Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
e2447ace0a9ef9b7db2310073597bba3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2447ace0a9ef9b7db2310073597bba3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e2447ace0a9ef9b7db2310073597bba3_JaffaCakes118.html
-
Size
21KB
-
MD5
e2447ace0a9ef9b7db2310073597bba3
-
SHA1
7216360dbbd7d7472d4ffc9ea4dabfd74326407c
-
SHA256
91dfbb1d147c737e2d75ec5cae2632bf201aa9684b9264d0050b08e24d0d109d
-
SHA512
c86cb7f8fc7b9948034b31270996abcd6a31cdc477f047796f495bbfacafc34245a35c30534630536a4254d4e58c1f715c45e9d5d697bdfccfa64653df8c3ede
-
SSDEEP
384:5t29t2WAnkD01pR29lRVJJ3nDql6eIF0zLBXrPBpPJ:a2H0lf3DqlvBXHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63855061-734D-11EF-BF4D-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007561dbc7508bc6bfea2e3b07abc43d3bb4952055993c991be1d68fc8c63b847e000000000e80000000020000200000009aa07604cb7a2bcaa3ef313d13fdc76a3aea31a2c4dc3f74717b36db10a6cafb20000000d9d4abf5053b2b1736f6684c8ec1e05120ad1ca1c136ce9412261cca6fc4b14440000000fb1da056fb35e9a41a703c2b7675f2438c0aa94cf1bb0f8564cdef3c51357a5d76752ded95c0bca6d74f697df60a52eb7374efd8fb7947555394fd043eb7655c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432558038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300dea3a5a07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2336 2060 iexplore.exe 30 PID 2060 wrote to memory of 2336 2060 iexplore.exe 30 PID 2060 wrote to memory of 2336 2060 iexplore.exe 30 PID 2060 wrote to memory of 2336 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2447ace0a9ef9b7db2310073597bba3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c644629ec3b286f7d417a748d58482
SHA10301c6bffe23796f8179e9b420ff381703522932
SHA256f8744672fe8473cf9cf9bcaff7d600b673c8686e209790116089a8bb5dba1404
SHA51264a329db8d134b4f397e80939986340e15bec2f6b61c985c8769b884f1dadb57475a2728f2ddc205df5b65bc53eea2d728cf6873b19fd3b78a5e6af897644b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f955583ef2ec611f6a7683246b2d0e7
SHA1a602ef041f6fb41ce69db1daf0e6ef4dbd294677
SHA2562aa4e0f5c6f6288c8a6653a87e59e6ab3c9d92cfc6e125146cf0f6b19725dea1
SHA512c40dd1e4434cf683e2318a427218d66cbb50c07ffdbba968b115fc0830136ac46d1e1b275f19001fbbf14943f66c78f63f373f4fc8e13fe655a6103350893991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817c981b7ce8305075b81f4add357546
SHA1730506b1a8d32b698d87ea902e15da101ac5ec00
SHA25688320ddb57545b7bfe1a4abdfc58c45cc841fcd82d9ab78e2320309ed1842bb7
SHA512e2b589e241d13c0bb04a572846f03be789782f3fc09843b58837b46526b5bc06d9de13821ec733a0a88f3a71715019074a8187752ae74cf0b5ad07d74979a2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d0fa780c28e86333d25f92849a0e42
SHA11c9d29aea3935892e20319aad73936b59a1c0ae3
SHA256c4438be5242b4548446b4772da0b15130e298d30a907b1b3865193d02efd57a9
SHA5128f661a26c120c212907b4fb5c560ae47cdd01e1b286d7a0a12b4213c13de4a992687eebb8cdc1fe22d74c8c31523eb88037bf262e23b4d585437848de40fdb63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c09f86e1c87db8d9fe88bcfb9e4bbf
SHA1e16ecfb4d3055912d3e868c4c70855feb0cc5542
SHA2562372e0499725fd63a129635ea73b7b3725d31cb4c06b78b5f38b788cde2b5c9d
SHA512a9583af2e918ae83bf80311b7dd3ae303a58e378bfd3a381b48e3db95906872cad4fce386c1e336b0a4ee74ab164074f7845b24271621e3bc0c7885a9d552822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe7dd3e940ca344cb434ae355c638f9a
SHA165c06159ad9d8cf31f7eededefc318659d18fdcd
SHA25669412a46c68a40bd578ed2b465778bdf7a83acbb313a4adac3e8950a00afb33d
SHA512fb0f7d29ff847bd0c6524b622202bac71cf8d990c40f1fbdd4ca158420a39b963cece7c5f3e87daf3d0bc8ee575616863cdc60c563426069686e39da02b1a525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4b0a113643d6c94950f6eda12b1bdd
SHA1e4fc6a526f4ee4ba302b01681ed9984f475a2cc3
SHA2566dbaf234fb53919644c786b3435babdb2cfe0e6a8aaac36bcc384a50698124a2
SHA51200e193686a599e14218318e427558e9aa35bb70d2c83da92a9e9c23589751ec976b34094daba644bc5e2f9b1fa2bc895d100e335b0bc55efb58157a6d8390bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577c3551dc07bb4c4a4575c604d85e56
SHA11f05abf17b1887300f32f1bed31e7fb7c16425c3
SHA25657e466daae27d6a044472fa2002d1028fc56aec201433655f4f04639f131c5be
SHA512bf025f2004a24acfc62d8875796fdcdf64f7cdcd78f2ab395279f271bc9051699bf5e61f6201f09b7bbedbb3c94026db97088e4e7e3b0d5ce42a08bccf935dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325fd05d8c0747813774a1a52070dbfa
SHA1306663cb42289db7c808af532d98f3f1fedaff1c
SHA256124ba71783b2ed1c6e717b7749f75bb0598dc86ed51aaad0e92a6555dd10a497
SHA51218e73d7a9bec6f443e15487a5d1ce6bb2b2bd5ddc0a28f263029c0ca48f55bfd11ca4b4485a9547f39c3e70b58da17b8a358278e1bfb33a0da058e50e9db11bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c811952aeab514f8ad5d669e48a0c74f
SHA1830bc55e1e769dda2e09a9292dd5952ab287bfb6
SHA2560cf7a5d849681c4f5258a928c89aa3388be3430d8867542c20abb515d64df176
SHA51211db4bbc26557bbb292fb8b9f3e598e6b393a3b1865be17c5fd0e17099da2446a9c4ea81e26d376e8cdd642d02b6b3501bec654abc1c46610f07991ea651bdb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589376392c267bf18dfacc64b3e50c7bb
SHA14a99e127e7e463b1b94cbfface0bc6ecca298b74
SHA25693dc022b24e0ae8d0f4bb6ba128f16f7be9115fd534b47f1c6753349d5dadc80
SHA512e5168b673431f8dbbda6462b19649663fcd505e7af487f2a66a55c4baa031d5be00bb485d4ef510fba4e1c7679a74a0f926ec899a2a26e7fc691cc8b9bf9277e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d39abf9884a9edc60f1605566a561dd
SHA1ca9b344c911cbdc0e138d55a7c4f1a1d174f375e
SHA2568355909fc1292f9a2ba486db158e35490249bb00c12ad5dc8bc2c3a75b179e20
SHA51208bae9a990445fbf6697ceed86cc6172224dafed2d0ef8294831378f49007d82511ced293a65f7120ad247ec18363bb44835b1af815e21349be677437c995e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eedab46438fba36347c4e12b7e314a5f
SHA1134cb073e7fcf44189e375fa9feb4d8d291f295e
SHA256d0f9152d0c27c7b6865219a26b09c78becc8a4c966e0e4a0fed5930f39f80034
SHA512cec2fa67a7ef1ab397c7ab7e1fc598956f15cd7ae92c1c6803e10afbf05551b9f63ce29d282aea5aabec83fe8f42e6a38fb1a61f0c7d065759e85e6cfdb8d0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b848d4fb65a661db94066fd1763b4e
SHA1d2a4926ca4703caf469232b13326a7fa751d491f
SHA25623aefb8052e47a9bd5f571f81700f6330d9affb9d3f17a2186ee38b7de131434
SHA5126ecdcb56c4bb135e1ac2700cfa8cb8be80c800aca6919bf78d542cd2722e63a9423be547b40123dbf8f81833e09db14636f697dbc64ea44f173f2e64c996f7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db94bc8bec916ae1fc2c934b26d51614
SHA1302c3d2676fb63a1e1c6a3ba636a7d7bcf4677b6
SHA256cb34bbcd23eb8a8c70d031998388e7d7a286d4f877a09687ec79edd16e36065a
SHA512879737ff3bfc0daf1231df4a21fc50b5bb2ab0e200f534e198e8b4539fa7f0f8e0e09164926114b8f71f2375263baa3df14e8f330053251e1a001891e5675200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a47bd4a4fd715f86ae7a0af669535e
SHA14165a0b1ffbabe6e1ec1199a9fb6f050702d5e87
SHA2562cf5a8e3a30e609c375aad774e53adaeb9019bf9b4a77b018e46fd7fed0f6764
SHA512d287e345bbc539fc544e464a97ad0949140205094714c6f2a608baaa5783092c14bcb6698e5658d73f734a6f93e119da4115f859eb19c1cb184623a42a04ac9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53923d71e9ea4f7809d24fe795434243b
SHA1962aec44c20cf1789c9ef7849c7c922b9a835163
SHA2567a283a53db00e6ebfa0b1cebc54b3196fff88843a75c67ede32255f29deae8fa
SHA512fd299a532259a11af0431cfcf246526978c27f595a30bc579812561655b14e0f0895fdfff645403c472acf50c169c9e48436dfff7f8ae787e9c1bd3b33c298b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e148e9ba443724067b637267120591f
SHA185c0ed850b26a8cf59c416a5d4666ebf6f615c31
SHA2564ba470352ad2dc9cafb3a8aed6c425c8da92831768700fe8a329a813b2eb285e
SHA512303880bd85e8f3cddf5e2274078671a50d019127a14435517088d8681046afdd27400ec0fd7e9611b8f3592f2a33310d7694bf5a7879efdc4374a3f313c99e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0c689567602e4a3e9d100b24ea3bbe
SHA12d87f04b8afc78c402b2b544ac5501bb7a87558a
SHA256c1c26fd2cf8707b5137f6774e21d2853eaadc6547457efa2681d1d1b92580c15
SHA512d7a77692517dc8d6f55ad4cd0fcfa1374eb73170dce546262333cdb7006773b1b956a6e22429dcfd4ef9986f7624be36a1a922be5c00b1c508a3c577eaa0752e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ab5c1775694d71d4ccf100e746c0cd
SHA180aa8a2280c76524d9631b2065d283500a6e4ca4
SHA256133fa58b4e624b77412a63ecbd248e3631e5442ea23db086ec2f1d081045cc28
SHA512948bedecb9dd040578a50b0ae20fca1c67156f424a137115d7d9f919cbf282ce5cfd7bed9b2e7d4849e322b0f9f72102db26ceaea53fe93987aeb7c4342dc9da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b