Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
e9ca4518cd8d8b89b96839749f0761ad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9ca4518cd8d8b89b96839749f0761ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9ca4518cd8d8b89b96839749f0761ad_JaffaCakes118.html
-
Size
42KB
-
MD5
e9ca4518cd8d8b89b96839749f0761ad
-
SHA1
18543fd5f52b9f23c20faa96d5e47374d7ecbfd5
-
SHA256
af2b41a2f4e2ff3e19025d2ffd7232123d49ee307b9bf19f18be557fc427d9a2
-
SHA512
9e2ef5eff54d9b3ec22bb155dafd54576c7b027ab703e93650c3fec057b16d08c8b2ca6e718d874143f9ed9d704f54fdca86eec43928c9d006c47a9568e89ee4
-
SSDEEP
192:uwTSb5nWhnQjxn5Q/hnQiekNn5nQOkEntL/nQTbnpnQmSxxFXcPhDQylSPq2Qsuq:wQ/IOx2UBRkx1DA91QtQ1/sM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c054c0f5fd09db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432848262" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000300189a3bb0cd0c12df7d9a70f0e38b034079ff3b24a7bf1715045f24436e14f000000000e8000000002000020000000ed80391541b9cdcb9229f68ab61e6b4e0459257f8eaa3b3dd9eecec5bbc52331200000006798ea79450ceb2f107d74c4e3ea0f3ed9f800122217d9088c02f3e28eefe1ec40000000126b41a53a83e5faaebdc23ee81df42d67ab7cc93e59316ff6de88605e7b4a06387e6899e53331e7f5f7cb9af5f2a8ab724419e67be2591117013c53efbc7f81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F3E00E1-75F1-11EF-81BB-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2396 2540 iexplore.exe 31 PID 2540 wrote to memory of 2396 2540 iexplore.exe 31 PID 2540 wrote to memory of 2396 2540 iexplore.exe 31 PID 2540 wrote to memory of 2396 2540 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9ca4518cd8d8b89b96839749f0761ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f8b804470018cbfe0a4b697453c448
SHA1980849995e873497461c235bde51df135679c0ec
SHA2567bf0cc0dee2e08f4386c6b67e51618d27e51e64b4d99955fc4625a45a8d0bd68
SHA512616bd3c18dce4566ee031080b5e004237d40774685319fedc4ac6f0d37d85e4dd285e579711bb1c79850a3fb66eeb318d023276e1a1e0ac854e3f8b37945e8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb47dc9c2c06ed1b92908f265de69c0d
SHA1256c0431f86f07c9059dc22f07be99645079d305
SHA256fe7d0c779a4750066d0e337c30758ef6c4adbe6c7e6066b14898529b37519904
SHA512993e390d7a6aaabe6c9b2cac39ee5eff9ec56ae4aa27c37973d4777249d7c6b3d8fb96578395ffb7f72c72d61edd1ccea3f9ee5ba8bc48b632ab43f211b0bc62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cea3ac90426784d2ee51fd500c5ebd
SHA1f51efee4d2789bbe57518192b11865692cd84567
SHA2560f636a257f00d9f9329b50e37a713f493fda10db8055816299930075b3af4ab3
SHA5120747ce841b147bc0d9ac2c9bd54631e6ffc22154ccd87e73795c0b4b44a76da51f23fd8262936c95a3f0b6d7c53203daeb8bf0ba57ce08f32eef68da1a3ab8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f922415665c6a7cdac9b94b99b230a43
SHA16a34f491c7c74d192a1b3c7319fc87ab67a946dd
SHA2564ddd021a70453cada0d2c65d99cb3e94539be29c6d5ca520507678f0fa6f6f36
SHA512a964a26a3a89344683fd2015485d28519c77ef405597b3eaf4772b3e1fc74559edc9f1ceb531c98d20f143d6f850840a27c9eb6c0300c32c53e69b6d708fa158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a3e3545ddf8f5366cca4c1039f1b91
SHA1f13cb718f24fae9cc30b6c05b64c570130db685d
SHA2567dd28af929ed1ca4d21db4038330d049eb7ed10b23c12226db5ac7c85c4eb389
SHA5122c97f3eab8edf105e1cacf3cf32cbdf9d88b45e4449735b099644cb653ec0340656db37db5e2f772812d8fd8b5c2da6bf5e9e4e788bb45c58aad6ed259fb3da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f37e76395150e665848204bfa937664
SHA12e5b1a8954fab4a7ff249e6577dd3777830d59cd
SHA256cf925f7dd2f8210e50857a0473ad124e83e471708c6910f7ea468b3e923c933a
SHA512ed304c90d7b6e99e3d506d74f79fe05c53798ec482309f30d0bf69af740bb5b51273f55cd2afdebf4c5d08a8e11e5bf18437bbf83962739d49be51d77e7a0179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564fa7d16377efcb32e5e9f6a4a81e0ba
SHA1fdc6c5fef14814c971844a3bfdf3bbe31bcbccb7
SHA2561168fb9a1c78e13cfb802acd089fa6a6b9370d444fdf8ad140919c575f92101c
SHA512ca2408b5e2aeca12b0d46b1977511e05e7beeb84bcb2c3b1e1d0de8052b5d5c9582b18b5b266ce28f957ce0fa14836aba69bbfbba11c3a418bfc9f921e61f438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8893495a691f5c21668a57c8f7266c
SHA1fa3b15c83238cb6357d45501316debac8368a96d
SHA2564ce0ef166a05aaf9189723ab5446a1abd01270ce022f2d72e761e60776b9f0e7
SHA512ca1c5b5be75257fd43f9590f1dc5d75d8a631aa72a5157de7585eca04a425580291242adcc34f4abd27a7d8dd7c4e98d53e34174aeb589f217b1343633d09481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea896334745b22b6af0c219da716ff6
SHA126a8f4e68254e63f430f12c89a4d78651886e28d
SHA25676d28d58636cb8d0a963233b941b62f0c11c5f0b535b2ab8c613238d5cdbe3b4
SHA5127563a2264ce46ef1a3b070e74c0f7b800e1bea75771160040aefc8abe88e795c2358c1bec5a07db0c835d70bb34a0061f3070a4bc4f33f34c39ad5bb97bd417f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700b12140435250475dda13371bb3a00
SHA1e74bb5aeb1b9e61fd3e0ff4a16c68b2d32f61048
SHA2568b772ff8c7e9edea54cb7f364e6a0d7f4a20bef680ea7ebd8c2293253acf8ed4
SHA5120768b240a10c325090b1162a207615027d4c3b5003f74bf9465e8aa2e04ac8f936de393ee941be828c1e8791044414076dfe5e1b8d03ab03304b73722c321a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d804228f2c37f3542d70f1cda857e08
SHA1230a3be07bc53c110161205f0766dc2dbcd7e1cd
SHA256f87ae6fccd880889b3fa286d11d6c346248f6b3cd9155a92840a66a2d63a1687
SHA5122644d70a3e110f587416206a40c285e6f8a5862c9a503759d51db3e43ba65a857040e43524ea665b909b1807363736d45e58ab9ac828d35c61513a2f0f211be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec3c539dfad9df76ffffc9f98d03511
SHA184fefe185d675093b801eae8e4e0f4e7bfa671ae
SHA2562944d0cd17c0d53d54d7d3f51db1e51a3875912baa4840969487a064e6bc6814
SHA5120e93ec554ba8c6fa62fe7775e7a2f82be492a6ac14921c27b54ef5d8a38d90f56ea6e67a01bdf4e2a45c7aa11fddc18db7817fe95a4edbb70d2a38d23ff2099c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c2908df55c8574ea6293f9e6f4b243
SHA1df7824dec586f864081a039d8281607ddf4a6ab0
SHA256832c6efdae6aadaa5574d112e19f626514c20bf326a856f0679753a317a41980
SHA51233e953e755d18f3ae08e1d95fdc2a5245bcbdd46bc59bccb53e20f868b17169355b78b2be49fc8e0e7058956279cb0c703141ef0ee0c23a6ed0da869dde04cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a108aaf4c5e8560b0dec7e99d4f517
SHA105b633e0508e4864bd03b874d3cc481f9851af0f
SHA256e7484e37a1968d83a946ebd8e23d4c68e90ec8f277b74f9d5c012b88cd6a7e79
SHA5126a30abe28d6dc71d6ff15f58465ea6c39dacbe94e9e72265ca809c9b268b165c2623cb77018bf763705312a93b2f4b469634e4d7c10cc1e50ae0e9b4c63ede60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c22afcf609db68470df665248d1a7fe
SHA1d4e71d5976c3fd82f3405e162f33c02158941b33
SHA256fd97f6dfa2c438d88e64830aa5221d932075a191ffdc2992940092ed708ac53a
SHA51297e41261fad6a72abeb95f462a77caa1984dbe68ceb0a5c4b3567c726126ac3545fcb1149c87e66520f16f70ee90302135871089f292903c6692ed7bd81bcbb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa110067971358ae048c1808ad75967
SHA132223f5794242063d7fe9f0552a41b7e3bc92117
SHA2567d3d0718ddcb5b077f9314b5bab8c0f40d0b72489912ba861172655d302db4f0
SHA51272c4b0e4acbdaf910593ff0df948d3d92f530115c6b92f6e930e2b376150a595e01a3ad4f9b030baa69f6f0b8eb8a8aa653210d23308f6e6803ae6660e9aefef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42145e3aa2f6ae29a293bc09455fd9e
SHA194bc56c5c568e877b9bc86941bbcc7209630e881
SHA2562cf47a85ae4b0a9689375ba8b699c031482519f9fa6accac44e24cce31a7493c
SHA5124e4f4262d348d750d44ed6b6821d70ca8decba0671c25f00bfa7dcb95ed827b424d60e7569f444911b44ba91c35bf8c21e636cb51ec6804ddb7c8158e4648c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e12d9e3386a2f309c8beecaa6b62b7
SHA15b528c4c0c1210071351a32c9f6a20b72cea7580
SHA2562fec1b3f7f3ae5ac7f2c0490416121f1ea26d4f71a7bb006eccdc0196080115a
SHA512107f6804661b4e50ca48bfe9d7b06b17d6570fec327e9211a04c778c709afad087790c7e0f217e36df8619a665e85ad4449b8caf5c1cf59d299ca8a5c67271d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b