Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e9c70490279f6834653946f7400be091_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9c70490279f6834653946f7400be091_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9c70490279f6834653946f7400be091_JaffaCakes118.html
-
Size
72KB
-
MD5
e9c70490279f6834653946f7400be091
-
SHA1
6ec56b28e9dcd89292d8fb4de2b044aeebe2e2d5
-
SHA256
3ca83754af1ed2fa0a880345f1ed893904c9f2b40c0d1740abf513cf8866bdc2
-
SHA512
4dc4d960ccc150ff19ef2edacbda76a45421245087a372fe39100afbeb83a6177875f5c57dc1315ef87932c62ff1b84e7c455d98baa5b8034b20aa15c42088c6
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sr6QI94bl+PoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpq:J37tl+wTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006eae42cd04aaa939239679cf8e81b18e055f949083467490993353e03d3b9942000000000e8000000002000020000000103202fd8af329fb9f1251764db6d65ad76ff6543d0424091b7f44b452c5064d20000000a7f634e784598f35c3d193b183941fd130dd599d02f605425209fa17cd1a315a40000000070a8c192419ba6e8a95cdb3999f059bb5c5c02927890284f4818d933984a2773f3079b3117720f21fab1898e6f7d1cde950897c7d87fc7dae6779ddb13038be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432847742" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9E8A451-75EF-11EF-9A35-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0721cc0fc09db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000771ae11c6705c834c5167b39db19b6bb8ca4a0bb6d7b05de2ffac14be2002ede000000000e8000000002000020000000fac0bf10a80c95f1f071f6d36f5a8537f4ebd651c43b28727a322e427e50141790000000f3351a3086918ed2e3869b8a8ad008b0fe898dd209acf1aeb94fb4d23a9933aee0b84fba9a29a3fd00e03faaeebc29f44a437aa045716d4f754dcf226416be03c337a1a02ce5faf4c47df8a9e400a80455b67c574ba624780776823bb096dc63d62dcb7524ad5dbbde1486605c6c2817cc169b05664400973469cc597c00b8e084920e7a2ec2b8862d08657d2647498c40000000ab22675b71eca7ca8f1b8af0e636cf974a4931d56eb629d11654b9f383ccca3d74a402584484e984753c68b9e56b3b29e26d2840ebb4595de923be6157cf1893 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30 PID 1704 wrote to memory of 2400 1704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9c70490279f6834653946f7400be091_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f815da0f4c6a2566c8e536d2f53934d
SHA1e0914e545b70a5029fbcd821a5ee6e17a60d68df
SHA25645f2dbb2e2715f0496de6cb2db8c8c68a74a1a1dc87e268770df93fba201742c
SHA512bd508054ce1b111261761070ddb3976be3a5a309d5b4c74a8bfed5a4a7189d12b7ac74b74ef35065807b7a5d83fa364c874bd80d7397bc637e421c6e17209050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc0b25489a0d1fe064fa0ae9f965f5d
SHA1b8a585ff037c1cb9055b957ffc8feb921368fab0
SHA256185a8310c2bbb11a0d7ce00b2c040736afd601035f755840fbbb97a6254c64e0
SHA512ab8ca0a3207f12964d12583e83721a042b7dbc0f7a13bc30410c42187d4184300456cb451af526aaf31cf0771682bbfeb220ea9892ecb8716f77ebe3cfc31b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa294f4371de4127feded075e0fe52a
SHA1e4cc069099d50ac7a0176c5f1d4d11f8a68cbe15
SHA256ec8517be5de08c7baea5da7cfeac7ce12d2170cc6565d4fedf8680297a3f803d
SHA512acf282b702bd149c3523cbc2e4f4b33abf5406bbb4642b5456333d5558f0d2a8e589c5ec8d72960af7e7548c4c710c7b2aa78f987fa2285b5b01945eed5375eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4896966bacc0d5864fef6fac44e1e80
SHA1c1c7c2fd3852a7204e308da0172a8854c2f2b009
SHA25695dbc4f4aa4e2699593a8b7cdb2f654e63c42c60c2dec215254cbc42f1e77496
SHA51225ac6006c6132cea509e50c7e16c61295b3123e95d116809bfa80edcbe77cc38dd3cb02a36120f98a0075b372af3c6a9cd94b934bc2143a238742e6d583b9bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa7724fe09a03cd0c27a00c317a9f90
SHA1ddd66366e667c062e2f46b72f702865a3a3704c3
SHA256466b7dafdb9d9fe4e8d85f797f490c9f4f9ba942966b36c8c14d7e39eb6a523a
SHA512e11ec69336acea1bade5a366430044e736145efc07ed37049a05c356b057765211522c6bc0138a0c02bb51ff801f741a7508fa53da437f3b176a1a471c01bcc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e508b8c306d07b02fdce7abe1b99fb66
SHA1bc2f2ed2469a03e998abbb86f8a7dd78f9d53eaa
SHA256c26a0bdafb30379fc25d42c994072ea92f9728f9e176245013d82e93bb9bf282
SHA5125e761e1b3efbd82885c9aa90cd6dd05614ad4682532820fca36ce2b06383faf38c466520ba59f2d9372bce08309709468cd25b4db84529a473343f3f7c03a3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52baa6c70017030aff204f0859dd51d01
SHA1e036ee419c5bdac7231e534741c65627a074dc3d
SHA25614af66434698e2bd6a21b411aaaeca6b3c25e1d0966012cbad724c5784cddae4
SHA51227f50d25995f14ebff8500a65a0c2b204b3446561ff05f4057f19780111ae2db1a19a0fbc77296343af3e4c4a657c638aa7024eeb4eb39fcb0e37e6180dfbb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d0a2edbed396903925d2a162d25d5e
SHA1747ccf608335588cb93f34150908d6204f9b9b54
SHA256b29a3ee4849cc6d98f39428a9978f328dbe6b102e3c2b9b0da662868d655ab86
SHA51273628fec461b6d200c34cb804cfa663004050945d6ca1c512f953e25bd34e271b36f14c619e8103c2d0d2fdac7210d6356c70c76b07f9a303575a344e2e06415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f7e750a1c95f1aa977e16fc69cd764
SHA1345d703699c5094af14779246163ae451305652c
SHA256284326499844ad217f0f99f8d3bf3649e81fd1972c1046ae47b215eac9d4b4f6
SHA5124b7543f7792f9cae84696e78adc99556e9c2bee86e519d9c9f3effcf84871b24610396c3cf44f4584ebaf4664bbf9f89f99ccea3b4e87e3de22572210b178b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a417a329261d8883f7ca0f6b4b40b3b7
SHA1ae786e039a919521663dbaec5bac76ba01e49301
SHA2560f913a58e0db00483e2bd7096db52cbc3cec8dd865fab769a4a777dff5529ca3
SHA512356fd5772aae720e744ec94077d7587995be8b0d665a244f66596c06756e7eb886e67a5ea2352f97f25d25e7f4f6a9f4528d70d15020215fa3d11acd59a3fa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5139a9cb64154c61342515d49262db8
SHA16445c9515e2114b7dc79679efea00f481b4839b7
SHA256e3829d221f0952fbfb39080b179231b54342f9a5d3e8508ff53beb47b3413370
SHA51267b71df18f9c381b726049d11d8310f8ab7e6cdc835737a99f5b257f3cded8199075d436917cd1f5f874503496afe9664df297459164e499e45b309faa012279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc42420d59a57bbd87b2ea6fcde25cc2
SHA107ad22e58290c8f6495ceb9adc4c9f76ed950aa9
SHA2568506602831d3e4c0f0226afdc375241718d0b560ffe763ab531c8a6f51e96fda
SHA51258c732cbb9c77ddf1728b6c0c79f230434c54a98cb9a1224dddafe128c94c72d76ddb536254bb7302b8f761ea12439eaa7d5c7cab55d47723871a23e5352c174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3113e96b5628e2c20509333bbf6b49
SHA190a0d4c6496eabdda2e87fd3b2d8821d1eb10110
SHA256f019f95ae51714c90e7aca9983ba2976845ea048e520c6ed5a753d04bb8a17aa
SHA5126ad4c6d43e3f47b01dc65e07069dd31ffba3a0acf81eb241d9b0aae2982217a47be43b09ddab5b107b49727ef5a183d44081c81be82ec3d20579ad63400cc94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de2daf4d82f653f7ba374fcff023305
SHA1cc8e48a9fe8f765e5aaca0ecb2d2f9522224f2eb
SHA256728bf7ea71c56a45e0230ced32d7162d479b02a23acb660a3f6e8d030a4b644c
SHA51270f805032af251b0fd478b03fc65110a707669e7f168357b4f30f9617550e6844d1a7733aa6ace66e52e12053ba4d4e2ac7f2f7516dbb86f080accdf20ca3f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581105bccd71aa2fc47b702726fa88fbf
SHA14857509eb01add7d1bf64b4daf2cc52f078b8c76
SHA25667b534e6d13b087cf6359e761e6762330fd68553b95d88863e1c7bca800f4c72
SHA512c583ab0736c8e2bdec2c0de916ff008cf35fb202e0afd5d72df042c6377813808aac2ba023b2b24a0b0604724481ccef2449178eea3128d6974d9fecd9327ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e35c3fa6f547453783634cb784ffebd
SHA13e84b29cac3e229a6226f14a858b3889325e39a7
SHA256c3c1e583810248d8d2335255934680783bafdf89537bef8651adf2f8442110fb
SHA51218d61312e84d82bf53bef83455e62ef054845e0978181b08958f4af78aa2ca902573a2088944a53113089033144f6e7913cb8a8ca446e8918ce6cd3c1e46fbf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d312027fb2eeecbfd75143e04a1b46f0
SHA1eae0fd0bf86013243b5c100218209b5788d4babe
SHA2567ee56e017f79cd0084a94a3013b86507efa018ffe8c1cd3ff6aa5ffef1ec1ca7
SHA51284786c268364897d7caaefd40805b62ce13002b2e38a28989600ea51509d215ce01d57c42c23b86ff4ec5c2c4e06b736e903c136653014a1ec8b56e2141caf16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be3e1310587bc7255dc5f6c31ecd284
SHA103c84a8b6fa8ad2a4ee815e24ba381843201b403
SHA2567b554cf3f4edbae4159e22ce4994d4d6ed8515f9fb022cd980829001c12f639f
SHA512d9595a0c737df1ba7f3b700b835b21d38beb4c3ff1d983622a5f3449ac5dcff289d83c766ebf4ffca57aa6d615f86fc62aabba9afc68639088a4dfd54f885d8d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b