Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
e9d362fea66a4c6d15f5e8134c67c2d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9d362fea66a4c6d15f5e8134c67c2d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9d362fea66a4c6d15f5e8134c67c2d6_JaffaCakes118.html
-
Size
14KB
-
MD5
e9d362fea66a4c6d15f5e8134c67c2d6
-
SHA1
e93a110a73127c3a249982ce7323f5eff84d8bcd
-
SHA256
904234815fa14e7568a83efbdebff355f4d4c588a657d0517dd008fef410ba3c
-
SHA512
0c911828537e2adf8d789b1f92fee2be21d0ed50f7f88487eb82830038e3cdd46d7ce29c8445cb9b02f7655772ab8766f4a54348f00ba5feafbff31feeda1a38
-
SSDEEP
192:SIrFpfuRt6ol8XxV4uQCAeYqIuuuplX6ATAipNGOZykhq/xHj2SeOqOgrhAhdpV0:SIfu/lEuuD6SkHjBe3rh+lT4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309b7031010adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000267b649618f36fe271b6cfc8926389a1286e8121a1b4793f6e771b4abf7cd14c000000000e8000000002000020000000fa61b9c8b277db8d0ccd2df7394cb18744b2b32ed0c896a16490c193247a409c200000005c88d462187ac0179404d31a837554fbf7e3ae7052dd513520eb16c47ab0a46340000000d7358f288ada9fedbba2dc1e1df0b8cd2c39df91261ea080bfbd9307e5b870debcaeeb8c1a327015e1a13df4c626b0f5c914f810e534526a0aa12ff58294ed8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42139B91-75F4-11EF-A6EB-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432849608" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 316 iexplore.exe 316 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 316 wrote to memory of 2536 316 iexplore.exe 30 PID 316 wrote to memory of 2536 316 iexplore.exe 30 PID 316 wrote to memory of 2536 316 iexplore.exe 30 PID 316 wrote to memory of 2536 316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9d362fea66a4c6d15f5e8134c67c2d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad86fe53df7a89a1a394d001a117491f
SHA1fef4e7060a122b51fd55979e96157ab865026f44
SHA256af758f2997118b3f587ee00fab4fcc3484b93b03e4296727fadc96aac00c7dd6
SHA512a026f7460871ccfbb6a4f7d92fd8341fd4ce5e5ce13b2b22d7a198c33c9b157a0f9334e488054c94e4981b4eebb2954d58445dc25e511d94c0ba29024eda2ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a44300afc35632ec7bcbce7454c4f78
SHA1f79dc7730fc1dcbcc0de6538725effc1b40a3e80
SHA25626ff2a149c774687664ef97cb8d5d2e2696f95a65b9e84e71d72dfcbd2b9bfd8
SHA512dab7fb7d3b3402785d1c08432c332332158acd236feb01f04d71571919610607a2494a7e40377475674ac29fcf5dc958c887e16d2a3eb9b24b6ec71af817abae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde60add2061cd4e262c4661472ca4a2
SHA1cb4cda19f905e262bc40ddf4c0d8ab39e0316b0c
SHA25683f2a0598b810b138e2c6b373dc29a6f7bc147a7b845f662692cacf182f78460
SHA512ecb569a33408b52c9ae2b195bbfc31d8fea907e266d26dd5d2c65530f90925fd079c4701d49b603831112e3b36581127e04af65b344625c572655bf96cac5366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e6a50ed0b484e433d30b84afcbc96c
SHA1404425e981553c9846f5857b6219e4d56fec5ede
SHA25617d0d55d319b77f2ee70ff0db98a93a64489619d69ec658eadc55bc4230057c6
SHA51276354e412d6ccbdf1401277d54810835c9d3407f3c44938e75a509eff5651303fbaec63f49fb80c11f43f88ebc95489b2e9a5a5ec28dfcc1fa94a1b349392532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0303507ddfc640cc66c612a4b8d721
SHA1ca3870a364c7eb026c47051ace59eb72b02196ad
SHA2563fb89e36dabc4804dbd704be0abd19378aba408196ae603e8a4811fdaad7444d
SHA5122eb1333b6f827cc275e9c2424c06d6ffaa34a002980fc4f393cee67d10d28fedd8036307961e3d42419b6476f45e5dfd990910c0f23e6e22e09ff095c940b3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc1d42ef676721b3c208304ffc60de9
SHA1bb00e398e96b6c55154860e7d201db359a013bc2
SHA2562a064ca615176b03a5283bff58dfb3e133312f58546ec681266a23dc06fa5cdd
SHA512b7526fe4c5e4b89eeb59c45fc9579c8d511933a51d63a155f5aec1782cb36389cf6063ff9f2ae3f5262d6b0b017a64d7e9533d63b69bf9aabb0e55f6df6c7415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505db99f042c16c6987ded2a5d80f00bc
SHA1ad9152f6f6e70a0612e35f72c59a37e38599dcfe
SHA2562637c8faacf5ca71e2ad1d107dd1299cec1ae4015a47cf9e3a53f79abcb2c7d1
SHA51261a2c512ee143658ea0cb97e9bc504deed848eefd9e8c6c86283c60ec101bd5e05688c83d4599f41896bdded80421b9086111add0c5a4c94afd7a4f1db2193e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529516b234e567aeb89c3db98ada76524
SHA1c1952ad2fa6669ad09bf29990988bf5a8c548bc0
SHA2564848b0f6e560369f47a2e219cbe7f0fca52ebbd5a2cb2c9777759bcba00b09c0
SHA5125d92cd1b3a24767410b1ec7482a86afec929841a6cefe9e8a7dc141173ebf24ca7c506c90cf3e2a4a411f71b7123502e47b864e94f77af4c76391ef937d542d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ecc2b35433134bedc9bf6ee6f70fd0a
SHA1d75a41d19ea89c94032ad902707ff46d385babac
SHA2563133940978c14073065577f0718c17daada1dd283bf285b690b2164d079e9fbf
SHA51260513c18099adf81c4611acbece456c65418c442d55fe71b5710124631a95b12706260867f0eb437180a4c90dd85fef9cf8bd471bfa0c5449d7d988d009591bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ca911a68cea345bcff7b7ee743a5a7
SHA18f14a05db3cc20ebfbb1e8e547921a83d18c091a
SHA256935d65f9ddf74c6b98ef45cc8954413822934e1d3e54b4a9348bbff97af46d23
SHA512910ca577a3ada2e294bd9298252e3e0e78dd5af2fe1a0fea2396de37f8c281a00b1dd75d098576f12c521da6f3a3eb2418c45e33c20432f2aecbfc43e0968b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5553a6074f6299ad7ec54b758104862
SHA167121e449afaad839a452941118b8915bf921815
SHA2561c985aba44abc90dc32950cd959d66db0ca5d11fc4f4670c520c0092d44f0062
SHA51239f22910bb2b995e19e7fdd5a8741f2f2afdd0a19bfea9b6dad2de6f96d3bebb66434b4dd0e8b71c5f66e62d3ea91ced415d37dae8deac80ded864c168a41eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57100abc2367640093afc6abe812530ca
SHA1e77508076c8d9cb0ea0071921e993ed95de02ac3
SHA256faf19655cc58ff2c45ea00a6b7811dcbdc5c9dc870fbb095e9fd932bfef72d65
SHA5126eb8d9221011a45a1194d20c9fa132281dbb50369b01d47be1ac252b710f772a47841a314ca5988f347d2d3dd72601f2b81a46587a422a42999035633a225559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b468bd285e3a88c2ca73e33c52cffb73
SHA1e42fa7460228317b360d64fbac175a50325529be
SHA256f3dd7f40fc66aa71fcedba4feb0a1a3be740360836e03f96142e232eeb0e3c41
SHA512e0a7a1ed6d60958a02fd4468db44dcbc09ed338abd5b16c601293affa1833994f95e362866b74867142b7ed2df5132653077c66f3876d5f65833e9f95e367701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3144f91e7efa42965047bffe790ed2
SHA1e594d45d7a17b5c7de6fa7a1cfbe07c63aa4ed7c
SHA256015aa73996f5f30e28877cf172778134936eae60bed02e7cc9959a64c5275b08
SHA5121bacbef45d92fe7983909284591e7e783bba2d1af3d4e917ea0b79e926c947cc9531dff2409ea40f2cd2f1542a5b8b37a0acad18f4fe1c12612732a52d070de6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fdb4388338203bd0cd2a8778b44d40
SHA119c35b8d7f623953e78fdfb9a263f3501ee1163f
SHA25602cfbafeb063ad3a211dbc000263e9e21da505cabb3fe03781f5e1b9c187c7f8
SHA512eb5c4578c297e0a97ccd923290e372b071197b8fc0008512cae024c22db5fb048ac2a1f519ac1bc8d48b19f4fd73ad8dc0d2b12be0b025dac992f859e9adfd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e0fc6789fc1edb45ae7ef60a78e76d
SHA12d503b7101d8389ab764213b90e2fde4eebc0cb6
SHA256f6a0f524d45d487970ab58c78035b9f78b40f3d87d83ba4bdbc83b45a3cd5919
SHA512a82e7ea3714b306780be48634db4fab2bcc7d7b28d410531bea30ab1493eaf1c8eba2d1f8709a05f94b7a79255144cf23d835b11546c6cc67208e63302a689c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f330aa2592842475d807f468dd2cc50
SHA1b15cbd83efd9c002c9234603030e1978f284a7cb
SHA2566d825b53e6cc11f9210a30f9b1272cb3d748357c67d2cb43e1b2c03c628548a9
SHA5122b20a2a7ac2437a2383b3eeffb96babb1415b312064dd3555d8264c8100a7180bd20a4acd9a84f8cf55347dc064ab645318d9a3921d79f14684b706218438f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471f116cac6b1f3740aca9141b53cf46
SHA13d06bc467b54d8f64ee54884f7a628cd432b9a9c
SHA256b2671d12f496fb9097618edefbf6544d98e192f93e9203050e3d2b7d334e0405
SHA512237dde77b7f23e7db6946c3313f0c5a78fe0c034c97f5be0978500c761d84a56b863488973efc8d10a6e601978abf9739461f6becf876dbbef5401a2effab0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513875d1b4067e658a522faebf668e604
SHA187135a507510940734d5901361599deb5456e8a7
SHA256ecc3fe6bd50cda6035886aa9c51b479e593face174dfffd1a7ac951500075ea0
SHA512064be96d64d1d200e0a497efc89d5fe96dd4e55bdb0d9d69ccbb54c158d471dd260e84aa2c8aa7153487a01dba1157fe841f5bad24bee59a7c0f0386b76942a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b