Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
e2406b3837f2316065207878d08b6320_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2406b3837f2316065207878d08b6320_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e2406b3837f2316065207878d08b6320_JaffaCakes118.html
-
Size
3KB
-
MD5
e2406b3837f2316065207878d08b6320
-
SHA1
410c17e4bca29f6c838729218a055a909e6b753f
-
SHA256
51cd057033bfddf78cd699ef7642afe212a730e740b09e2a57e088e40683cbd7
-
SHA512
2829cf1bdb696c9f9a8549146a16a29a0a56dc68dbce5c93eaed010ecabe4ad3385c3f3677c541f9e79318e7be791608abc7748c31a4c5f9cbc8b46fdb32666a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432557522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05bfe095907db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000df92fabbdb20773a51fd2985fa2ee88c955d3fb885308befc7f3b94400d968bc000000000e8000000002000020000000e3eaa6dac48cace30dfba7f8e2616dda0d2819223ba164f641601cec00b57c9b200000009eb0259303c30535a22387f9854d71758cdae1fe0e87e10c5d88833ec4b78e1a40000000a7635c92d4ce92650ba6e27119f87383e0678b7a3a69b68ec4fa9a9e8cb106c592d949744d0efa7627755111cf0c7f1c23f4f5443a6436b84aa89150a58af548 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{313D89C1-734C-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2736 2328 iexplore.exe 31 PID 2328 wrote to memory of 2736 2328 iexplore.exe 31 PID 2328 wrote to memory of 2736 2328 iexplore.exe 31 PID 2328 wrote to memory of 2736 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2406b3837f2316065207878d08b6320_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b2d99138b7652c92c3995da61fce90
SHA14e72d576e807e80e7866f376d1d6e6d637d99d6c
SHA25656ff184477732217790bfd1128eb62fccc811fc21987c5da13a8d34ea4b54de6
SHA5128c65582f3168f0dfa742507eacfdf0390ebb26daa57a891b89c538be3c3934a86e71ef11ba450f4032a852245bc553d5669537435da7bc36cd970902fcd318d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510279a6b3d1eeb09e3bd9881ce358482
SHA115d5e77ee8ebbb19dcb19fdfded05c19a20ffd9a
SHA2568badf0ad094cb24e49f7f5e1e70eb1d904a09c8ecfe10f6d26a311a79fb48c35
SHA5121a20b0b2aa9f9fa3038237aa52504fc2cbbb9f84e7ec9470763612270dca507ae4fc6022090f2f76927675fe4990927a025e82257915f5fc0f8fb40c3d4d5ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500424de300b6b63d57e760802f5aab8e
SHA108adc140744eef2fcd40f0135554ed1b6b167470
SHA256fffc3d0f44d32acd7a0f2de5c83d39f89edb436eedff929c5967fbc8469630a2
SHA512549fda28c44ee6303a548363ae1cb92cce504ec039213053b230ada9b0eb9acaf19f8e5beb0d22ad3a54cd921af4b4572572661ea154a8441d87a83814080360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3968f8f8a975a9eb14ec2339c30077f
SHA194b62d8934e2e98024f4bf2342484bbb2f849e42
SHA2568f3235878e14d43c06030fa82be65e1a90480489f6eff183d32fe8cea5d541df
SHA512dfa7387e73b6550756e8fa48413695d5c46ab2bb8b60be29606a5574b0885240f890bd9bf8e19fcedb728507df58568e5b2e0215b5547498a27eb7a500216bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2e1193c694c21f8b82603dce896f38
SHA15d9c140ec651a7705db59fe2ea05f91a99e8a332
SHA256fe357996f8a4a21f7033c5b901cd83fbf5ebd18c212d3e4852407e750749663e
SHA512c886aeb1650bfc35857e588752a876b8eecd16d3a6bbc5679ed89f7ae641f2e92dae6f98e80560cf9d3b994e4aca93e41c1ca27dac2fdb9f93810b0cb5463b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594cfe125f955f060cd5ec18a59f94ac8
SHA19e17fcd5f53a1aa2b3dddddd920d80cdbd0c76e5
SHA25683b5e70cb34d15cc4b3a90cf023e692415405e499303dc64298698d10c459fad
SHA512f460f89e2944a7446aa5f52b5a5bec7e6efc2b186e9590debf82c131cadc3af82d0687cbefc91328ae72c69358a2fc8d80f752c7c356ec22b7af89d3d026bc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553be993d8bcc628c06e0a7602a76e22c
SHA1f0fe124c4f6fe7870654f9488bc85e91f8fd5c0c
SHA256b30bf1efaee118b3ed1d87dafafcb3e082286759d49c76b026c4d9b68f004675
SHA51276d0be41949db94f7c83905c4cffa561d5d32a7be8b9b21ad49af16dc018b9218858e31c35cfd02a9e0401ec1bc2449accbf46701e5d3e7a418ee87c966c3758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590010a02e9267de2b4c346305ec65dd2
SHA175ec58f24740e585c234622576d7b81a389ecaaf
SHA25636089de6c3accab433be393b852a1a121afeb195ca5f1856c053f89bf9630fff
SHA5129e25eb4cc61620df0ce8e6fcb654e796dddbde747543582e7fe037815394364f294263051d1b28d169d3d5417d16b89f54bd491f1f7d6caad7613e09e9a58b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce235719808f7b39a857ebd23d040ec
SHA1f1e29273b2cec82f5385c158c0412d445e1beade
SHA2565b8eaf845a723eac8b0a3b58690079904e4705a18fc909fcb7f86a6abb8bcf89
SHA5127d53da0aaacb978cc76a840861399bba5bd4ea1decc511d6d00b2459e0fe86a6c5f8c71b0cfc62d412ee90593ff60076288f746f94c8f1ef1681f8d91890241b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7f875fd7249b7be7e15a00071acc06
SHA1c2bcae085bd14f64b6727e989a76ccb22e605c43
SHA256900c0625cd529ff88e2ebea0d31e121cd0a01b37817de35203339cfb997c1fff
SHA5122c8b61f32bdfca778f946d0b0a338edc3a9555ab8475964ba6f649b07f96e197c1b2f5855edebef99bf06ac067ad58e76c737371e4cb9021a609adc0b09b10aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ebea09a87b81b0dae9262c6624dfbe
SHA1bfc3db5fbd8300fc0e0351e122c362606e74cb2d
SHA25687005cf87f7a1df6aff4d05f8abeb19dc5c1f6fe712cd9440d58673763ff8774
SHA5123d34a11c89b7f12d441269f2a7396dd20aa9d90dd4cd14da2ec6ebeced72278cf2bb24b74f8a70f4cb4918cda8305827539a8daeed5da321de28f2abde87f448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b73d5ce96e609250e959d34c0a18e7b
SHA19cfea6303c8188ed4e5e38846515df75b3055459
SHA256b624e87419371ae48dbd87f447fd0c4981bc05428eac8d238eb22202074712e6
SHA512c7085a8ce01826884e3ae0aec4c0053137cfed55d3c24d4a7726a8bea71cd959d9e25680b42987b233ebf95ad6f3bc62f571d6cb50406e3100fde9082903429f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a5e91af9363dc952360e4aef86df76
SHA1ee743dbb6e1a657c53f7e965de4d63b98ad00b72
SHA256abe56abd3871553e65c4b33c65d732c038cb40418f65e037844bb943a392f443
SHA512ce7ebe7e81a1764bb8070b4eaa33cc5828b1a5362ef73d163d093a49d39a9ce43033bc34f6fcf2acb323561e06bf0edd3754fa15f8c69fc8a67725bf5d7bb731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667d2202561727504c5bdb4d80bcc8e3
SHA1b192f01362945df350b69d5c39e75afc112f9212
SHA256a2064efebe200a69965cf2a346a6f174e7c0a673a15d76e7c754abb562ede35e
SHA512a6ae66a7f33897008d8a002eceec6634db27e94fee5c6d233ab93cee5eb066fda51bebc53132d16250eddf7fe9926ec7a9c0ce750b74a01c1d37c399c2f0627b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db7c3406258b67dd234d218d015de38
SHA1ee1c7125e3aee6b8a495e37fda2bea837300357a
SHA2569460a4b6af4c9f2670dfd6daa829e2e51216be487d6f9e172297518bf7fcb1f2
SHA512fb5a882ed17ff09fc22945dd42918a9cf7cef3262c3e0c618dd09c8dddfed239b9edcbbf995739fed28e98765e431ce9ef2dd6dccad59dbbb493b532e28b2859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732844970a412a8b625f4bc999781595
SHA1b38d48638ddfda39afb629c4e630979a60389eff
SHA2568fb652bf28487241ea77706b43f181cd57022ab926d0d1e712f568f15e32c138
SHA512e6d4e2d8d8c98bb2d5cb4c66bb6db02ed066e9823b91ad579adc7197f8a523b0bcd2a4870c08244c30cb8e3a9afa8dad5ae6e83f4ac06ea2fcd37d37ee9af7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4bb551bbbf81b24cfc0617d421de36
SHA18887a1ccbb5cc5a6feea6b8d325293c99794457d
SHA256bd8a1a201dfee2d36a360d493164e3c0cea8337e1cb1012e9e012a3238052d44
SHA5127367f1f1562eac843cc6f9106c7c7c92dc2346a79b7243ed0f95b7ed7bbecbd00ebc646db4135f89b7426ee0cdc28746e0f03349555a7f2e2f3c4d4acac4e7ef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b