Analysis
-
max time kernel
75s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
e1f214efe69c5bff843788324f933317_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f214efe69c5bff843788324f933317_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1f214efe69c5bff843788324f933317_JaffaCakes118.html
-
Size
54KB
-
MD5
e1f214efe69c5bff843788324f933317
-
SHA1
c49ba5d5518da2312c3a7b05a1a534de2c4d8da3
-
SHA256
f1d7e372b45bc0562533fdf9918cf22e01ae0046bdc27960793905dee917b44c
-
SHA512
2d4ecd37da32ae428cc19dc473c83f03f1322c233db4780839eb3fd507e84bb2cc37b7a3efc82c9ba4f80eb9596484f0d62c3783a4cc388025d96005447652ee
-
SSDEEP
1536:juV1dozjBRDuCtASilylsgCWjyr32FmFh8Xj/0rwCP0:c1dozjBRDuOASiSstmFmFh8Xj0w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cbffba39c3e0d8f523983c0f45e8d463be84334ec9a7edd25dd2341df9ff0618000000000e8000000002000020000000657d73fcc02cd3484b14118a0c16c0e381b8befa2e946681c22419766fbc879b20000000c2ecc066a4e6d4d9ce59f741044950cffcd59ce242bcee269432fc34449baf6b4000000083f1e8ee9adfee7f50f242facc0be0593a2d19e67b564c4c278a9bc611907a04bb38bb493e84091fdc6d045f7f3f4e2436bd98d27f21870af7a5190e16f46804 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A869EF51-7330-11EF-9E99-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ff5b973d07db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432545698" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2220 2960 iexplore.exe 29 PID 2960 wrote to memory of 2220 2960 iexplore.exe 29 PID 2960 wrote to memory of 2220 2960 iexplore.exe 29 PID 2960 wrote to memory of 2220 2960 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1f214efe69c5bff843788324f933317_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f25eb6bf81d0eff78a78a2c2f53ee01
SHA190903b036875a52f1ea7272386f5ef5f8fc8e48e
SHA25660cb5ec864abfc7468069d1830152c7044c1133625351ab27ba37748536d5df4
SHA51202d849521aafe5834fd697c59dee1963600c9f5cc52f42f64fdd08d406e349566a6271cebad9058fb4fab8c385dc03ca53b701100141f52b0a019b4a1842759e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51650740971235cf835e3b27829afa3f9
SHA13e3acbcdc475b9f71a1872d56c953b0c3fae5a0b
SHA2567357c87a8000c3afc092dc8e59821862d41139a462be5362761df44469a6cb72
SHA51234a732fb3937232152ad0cecfc1954c333df38251e0275ee732479442694840236ba3a5603dd341dde4cd3aaac3b10ac049df3bef25b03ce2c4c31b646c53f5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c5092f58bf2b3bfeea4561e72723f20
SHA1443d5805dc4ebd737cc302dd20554614966a4f08
SHA256710755a1fb333a6cf62d9b8e8ab04968a6548d16a7f39d15a1b371e5761dd7d4
SHA51233b1b28db8312bcfb8382c30edea8bb86205a42ec54f3b601e16b49f93b1179d201d7abf6547110e6c029c8c5d67c97db4bbb1a985362daf8ba2b9c6b45e87a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de65ef412cd3b66d8203fb6de25a9066
SHA13eb8b5870009c95a71c36efa414357916845f864
SHA2560e498b26172df6fdccf4b217ba03b303a209d15397fb97b2d9c8ab9279de5bc7
SHA512b059599312475bcf94c9c46f21fa02d4e5c14b37e8afc628723e088ad74e80d0ca69eeff7e6d22de236e9b33c6a5d046d3c2cb875c2c1273a770724cd3fd1479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0bad7fb55ce30875f9486a29e0a7ec
SHA15d2df239420f12bf7effc88edaae50d990b09c99
SHA256d6f3c581d9055a16363a09491432ce4f000abf08d05f0e1e3754d9b08b37a3a0
SHA512727a35d8579ea407ff955e18cabceaf3ee9840cce70d7e1744189ff5ca46ec0428e0ece3cff39f32f9eb5c76d26a165d1364cf766d759ba561a3f23012d75d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14b32a71fa890d6957e285c4ab81717
SHA11cfe7f3f2cb76f0a965947900d74bf99ffa81590
SHA256e43866192af45058e7cd4dcf35055a38ae2237d775aa90e43f76dcc4379ac7b9
SHA512c2373980e6e82e058d2522bf611fbaa76cf0b79ef5a030f259b0cbccdcca87d87275e8dcde3f97c827b1335877a8b7b99c56d7a215ee28742fffb18be59054f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54ed572b5a1203b2970438e01a6535a
SHA1871bfdf8579cb6fe27b39997bca79ac9ed880e3c
SHA256a6f0b0cb19b2f03493a4b253b161ce0538e3964cf09430f63e6038a47ea69f22
SHA5121f313cf910c7c7d9c303da889b8c6a8dc4fad8b1d53ae686ed642f8b72b845e5baa50cbc3abf4d2ad71ae3c28fd21e2de759d104a7e57246287f42762473f9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e795192f9c61513042a1fd64877f2070
SHA1f9a72db7b7510d955ecce312a1522d9f800bd22d
SHA256b846ff80dfc256a8b1887032b1e8c3cd21f46396cb5d94705433e38cf6e56308
SHA5128c41d52917dac9bed499cdf518dcdc3864b7fe491f5e7186458ad51e7e73fdd5873f80f173d1a0afd773bad8ed5dcf330bfc441113379eab9fcccab609260511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af90c61d6c69b7bd2cbe7d4d6d778470
SHA11fa074a7754bb57ed8416e02a2226ad34fbd137a
SHA256306c2c5b626bca4acdededcc531afbf683fe4cc9a287dadc4c068f56ed341a19
SHA512838ceecfa65ad143987423aa4f4b373e160da66c19d9b16cd801c8c42ad165de6bf1d5bfa8577bfbb0a7380c59aeb13f106631827f89c6ef8cd73a101196efc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075b6a4aed22f07ad3267ed2ae859352
SHA18fd6e6b5741588bbcd8490a05286ef665c570207
SHA2563016c9c0e51985a1a1af12435b988313da2cd6dddb5716df7ce608f43fff8d52
SHA512ef20b70aaec8cd130598a5aa45b88af853402e9b5b40d54c9851c6c2f8af4e6442263afa68ea820caee2e69f42a2fbc8f53cbaa8f12105a032d066f1afc7edc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a20ca3d8466364469c1753cfaba0bf
SHA1a155474ea76b55f36f70870202388021cdfd65b2
SHA25647cf133f0a97431eda3d54c8dadf30d5738d2c92578368c8632850c3eeea37a0
SHA512019dcd8edf252af918ead4ab993db85a5fb2f7a5f0cff1b88fb44e451f4cbacb55572979af2e478e6c40314f8b46d006b356f05bd1d561d39f18206960885832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46623151d05bcba7e05ac20148fe466
SHA164cbd834c5e671855bc9e2cc541ba77f8834cf22
SHA256f5901004be476753b1b42dde3826bad704ad4fc74388d34e7786940024d8cb29
SHA512504c1d1f88330ddea6136dc61905e87dbd0b174ca1a5e5677340ab39d5a48216a86d16eb44b7cb23bde17cbc67d9a594ea5b93f9481bfea10c0c80b996fbae75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d2f1113448d065cd20e5f76dcbcde7
SHA1e657b9ab1f878b3723c70149e93a2478a7ccae7a
SHA256a23f762a0c24afc370e43e9a14cb8ac19298921dadc1f792127ec5757e4eb18f
SHA512752412d3f8d6de2d716bc4a77bc25bbd889714f5b0ebc3582b188b94db5316cea871c1e2954433d9fad0aaf5eb603fd73214572a3a3842648e0c7d8c1576f9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d112fbc805773f662730291c7e46e1a
SHA1e43460400e4624d8355f25fd2ec82bbc6ea08025
SHA256d631bd28e7de71fe0d4171a6fd332bb4965bdd2183a64a7ea325017f88b95501
SHA5124d8d58db0447f4829d554534583586b9f96c00bb11a61b535cfc0d96f814de673d7674d2b7a1a6f44ebf793162ecc77712e6c7312b3ec0c227858471a4876500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6125d6f882b13766d861a685527feb3
SHA1c32ed83698ed3f2281e7e9c44221439eb3c15658
SHA256bb5f236628906ff8f39a60504c000482fe9c8ae0a10cdf5dba84bff0a873d509
SHA512e8f562b70f4e9319f5005839db6d65157013725d29524dfcd70ae247d900b7dfe4c210d23d786f3ae8e64bac01096fe3086ec0b76da4fe9b513d7d9f1fad2834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f954b44bc68a9f5a8cecbab5bd861e3c
SHA1fa5e19cb00fbfa5f389f895c3a07d86e0ce279c8
SHA2562a74ead48c057e6f25524b72b17b4cfbc79c7874494f7c8288352fda1b97d75b
SHA512f474a12a0a2f21a5c9b813800be9fee90d8af6d5aeae8fbfd5ebd8b815b7740e4369a387757238fb197f3f30c4ad66e8a270bce97303c0c60b5d80ea494d5c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c42a056f814e90d894931f8ebe7cf3
SHA1833b568da049ef5a026b3eb52dd78dda4cb47717
SHA256c233bdddcc754f49516f7d12c815be3f6c6ea6c9ac78b24e305b2bfb73da6302
SHA512ce29bd6ecde755e0123bf133804be3c1467268b858cb58e3968614c32ef7f49e3cc67b590ed3adfec7c6ec712b1c7b646cb4efa15e54fa9d77563a6ce3108e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d95d69faadcf325ed2d3e4e53b27ebe
SHA1f43cd7fda8c116bf52a7adb7b14497ba5d363f4f
SHA256cb4108601810404fecd766220677be835d0d08a9171e467769cdf6f5eb2e4ff3
SHA512b8f667609d8c2a91a80997572601c0a3d0b8e2782ac89b030f3a9833c5b3f72f4973279d0d07e264224ee9fd5e29e7248ee054d73540a5b2bc90928087834182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fe3771f36188d10274beb204a664cb1
SHA1da16f23cda9da4d69964be8e36473f902e3eb3b5
SHA256f48ec64fdf484a34bc091c06017dc540f41298f4d0ddeaef1bbae753d14437ce
SHA5123f8a1a047d9e10143c9ce41348140b82e95764ec1619ea58270f5d14277caecc510f6ca4ec016c6d2b75e4b8f465d005d25fb78a71b250f1d45f00cf8e8fd414
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b