Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
e268956e5c831419c107661adc325e5c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e268956e5c831419c107661adc325e5c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e268956e5c831419c107661adc325e5c_JaffaCakes118.html
-
Size
461KB
-
MD5
e268956e5c831419c107661adc325e5c
-
SHA1
186014d3a9e87cedcafff49d54ce2f82dd2960fb
-
SHA256
95fc12176a37719c1243755d06a8846e47696fd894aab4964001394c508548df
-
SHA512
223414f8289995d53fb5ba6f05817acbce7187a7a7d6dadebb8ecb78cfa074a34b51d61aeab1f4bcc4c9525bc80f06633d9dec93f18ec8fc9dda7160c9a0d85f
-
SSDEEP
6144:SpsMYod+X3oI+YssMYod+X3oI+YEsMYod+X3oI+YLsMYod+X3oI+YQ:O5d+X3g5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08965116507db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432562687" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37434B01-7358-11EF-8250-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000186f28dc78bbd845bea53ae4b4e4b05d34141ee2ab11a0e22e51ca895f519036000000000e80000000020000200000001f912ce7d0bc88d14618403e9c864965ec23ef03e7497e5654f69d207172af0b200000006b9cd99ad508ae3966a883522538283d71e3d0b0bd8ce1df90389a168cb50c5a40000000ab267d2e23b5afbec76aee58b6118e7fdf23bcf955f4fa0d1c64d6ef8364f7aa38b109e7be7c5642b09da3dddf246666d129ce5e55aa798a784ff739f271b88f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e268956e5c831419c107661adc325e5c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a0a9c49fc289533cbaa0a60f3e4012
SHA18a8099ea851061cd0d8f5f6add9823798122f378
SHA256fa3b668c365a851633a0e06864c09e88360d18c866446d457aead285af56cf6d
SHA51277a06e58cf3755419699545463c2b8559d3bf5a60a2e0954be29bf0783a76343b46956414584a0cc5bbe71ff03a9684dc84b365a91d4da893985848e2c81ec5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb79e7bcef6eb7ab8888f0995a72c91
SHA1a12f126a5bf57434e7de0568591fa38c28f2e539
SHA25643133f602923cb868102dfb8f9bb312e5f0fec49455fe6b7b0131e0e4d46a0a0
SHA5125f9260a83218b66f9f684d0a8dd260a8975543f359aec0e52cdb9ad88b96e3bc7d3b9bd2924b5b17e190fd3ce39587ffc0c415cead5dc4bab6f0e9240d507cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd1f444f0a58c63fe8128d3a464e5aee
SHA1c92c3666a85069c9317e998091bfaebce1401c48
SHA25684919b9d928fcc5ab45ddbdd7b51f18c89809a9c1fa6ec8c02d7ec08573cc4d5
SHA5124133a2d8a9ecd309f4dc7ce883776ebae0aa2798c28422981a1aaea884c07cd35d15580e54884f8a18d0abd2a46c1c563f5cb3ed6f626ba22fe5d19538f98c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bed4d620e04049b8ddf7a36477ecc62
SHA1e94d114f06722a1100e189ad31b5309985a005da
SHA256891bfc01107077da3dd34b80ffa3b12730c7e24868d5a9c02f18e60c00b0eee9
SHA51257051267fdbee438b4b6a3c2738f7c5224ad5ce1a4e14dd36f1ebd4660b8119f6f72eb75180ed415ea19d4869226c043c220b38a658b8b7f713df30628e5b274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fde8b00f87a68c2d244036752996276
SHA1ad510e6b186118e7242607013033ef0c882e7e4c
SHA256fec4da3d34ea36774dc59f7343e090d8e56480e0a3fb1b8de0024dce66bd3f65
SHA5126f232036b7d5f9739cc9b6da6f5952db936f04bec1aa15e612c81d5a8465fe6a5b723d680a412becc888712ddfb30fd94b12e813faaa6875283d43d42656fdb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c469a1ed76586fe89552931b2d268e33
SHA1ed47768bb0c484a0e88d78b00cc15e1cb9580f42
SHA25663fc0ea7e995d063468fa2df3b25895241cc4249df8fb8f00a3bca85d8afa9f4
SHA512988702d0356774cb65391444e9b6326f6b483c968b0523f03d46bc210884ed8dd1dcc82a79b71155bc312fa1bb2a62b479c1144569f7bd078f099c906654f31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52182439de82ea3090a6310e8e54732ce
SHA130a76f0ea713b02373aac1cdb3b29ccbecb2308b
SHA25646599b4c49c55f8a793e30dd0db7daf03f4959ca51d2ae91758b295709a2131e
SHA512569870535d1d9fdbf02de461fa06abf3b99c9fbeaabda7d226169b9afa3926f3b3362e46b49150ac2df1fec4d84c80667e307b4cce87792eca1b808bcbe881fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81d51e2beee5d31a5b9f1c81b52e09e
SHA1564455aa3378d982ec5ad538ef5c30fe65d108dd
SHA2565154fc4f4cba5af4b41799e39ee9b6904ef3dcd8da9fd3ca378d8e9efb7cad50
SHA512d55e3bab8032d16dd42642584413f464748d688f14bf19c1cad30dd03ab3a7a3f4260fc6fb7a9e3b8f4589f58baf12a8fa93db6562ddd898c26b0eba15e95ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c14bc84f7bd4226f41c22560310e4feb
SHA1d5f545c177ac5a803552a001764bac088fc5429f
SHA256fffc1ca65c2580af7be0d0a8c92d831bcdeadd47863e4a945e3dbdbdadfbf405
SHA5128950f66f90861cf92b4d50ebf281c8619fd237ff40a30e2f7f33ab4d67a4ba96c6e4b8b0557285fa3ea780ca14fa73fe38391a1d3a0c70ae62b2563bec7c38d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e643d93c21c5870dd408a8cf5cb0a04b
SHA1218749317133645a745c20d85359aded62ee5efb
SHA2566ade98b1e01a066f55e9e21d4fb34eb345a50055a01097dc24c5aaf7332b5f2c
SHA512b2aaa7f61a8337ca156f7f9ea94e6f99b458799f1723cd2531ec752a639ccff881a5d1752b7e24880573b89ab1ac950dbc897fc49b851f7e2026bdd9d5712ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbed045c0d45bbdf428970763fcb628a
SHA1b8ec0e6d273f2b1e12a675dfc89aeebfc54acb22
SHA2561b8fb2a1300f7dc35c1dc2c855cefa96d797e2ee8ba6e98f20061f3a01d44432
SHA512e0cd2a93829691c519493d9efe5424f1ff5bb4833c05f025154420551d4122d86c7f7dce1ed605d239c58d0fa854e47b040a488fcdf7d8c8368fa543091d85c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea3cacacf74623500f7ed5f9448e552
SHA149b85f9086fe4e1743a649e0e68e7b278f3298a0
SHA256603071540a37d4f0c204a5d00b6da75946c9bade0d4a4c0ea477800d2a20f96f
SHA5127c97f4c55f2508dfbaf0db77a1ab002f3cc55a6a9abe7ad541d55a1b15e0850de1459ee3acf1a48ab4efe2d2d649b24733c66f82ff7a02dd4b6dcb7bbb4d27a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565417b0a4ec5de002d71df16aef8b39e
SHA1f5ff4f9dc67298f9621c646db7ff0b5c951bc4b8
SHA256e44b85d86d7edc1c1db0c82399b90d4b7c201ecec830fc04bb976075aaee72c7
SHA51268a9c1f2cc385a96f84f029955cbd0716e8a55b5dfe00a82d78f055a092bd5f56b1c2e3f77457268bbdcfeddeb70380a575f4216b43bc55823e1e3120a5df887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c01bd0500bb5f798212fb7c7df36224
SHA181e3ac50f30468228a9956e601cb5aaf16456ea5
SHA256dc5312c903a392497e9f69ad010fd0f1ef677c100d93e871ea81b4a2edc355d3
SHA512f10a5a38bd7a6e7f42f76a58c64f0aaa9152d5dd5315b53b02af5db286439dc00f34ea8fe7c9df20a3f27e3995d20ebbdc82d3670a20c65a214758dc941dd6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8f27b29b87ce6794a3322aa88d4cd7
SHA1c19ff73338735a583ad32479614a5d5ca340ce2b
SHA256d382a90c75f401e501dcd0ba9ef7e6ce9e5c04e168927cfda5948d3f53a0c8fd
SHA5126951fa0b5529380fa4a03ae022bab30878ca1d647215a56670b7fdb6b665d5da25b8cc637cb669a888819e12021af1bd2667c2e9ea94d956f815826fe95f4676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49d30633e3053feb95961bb311aaf04
SHA1106cb8ebeb1f69d93e7d36125c084cf70299fb2d
SHA256651611d4141611ff36a7327406dd36ac067e1b720894a694c786db96da14b2d8
SHA512b2ad23361b2ced32fb61576eb194d2713abdd8b0c7f0206984f69705bc4a467acd994eb68ceeafd6334c1319397ab824d625e6c9feb8a3e5e892ac368eee1a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dde4df36cd7c94a8b3e9e8d8d8236415
SHA152ea8b7f6f5e9679c5855439479939b5635ad877
SHA2568331f02a87ecf6e08e2e258aca9ee68305c21d74e6b3a5662d6f6df5d81f7fc6
SHA512b63061c4d8c0d363ace64a2f57e9aad8d2b76f56bdcb5e231fc92ebae60c666c3f77d3d0df419943f88962579c5a0663af46625701bc08f55ee4eb46362068c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c79960b95c6a7c361c6d3c584aee9f
SHA13144dce821fbc13e5a73b863d7ef75de2d30b1f0
SHA2567e4a6ce50bc5f51c2a611e585557bf967df1a9579baa87169d4d7fe4684929d8
SHA512e3a5cfb82f93b63aa75f8d9f8b654ab412c83acd46400a8ecf84c57b8b778e1b86a5ab3dd2c2c7fc489c08db9e1b1df30fcf3574856180df31d919ace575bcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142599c46db9e797a4834bce58178d20
SHA12cac057374916089ceb24c0458a8994198739351
SHA256782f516209d7083c25e01d944c3255848f661d222ec1d99d107fbfd198e07eb9
SHA51228d89e78a31b497558cd4bd6c4007e3c243e214987fb686be5af0bef5acfc80b826515ea8ab5d602323c2f7ac5e353f9af03f797462d456110bdbd9539a529a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b