Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
e23e2b0b5d9a18be3b9ca54b65f116f5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e23e2b0b5d9a18be3b9ca54b65f116f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e23e2b0b5d9a18be3b9ca54b65f116f5_JaffaCakes118.html
-
Size
4KB
-
MD5
e23e2b0b5d9a18be3b9ca54b65f116f5
-
SHA1
7c40fd56f69da86355a1b34aeb0746c0d068f3f5
-
SHA256
55696c83b4ffc4bdc739cc02271230d6533aedd2f75d85d490ddf5832287c0dd
-
SHA512
e59e063cdb0f085db8f6cb5615b2b037a48285c38aa746dada7c681c486de34fa78eda8f7b9cc76c4212afb6a8995b82ceb99ecfedd0940343152e86b403d292
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oRL5fd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000036189915dd2dfa6a43c8eeb8d9c99399acdd8b3af6f3691cc048c9e266104252000000000e8000000002000020000000f0a73716959876c75432a1dd21b5ef43b809ea6e555e0a7c262e8d51b59bcfc220000000522fe78de5f78a833bd3921416d34c839ffb23ab434b686f50ad87b0a07c282440000000eed0ea7ac74810a162ece19d47a06e1ededab697d944b0d6693a0ef0d4b2fa912f70bd2f508246a76e14caaf4c69fa15c5e4a936a79108975ff5494b8773ce54 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432557178" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{629E84C1-734B-11EF-8595-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6028d6375807db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2740 1424 iexplore.exe 29 PID 1424 wrote to memory of 2740 1424 iexplore.exe 29 PID 1424 wrote to memory of 2740 1424 iexplore.exe 29 PID 1424 wrote to memory of 2740 1424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e23e2b0b5d9a18be3b9ca54b65f116f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1fe08751b2c51fecf8fdd35e8be51f
SHA1f6d1f73b36dd29e6ee43bdc91b37be8f544823f3
SHA25600e03466e9de81fa106b300c9aa1b7f674b765f6756e1f8e9f5309211821675d
SHA512e0b3ad7fa4e05817d011da01098e4f4e428ee291027ee69c23376a235ace19070e2831109b314d0271896d758e20442e546cb4aceb1a128b5d43b8c3bbacb6c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fa07057ccb82b57869d2a33fca0699
SHA13ddd5186efbaecd8b762a93614e633287b5100a8
SHA2562112687324e0c763bdf138fb22550fe193fbf46f8ebb0938c57af6eaade09923
SHA512e9dcf51d4f659f66a2b1137851a17c2870d0d04c358ce28272b57d1de9993c88f9d70f4560285e7af7fef42066876cd23a1abb913887b70a0a1855a08b79a9bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e22c0cb2fb3f2c8f0fb2c998591c0c
SHA13416f6f9c9b32daeb2ac263b70b559550581f01b
SHA2561356cb295f7d4130ed8524213527993bd7c4598bcd4bc5cf46dc549f1addbd45
SHA512873d42068a150a25208aca590b501ad80068623fcd2803febc8f3d96e48a245ea819ed61968f46860f9e6814353e339d8ae056c74ef2d9026d4fe34784430927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a088586c99959af0b5d2e21cad6446e7
SHA15f4ea9cb4bb7f8e526aea38c4cdbf7127319aa5c
SHA25664c9db9701fe42c3ea0945b1482f02014148831ed19c79a437f37f49ded667b6
SHA512f31b86c66ed4356c4d9f95b351ebb694c953284bb2fa8f543915913660c10dfd4b8fd5f690cdf440df9863295cda579b0b5d5dce84efc33a902cf0c357c21c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1fd918a93bf21cfa972e71e3f939450
SHA17af8b8e512eb7a61557c48671747ebb0bb5f0505
SHA256e191457797df85a0d8e45eb4b121bc3e87810f04ed33a262364bf12be89c4589
SHA5129d3576f7249e4c30140b2a352658bd220da7b380a36d5e4aa748ff65d0943044771e1fadcd07753908b7ff9908292f4b3a4cc17b1857b66a0499976dda42ec45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51849013315be97073cbaa2e1db289cd6
SHA13960f1cfe92ed1055a04e96931257f3c0cda809f
SHA256b93e978d6e7a309d48adea3401825ca949757c6c241a2e73d5f1ea0c83489a39
SHA512d32fb874d59c59f8d486b2c71eb8085fcd4e1b21ca7ff9c6186f2ae0cebf73f7d3444266eb18d5a33c0880aa4e653d022332aa92a9541516b2fdc0ac09cc95ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51980ba6f6e616ffa6b34dc160c4b3599
SHA169c27491e0dda1fae813d920d29fa6759d5baadd
SHA256a210e397aad452448ba62a424415ae61a263ecbd57585999bfa919656a5f931e
SHA512ce4683eafdd707ba86b41ac9d3dfefb74313da18abc43b617f3dd6db18550585c9ee7bd23c0f6bd2d59423ba286cd7d2777826826322eec4c26b986502f89801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574b91c46a9c58aca70ca66b32033e7a
SHA15f85d4ad521632a091c6b3618d4c6a98ee72885a
SHA2568cd9f1a79f160b40990471d7a4f27f0a500c011c5d41eb7a5661bb3769f177f3
SHA51250ea0bcfb93f91e0ca30bbb3954f24e621a4a63d4aaa89ce5c2b673b93d167f03d57b6604e5e651c43e2101fbc82c921b6415917193b76f6ca1621de46f76e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53068145f7463eeeee13bb679377ca8a5
SHA1e78f23120bdb99a804a965f70f31c5b6c1c6d8bd
SHA256d283443464234819a1b1c5908efa8551d3fca99e94000711d681e2da41133feb
SHA5128c62da4b7030ef3ba6b73e2c9668b0ea77f4645965aed31d9fdeed77b1c06dd43965e81f63416eb11bd1fa66660243ceac7a7de817e64b3701e3d92ce16ba0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926aedd4b7a5202c7ec4fea1b22d06c4
SHA11213de89435647f3fc25f3c6360a245c651d22a2
SHA25683c40c712b61ca7c01df471ffe1557dd1f3857f9079172b017a44a10df555a38
SHA512d73ce1c986b54a835a672ba28cd6e70b9fbe8227f194f760637c82fc477388018c9646db00aeaf6423529efc30b3f87ef59790446fba039ea611f7cc24fc71b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5306599e05678649c5fb2e84ab927d4c8
SHA1e16a70aee1362c83d99531930ad93bd6d80dc055
SHA256141949354bf29374316757efd588ae925297ee603608fd1adf691db88e54c3cf
SHA5126e9bef410b137473114113a24c7bd637ca86eaaba48f5f9e7bc516288037aec6ed1fed5c4197824ef388ba1490e9d12d0219a80521279bde5bcbd3bf500508c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac10a395794458afdca90fd2a69ea3a
SHA13ce8a6ab773273ebaf4aea32c1a778af48da2289
SHA256c81a3cac87acc6b2bf402e7f482a03009cf6738f99e246fa4eb487f95669ece0
SHA512dc6b803a4de16aea3b2548bbf2832871de25cdc784ff91eb78777c20040d1975df4cfa699dd14d12413d78362b25601c71f4136f636be6e2600b198dad59da7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f92c966e1aed696cb9eb1c2e1bd61f5
SHA14dc3b80db4dbdd95908f5000fb79cf2cd24c0eb1
SHA256d9a8a39b8eacab2a689610ea40793dcc8d2adec715ac0e1d0c83da3c23a31b34
SHA51207b6bf9d7cc15f96a98374e7bb1a5fc9de19c13b1ac3996313a793b507f659677d0f16991ba23094036692b3b67c18a92a542959416d4e10a301c190f5a9ddce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594593b9ee380f6d527abe7d095ac30e3
SHA1ee429844e2d8e04a4a22cc96fbd550eeeb719182
SHA256fcbc93fc7ec392315ec22a6066e5c0b6feb03d3a51c164f9c098194c20d585fd
SHA512ce94622e1b130e835c18812d65a151209c6151620ff99f60e6c0402c41951286934fbc0b14184d7b95a709064f62010dd140f87babac419ad2e94df65842753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1522572b74711f99f673328fdb152e
SHA1efc710c86a88981d3ed573f07239689af7d852d1
SHA256d9b6817c5441ba1569427ea19b079a3451e057c50762e49473d41f19ebb22f16
SHA5128c30db0f828a287771a0496d83f0a2d1d20606adf63ae43c1466552a6ea80362d0002f9c06f6a4cda598f45764f281227c3d0e38996a336ac0311418f01c3b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b464ef2c211cbeb371ba51297bae247
SHA1d37ad6d48ff5562f7f14addf0b095303282838e2
SHA2569238ac36b26f764a64f85caa757b040e5cee5e1a3da1489044bbd6fa85566504
SHA512b98b9320831acef4e422623b5cb7274df30c658b664d283d837d41c033ba8782194032aca861049f1df6b38d8c188d94461d662891b6f7dea765f8141b8e6f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0936d3a70b3226672c0b22c0c8c0418
SHA1064d720169d2b34309985582c0cb6349b649fb9a
SHA2566973479c1b121227a824f54eb794d664d179b2e3c5940d61f5457ab6bad22596
SHA5124c96c06c91793bb4eaa02368d9654bf73624f97b17872e7aabe5164eaacbde2713fcbac425ab47c2e61d8eb05fdebf56bac89ba22dfd279c5bd28059440362f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5f61bb2827cef4f134ad5264c9a232
SHA163ddad85b71e96d76d88c5fc0509f63c694207f4
SHA256aa2f24988558e8f48b02211d9594ad76757680ec8cd417972db0ba2510791b2d
SHA5125a303d5a772ca782701e7ab1b0d076fb8ab777e56a55354ad90be82c0a64a1975873dd3126bec645e002ec2992d36211467d3dea0ce9f967b9886e67e9c7c3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be78c49e599f936b000013e229b4679f
SHA14f3a349912c72c4db6013d0d9d9e0cf7100af55c
SHA2566bd24e4dcb8401a47261c25aa808d20e750cbfeacff421e64e3e9018a85f2754
SHA5129ac65ac26c9088e98bd9e8b96db6aefa2cae7a3f144a1e8894cbc5041513af3bd3604ea18b1d42771cafec929ea5e127efd4d9fb03bb652c101a236168da1a82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b