Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
e1fdd05a0acb6cad42115ef6b0354e1a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1fdd05a0acb6cad42115ef6b0354e1a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1fdd05a0acb6cad42115ef6b0354e1a_JaffaCakes118.html
-
Size
18KB
-
MD5
e1fdd05a0acb6cad42115ef6b0354e1a
-
SHA1
15530f6d37169fb99f6db0bc815308edd322b91e
-
SHA256
2e6c5942fca599b585541d6e28a4f9d7ce42e1a3b4f810f5e0055e007184eed3
-
SHA512
8f7c56acf1895be16ee9e7a9a9b638b4e8c891f95f59004a290cf23c8b588a48f302de93beda62fdf4b2dce58522d343d5f5be494efef4bbc0a82d3e1a2c459f
-
SSDEEP
192:DkT6ExVEMitnzfy9Qmtd8Gq1t0wzpg0wF92oNTZicvP3:oTUzfXISGQ0Hh95R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c988f64107db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000006442ade320676d962d2144710c6fcc10d6c050cedec969cb7b0374b744cb5d9a000000000e80000000020000200000005f0dc4c47c00cc1b718329d428c208e65bb7f122939eaa6ba88e74655afcf46320000000ee6a2a90515dc98bb58e998734bffc82cfebc974617809bad4bcde06eb29762d400000005da5de626160afe377216c397bc292aedc3f2fe38885a29f77ff1e5f95286aa737c186ee977d52e866fa026604be770dae3c6c7c6ceb89fa168686c318f78361 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432547619" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22046121-7335-11EF-A528-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2820 2472 iexplore.exe 30 PID 2472 wrote to memory of 2820 2472 iexplore.exe 30 PID 2472 wrote to memory of 2820 2472 iexplore.exe 30 PID 2472 wrote to memory of 2820 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1fdd05a0acb6cad42115ef6b0354e1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5266380cff3f13dc6d596fd51013f4076
SHA1f47236d3b6d8a8ba8682b1ca16522a9bb8f49171
SHA256521fcd8b1bec8f2bc8f262fbb3c32f8f47d8be0d2716b6cdc8d1311202c07269
SHA5129bfe34bcc04cf9f05c5986b51306302988b006ef34b218dff8682b66338c6dab2380c3e3c700e892d175c4aaf403e436106fef316eae7771d677d777601612c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b56174bf7177f9c83d331d4657ef5e
SHA16bef30747ed413a7d481c556f48d628ce5ec2236
SHA2563d9d02607d41e5ea414526d453804c58a6441d0de6d67c8ddf4ed6f8621041c5
SHA512821c35f9fb7e8e611def13f5ac5b09c4ccbcac59baf5d31b420226308accdf8152bb4885d382eaa8f2fb299b495ab6814387be37cdd9cf519bf0a736a8ab2f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202cf2500acb8add37977ab45c5fa92c
SHA174072d65f313aae3301101a83dc9e18bb6323965
SHA256a41e1b0a243066696aa5167abffae4d1c280d11da9c36e0f0bc08d1c272a2578
SHA512d3be2c3dccf6a9bb0bef052b9fcf7430c43034f70a3bf30210bdb50033648fe0dfce1a2826a23cf530eba884ca6a9ca726f0f49a4e041a77db67c16935964c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56463f3bbe9a6e995bfff607276f786bc
SHA1fc196ed91336949fce85d047654cd6912154b279
SHA256d5c7d1c3a4f57ffacd9fce9c40fc4953fb62ea744ab9c268b6d5617e38c2dae9
SHA5121320fc491a0cf912c4a6e0dd053a075291cdacff15420636e049ee1f5c0e9d72f8ded3bbe4526dbc476c9dc5d06d4ee312e796e970bd051bf19aab96ce9beac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa38977954b4a57f568a68e86ad5e29
SHA17424f3a7de581dd0ec82fdf65721961279603faf
SHA256c5e14bc39b0989015ad3131eab453a5d2a9012eb32b5889681443c84d66009dc
SHA512514aaa0344b829aaf399f9e8f10c5cb67f388488a219086e705b115420030a9ec43c9402c916767635d3c472a497c329d4c031a31b7c6c74ec779d1840094738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5c2ec937775a1fa9df44ad1fd9b447
SHA1ade12a658439068597cf9c0090ff7ac05040b9b4
SHA256711e601760ff906408cf621994aea4965675f186411beffb8ca57462ea23f630
SHA5120941f1f07f0205c15569a167b281b7f30c69c1b0740c920f92e17099a5e3377f2d251df5ba6861b041ca186a1332094d27e320d10d06d9d7f934e1a638b65e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f0fd5a150dd943a14efa1e11a649a6
SHA170352b0db6df13b96db63ae2bb2919d13f15e9a6
SHA25675e08c8d02ec13e06d786083789971f7bcff5096a9322320f44ac72ba0150cb7
SHA51285973c2945061f7d7ad358f469af1743a818a3dc129c1246674910b03e05bf664c0b682a2e5ac76e8077759a065bfff3c0fb813c8af7f764178070f08542a50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc5b8832d5c19ee289fbd8e428bbe00
SHA1398f27699aba0d77d6f761e6017d549b08a91d21
SHA25685510223d390c9693922f9cb78e3be9f2013664dd4ec863cd0d6a06c18e89efb
SHA512773066e4dd2beecf66e91f2fff241348ee951b1ec17f84aad7abede15f941c3d0eef65132c2f7deb79517dd6b2f14a1cda292abbb4fd42b00846dbc7bf2e8d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b7bfc1ace228a429b092f7ef703f7f
SHA1a6f4eeb1053fb424db00aec5866eca6d2694e096
SHA25638b9d7cd9c8208787dfbbfc891cbf7b4e53b4b73df853003b3bf4b9ab0e7a79e
SHA512af3bc7e577057814673a6b09a0f2b3e7053c9c2abae9674478db0628731c478bb073d13b317ad958a94000bb1e17669031029721f9838f5ce6a1f450c8cf54fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09be60b90d6542a93ff494b2938e106
SHA1a8f5e9e0f6d8bb59ea74a884b27a0d4e19c84670
SHA25627eb335af2fc1c12f1b9a93ba87da3f4c1c813e622bcfafc66ef9ee8b4c617c9
SHA512b22e030a8005605ac4ee187ba97403f7e239e98b83077f546f1660793c7bcb29cb1896353d3fb2ecd362fc7c2ac627256d0a1260875358c287e568ca79ad9715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58998ac7543cbeff248086823e1fe435c
SHA1a7e67e0067f2f778c74f681b822afc5877bbc0c2
SHA2561ea5107f36f49260ed06142d3553acd34bb4fc8c06044a9e33f927a870e222a0
SHA512ea103216a4d9874060f9ea2bb53053b60056b27b7f6d843b05c38ed5024103218389349a9ad20682c77e83168ca8d48a565d980b0fea2cd0b157140e2fa64d08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598189b304a670d675289020ac7bc0fdf
SHA1d8f127d7940666531767b1ee08cd861f4e6bbd35
SHA256ccb0f573bcb82f4ee3fd264666fab4db280aea790126969e6cf5ab64a816a743
SHA512e058dda3722b1fae662e8f72abbcb09f831f401389e4edb89b51318a1b3b56ead11a530d21cdc4b3bfa7373426014ddc1207a1ea37a7d3f4113e240eee53094f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ade09348e8741b009e7c0237e1c81b
SHA14287a5840313baee76b4d6d9e79f0f3d8b22a9ae
SHA256c210f6648eeb3dbe49f0b2c38ccb3f91fbc93c76f01e3e40827ef6939c8867f0
SHA512286796254e9c6589a157066594a18b529e2709b2efb9e0405fb61f8c3c4adfdfede397bc950800547aa8b8c3338186c285fd5d0c94059fa5c086a7a7c8f744af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df3df99f6273067495885bd45abea3e
SHA1ed7f076c2fe50dd5ead16ca590fd4fb2283c00ba
SHA25674dc4089d3606b1f55d52788f1251261bd0d13706cd1d452afba5e4140e34925
SHA5128038bde6c66d659d60fe738f30b8278579672328888dd18edadf0896c90585cc394647fba60fc8ddb93b985bd2c0a53df810fafc013e4dab09481b327b6a4d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32bcfbb73d8d21a8ace051e00b9df08
SHA1829ac40ba85d0e03c1f1bf439d150add5924afa1
SHA2560f21a8d521a51df51ac9a859c2f2bc7ed17cffb353cd408048c8f6415c6072ae
SHA5129cb894ef54d720d12c524e5c9dc20883faa43f8663c8a67f8d3fd221e72b1a9bd9a054527a6efb66764743dbd816e28a19268da6bf09a8e59d8f64de37725454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f14dd87ff09fae9c3670c4ac65de64c
SHA1f7dad452c591a031264819f6aa3355dddae68f76
SHA256c442f8cd22cfa413617b1e6d31e4de2fc4907f1d2daf0536239a5c1d2487ebbf
SHA512e3a47537abc6359f72f77e47fedf181c64dc9661c15aad0a9d3c636ec27f693ce3be7d6a4e3bbd14ac3b96d18a927d5cb627f642405a7a2407d4bd0d35e60c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b37ab516c6d1bf41be79540cc7478eb
SHA172109497cd4753cae052bfb9074a7f8186e4d043
SHA256904ce7b081935eac89ee4825645cb81a1f29f74df524b67d64c19002355bf39c
SHA5129313eb8d584224a16109969845de58a20309a2d1d31ce7c897fa23a018a0f90994d1e6def829d706bf00b1838e3555246159cc74d702f51267e6085d46781852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b0dc8fffa32d5c31c4163eb6633111
SHA16e5297c764d3d410b7b9f3cb5a8504150fa58d85
SHA2564f00f1a7de55e0985f16a761670309d0c559daf1c50b4df67cc09869314aa50a
SHA5127b1d98c601eb622d3dac5152b5c37ac67a83da81e2b31111f6c6fa8a1e6b6c340dd28b582d317317640d4fc7e335c2e9242643f91d102e98ab1d55207643f481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca10aef560b797e6c4675348feb7750
SHA1ccba3227f5a6f45f4fb691956b87d0d25d514f3b
SHA2569bf1922c0d121725ddab9453898e7841049ad40223bf5b40ec276df9f7e410d3
SHA5120b4bb5a0cce8f1d024a2f6e365ce1afe6527cd0427d0e6ee5bd4a6a1677b380b591ac6d643cd90baffccf0f439576a76ffe8e1d40ceb6890305d6d83011bb040
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b