Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
e25121f7f76563670a39f307bb7e6902_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e25121f7f76563670a39f307bb7e6902_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e25121f7f76563670a39f307bb7e6902_JaffaCakes118.html
-
Size
24KB
-
MD5
e25121f7f76563670a39f307bb7e6902
-
SHA1
2795f376d75db94a8fabb4b91c2a057609f06b41
-
SHA256
173fe71f50b3aee65059cdfc4201c48ab45f40916cfd8b84fd7e63f89c0ccb45
-
SHA512
23bac2502592c8be12f66aca7ffda953c46ced6ef69e2d0b104414d5d687e042389fe0b1a10aaf5e6174f014ab75721ac73e5534fff6d71c6e792810e44edbca
-
SSDEEP
192:WLZLwKQgUOcr/h10UdQ/uQe/R+BllCMB+p+4UuPi6bTIw5WafW8OhlC9Z9L4Uign:fSU2/IaAFyxkZ911TXT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432559485" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2B870A1-7350-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000f90d63addefef29fe0589db58fa43525843587cc0c0995802f11a0f536ab21aa000000000e800000000200002000000029f3fee035cf8cff76114435150e1c19b323cce45023d6a8a60c461f03e10a2a20000000d4881747c6b5ba06aceea7f405261f5f8c7089187702a67bccd975d13eb2873e40000000b89cc9975bbe9517b6bc1c2621de37853c1f3d9360f2244ebec5c83541a849dd8b1c97b6c7994af15ce35877a938c8b997fc8ebf6e5f4b31ddf658e1e3499a1c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00906e975d07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2116 2272 iexplore.exe 30 PID 2272 wrote to memory of 2116 2272 iexplore.exe 30 PID 2272 wrote to memory of 2116 2272 iexplore.exe 30 PID 2272 wrote to memory of 2116 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e25121f7f76563670a39f307bb7e6902_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f775fac4cf870ae1bf1646964652f1
SHA1c7259f26a79312bb4c0faadf3dc80212a85b0fcd
SHA256f6fcb0b79e2efefed7dd747a24ce3c87636cc4d1d2e856ca84d7ad7c0979215a
SHA512c9149d2fdb0f985d0c82aba3973d05bf6a7719c7c1ad5996091e0cae9c2b6fde9be9b1a8d812281e0574c5579060a5d52f5dc318ca3a36c376ed5ed51abdd04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3fa7cee3f17a64085f0b9307502ded
SHA1fa943422f7dae01091335ce6207a6be158bd8fda
SHA25648658d46fb44c6b2922ff2d9a1930f2de5f267d7cba1bb4dceff045ffde2b05b
SHA512956726a86d025d0af98ebd2a986e467e894f8b7a03df195ad64892e81d8372cafdff5518a82b41fdd8c920d90673c22c980951e6b1e61df67aa6ee74c6de3caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3954a2ae38881b86e0efeb608a1aa51
SHA1cd660f2d98105b028a745304530a4a6dbe76552c
SHA256ab8b7ef61d8dea07f862c45a78b46155218327adf67118af8a237075d6712937
SHA5124e83c86e9234ea1011b83ae01afd13e96b8f1b69d8a8595beafedabc896e92bbd2f45e93d61b529bbd32083d7fb0d2fcb80a920bdd58ef94fa2a0e293f1dcb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577256f1bc1508dc8903ef86b136d9a2a
SHA1e261388fe19a9148f47766b2f6db7a1bbbbe31ea
SHA256ea7cd3f4008b172dabd4156fc98742af619d6c21aa9297cf7f70e58c7f5ab896
SHA5123c850c17b5b5f8bab14914e5e1ea5eac5d90ad21d7f30d4a2809b83f5f15e82805182f17f47f4a0069739e91727028809a17e60bf21b8dec28f840f350083a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1e77b59a41a5aeb0b2ff9d3ffd9330
SHA15ac7d2eacc7932c501144a6a954510491b5e9eac
SHA256ea0a9b6eda2ca4abd580faa165ac6184ce02f7120340d3bcde285ca01d3725b0
SHA512363d8ba93d17d2ef0673001227ae36aaeaffb01fa75c51bc73a7c32855ab6fdac64513df36ee45db6982bb63ae7b01ce7e516ed16f284360cf0864f0b734c7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8f04432ab54dce75191f4d2d0e9c1d
SHA135a03a4f777536830a1bdd2d074ef50968590341
SHA25679887810b807007d120903dcdbe729a43e34b8153815fae5b9b76e20370c64d4
SHA5124286a8b2a8f9f3ee0137138b58edfc2bb1e6e52e8b6752f99da70611c3e3297bddad84280f9be5e0ee19e55e632b36582bf87537c2f0e7ae18a01c33aa77dd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c635e271f520c729c648af5f326cc824
SHA11a8a81e5f70e0271d31f9f8bcc5ae3ce9cf7d044
SHA256d17639fbb86e7ada0a6a4f5bfd79cbce238955030ecb971689361f277432a675
SHA512e98de2b10ba517a47166c33c17dd29900c8e17db6d23c4fcdedfd5f28dc202e88bdc190468571cda82734ebe384f01e04b38aabb29cbf44fffec7310a943ffe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b2d5d9a2340784119a9132b9aa40ff
SHA137c4ed823fb1cb2c1717840048dbec6545415856
SHA25615c33489c3660935ce6e22f1ea5b4568aa619524b40a63ac90df92ea34d09bf9
SHA5127c9e2dea42fd5e6a42648ed6bf3637f27ce22a88d157698b39555c0edc60838b8a8b5b4dd6283606758c7058d2c68aa0cb37d5112dd0f47079fe218f888661a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59babc765421fc054457781f6420469d1
SHA1abd46c3eb095fa0990e8b505a110afac2feba0fb
SHA256f6ef720ff5ba40a261d7ff48182ab060d5eea6b38cab7d7527d93410a1b72cc9
SHA51221427cbc3c9bdf9858e4b0879ef8df411436e203540551e82976393f03d937bdda908f22b539f6ea9f1826a6f22b8c52666e9894ed80e45e0b98582761a20df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c0156bbb842b99bd8347a27f556d74
SHA1fa017a06f3fd2f0eb78bb4e53705b54e836fe872
SHA2563609dd5e36ac58a29056e8cb59de4d058eab81c6f9e53a88e17b810a0554819c
SHA51293f318b0114bf5bb0b918488fc656ecc3655e1c9c1fea679c2fe1f49ee0ae86cbc53e4eaa0855a55c347fec8092e82dfab61bba792e3ec49f3b2774eadeb1b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f57056e01836fea8fe889c29ce2d689
SHA12ca613c3be3a191bf33c39f32a3674a9df8eb66e
SHA2563826e164794d38fd596f1b9c8ca0f5b38ca1847633d5f7f06ca7276b64906513
SHA5120acf31a1ac058bf476e58f47e052f1ecbdb4eacba150daa240154bc2d6f0878dcd513060d3ff098a44fcaba9d1059433ad69eee6ee4eaf65a21ba7e717fd439e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573770615b8c3a660e3ad0554796f664c
SHA19a12de9cf4ae556e06eb10d6daf5562dd5430980
SHA2560ed80160156ef5561086da49b7361c79d2503b5e281e74c067d7c5516517814d
SHA51269042316306ed2142628c9975245d82bc7ff68024aa4052769a1a98a80a514b58dfe20f9675c7aaab1827e9d0f7845373de5380f303cda207adc20969dc57d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fd2f9d3d1f651e481e184778d189cd
SHA1ff4e393079def4a5471e2880ce2ae46c33439a3b
SHA256b3f6a7e23319f0bc3ba88745342fe15bf59a2be1b29ff846ad9acdce484f0db3
SHA5127bc1b297ecf8a74aaa76b80e3bd1cef3f5c651cb1a2ab9f1ceb41d30e19805ed7ad0628354479dc0378903dced7038a3962055e1a33ff8caae021e43c0f8326a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53161f9510de26b2363bd2edd4cec4b04
SHA1eaa021a16cef000679f30f15e9343ed615a99b54
SHA2565957bb70822b85d190affb88bae1a6f659c032960ad4845543005d8fff2ce00e
SHA512d051aedeb87a616f731c25fc00825812b536e0dbfc6349cac5a5e3625b4fb0ae7c0a128410319dd38ccbdd896337e677cfa158c3203b33b0b1942a911e07f5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cab40d5004f421026770cf9174ca884
SHA1883f337babdd32a9697c98ac90c55a37d70556b0
SHA2566e2f82e56c088e2164bd59128e19d13149255e8d324ecb1467f21d97a76447a4
SHA5129cf3cbcc9d6a0f2bf0fa0c0f09c7b128e2a2256afb3cbe19dd362ac32469cacdc52e2ab1a56e79a6f771b86d66c9e83e8b8879f811ee7f3c612291fa1e26f8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518357e9ae3bc8f9903f129d3256b02e3
SHA1089d6c0e0bb74a8d7ce9e8a432643c9d667e2e1c
SHA256e4bb6ba8b750d2d0e831d2d2cc3d192ca6ff9a4135d2821aef7c79a2f220c4d7
SHA51215e59436f3a6b01a4137e884ff23f53e729285af974ad3a7568b40f77dcaa3b0f5fe381a6d43e22d7129c6fe5383e3abb4e35735b7d617f0c48f239be672290a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51baa000cfb8fa4b1c2cb3cb8a438a8a5
SHA1ffbbbca6c0577ed6327fb71ce69e1475ba78cd8a
SHA2567b527367f8964a3b6bf8f773ef9d38466aa2ce139f96c673835c82f32ff25320
SHA512bdb7e3fc6650f07a16e496bc9dcc6775fd329e9c23f00196461a0fa21fd93541fd26771d0a2bfc0ff5d038346ef1ef0db3501a0231f7d4f0b35050bdc7bb109a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b