Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
e25345ec25642461baf8df53dd9b1fce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e25345ec25642461baf8df53dd9b1fce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e25345ec25642461baf8df53dd9b1fce_JaffaCakes118.html
-
Size
68KB
-
MD5
e25345ec25642461baf8df53dd9b1fce
-
SHA1
3dc026cd92b18d1c6b617ac9a24e88dd10a2acf5
-
SHA256
149202cb38a5068d72237f36496ed70e509bc472af5fd903290185a9e6f07dc4
-
SHA512
fe141f5988d724fe4b2edba9634cd6aa05ba202402ff477aa74632e532ad3ca3042873573917c1fcc55249355bc677201ada7168cab1970c2d2a247587589011
-
SSDEEP
768:Jixg1gcMiR3sI2PDDnX0g6K2vmUcmEoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JQ3yZTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c069b14b5e07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432559784" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{757FF501-7351-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000116faeebc92a0c6ac033dd029671c758d54920f3d92956ae668734500e950a67000000000e80000000020000200000005a99f126e9112d62ece6294cbe98141d3d810c97b00deed238d9feb5d0d6dfbf200000002461002a85b57786c73e3e8dd45fb12b9f24b095e1184c27a246bea7b72b71a840000000487d5e585a5ef9b99d4ac00a79143042b5c14dc53a35cf38f4254b5cf6cff3de8bbbd22d00025165d736d4f6c425d6d68c5cdc83cf309d96d46b76fcbd19519f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2276 2252 iexplore.exe 30 PID 2252 wrote to memory of 2276 2252 iexplore.exe 30 PID 2252 wrote to memory of 2276 2252 iexplore.exe 30 PID 2252 wrote to memory of 2276 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e25345ec25642461baf8df53dd9b1fce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a57fd344e9a85ba96f9d55ff4cf146
SHA12860a097dd61b22bbf06ff85f2d1a2a168ccd452
SHA2568ec211ea68e56472a68fc0df16f916e26fad0a4c4facaa91699dcd3d74fd21f5
SHA5124cd93991c69e3ce4fe7da6d62e65757a7f4dca8863d7ac2be0eababe0ffd95b65144f67fa008cb946edb0ae083199d5e02ab1831f0102e77c67758297ec17130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b25c6477aa599f7abfd5c4fd595519f
SHA1fe906d407b377fcaa64c4ed9f31e4b2f6c525e59
SHA2566f5d5bc5cf19a5163b649c8889bc7606e03682ecacba9ee20d9e5156417b011f
SHA512547d072ce6bcf734093392cbf068064b89249ef1c8053c0925a5bfd09854ce57567966a3a701a2eb864f8ac462107fd26b80441cd80b2976350337587de7d3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5844c36d776cf1686b1a9cc08c0ea6
SHA1d7e36c67ee26edc3b6c3c270af4407e40915e3a7
SHA256c7c773e8fb2c7c91f3b233f15caa5499f0f9c4fdf655fc1142ede6b2385590f9
SHA512c979e1f7cc7a99e3172a11041b1c5c463d7c9f3137dbdf347eda635a9395675b36fa7bfdcebf75e87bab343b8a0115c51077ded63a10172a075041701976f620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3363676d7049c92dcabdf25d9c6325
SHA1d28ab8f7ba27aeab85438dab9ecf1b9543076dc3
SHA256c52785400cffc62438e98a48111b08658ab73f147bacfd6050a5f11793c6b4c3
SHA5124d0292b2bc54f1053599f953d981c894f6fb0a4e3864324af7a721f17fcb2c1f7939f7866516b2928b8730628bc072fe5ecab30e6ef8a543133f3c0edfb1bc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5d074da92ec04a1cb5d0e6b0b59036
SHA180017eec43604c6accc5473d9482f0e5d5cc8c60
SHA2567a43a0fd0d54f9789697cfffdc599d51702539116fe2855ecb2bb54c3858739e
SHA512bcdc3efa3437cfbddf75707f5eda1801808e3c0222ae293ea8417e228dcaf9653030a28d244114fa8b3bb08fded29bb5e5d2319f2a1c916f15f20178a59f1de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d553eec55f51a82fbbca9af8c8e1236c
SHA12e5d7d9325e8424a6b2b5dcc743907edf67ba978
SHA256ebacf581622089075eb7b7aef4e61de8ae97ba2a6e2fcd4044fffee15e333295
SHA512f71cef1d86353c808cb1c76b63b4f1c27526fcfc34626896f22953d94a60aece5a76f0da9fe1366caf3e4c23d58c5a7685adaab4efcbd1b2f073c025058c95df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810f9018d96f1d9165792c0b69243b5f
SHA106db0cc63ace4d2221d9d69e974fa92f1eaf61ad
SHA25698acb223f51f25b7410d17c6755c34065204190af191be8b2cca53354555f9ed
SHA512d414df94b43a7a0a678dbd648ee2e68dbea1699410dad001056725400eda85cb5a934ad2bcddbf0a466e92f7a0791d563b7a233fdf0149b02dfa2420fdf9e193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d34fbc9a638280bfab0b05aa6047e0
SHA1121ac914febd01c0d03df4d02c666b417617e730
SHA2560d811110318334d823a1bb30d7377cadd3ff1452a5abfe17bbd2c75988fe3ac0
SHA5123941647d385cb174d01af4df4808c64b13789e271b1030b5fe00ab349f6ce1a7a32dbc0f7b36425e88196119301566153cf4f7e310997625050d8b678405fb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541caf89364a41b6d858cff114f2ef4f0
SHA14bf0a427a47a1dc4e172d21b3e0c54a697ab783a
SHA256c910a025e6bb41e34a4db33b820689bf5812cc8eaa0f0c029adc70cfd510695b
SHA5127a2d7b6b6cbbe2fbace63f4829423ac46804f9d387ff34ebd70a876402e600a639e5e7688b7f2f9c2c4be03fb835f0f33815d74e28d1af6a72e94d98796b3cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a161f9c7ee4675e426fbd0f3706ed61
SHA1600b0c52f56af578e1f158c95827fd5900d2162a
SHA2563562d6b008018a9cdc72c33023ffbe82c733387702603cce5e62bde1b7bdf92c
SHA512a990ed2b13be27d140e516090e47686f08d9062b017aa76a84fa7869df7209ec71cf7d08e744bea138f61c9ee21899ebcc10d1af71306e8c4b874cbe0f47e4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc457c4011ec07bde291a2097f6867a
SHA10b22d20c1150fac62fa6f4c5e96cf43c72a4be12
SHA256101f8f71fa777be33a8cca16ab2bf08729ef6ca9869bab6a47c55a09eea9045d
SHA512a0db32e78a1abadf8a1992ff177788217ad5448bfa31ca9960fd73e0168bab498f62875ad6905d5b0536b84ad0e4545ac5ce0cd80567b69d32f31cf55a9f3b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fb8514f0ffcb22f23d6f94607a71dd
SHA1b91adbc4e570d2ffc8c6fad83dab4c2f164aac0e
SHA256b5f8058f524106b2457a01aa29f26ccd742ca662962dc515a2b40ee64ab8bf69
SHA51247e660533bacb4a7dbff78e4db927b2050b2271a5c7b0523552c0bdee0bf823db3b2d83a70810202a720ea280bbaed17bcd384ae725ce1f85904603359512ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a7b1636badd89ea066c73f261ac4c7
SHA10e89359968b3288c8fc334c9300a04cdb073a04f
SHA256c3a42d1c2f3f7c7568ec914ac14a85f5815e5155817ed32b7a1c801b9efc8400
SHA512fb12d3355d1ecc10e0f0c9856ccbc17bbdfbe42eb994724aea1abe3b6e49c73c08c5db9fa01148fcc6f4aaabbd15eed4b4be483db95f3039b021ad215d624291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731ad54601e05d635fdfe575290bded5
SHA161bf254197176418478d6888731b305f8accc86f
SHA256a9577cd5999e242128b3f750260abe5c1cd0550684a88450090eddf97476add4
SHA51243d83479fa20a796215e3fa05b3fa5abdd095070e99a448e035c1b44a4e0b5c9f9e0bd03aa545ccfe0cbf94f5fa6dfde2a4d8cb9678f787ac925c16094ac5cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009de975c187df8ff1fc1e192a63b4a7
SHA1be1559a61348789daf2b77d6e5494ed866192fec
SHA256b5462fc9200af9ac505a1aa48695ea7e13c7b9f1f89ccd593d2b62a29c710856
SHA5127a99b19c1886087b1ebe9de66a4e1fc6a66c84e169fcd8b18ec2b04c827ae5bb5595f62ef15fef8087b16979dc78ab233ddfc6b3c07362e424abff4d23f55947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfb7b8fd7f7575de2190247c1ae87e4
SHA18a5989ac51e982ec2c2d49eb15e333e4548d6e30
SHA256787819d4a17605da63539a256307ec7e9a258913614acfcb034841eff59dfdbe
SHA5127f30f5549a77663277366f3365bf37eccead40b95bc37e060bc1087235df075e5bf115b51a72920799622d5be2268131c7c65e02d84cc8edc5c6dda4946873fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c9f195ba126041ff375a01627ea791
SHA1d11f41226176d0cba5995fb8bbeac584f4d3f178
SHA25627ca9f43fef513f651a839e3e2f942aaac0c6be57c62eb8e347fefb3d9ebd23e
SHA5123641fd8559fcaaa79435bbce2293464d8c2cd3ce3203423d248c362d720b54e39a33998d429147a54f91b217dccb038aaefd9ab86aae00604a9b7e66f6040b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc7756ac44939af76d88b22552fb2f5
SHA1db099cc164fe9e31bab4c9f4ada62ec30039493e
SHA256dc7baf9fc791882a21bd9326121b1c53e0286507c60a26a0589a8cea0fcd7ff5
SHA51206a7ee81a60092d41de7f22583ad494451802d459a60dbe4ba6e18a05063b12145b857ae7cca7f9bd9753e37eac94f4d183fa82b0b80f778a05830790a5a926c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5932fc20b042d1321fdfa7cca36ef001d
SHA10f124eaebe9eaf4b35ac28d770ffdd41d5a56980
SHA25637894680144f57dcd8ce895d46dca131a1c2c2697aa96f97150f49b3f137384e
SHA512edf6e3cf3f7eb860b30a772fff86aef6c498487aee281fcb642c1829926e3e93de124c51422a59c06a9a957c8ce55ea6ab78b453e6566803ad4a3d742a821571
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b