Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
e258dd51aa367a6daacf7a07382aea8d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e258dd51aa367a6daacf7a07382aea8d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e258dd51aa367a6daacf7a07382aea8d_JaffaCakes118.html
-
Size
4KB
-
MD5
e258dd51aa367a6daacf7a07382aea8d
-
SHA1
b4259ff1914d414c65a63ee222d5f5073844f3ca
-
SHA256
1a265f3fb7946f31143c842144610e28c6f9b55525f4853ef7673138d52c2c75
-
SHA512
7c24afbff972fd375f170f248806855dd0e8d574decc4e88a39c6ffdd5840ba9daf491fd4cfaeb69064220d4705544c4a88b2495ce8407e3fe77539608916fdb
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oTIKKNka:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606365f25f07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432560497" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DE90141-7353-11EF-81BB-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000e3562d8f23f213ba4cfd7af6b0fe7b7cfc908163229fd4504ef6394068384c93000000000e8000000002000020000000204852a72e38cf69ff1153be66a0044b695d5d9df3b973dc3853443c915e543e2000000070874bc5040978b469ff85137f89b61940bf28d34b5e057986b253dcded47a5f40000000262e42d67d3c3371971d928db63ea6260a30919c2daf4ae11bb48f530a347cfe9b47fc5630fdf938f7ea4fd268fc36c4b841fb5c711c5949314b48d0e1136c22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE 1796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1796 2548 iexplore.exe 31 PID 2548 wrote to memory of 1796 2548 iexplore.exe 31 PID 2548 wrote to memory of 1796 2548 iexplore.exe 31 PID 2548 wrote to memory of 1796 2548 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e258dd51aa367a6daacf7a07382aea8d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b0b411db021706069a16ceb6c4e014c
SHA1010cbedc23f9ad33a5780519a767d94bb72529bd
SHA256e47372f697587e4940b71574c2ba538407d60eaa77c6b6bd2ce2aa004a616c2a
SHA512e7fb3072cd474ec885c42a5428ff703f33dcd95c7672e0c28071a07a698633919b57f2feeac2e91b6bf2a9bbd61a156c18f57523b7f68271c6bcbaa12c27009d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee79bf325007367a4daf12bf179dd174
SHA16b58783017b75f097975802f98a9fa8eb0eec59b
SHA256d9daa8d60a03ced0184e7eb3a5b0394e2879af187c666253efa08de41c989018
SHA512f5de787037e9c83ab690d30673f4d7f2634247c64b7138c2821495a4bde6c732836069ba53f588984d482d5d9e368cceef3dc7afb19965ac3f71680e09d4309d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5c1a0e10d22fd9faf067bb30d234c4
SHA1527761f97efd18ab7b5c48803df157e3c21b2f55
SHA2565cce6a1a59a235b62112940368c3e9f080b7603878ff7604321fc034be850fa2
SHA512dd22c69ff7a149d373984cdbde64274c58512ac88f765fb39355108ef1a57fecc86622982173a266a589283d22bad5153bfe2e3c2c29864ed347c0e357f39801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55999954d71d4e9d97efd7f21c688cb21
SHA18fcbd3a1f7d9cc94a9ccb8becdec1a3c18b4c6bb
SHA256cca93865705eed93bee2a9d9dd40f012ced97905d3b3539091f51400c77970f7
SHA5121c50cd0e79c50f3dc7d3e85e82703b183f71bf8b94efae3f5bbf9c1c2e20726ef75359150c77c91db983272bb68f830659745b5f7620d13a31265a6a1b5b160d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54956de7851fc261829c9a3a01b031e5a
SHA1e293fb1df00c94091f4d9c9d33720ed6987f17b2
SHA256bd564541ddd67f2a4a8b9dd2d064185ab90296763bc9e6fc13c6f417b3e4f504
SHA512bfc2b922892dcb54f31ed1ad50e21f3a3b215c65221cd937e7fd9c68ddd2535128fdef84860a59defe916e27f6fb8f880543a02c4645ace38dd4540c5ee4bb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591eb2bb60726764440e7e94109a0f771
SHA16fed6c69312af641f29915c970a4f0fd7afaafa6
SHA25677610f87b5aa8277c73e1674fc4fa0a8850850fc6bea913803dbf9519fa58a65
SHA51210c9635ca28eab155d56e8af64ee021d6b81196992cb70c9f031fd96b26ae35fba3f5a4744e70c85af4b0c0e8629724b93efbff59d154308974ec93d253404e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f6fdaf4cf37b1aa7189a4ca9e8918c
SHA1b0172bc9937535c49336e130fa7ed94949c04ab9
SHA256b9d85aacb3c39fcf5ce4910d34763fffba6c4ac635b3ca69a4bb47ccf25f18c4
SHA51298e979c4de72f73f48bb34ac34af07cb13ae39306be7000c6439f1e39aa38cd26ab3208036e09a9cb19e8cf193a689a8e2a85809c835487470f6cdd19d2547a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62b4050f6f8d715ee20c37b15ddd526
SHA1a9f084c38ff2becd8b3e15b8fcaa9926acc9d6c7
SHA25609450cd816dee308ab66e6a180c35d87c944a5a087021cafc455d71a64705a9b
SHA512b2478c60f010e79b962dae6c00cd0c2f2546c678f1af96decfeccf9e9c254e00f18ee25b4357ec5618c0c8563f2553ed7b928deddeac434fc986c0fe866bc06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548088f836ad4d86c308439f704481640
SHA12e972cf8a89e495d3fdc2f7c977161cac465aef7
SHA2561c2e418e8aa26b107b406ed5f75d8c907da284600ebd0edae456a9ce5c0715fc
SHA512ba9656d32bf22e383008af0c9aecc40ad96df4e7fd2b83b5cda537147f84b784c09225008a1f8dd8cd0df8897d2605af3e0ddecfbf9475bd65c5ddafb0ec585f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59577b7b77ed4b2b05840e2c01f6921
SHA1441ba50fe6686182a7cf445f27c07776ac4cf5ed
SHA256e890f324b27cc56cb6a4b8aa84ccd399b0a23a04fee7f94c9496a3b86d6eef64
SHA5129c27058a44d49484f52839d8d6a70cd1c9909682fa6558095098a29de2914d2cfc5f2d8822698c9e7a76ec10ba39e3d739c61a326ac3b5414a45fba32fead97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5e60711d29c2826880c349782a644e
SHA14b8377ee3dbe3faa537de2e2b9eab17d1f2df353
SHA256cddebccd0bb748cfe704ad70ed32e5be257901c2cf0c6f191614ab12adcbae98
SHA51219779b585e8a7b2d73f255a2166181071230c8a59fac2479f163fb2950c9b73a5ca2be20c27864a69ec1ae2534d686811ee0f2e67f40d54de1200c8c5c567951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9a1472fe5797e8ce25dab850400553
SHA10f1834df5c137afb8d61c02c564d57ecbbf41daa
SHA256888c06d65229853bcc836c5b3fb0588869a26ddf6083804dbaa8809ae6e16cfd
SHA512868c9e79e0c7b320c8d59100192b6703a8ede08d63bcf4fbbdb681609456212be271735a3f422fa3884c36f75945f2d19fa8c30446518e4914ce703d5f1bf398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f6debd417702526bf1c785cc22b5d4
SHA17b5ee2ab878b4a23a91f2cc3bcc69c0f4c679bc8
SHA256a48b2b6005dbff5a69fbaa3d5b664e32fe2aa81f928a5c7aac586aca3cf15e27
SHA512ccec40ba68b5b905a3bdf0307ecd652041c597940548f3bbc41e4f392c4b8f81da21fcedfec5b9bfb547ec55a3944bb721d7a2afd7c80cb662dfc7114f3a34cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e736bdf058dd9d6264c61f8e71118fe
SHA1593f99f7ac7bf645cad9735cefac5859e3e1305a
SHA2562df4a793cf589ace37ac276fd8e8fce21a1033d86e7201b761c0650318c0d2af
SHA512ad3ca57ba30d9c33fd38f50b9a1e251e1768983f7de0ebf27ee9119f919828acfc36ef29fd7c87e857fa2841bf758641703aa838da041de4e43f44273764eed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c3c68fca8652ee028343fb4974c495
SHA1d55fd90516a2878e16ca9d5f4dcecff7f3747300
SHA256beb671b7eb4301063d0e91ba93c7cb654ae3cb43a895883d057e290cdff62531
SHA512a80ebba7a3f2f24e329d33bdc9960fada00f62a5057b4e44c7b59d957af8ba12127e48ab9a45bf7d6f84358dfc35d5314ca9bf751aac4d4340ea995608e3743a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c81400c5a561a2acd75a26e4ac10af8
SHA1c92dfb57a0ea937f2f19528aefee6787d3d885c4
SHA256a348f7f2a9d2c7e8df9042a733e149a99b3a5c70d79c573e6523c13b3fa1d38e
SHA5129aab2f2e72c50913443885653e168d05ad8ac524519325543ecffd5afdc605bd92fedc9fe38341428c22c3d4aa0fd6a7093dff0fe22c72eaece59ce6649e7695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230019b2403c065703aa0ce0eb3c4130
SHA11ba27fd6c92afffa31d254de2ae95843c42b7215
SHA2560e40d9decfff3a0cf04b0513b6de7768139df2ca766dce21dae5b2c49d4a8fb0
SHA512e4451554fdf38cccb9751d3ee7a3dd7ea4ce4533d847f1477d2c1606d011b1b1d74ce6ac6ee1c23e3578835f6202991289827db05fb1f83b77ab9a692bb9b468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c311a06fd33d143f197faae8d4f1cd5
SHA183f8b86d68260d131959a25b0885466cd0221c8b
SHA2566f8c0d6df9c96f1b1dad67c4fd19aef7880bf44c11b6a1129ca09e647b5fc3fa
SHA51244c6a6b1fb68e0d53e88a4abee06782e5d2f9e09265817449b3b48961f1c15e9d343c5c978d3dc6987b48d5f118527d1642a0c5e807ea9127d6f9be9b4051a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a4bba165099187724d55486789af16
SHA1de5339174da31015f6ccb54d5434832a65199b13
SHA25614590d144df574348f7bd03493a89c1fa2eb6797d3fc3e7bc4b82ab13238fcbb
SHA5126226f6feb71d1042bfa89eb66ec386401855f4fe61dcd283c199fc63adc3412ef8e88a6ff67acbca9651d73ad2651e0d9e2c3726fdcbe2b5ceca3f7bed9f86fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b