Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
e205d060ea9253e09e946f115c6a5bb6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e205d060ea9253e09e946f115c6a5bb6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e205d060ea9253e09e946f115c6a5bb6_JaffaCakes118.html
-
Size
70KB
-
MD5
e205d060ea9253e09e946f115c6a5bb6
-
SHA1
c3b443c0b00005f04363f4293dc46c66d3aeb8e0
-
SHA256
cafb2d7e3d9a26f22e7f0598d906c019f38f97ef5f5fbf21994aa050d194a4ee
-
SHA512
7ceb0607aa976425d8cf270752b5b4b82829a0df8e6c941e19bd5ceed0f1105fad3b141b41db9895bdc1b5f3680f45c5f8f047d0f1d856e39655f7e295b80497
-
SSDEEP
768:JiN3gcMWR3sI2PDDnd0g6sz+oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8sM:JPtTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432548758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0072d99f4407db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000acaf86577ea5ddde68ea2cd3dd93c7afab82cf727b94202bdf7cc4e96ed118a8000000000e80000000020000200000007e1af2e3451977391cc72e06d986678c5b30eba090e0e75c07b3148539fc2ab6200000006c8c69663dafe88d104b65ba06ae8ccc44bead9d9c34294e72355d257c70eefe40000000a09959a7f9368c80efc529f02cb8e9fd80d693724737f4bb9ce3ea3298996d443c2cded51acf6cac20cd191e88142ce1eec9efe92f095b7dea7b116ddb3b1c22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9874E11-7337-11EF-9630-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1664 1620 iexplore.exe 30 PID 1620 wrote to memory of 1664 1620 iexplore.exe 30 PID 1620 wrote to memory of 1664 1620 iexplore.exe 30 PID 1620 wrote to memory of 1664 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e205d060ea9253e09e946f115c6a5bb6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a2e39321efa58ce0307bc507bed976
SHA1e5e378a951d285fe422029e1f4d3ef1fcbf22454
SHA25667aabb0d05441615cf45a5f7e87471d79233c81a2678486df8aa5e0026ce9b6f
SHA512d3decf3a43ae2c8e9439740015aa23e39f68d400c3747b8016bd4dcbfb882c55dcd037da89facc2947ef8e2527b3fa4b606d28ed165b41cb6fddfdc413525ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dd0aaa71d6eeb51169bfc66315c92ce
SHA130bc6ae9cbb7e54ff233f93104ea547c66ecc9e0
SHA2566cdecb80836d8ce8dc0edb7bed0db31748bc08f76cfbec932d5b632d9b54ee22
SHA5125beea319a33b376d05e076bc40f925a8231bb308aa05d055c0fb13da3e1e28375fc99432d520de77105c309f556ce82d15ffaa822de8bb066bec2797a8252641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1aae0c62cbb109160242fa732405a4
SHA10e51c2d2d9cdc6d01a1561fd935aa5e249d96542
SHA25664278e7a571a9eb78ca53b6300cfbaac4d8cc56464fb9948a742d3b77f869610
SHA51212f22913113690986012c241aeb4c392e5b52fa943971a3eb3dfdad0272ba4910f72fb75c172fd766abdc57d4b76efe31c30a7b370c8e844ddfb29fd70486912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f9c114f33b9a515f8291b6b7d499b4
SHA18fecd72dcb1d78d71424388862dddba19476413a
SHA256b807d9d1bd9bee9b6e6e755da8b21d8671a058a0bc89e2fac56661f99d8f1a64
SHA5122a91bab27558f6ad12011784d12e9bfdb2f61880a5a5d3ea83b1eae89e234190fe3978e41eb49ea7dac0d5ca68f1f68fb9ffdb7cbb36989bb92f2227806884f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a087506e1cb7c5b830326f752de037
SHA16632f639c3d3ebe30bcb8f035abe1ce5aa9bcdfb
SHA256b53bb1896d36cfec4fd50154df581325865997c04e95791d3f863936e817b58e
SHA512c516acb5eeb2f2fcf921df7c268f50d8ed78821f192e86fd6b2aa06ee60ab8793e1b1368db208e3d1cc939c986856d39c3ed8055dfa9621b6b40e119e5e7c58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76d96e980440a47b93af0bd1e88721e
SHA12d2ec1edaf7a0509a52c4b9f6bf2263468afa8e5
SHA25691a22a3c38b1b04293b514890f58c851f16c3b2cff084dc137f67bc090b3c138
SHA512f7cb305509c8e6af10794ff40e6abe17b8b054b90a111677b38c83c6f1ff38cc42dcb40214e403280b14dfc2296b2c5b64897a987e4d1e58d47132200f276e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd58e95c8b9a2034c78e77d8a8c97998
SHA1fbfd1f8aba590e544260730a0308fed804c4c407
SHA256f861c3c41f547346cb981f62169f3ca68aea116fbb5090718f978f2d2024426e
SHA512eabd311a246076e351b048a5eca042bf82259a442d57d6765958a9cd652b7c0a79a3ade55ee2ec71692894dd171bd723c4e63e1e1b3052df1c4d34b4f1d798fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f49edfb92e20d9007f6cd91a581fda4
SHA180e2a539aa715be3872973e53453baf6fe1cb683
SHA256f2d4654357d4f15e065d105a70dbfb142f7b90ce8f8ca1d595effaaa040b983a
SHA512851fe06b7306831e3f00d263899b539b0ff316d3fdfaaaa55c1ad8cf311055bead91e618c7b7ea2ef1ddf5621337ad732f19baeaafbf645959e2b6e2b9e1d7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574cdb0d9ac79b7a5c615cd37e293c0b5
SHA15ed48137ddcfb237e6d88297db887749669752d1
SHA2560ac79364c26d3bdba09d47b551c0677f42cc4ed69ebd378cdb504949c01ca9b5
SHA512455cb20c7e5bf2e9e4fba62cbeb889da5b131f4de280628db91af7fae9c6a3900a02f1f33dd73b2d65fd0766e59f4fd051dbdd808c8e29186feb72954bdd461c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c95337e4c93d38e5e79d303137e2190
SHA161c91010046c21a917b623cc66b89847df6a5975
SHA256e5c7badd9800dde9e1e7f4aab8972d424d11ec4db46f18cdd5ff8079aaf103ae
SHA51286d93a7d21e3a5413e819adeaa0e626178c7b0b9227be46971f6bb9bbd8600ef8ec2923cd1d0da3b8f88424299c992151df6a90e7da133d54dac958f2307c4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d07c9cc5b619c5cb151ac5fc79718c4
SHA10be923b798772c89b630cf41fef36153049c23e6
SHA2568867b6582ecc3f5c1d7ca6cc6c4551504607949cdf150ae3c2337e078b40382b
SHA512834cc43f4125d0360eee21027c1246d78c5eeb6bc01191fba41ed8f074c39448177421cbaf5832a0ba04a6beabade6ef7f01ee6c2aa4930d19c278ad668e14d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db33a64ab3850b507fcce673d337141
SHA1a07316c43bdc9be373948706aec172ffa3071a21
SHA25659476d862641acfade34dc76b0c6dc5d69e58cec03dfef9ee0f8d1a1168b7fae
SHA51238a5f3faa1e36f1aceb1eb46be921ee5c686f0b4f9b273f45ab906c95c4b019c07e0aae2de1b21b2cfe71f0e4dc045dc830bac774021679bbe6d9253c0afd098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645a7d6826f2461aadeced02f54be75d
SHA152af8bc0504c652605e9032088d0abf237612da2
SHA256026299c36d8e614af5f6967071b60b834d71ada1ba7dbac91601d0f6bc310f11
SHA512e30ec02b0568c389c64fcd034671c6824465b5bafded5e41dbe5169f2571d0fe76c17c207506653694716069211e9130bc9f6a3069caa9d8331b17dd4b4dae45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56676ff30d1f0638cfb2c19158d21c5be
SHA11828f571f3535bc5cbee6d87839f5d988c612f3b
SHA256830e1d312d59ec44f5add4c887c84462d70263042e837c59294ed66ca72f2712
SHA5126b31de39b256a50349c427ddf7c9642be1f09f430e30f8fb174d117d7fe805ea67dc52aeac695291beff8902905ea0d8b51649142f2022b7bab3ba7a71b471a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc1ae4bafa783e3817a8545d8e7b4b8
SHA1df50452197a0e67274bcd2cb662cd8c517c5bc8c
SHA2564f83a7e39146a87b5c5e19164d3fdfd986475950b157072f1eb3cef6866d514e
SHA51258db2b3a3cb66f9b963d79e5bb32d7ad448e228742b31f49b34839e45a5edb7c1fbf09407c0441e3df7e7a51ca14f353cdd977af260998e8785f9b914d1b54fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b058b3448c441429b3d06e62943545d9
SHA1478e9d358430720452108fc1420ef96ffdee167c
SHA256203eb4ff4afcafb9e0e9b27bf785e5a4836d71c765f6fce7903903930579a0df
SHA512ded36c59d54fb907bd0a5bc3ed25d0d75c290c3372541aa284f3e058b21060514e7c62ff2dbd5e2da545b99b7ad0936480063d81faebf776f5f95b3ed9b34e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ce08a8dfc422ecea45eb1aef69af1e
SHA13ec64de739f564cefe604cfdc451d1df719a16af
SHA256cf03d98e84953e9d6233e66ed0f7e336f8a8db02c4e201acf4ce6f045fcb4821
SHA512fbbb59e9fa75d6dc3ca0a55f739e07d5d90726ada65dd9b7377f2e8b09639fd9e68862ff0886bbb2fbfea7f9eb91a9c793524222fa6630cf524592d582a02383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1f371f64febef3988d2c0407352a1c
SHA10c5c8f351ac1d31b069f0e6dfef879b8273388e9
SHA256fc0a3f74866b3cd1ed6be48d58781934c9f6a297d2d772773670ea30b4df44f3
SHA512940e8f5d724dd16f8ebf4a633c0bca82d048e80a847a7da34f9aa349b0c60506ee9b896f3abed59ad0a4d800e0c9e24c01637a4e3efe33108804c97a65d0b16d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b