Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
e248c50536e2549bcb223d1477902cb5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e248c50536e2549bcb223d1477902cb5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e248c50536e2549bcb223d1477902cb5_JaffaCakes118.html
-
Size
26KB
-
MD5
e248c50536e2549bcb223d1477902cb5
-
SHA1
12806598b8d8bfc0df1b9f197c3191d6698c86aa
-
SHA256
0ba1f09ef5d0bdc2a5546b25b1968fcb7c73abd112d22355949575780c4ce147
-
SHA512
af2388a78bbb509e2babcdc49b6add7067d5b5cb6f55daaf07cd4b7b12601b8e5ce7ad758ee35d47434af186318290cd1d1039e58692aa6a993bbeb047130dee
-
SSDEEP
192:Ro3ox6Ab5nTnQjLntQ/knQiemnInQOkrntWBnQTbn4nQT+5Am6CrxWVfQl7MWnFL:i3o4PQ/1wI4a8VeL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432558578" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A618DF91-734E-11EF-BE3F-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402cc4805b07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000339a6d8aa7f7dbe96106a3195f09c395f15bce51955d79b990e6c64e5b1b6c5b000000000e800000000200002000000057c6b1334472d03c934d0e3bb0f2190e319b5d4d6934413bd17e4eeb1081dad4200000001281b59bfeac7b30425dc7dfd22545b73dd7b455d16b20f035bb59fccc584c14400000000774bcbf710a335c7061fec5d6e4ad14d4310c115109596b0498eb99d211acb29c99890658aaad047702be92e61b1d05f22275dc58c9f70b8e8fa84f9b8519ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2880 2640 iexplore.exe 30 PID 2640 wrote to memory of 2880 2640 iexplore.exe 30 PID 2640 wrote to memory of 2880 2640 iexplore.exe 30 PID 2640 wrote to memory of 2880 2640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e248c50536e2549bcb223d1477902cb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5f6a4e9533582f50dfd44f04829353
SHA1ecccc0eb1c798fede530f23a9cd2e62dd755d469
SHA2566f9c0a1ee01c065209bb8bf3ddb79223f0a5d1325310245d62bb4f06856a2004
SHA512bbfd5f4cdf1b5ad1daa15054dac4640fc762e435d9827c187e51a87677eabd53bce4266dcc042b5bdad27ce539e21254cae879bacc4dd70b3a590b92e4cf120b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be80b89e00f615e8ba87e03ae2ee6209
SHA117a33724ede4f8d6370d971123585e72cf809e02
SHA256143fc6a6f5b1b6f7d96787d5f0d204d205bd55a9899650b5818e336e575328d4
SHA512e9e5405834581e969b0158a097f0c2e8d9d5d9acf0d2d629eb0a844251085b246fe43cb83560716ef1c7b1321ba14d9281df32901069adfedc52e6c342e2ac6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c231a97a3dad8fb1bdc0d2b558ef4568
SHA17214bf7fd5607d4eb8878590f404e2d7bc316069
SHA256052926c737c1b95de229bba66b2c551f65a7ae468ebcfb7af65d9fb078249b01
SHA512ccf6a56d5ad2a2fed94505989a4a3afea48accad30173948df6aa541d2ea2a4a8d58bdebc1b057c99d8e20a991e7154c6e275943ac77649474ef603bcc211a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527911b6726b088b3cb0d90686c096eb3
SHA13e0ad42d51580cc3075e337d2bc465c3c3b346b9
SHA256245deaa6e5580813c37bdf8a70e9bc3eb965a0e6ee5900a01e4a4a1375012bf9
SHA512743fdf2f2b6a6e7462c3fdb88c1335c02292be18b40b9fcd0b2f50c3ca2241c6334e92f68cbadb76b8d493c5dd4595ff7f583cc4813f20e662fc05421c6c3159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acbc1a1bb69b0f5266301d4b61b40e1
SHA1eb48421005e05f8800cc24e568d2f0070fe1bc99
SHA2566999222b8775e75193cac51b13a00dc49edb8621a356e9a3c3abac141540fb0e
SHA5120e92981e52815ff7b425dade9aa4594fea2d8a7e9aa21fa8a6585025aee9995cbac6d3cea52d80c47be903246819c3f0c13b2c8109a995c7bb726610ee411089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29a6fcc968ce0104661df52a8ed6851
SHA19a0999c7983e2beef945ca9ec28a39644c2747fa
SHA256963e99cbf71d47f61f587fd94a832fcd00205d65ad43687476ad00e41e9ac104
SHA5121f4be064f06f57251accff329e65182c70dbbfa1016a9332bf6e54ee7be9f2c7a1ceeb8ca37e0597e45008b20c71d17428d23f1ea28b3c9c895c7aa5a4fc1a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3a1bd2ae1dd7934084f21c926cd8f4
SHA1fc6e7c9e0f1e9a32523f379bda5d36150b42f6a7
SHA25659008b338a169561696bc6bcfce0fc5cae6cbcbd86d3c1587538098eaed0418d
SHA512c5553f3f7f9a756610850bcdf79cc12ecf3b0276255c30c5a2473b6a50a057d013f92e09df96f9c3e47a928bba31f34330ec50da377d5cab3b5b23b8a7d34e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7fa63ce357954426551c1e74a09ea7
SHA1e8c397df4a8fa4be56daeb63eae1371102b34541
SHA256c6d8c66bb929faa6d6d2d688776fe0e047da32bafb2529a9ecd1d5907a0da3d5
SHA512891d6983ea74edc2a8870729721e3743805607232650711feffcc606c1981717c5b6bc0248392d6944e7b6e4987f91ab796e2f00f3e4ed7f6f032f13bce1ee9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597016b608a1620163fb31b07b98cb01e
SHA13fd2e41b6d24e6af3a31ef87ea4aef2158709c01
SHA25690dcbfc5a4d636e3c4fe368b9c7a8150984beaedac3a36b8c32ada900ed9affa
SHA5121fcc14dcfcab69a495c8b44dcc562f252812eeae67425472179326792e66d2358ebc9a8bfceaa3994d79ad9dc65f9f524f51d188ddefb3f6d55a12e7e22ffd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae2fd9502ef34841f38ee5c232b6c5b
SHA178b3f3dc095e8a1da6593585acde5cf03f4a01f1
SHA25658be8877e7979ac3dce529f885f796a46888c97a0079d4653ffbe9688cea5817
SHA512980f6a38d13a047f8a4ba8bf523057cf8a32f9fa7c26d3d722be4639c5240142ab31a067248334a1f9ee5bd916a957f140565142105d0d298848f961282ee7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9c5098780f94116d91ea111fad0142
SHA1d3a099c3c1dda55488ecb4a37f1eda1cb2985cc5
SHA256809b068554da886a1b8531e738570cec0bc18f10ed33fa507009e69090cabeeb
SHA5123fb60518c35d04198080fdb8b988434a6fb70f8670c26d5dc380142bf3607ec457b2e900af92a419716f224fc4cf7a7a70c12f76a82d44333440ee7358a44ce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55426c135838ff126065e020638a6ce20
SHA128f764bbf17e077aca70da5d0cee4ab6349a1795
SHA256ce4999f6062c51e13fda029bea1cac4cf16bfc977345a6ed208d89eb2cab65c8
SHA512cb640adb075956183a2b160dbcc007345d1c5bb54f3d6ae842c79be8d39c1d8a6a43c8ce1be6326e152369767bfb572c4a84321e3cb822535dfd16352b741158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c497496afa4df088551e583de7e18c
SHA11dfd5171579731331d783b2023a8c16f21a2cd9d
SHA25646d9d64d46e49f36d0907f3293bf8bc4d7e011dc4a46a244f5e5a6cf57d4ca9e
SHA51255af77ecd4ae59ba4679b68d9c4c186d4be5612c13d4b505aed5ce8ad3150c0ffe9513ac764bfad5b76fcfbd8fa8c52f789a60e3440d75902126e57424bd5ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb92d63d15201397293080e6257eb14
SHA1cf1690f3cb9bbc45bf99c6266ff6acc4f0a0896c
SHA256494a318e9a431a9d2924cd2f1902b7f5a5cbfe55e35b481e39d34eb9ae46c7c5
SHA512302c1341f2177c5bc9cc3f708f502a60a4264d4ecfffac19a7709254b136ef01557b35943e5f65dc3458c13ba28e705ab78f74fe1897d5cbea375ade89a15300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981e53bda26c4953b21074a3ccebea0a
SHA1f3740ed2d2b96d08958b0229b343316a44663a56
SHA2562c631fe80430fd8e9ad84df7fe9398fd77377cd971c9411393a27233f28c068e
SHA51258bd1b5ad9c8bdf5601546f095c7b54d13bdaad912fcd60a3dce65da510256935e0bc7728adb343fff65bd99edb5d4ad48cffa07405683f00279c2c66c8f39ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9f30d72fd7c56fe274ef99ea4d90b8
SHA13504157a26fafb3689b579f316fe891d8ef0ea65
SHA2563e89d2f885cffd2666eaa8c2b7177cfc53a2c3c8a81a69ec2c9de80c368ba604
SHA5126292ee3fdd0413d2407c11961c864cd840049d8a8a7082b8cf192c10f22d9c839fbffabd853b91bd3ff423483ff7bdab4203a917a27f73c349e67ba11421db92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514740913a9ea2bd51a3f51055d2402d0
SHA15fa9aba63c51f745b7a43cbfb540fc9d85c64ba9
SHA256f376de9f7bf76c03563ef37ace2968af0bf218f76197c2b3a42e09eb56ced857
SHA5121b92c69d04279f808c8cf17bebc43dab22bd36fdbfc3db13b9a5ece3eef2871285addb1e31f0638e368b7fd62f67c6abe94b159099bfbef26c2e66308521ec20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84fe38c7f639ad57f78e41a77ae158b
SHA15bd5052ef0b880618e55e84aacafadfbe323e893
SHA2565fbd43e8ef4794140dc9276de020b3d616fb32152acc35c424975cc1bc7761b9
SHA51299ef92d4d3524d0905d4acb9cbe60aba8fe07496b27f813db598f945087187492b2eae05ec9cd77783a42c7fee606da162d02e9e1f56b98a5f0f81c3f4477e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea43ab26bf99c1078eb8dadc3627c5f
SHA1bc87d055eefc146fbdfef3e227f2ad080c6f688f
SHA256d46d7edfcf0f2b9bd5117187a186dbc27bd017a0be9ab4fb44af5f9b1588d6ad
SHA51257439e3aef6330cf371dbefb56b30323a2adc263956fce86bb2d07afe36c5ed4bc000ba5995e1a236c96b3e1d09a1c55a204427f1c230e119e69d93a6b4acc86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b