504088262053c18175569e50191c45a5813e410
SHA25698847dd7284bc1cdcaccbc8fbd45556cb603637cb33437c3feb5197cf65a2531
SHA512d325feb21b8d676385c6f094b74619d1d900a4c6fb301879a4a89eed00ce77286dec3763b6c4ce9b11dfdba86bede2688bf8b3d246807def4d81251ff2a2a8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514b37fe321a0d49de4009c514f13ddd7
SHA157ea6b958cc132037813744ed9f1b10ec42e6abb
SHA256817db45bc21d10d4e51673d1f12fd672a9a2e05a0310b706eba81631ca1b56ba
SHA5121b3e6aaedd6fa1e569f1c4d8e01e533cbe8f5f05f0e8086c11eabbd1926ac64b375494ff94bcf2d77b274c70152541a5754c908dd65367ac7757e3429ce481a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d89e4a9bdca0e0313b599d49ebacf8
SHA1a36919deb7b91739efe4b00cfc2fa02377243da5
SHA2563c96cf26b750390adefc5b02505c87c28e5fdfca004f6b8e0f325ee41c997c48
SHA5128b4964d6841032340b181f8ca661fce99301c8de53607f7bb4006f2f32e82aae33abc94adae084af9ac628641b30f8337cb46758c4db87df8b52134fff415078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbece74ddb77524cd4f98a9d82528ea1
SHA11a03cbbf962b9fba15ac40ebd0e6861a9ac01a64
SHA2562d38282fc3cbe9ff8a37626324bdd6d2f9e8f6a01dfb16282efb2243508ef2e8
SHA5129919d29c38c22492f41cbf45cc87f057e37f6bd0ffa4d6b9cc4d3db76a00b5ec8cafc17ae47ee97a3394fc06862630329e2f4d217066b04d0b8505487ee1796f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d543b22610b09501b10549b1537bd14c
SHA165b37b5a816564331e8cdfeb3fb5c42c9d7929f3
SHA2565fe59155d1df0619b523e7e0f5f7577aab0ff8da29478f7ff7c258c369e7f8ec
SHA51202429fcfb739bbfd306b6684a8d0229e9e165c243ee17bd32495c8477148051606348d37b1d4230411691c0f811848d5c6ca9cf2058275681f0cc9e60bc50b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9da97ce9b82fc00ddbc3e1b93503ae
SHA14abaa8e14cc03b9aad345f30195febedce36f860
SHA256f428fed81968854b816297c38e1d32882213a6bcc94ca66b3dc571de8b233167
SHA512688414ff67e686e962105a90bd1af541189983668ffebc08e6b9f2cc9e991f91c9a1d9cf9756118f22fa708b6dc9446bf0dd61c493411b291b280ada8f9bb6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ce65567ee463de19d021109801c1f2
SHA1b7743aaec5e9f340a52ade19872e0f5c3fa0f64c
SHA256a4c99f39cb0078f84a6aa372535c4f1546ccd74e3fe435ec09635d0a12dc405a
SHA512dd032c52122239d9d056fe298dea80756dff994cd9cb535a840b5b68f85e7ad2cb96bd45ad5b6e4574b34ed07919081b51c2a79fb0d9c92627edc002886481c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f322f8e5c368b94416395a76fd018422
SHA1b1ba4e46c34ea7650309f5e824c6da19ee98eef8
SHA256c90a4a80eb3eabd47ae013f20c579d8a5b1f0849479188a7f4add282dde70c5f
SHA51274a06d185091e83727e77985292758b5bf2870d3a8d0f13ae0a0937ab886a4511a15b4ba80ed2ac55a39dfb7f90aba486c199200a4ee1d67f356ca6664259c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35b6a564b33bd7095e86dcd338cbaf6
SHA17cbac96c120935e2fa353d0629ad2ddfda4485ef
SHA256c3d4ba26362e56adf2a648a7eaaa2bf2ab84134617c34c0249c53cdf1b97c77d
SHA51232e3ca8c75bbb567b913219446c8f761ae39d6af3d1eff9f61557dbe92ead10e826796e8a8b90cf8fb6e977a6beb1e04f414e599f787874d20786b4393909786
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b