Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
e22a6ff3a2c76081d53ee5da0e874b36_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e22a6ff3a2c76081d53ee5da0e874b36_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e22a6ff3a2c76081d53ee5da0e874b36_JaffaCakes118.html
-
Size
32KB
-
MD5
e22a6ff3a2c76081d53ee5da0e874b36
-
SHA1
41d8de5647d1f62a0785a96e09ab98f2248e83f3
-
SHA256
931f985cb2f980b1cfd440fefac4d35dd189fac9e31fa6d8af665a68d11b5cf0
-
SHA512
5d41f6177bfccceb35df32f0f16223c828f8cfbf90de11adae57471dc6380af77b0af8703f890b9fedeb936f6394ca414796d895337e7395fe486d144748f25c
-
SSDEEP
384:gGtCDreJgS0i0ovcyfA/yiAJ7FFTD+tk3cj+t0OKLcB4cELNQH7vvQdW8x1zQomG:1OregSfnUxNQH7vY1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000cceb909b0d33f3d73674f0506f1e50746269002333ae5824a78cc840c9b40593000000000e8000000002000020000000c65162c4f7de8524891ca1cf59564882ad4f39f6873f4901ee2f0a705cbe2d042000000009874ddaadb60d0e2d7f43d90bf84f37a1b1d368fdff654d1b8e8b2c1d7d69c140000000e905d4c5ac9c2730cc70cc4356c4f9daac7663fc344689f6c4e6a8021b3278e5dd4938d9db3cfe2611f3b345fe46cccaed0797ecf48998d71a02d989b0717382 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0eb3a155107db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{402FE611-7344-11EF-AA9E-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432554116" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2804 2172 iexplore.exe 30 PID 2172 wrote to memory of 2804 2172 iexplore.exe 30 PID 2172 wrote to memory of 2804 2172 iexplore.exe 30 PID 2172 wrote to memory of 2804 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e22a6ff3a2c76081d53ee5da0e874b36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2a25e247a5bb01a9ed128e6eae2e57
SHA1f831efaeca220a5c330151740fd8af2d6cd5d4c6
SHA2563ec1103999c5b397d6d955251acc977bbab39df9d9baba80a087d5a0e1886dff
SHA5125588b6e97a3f8c606a839ba198732065773b264edbf44d5094d9a05334b7cf0a7074757448cd95a08a234d01aba46ea7aa01a78d2c102b9202c8ecb21e281bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744943410813445fcad6e7023dca4d00
SHA174be04c2faf63516ac75771eb62ac3f34cd05988
SHA256b6a79a7aa450821ca42e8cd346b74815b13b72906566d295b1859bbb16215990
SHA512f8799ca0d819270ce81abec647e4a3d6d304d1607119f33c142c278576a39af134cc7f2d74861c3a017d17809fe6219623a8cb4eb7e71d1711c9d405b9719f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121d8ec6039c3d302893de0d33aee68b
SHA10499e769a28018eed7ccaf44ac1a982ea79a1416
SHA256357244574a95d549010dfe4a47891026cfa015d96f5df0b1f16c8712b68201b7
SHA512919fed4465166640f6cd88b8a092fbd76ae4e93e28ef6826e68f61d5179694c2449a43e7630fa8dcf24fe9316366d5798b003cc76356a6e23de7fc62c294c0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a4bf2237d156bdcec3a94ef02f097a
SHA11431200da6d4a59e503f61700cd7471c55877bc6
SHA2563ff4856a2d6ad10eef83a6f417ea20cd10e9942b09d87177d58cd2f8395f25ae
SHA5128037cdd3c1aa95aa698dcbaffbe7b331781f2d275855647a723e6c21a821c1938f3b8fbd19609854a7e0ebc57053aec25b5dcac6ad42455a038fc9858aa9c025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56328b55bd6c9fe41780f519818fe8b35
SHA1a8245dd46155e99a304767464c4c9720473828b4
SHA2567724b38faa9109aa4c8e4dfd2497ed1fd95e1b5b9f0708ad05e04d056e30b14d
SHA5126e40f3ce25a48716f55eec28f6d918d91087f1d8c16cfb2f79e6ee6af351008f60acb41b049da5ac35c733b63b5a785a45493ee5b66ad712e73187e3f6f1b407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407a2784835025d9e31e7f1c8365b6ab
SHA19cafa4eed8cce1d453aba8734d78ccdead6cb25b
SHA2569fef8b9dc209dc19c634f24574284f2eb2ee11e8b7d5c3372c1a1e8777b04328
SHA51234ae35788c346792ffbdc2e417e7cc053cc3cf103793dee29b3c4b07e845d5da863e1d40adef813f9a62a8afe17e3f9e06fecc5b23904f42826b687c823d9758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5ffbc7f12ad464efb1d0b69016e819
SHA11aac423a2c8901cf16847c7709479d2dffe6ea27
SHA2567b6d8d3f9cc1e29dbf89301e26e65c4bf0f1c1c8ba226f8726bd3fea2185e240
SHA51218cbe474a013ebfa65b1876d6ca57c7b0f57aad748a40defc68b914958528d9b44eca72b445e8b68763c0c2d69090e68afe2c59a3e1cf64fd412f3ebca83db49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f7f6645806cbebb72e1310639edd1b
SHA1496c24c9bb288d3702d39476269579a77bbf87fb
SHA2561be0bea1e5dd9c17f7e3b7ac484453232920612033c30de68970e6454658e004
SHA512f1dc89c25c50ca141694ab00f22d2169019c074b28a1d122fe089c75932865e3d9440c59b69d3b39069ef8f56491adffa9a2a1ef1b00e835ef0997f971f302e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcffcdb55d4c0dd14ed540540c287c40
SHA1560a16f84f417292b904bd34390798e2a283e52e
SHA256d6d3b6048d32bbdda5511b05daa92b64b208f85c3a5d2e95ec6d068d17e80d34
SHA512f62f63f9fe594e9db4d8ed4fecc91e1395fc387afcad60c92b7a9b734087e12a8f395d8d996f7aa32b2f07435452ff6177d0163fcac064c30f1da48e23990b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b35fd03ff7f1a6af1cf05c4ad89bf9
SHA1379d59d8c678ba8466b86756b9f6883bccfc596c
SHA2564a4142107f15116fbda8a4b8b3e5f5bf8ef41db113a4baaa58012616bd32cc94
SHA5121a87c5b73085fd9b26933a75dfeb852e30a9abcbd69ad197d823b9c401c337dac42c5f2e692633a157bc2d6256aad85c6d160ed7755ae096411b8597888a7fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aef2c067c4ea620965b5b4c9af853e4
SHA14a58ffcb3a5e40b2327d362087306202c23c26e0
SHA256d98e6e2e8c0d6043713272654130853fac03ab59fb799c2786266534cbfb9dc4
SHA5122ee3479c8a58903d6462bc19fd32429f370a375b462cb71aba78fa5bdf17ded371d7d3a08fd49cf3b8c0becf54b57362fc1f51673dae31150fe35eca85eb604d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342669c2c5de70be688b1843fd609b8f
SHA17209479213c2b827aea95fdb6515526f9945e072
SHA25629f500bfc0d429fb0a400920f7c03c4ff80c9209e6777dd9f813d96de5015aa4
SHA5127cc255742305323126a3df7e2f9a70ba271897f5380710c257a2f543a35319e39efd1e18893c35d0f89c2ce94528936f5f9ea246f04bd2f1f466579a8f99f13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d19fe29a7f957dabb71045174ba762
SHA1022133ced837f289b7762363881171fc5a049a05
SHA256a59079dd81c489a016c6b9a5edace8c2684ffa850fe00ec71bdbb18bafe6795a
SHA512eda668250160260a78107d2efc74b3aa4ce59a379e7a07686c7445eccd55958dbfae7d44ae1a27a0dd524b96f01d90aecdf4d5c113eb2394d9228705373c06e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e981aa1fb0cbd76add69035bc886b28d
SHA133b87656212c0080977f4a8aad45dcaece421195
SHA256b00bfdb6998362fa911c28f23a1c81e98a48381d832d7dac6b0fa71b99c58864
SHA51217d200ba0e69e27cd4fed3ba1712cc98d0e78a5bc3f8443b6e9f71a050342c50a9f1c612769556159285c653ca7b8d7d94f42c3946fc28c37e9884f2c751146e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8af2bdea3c6c0754ff6ec37546d919
SHA160ae1c19e209c94f9261820833520b590d64cb69
SHA256964cd9f1bf80ab0a20ed755c085a8d21ef447738b195084b2be410d25502a076
SHA512c708cc4cba4e0ae41d17863139612b69fa3d81e3f63d652534111335ad829cefd5bc3680db86e5b312d203cff9572426700eecdb9451004da998e2a94fac7444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17fff4fb1e296347f83d416bb48753d
SHA1df002b4e323a2644fa9948198c49312836177a71
SHA256b11ebf85a149bce1f5dae0f87b36dd63dfcc17cd21c90cf4ce9d139fa1ca1b2e
SHA51267a4ae2f104baaea7501c54b84ff5e6d4936b2bc6246908d30836f797a6fb788f0f2734374057b508109c4775ace2da9fc58ca03ef6d3c26c643a139cde312d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726049a54fb57b8beba771b429093cab
SHA1f98a589cd143ef35512dbaddd3141bc52a301936
SHA256d8023b9296d2fec7a996932727625e0b8c89a7aec22692804bef9f121d3f7512
SHA512028bf839b564e069306aef25e3dfaa9c97cb2eb8284beed4348b699f3fe1cf2a5e100f77a5c2a228f47aa50cf64dbbdd330dd3dbb52069b6d4766553560554ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b