Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
e28410d47997de2f50d58fe7a8338d4b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e28410d47997de2f50d58fe7a8338d4b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e28410d47997de2f50d58fe7a8338d4b_JaffaCakes118.html
-
Size
130KB
-
MD5
e28410d47997de2f50d58fe7a8338d4b
-
SHA1
140db37d52e30497c6e3f437d08f0df9efeaf8ec
-
SHA256
ddfcab43c99e1bb546976dbbc4b1bca42433471c6e69145c7c533a2dec33ada5
-
SHA512
1375c6b3c21a976095fa382571c2144669e4afc3bb492aee1708513ccd30bf88ccf5d875465a5e9e4e54a1486bd4c4f1b5de67cfad14359d8cff146c88d30925
-
SSDEEP
1536:6iBO5NyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dd:6iANyfkMY+BES09JXAnyrZalI+Y6W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432566429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002720b9081f8e4762444ce59346aa23a9b7f0a2f876c7e5bfc8e9de8e8916fcc7000000000e8000000002000020000000204ee30d1780b1a10d6b8e910370f8f6f92b8848cedd4b613fecf97f2f3b8a862000000002150d2e106992b4ca9993b02ef39af68c09e7c669675deaf537c7c90b3bc69940000000ba1db24262cde7a24e37afc75a42a68979d3ca3f4f7439a2b838d83aefdd45ccef9591c7c3df88d14a1c210dbd60792e8870ae4e1b8f9d0eef1e0691ca4a2699 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1001d9c36d07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED12FD11-7360-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2540 2548 iexplore.exe 30 PID 2548 wrote to memory of 2540 2548 iexplore.exe 30 PID 2548 wrote to memory of 2540 2548 iexplore.exe 30 PID 2548 wrote to memory of 2540 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e28410d47997de2f50d58fe7a8338d4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2087536c15269bf709a40c071e88b8b
SHA1d56dd2b24dc0ac823abcf82e6ddc8b5bd656b3a3
SHA256e389890410e657376d8c38cc6caf23b4f65162f96827d93fa6fe68ae93ea20b2
SHA5124030f24f22926a75ee3ef548fc8efe4cac86426d9fa2fd1c1ef51b31da2374ed569841aca8645f066c2452db04c7859221a17237da1b6c08c0feb96fd1b8dc35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525529967be6b663297a87eab1be33e60
SHA1e065e10cef1e20b744d47c8dd5673a41bd69022f
SHA256cc07ffafd311492d9467f209a2538fc4cb8b517e94200f1f8e74da2e6ec9cc00
SHA512fb4b12b216c29d507f730f835cf75c29c3600f019cbaf740261ae04500c9e893e102dc463e2d59250c2f499570e2f6422dec92c6c60d54c3e6d1349c60aac5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3c4b64bd518ab6e8d5226ca9c301b1
SHA1e95bacf70036648d2bb676fc0d611cf502cc4aed
SHA256c065484cb719d0359bd867f32dcdc6a54484ac8591b0d9219c5ec898fd5b2d47
SHA51206f60f5f5f02098b18d72961187c01dddbb758e5b929df5627154bdb74b3c181b2ce7cebe00ccc0e7bc3159f35dce3206bd780970e6c3e11854b246685b004a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556b90c3a421c4acea60043de0db53764
SHA1e9683c72ac71bc5bf13bfc6bcb4afd6586b930eb
SHA2562141436bf9d9a226f8f92310f27ec49f686bf91c1636c8270eeb2f776967e1c7
SHA51222f451a32ea2a156a5fa7130c05039d741eaa4c53c876a9994d59c4c5465d29972e24d3536d772d315488223987e18fef57d36b986038c1ad8135e4a160693ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97dfb5ad345efa7f6efc022d297d7ff
SHA11ddf106a147c497d8d1fe06fac39dd9dd95068b4
SHA25694c26fc3738e6a0c0cb423c8047fde2a570360e881971e2443a9b4c1af5813e0
SHA512dc876971705dbc37c664bfad9b245d4ca5f6fd1aac6354b498b5cb9d2ed1fd560d0253442ee29cddcde1bdfea4bd670f56ed5c1cd415347bbef6627d016af25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddf5e4c528516eafc4f396e78016c8d
SHA14c26f58788d8060f6ea2a905c8c4327f2e70b726
SHA25605aa18cb65fe1e366e3a443254c2671449246771ccde16122bbf4738c96eab8f
SHA5124107ebcc4fe16215b55e7ec2019d7304abf9206553a7d225fae9f900e431e786489b6aec3848925a53aa74752fd4477940b15324047e478276feaa2fbcb35b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bb4e2b383aadf3717d706abe7b229b
SHA128fbec63f7aa9be6e57d1b5b03959be01b9a1093
SHA25685a109ee772e2a5919076c5d4f1da5caed1ff57522b16f0fe62c6c2bba381f8a
SHA51202e245777d6549252e6415c0f3000980ea7197a55e69afc7737fb499998518ce0d66062399acdf3ebe7a9a57e0865d7e84f71f8e0cfe05a01ef836a9b6074274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad67645ca0817a38a7f02ec2130e5d5
SHA1d1906a60339aa3b4be4df58a68de4b01106a48fe
SHA2563fcc112edbec54050b2e6c2f5e36aad1175b3f165d3f403b39766b981273217f
SHA512f10929c9baac9903e24900fd28d641d06e824f585e91f04e5eb33040cd643481b0e104de56617d1205274aa9a81b59dc35cae71b450831360b059d9bd98e4cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d840c41af8e6d66eadd9c0a042212df6
SHA1a81c01a9a1eef519255dd8535554ac9473dce273
SHA256b79a64193dac1cfd29137971eb120f54b96107cb88184b4159010e0b3e9cbff7
SHA5124b076eab1dc0d340332a90141ff1513075d211427725bad2cf5e7afc3b71cb1ada8376e278439a8a05f0a2c99d58b67963460f015af5c51f1adbb43535b69e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ae8409ce7dc9f658aab435184299ac
SHA16c0ff843cf42b24415f676e5a584f0b2979e8e1e
SHA25633e11e4a8482673cb9277c4892fcd4a67254e4eb57ae82f0797a6ecef3a66fa7
SHA5129d8f111d30ddfe76ab023f5d3dd0edf9b8acf3527adbe9f1bf24d113c55d7e630b6b1ce68eb5e131ef7fc97b468656bd94581651c86b8fecaaeb813d60eeb156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2f788881a81a6ff84715c55ac331dc
SHA11c3fd6918cd2162625f381c1ff2f024286d3b1a5
SHA256e28e8cbba76c67ce3fbb41211a86df42e08c34d30ad878b35b5dd518370a2791
SHA51200add6e5adf8aa84e3584c27be5a25f718edadb723e355fedeb2cde1dd2baf481a769c5b7b801a2a5ef3babe8e89c2a10b8863ff12941f74238611c90bbf5e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b184faa2d3f230c211320c2fb9c0460
SHA1e177babdfefbb36eb407d32101a8057ff610d001
SHA2563d980448abb3adc8f6dbc63a5c0bf19df14cb1f0805480c31d0092bfc764e47a
SHA5126b6cb8e439d0795062a557734a43740b5aeb0d70640e7b5368f1fd01e89eed5d7c36240f2fa4d91998152dbfb7a4481711b90c97f4d797b9954d8a100a9d1dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a20a91aad26dd2f45f35a65b7f0ba42
SHA103fc8100f54dba17534add90a2df6fc648061285
SHA25667db1258f349c62f366efb6eb34eeae5255eed20c4e42751b6450a768a57d9ba
SHA512b8194ad2b7eb32e1cb919fbe2cb79b1c00bbfb8c42c1cc5b945eb6ba5d454eb7999fdb4c1898d15185975adf3a51ab4024cfd1af0b27698a41a2e1c68f7a4a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25fdaafd62395d88061d73b10e1dcdf
SHA1af9fcd1d19ff5ee8bc26e3013e729a3897c3f0fc
SHA25696880b070afc5f686381d679cbaa22a26081fbd35bdf9b8701bc9c5a24f7ebc7
SHA5124a9f8cee24907fd2ab3f1496f36a13cf795237a67b66d9ca1230b787f550a9357156c1571a39b4bb4b410d9d2c24745c8825b29c6da7017fc9e7acc43ccef779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d30e3b362ae8377fded82e32853173
SHA155152a24228dfcae6dcfcf48b04de0ccbee8c286
SHA25650e1bbf0e9645ebcb432c78cda6c9343cb63086d9668ade45b9bef14f14af1fe
SHA512d49da6f5f5ed59c88b62dff79e3a11e07546317234784eee16f5fd9b3b7a32f948210c467f08d60e35c13f60625af5b1acad0c6bff59391f32c7347946c61157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86b8bbcc0d82d419d5002f023f9d0e3
SHA12e48b53e921d2f19408084b709ad8567f586bc31
SHA2561255eabdcd034a35ba0402e1bb684ee96ccbc3bb3fe62fbd3fcc6555b2047a18
SHA512b6c11b17bb3ea18f7470213405f3c23c2107343ed1d2bd935d2a7424efd9bcd2191c224ef931324910dc4f7a9d86dfbc14dcbd9ee0f58499fab7f4a4203d3c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5624b552174ad7a046446afd9d2a0b5b6
SHA13429d6d76d848b97dbce78a02c2c3ee3e43881a4
SHA2563ff77b6e3694690f2a904e5734658887dbaf2dd7da33b398e3ee71bcd2475712
SHA5121ed85d6c9c19278faaf09510cd5412085bad98528bf2916dcb0d4402854d081ec1c4f6f0fd1528a64bffcc989e67092a1d99e275f26148f41ca130176b32a8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e756182089cc3a3bfef7d1d857f18dfd
SHA1ab6e9145b3fcc5c15d21e1b08583f6bf044aec7b
SHA25661e58e2f2fb5e77ca6ce637cb3ec44846400c86548a790359c78d06c4ca2827f
SHA512cd828d8177a500edd982704c179a0d4734e7432ac6d59bdb7c9dec486bc4657e10ac785f936d2f5a7785813c8706f0f58c86d9a1513e78eee2f7d647ace80e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caf66d0539da602aad49ddf98578ef7
SHA1c44fbf5f8e504dac2a507f5cab20c4920d399ea1
SHA256703240aab6c0d16dffaa96c931ae45eae1b1ae6ce3b3bc47893fab8f117c166a
SHA512ee8bc6921184f85238f60fbed023fa123a849d28a95081679319a47c553e717d4d5206259a392306f33348a7182385ffd5f71b30f6a7370427b26a37052e6fcf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b