Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
e1fdcbddbbe8112617e78df89f99c58a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1fdcbddbbe8112617e78df89f99c58a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1fdcbddbbe8112617e78df89f99c58a_JaffaCakes118.html
-
Size
23KB
-
MD5
e1fdcbddbbe8112617e78df89f99c58a
-
SHA1
b25d8c57f46f8607b3e5a80ad88ddda467c98d81
-
SHA256
71256320d4d883c6d3ea5412dbff574dccd3213cf83139c2a69d7da1ffce8142
-
SHA512
709fd9dbadc3218ac32e63c234ef77b181d122ed556851c6224869846ce1e02bef7a695c05850b49a683626545479b1855c14d9fdb57d5ec7ce6b767b9017d40
-
SSDEEP
192:uwN0mzHDdQrFrb5nkfIeIUFYd9RMvDpnQjxn5Q/WvnQieyaNnNE6nQOkEntoD3AU:EQ/q+Tu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432547622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005b21707295ecaa8b7d9246e3ea6eeefae16057f30d577b3964769d3f29e63916000000000e8000000002000020000000855f506f856a7fde9f7fc1f5b0161f19d3ef637cf84a6e1beb5e9f670c6d4417200000003c6b73ad3ca96ccf3d1f3e16d2c7d2eb47abcd47a1f3daad9f41b84671e32b0440000000a41a46879ad2e20737be4f7012700bf8941fc5c68f9715aaf0e1b618324c0f49c2f1fde67a79b7f91b4ad647a3ca54f7043cda32e3c9da33ca74048bffd8ab44 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c8fef74107db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22A972F1-7335-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2280 1972 iexplore.exe 29 PID 1972 wrote to memory of 2280 1972 iexplore.exe 29 PID 1972 wrote to memory of 2280 1972 iexplore.exe 29 PID 1972 wrote to memory of 2280 1972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1fdcbddbbe8112617e78df89f99c58a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0c13a0bb881805cb4f2115a4b906b4
SHA17b8176811bfd51487a3270fe443eaf45a60c5cf2
SHA256176be16013f15e079f124056656c4951106ea2574c11bf3301a44a9a8a587d5f
SHA512da1dd6a832adec2d62835fc0f513df30184a38e6368651fff644aa4bf15de737ebff068ee0b1878ea6034b13a2e18fcb4c489ffb99319617430c18a665d96158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af33aa5faa1e4363b297f508bcdced2c
SHA1379a9c5a9fb677a82b367cd73a350c4183203f8d
SHA256815e78ee525b1e05d39470814cf4691679a3b59ff1266e66bf99e8646b19b903
SHA512031d48f28214774f385e7e5cf24b3a06e10d3c04d0b07904dcf6bff8c94544a66f33e2f7163a8863a9c5a7785a27732a52d3b34db832db329328dac81ab47fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35dd4de5fa33355fed0506c09f1f676
SHA131815a4d602f97feb2c92c365ed3b7a025bf67ff
SHA256c3ba1004bd3427adbbe7b7d79d1410464d7eb32fbe03b411c7e27ba4ea1da702
SHA512ee6abffb4257cd8ae9af8fc753d8cd845376c1484d8b8ca7d296a671d7aec6cd73b7cf2bce56cb047a58404262129d488c4be86d8b74eaf0644c31fe464d5f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddacff5d89c81e2ae0bcb834c119977b
SHA13e73438918b7b699802af992c6ea5ee829366d65
SHA256ebe7fa1f1a6f75daec27624d53c7990fbda2624716d2a80696fd6477226834d6
SHA51214a976674f446bc5f94b0a7243335b110cd794eb57d9b31e08099dc19bd495ad4166dadb90feef9b0d7ce1c8bc7256a006764df893fdf37bc2d35cb7d4a750f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a12920743d3cf32fbb40b2cb943dce
SHA1875f055f3f9476d9644e12fafd6ffd1797d00d40
SHA256a2f6d33afd9c396fd70a3a27f57ab1652be2793e3bd8947d445575ab9a566017
SHA512b29d98e70194a6e1fe69c6c44a3b2d15598d8927fa152c6a021fbac56a7259e5ef9f2c527d5b1af34148c01b055c1138959e835bfbba620d7ca9a86785b7ffee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476daee80d0e0139a63c0f3a7ab64903
SHA18414921ea678278b6e55debb46041cb7b02c2472
SHA256d94f81e73344a6d09f370e510b323c2c80aa41ea33bca480aedb64b215b2a855
SHA512e6d0ba3057c5e8310be9695141dafe66fd6f4b812e5f72b628a23ae4b4b4c41ab538833df85dc882d511fedc9a6534ea604342dbc014b78741a3b9ea78b03923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364919349411b0375ac60cfafa914bc9
SHA1f775f4a9736a0a74b7230b222dcc474124d5e1cd
SHA2569519a1ae77d03587b1783818943f4c40bd4d5b37110fe050b61e6e970d78abd9
SHA5125762842c6ccd46d47b6bbdebc0c81f0fb9f8c36b64aed08b93839dc8428b9ed36cccdcdac128fe7155645f589513d76ddcbde8e7c2f76a6252ba4cd4aeabe48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fead149a2db231d1bab64686c25f93ab
SHA11164903c276ec6fd782515de27877dc0df579e63
SHA256c7d2d066a60750e41eabbd533ea25a322ff1ddd96984e73a4fc63984184fa41a
SHA51281cf68ac43589c159a06f712028c1b8ed659d07c5e127efa8880bce9b1a0affbe16db1d91160da19f54d0872b49214f5c19ac909474ba5523208cfe983f214b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823bd73e7ecea5b4a1c791f32ad70391
SHA11e8717cd10b6126cdb70aaa1b25109193573d090
SHA256c7af6c66cef46ff943e2c58d2758d688af0a15b8ab13d10a563221cb06eed40c
SHA5122dc6c543e26df434fa5a189a588bfbcde21ee146d56351c107d67b7fe18bbf09ee2ad6fea9bbc01347839001ed5ede754057d69420b61936236ec3c3d226c733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c754b2821d54abace81fca81ea5b2d86
SHA165deeaeb3f4cdbce267159fd7b0b5deb7aef2758
SHA25698328aebe8ed00e747e6dae5a4a9e4158e758ac792cabe21e79eb44cfeb9fb9f
SHA512207292c6ea18316fc459ba2b8c20d36a9a5bb002c523aacfffdd59d2d6adb1fd0e97c31f75188ebe32939e84b3b2a39f955f7dd7ef30476ccaf9ef30f2605884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddca6c8bf8f60cccb2ed70f100554fd
SHA18e9c3dcae687ce3a04b494ac6bdb23d55e1fb34c
SHA25617b0b4eb57f8bcf12c8eb3f27d4e6a7b14671c74742796e0e028022a46f15854
SHA512dd5675cfbf2e90e34fa71a3bd2a41774566a34924b9606e0676fc4ffc6b6ef681d4251c743f61b8dc8d2972f0754c6d8519cb450bc12f616375612d9fde7533a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fee76ce5ce00fd46feb6ad1fc77bfc
SHA1950c2a3bb38308dd15438b6a478142f8f49c4d31
SHA256086aa2b7607ce9b772f159ac986ba4641b5dff426e77b7684510c1ec762e569b
SHA512727e7f685fe71094467e47eb2f98f50cf67332dd4bb80b53cf968b7c63ca7749831d2cb5341f6e5c207e7321d74756f7b8d060114d8ad176f58d0706228a3123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58ae5bcfa3f63f3621cb705818fe91e
SHA1de926e3c3dca67c0217de1f8ebce30a91977da01
SHA256b73c1a00967e5f3eeeb6de152f25e8c72b0ee3377914be1b5d0d657163406ac2
SHA5125f0b1146d1e08fbb7edac54d56139f99e581df7498e0c7b346738f16a6940c5159a18e13a1051e5378de4293cb11cda1ab1e1a512044275c7da762086ccd5553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb12218111879b171449d453268223d
SHA1de474773d4e58d59beb6be291f41e749277d9905
SHA2562eead4d2e071be9770d1bae77634a5bb14846cc145686abf4adef9ef0805f575
SHA512d2855bc7f060eba60dae5a21dfa837cf3eec8c3fec9fd3bc6b283f25b7aece3c3c09565365056b33968fb09c44f322f36b7acb58d011b55188751154555d42bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ac617bff14e39a2c3d58e0c4485e62
SHA190e9f3966e32d1d17ac26370e4f82bd8a3b016db
SHA256d60c5d05f28a5d4050d50a470d3fcc59760b6112e6b6a9cd3b1573b7cf174a1a
SHA512ce1616a37d036c649f4df55f857a806adff1f0de45edbbf87a7db2253b62929887958b984da34b5e0eaa03e70d8666a83a2687d7dee88efa3a8d2b4b7daedc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90edb9c6239db1762fb7d23b746e663
SHA183c59c07c37733a6753b1a3c5c4951891b8ca24a
SHA256a861f11234f5c17bcbbf3e2fd19297157b9351fd223f3c0ed5c4d76ce20a7eb6
SHA5120f8561062c84abf07ea6dc23ecf9c025ccd29161b5cb39f4d616b934a5d3fb4dc926b91d99172bebd16698a1ef0ee63eaf2b6213f5aa7362f84f3edbe4f3119c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ee7c55e65c9d47ef2c2efc371f99d7
SHA115dcaddfd14e8c9788d971b63f19760e68ff9149
SHA2568e498583691b3b85932e04491d2b571cd5f9b33b181476d672836b6ac27dc4d8
SHA5126a5f3c10375cfd08f0d690e28579abedb7cf9e923c53e20848f097cdc578a161f9f2f5118bbdcadae8afb58f67ebbf4ea588b3e96df40c97fe8f8603a8bf5891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae784bcd4921bb91dd44a9fd85a9bef
SHA1502714acd45db1c3ac451114507dc890d9371eb9
SHA256bdc96a6a28c4c22527f3df268e5bdd964154dbbf54e1bf8daacf3bb25be9c800
SHA512f1a3619fa6a875e0d782894bc03a4a6f1daa072e6acb77fcd17feceddd26e2f027a5d4142dfa8e75ce10207613c983aef45d743c82cacd8ac31c24498b5cd891
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b