Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
e1f40fc1531e69730007c8c940dcbce2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f40fc1531e69730007c8c940dcbce2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1f40fc1531e69730007c8c940dcbce2_JaffaCakes118.html
-
Size
1KB
-
MD5
e1f40fc1531e69730007c8c940dcbce2
-
SHA1
812b982b8a2945f8d13979841f1a127a5c44ec7b
-
SHA256
4135d026ec0c0e0eb1aa4e5d27b65a879fa2736d2b4be34fe371330309647654
-
SHA512
f63b92f59fbefa2670d7318d69940c67191a5e1365fe116459f75e433c977a4f60e05de64fcc27c408bdff6c8a8f9d1e122408fca17f655212989e2ed86e95a1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91825BF1-7331-11EF-BB31-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000285511ac3ee3f48373974224b1e1af301eef77f97b43328a7e1f7cfe5203ad87000000000e800000000200002000000001a749a96afa0f02f9380e538c0e3ca5243dff5eefc60aa3b7d5e9704f32cac32000000008fe26eafa2723037a449c3fe2756530ac2f2ba2983c5c4000b46d19f47339a24000000021fe625443e04d0fec586be675a08654ef3e23f26d946d01336a59c3a64c32cb08ff005d50742ce9dc220223dd527087ef4b3d444b5fc9f5e0976f8445aaa80e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b239683e07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432546088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1500 2336 iexplore.exe 31 PID 2336 wrote to memory of 1500 2336 iexplore.exe 31 PID 2336 wrote to memory of 1500 2336 iexplore.exe 31 PID 2336 wrote to memory of 1500 2336 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1f40fc1531e69730007c8c940dcbce2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae83e02f4ac8dbef4ee371ede8c4cc3
SHA18a5d1dae0f7a87c5ce73e72bf69118c24ea4f6ca
SHA256dc1796efedb89f1920f801ce51e0b3e435a848f5928f27914ab6b48df5b585dc
SHA512eb6dffd14512b27e909d20bb14e189c3962001610b5d333c8d1db239af270226b69b2515e06e2443acac4e478a014add6428471d543b664b51405c1c44fddb72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fe3c9d69abc351ae57d9e6856cfc4f
SHA103f9285cd509b10f140ee720af9ec3a860f0eeb7
SHA256b5ab1a2530fe08ea3f20a4c8199af73a6d7f8ca5f5aca7978c92bb8d0f2b3d06
SHA512ca7d7908dd14daf31298b2ccca43f06fb40d0a8a29ea3a62276e23bba7ddbe6e9c9845553dd8469c727331367844d16c26945817abd90c9ede615a5ad8564ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3037df3046c7fb031222a5f46fa39ed
SHA187f29d8904c96c08a90e1bc25fe700e0a3fce498
SHA25632156d46e9257672985f54a4c805a59a7f3bfc16d4a21a385f052fe8f505e5c2
SHA512ba6c7912fc456388711427d3ab720c6562341d8928ede7f34c5ec31f70e6a15cddcc3ab3bfd34c0f0d2ed72c7e2e23ab35eabda352a167a3c409ecc7e8541f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b31409242bfecdef018708f2c51cf1
SHA18fd131db98215d8aeca95f1e7703abefdb9fa7cb
SHA2566f71932ff9af9b668d8545328e245c4da6d5d8e63e2a3da05590ebb0a3c9aa3b
SHA5122b70893609c89c058a6dfdc381fd923f8f94c9147ad731d3d1970063b8f336ff5bb57d8b6e5baf8b49663e27bfaaf4bf064a8d107fca2692470c531c8de2057f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbdbc07d6120da986e3871c8fa8bed7
SHA17231ccabc8da73270232de5a818b9180ac7cad36
SHA256df4175d12e7164293321acb14ce5fa5022d3e92b1dc3ff7d4d68f78aad4e1fbe
SHA512a25f3ff2e1dc939347075452f8c801e6c3f7e5e150a8b09aa84856fafdfbfae4f34f97cb164bf9d9096f9264ef4fce2596705dce0248e3be6e79aa57872720a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a24041e1ab34771360a7f144a46036
SHA1f5ea0b2ad447c581d006e1f7b35a938c17d4e465
SHA256350de79ff8f8d0802a1b156fbce52da40c7f5ed133183eddcc15c605a53ecebd
SHA5124439e05178f43c87d0cdb2020f45844851657776e6862258f06cce0ec188f72ae00731117415edd5e3fa6330285d36ed962a9cc5515db89b7ff40a9520d79493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ad300ca48caafd9398fefc50a534c7
SHA1977e0aed2246e16ccb50834780bf87e9178557fe
SHA256cef1944316993a7f94b9b6b9804d73f5dc91309ea8b49928c30050d37c011e52
SHA512e8e8b5d4918210d2d68a9ae24b570fa9e0cbe257bade914061dbd7e85541d047646e017b709c7c490d759f58e2a7be492a88ae57b9fcfeed4c7854a546c3681b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514db12c48410f286a67d311f7c220c3b
SHA1b403958e0f1d9e5f54b49ab3f0a96c90a4916ec1
SHA256128c5d972f5e3d93c7daa8e99025b3813af319fd4155963a2828becb45f038d7
SHA512a39ed35f3bc6b0242420892c70e3cebf26f76da59b362582db6812c64b6e44b147bbd19b0a86f0fc7480e0f21e6eb7e4d5825d4eb0dd6a1100626e77a83b18c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a869abeb834179ef61cd78de3ea9a96c
SHA10d68c76b6f80e96d222d96e61906c4c8dd46a206
SHA2564a39c9d13882813c7a1e65fc01f58aac79ef52c045b998ce70c8e3fe816704ff
SHA512635e7bd0f3ab8ce725d669c19353a62f535449ab4c6789dfedb1bcdfe2499f80c2eaf6797bac32326c2bbba4258392f4827541f8a7473af2046e047563ad3e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50e3c4f29de0234af1dc761917a15d0
SHA19ea4fa1b71dc3ed9cca1cb15ad33d3ca02e81406
SHA256f518100fc7845c9dbca7a6b0975cd35ac249cb326be86384af263fa6fd04de2d
SHA5121cca858666990a81acc523b7dc417f17c0a3f171e965def537e4a7062d143bc23daa44b2b94c4b619d63da291f5c3836e8490d019f0ecfb99f624ed1f4e7e74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac64b83ace85e31f18846457fb235bb
SHA171f0cd965254f3231454b20a5499a29178a7ca08
SHA256e7986923d045b60a7c76117731b16240a916abd15f785a78b122016270c46719
SHA51202e050d562be24280501e488675822dd80238616a4959834fc3f59cdc4ba77e2f9e661b5cd957b54e448da40c4fd5ac6697f3ab2ad319cc4f5c5696ac349405e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580630557a219b691c748cc604e65567
SHA12d351fcc0de39a00a4140c52c471fb1cbcedfe59
SHA2560696398fe64f757be7338611ed8e177f464ce09a0b1d3ca3bacf1765e928e00e
SHA512c98b3d5e6657ef7458f0299a4322cff8039b46ecc8e567b0e5fa9590fb9647e4771d616dabac71796820a9a71173f44eb68be334fc3793fdb23aec5abdb74b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b26cbe193e6dcdf7eb3c9afc1cf26e3
SHA168397a45256bc5207ccc95a272c26ba816123fd7
SHA2561310f2d95996174bf37a3f224df54f71f116e8002af85e5c485ee553e571755c
SHA512492e7180489fa1e0e6f101206d2a7ec0d9e5fa12d6e3aa8898e80cb424bf558818f35201e11b045e03ed131a989336cba826959b4ca3e01f598e24651a4dc45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e04a3d1712d74d124e8472f10e0e3696
SHA10256a18f71062f513fb678fdcbdff2d439d2e97f
SHA256a868161952781c14b15eb6093e9501f5ad2a3a7a47982b4c0b72877fededeb34
SHA512ac64abaa13448b876d08b38b4f8c8107bd8a35c3d8cb67aadccbcdd58a86165ae9f913684912531337ef58e16f2a20a5b3d43ceae99dacd81f2096c5d3f60983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b4b859eccc49704681b6c8b5414322
SHA18476dfbe2f1f526d5fb207465a662716e9e7805b
SHA256269b0ec5e90145395d9fbb48c17e23e95d0cf4bf5daa58441ccd7bccae14c453
SHA512f64c80b153c49255ab5cadf552d5e48501e0edf96c10e585bee64e206ce9123faefe95ff6cf699818cc1893ee927b0b672b61e3441a6aba273f17af717f70a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60e74f26248c0eb089949dee29275fe
SHA1438a18fafba138e2ea1ea610dbaf57c47e9b780a
SHA256dc4d84cef916e73e4fc5f8af809898434086a8a39b1ff283619d320a7cb0cd9d
SHA51278089975e1755e398d8648c8c348ca589bebbad682562b1731b54f71eb0fcfca63e39e42515ddd5f3012cc54310cc0d5bceb6724669041d9b2f7d769ec69f9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500710af60b74a50c0123c41dfdd7ca31
SHA1c2ffd54de20b293092f9931477fac997eca04eac
SHA256799ddcbdf5b88e457aeab4fb1378440b865f05467cf2f1040544fdc5ff2e7742
SHA512729c4787a761771319568d2bcc2c80ba1529ef541e8f863a1aeff943b3477cfcf8dce99ce0c06de8e80223cf7e7208a80571a00791bd66523f6ee6ca15b022a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3c1ad1e5b25a5a48c95ae62d4437cf
SHA15aa20d54cdf938440c4ef5fd7aa0b97d9f69c0bc
SHA256dd11265283c3a58f143e7cce304f8430ac11611c2ffdfe94887be3874a5f26ce
SHA51271b762f92676e20a3c626c6f28ad0d3875aa256d012e85395f91504032c03588ff7a56ae58a70e143f0f4af7df659a8bdf73f4fa4a4d4cdfe6d1a21b3e1a9d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553dc7fae0f5f39d02e451790870c8a19
SHA121113414aae3eb9cce8ea0c8103ebaa1bdc18293
SHA2567e7c417ac877ce08bfb68f8e5e87e2df89528ae73cbafe84a039f65315ead591
SHA512a57be4a712a8abc4fd395a8a96c91b7b97cab48f424ac8c56a15a4b439f2f5d638085e64e5ea09452d75b51832723e2ff85c6479e387505c544a7defb68246af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b