Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
e9d9c4fa8317c159506db7c8fcbae8b2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9d9c4fa8317c159506db7c8fcbae8b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9d9c4fa8317c159506db7c8fcbae8b2_JaffaCakes118.html
-
Size
9KB
-
MD5
e9d9c4fa8317c159506db7c8fcbae8b2
-
SHA1
f05fe24d69ea579ba4ec051541e32856c3bb2957
-
SHA256
ddcd51b4ed490aff943343350601c753df5f4c93e890a68b2f5ee10f20b64dcb
-
SHA512
783f2fc0eaeb0613e27b7e5bbbe3a7ce4a3319466d5a831aa2458a497d2442ec391cd53861cc6591a0f84258a5814d4aaee68b93209fc52f1a2eae719af30b0d
-
SSDEEP
192:EVXe4GZf1WUb1/M9pYZsT8fsfEcFoQixeJNk3mgLog2Oa:HM92u4fsf3FoQi8JNk2gLoB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432850481" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A6CC671-75F6-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0dcd81e030adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005a20fbdd39969fb1d57386ec2ab4c4ebfe36e509340b3a82d0949a09673fb803000000000e800000000200002000000002e8307386942d61d68017757963d373efbf491ea2639fd5eff01b9bd1d1330920000000e82f3bb93ac942c81de73c8158d8bed2a8e13b2107fdd74c2226c6b8509cd28b4000000040764898352ad522b6e4a7a53c45b154b80d9cf3691700f3bef83a8ea4d30e6926d18854cedd721b3a196e93a2d2e65c93d1de7d9f746560f91f9ab7c6277f2f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b20ccc45e455090547e36946949ee5ff4dd7531b59f69b735e4c93c502b2a011000000000e8000000002000020000000b40c20f9b3c1d50fbc95cf80db9abd6fc7da8bf92928db3d58ad36cd1e05a621900000003ac2dc92fa9824da561e6e69af01865ce78d952ff97887250053f1c79343a3561590ddfbf5e81b6780a7b26ae90ed150a87a3e73a57bc1bf8398ef6c78f22dc65d7afd6e96aa682fb2fddbc82f33584cbaa10f1e37ec7d5cb812c21ae6555b52b4f7b0217d464bf1f8e404fb26cb3ffc71454fcc1d4ac3e1978a3fb558583c2297743d1adc495a4a63e3b96a827e755e40000000d27bb053fb1f8ff5f25d575284f7c46b50fe8691f05b73beaaefd2abe175f4b3d44a294c3a103d7148f4f8d435a0a97cbfaeec349cdab1be7cc6d6aa7629dd53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2764 2364 iexplore.exe 30 PID 2364 wrote to memory of 2764 2364 iexplore.exe 30 PID 2364 wrote to memory of 2764 2364 iexplore.exe 30 PID 2364 wrote to memory of 2764 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9d9c4fa8317c159506db7c8fcbae8b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43bd09534c53759299ab2baa3812d6f
SHA13fb9c27b59acf61d08eab528c1f11b9aed27c70f
SHA256b67015be6cf73b58962f0c4fb1e7b863433f2ba12cdf70b5d9f1bdc8f4bb34f8
SHA512bc3298649706cc7e0038ecda169cd73b75a864ee802aa131ffc970e072253e25726d33682d6db42b0af71860f3fb89dafb8d357a4b7e49f08f9238bbc864552d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e676bcc04337f42eb5cea14fec38f9f9
SHA1ad37131e71ea1f110af8723a130b38b017fbbf6e
SHA2562ccc2b2dff37febfbdab2a707c9aeb6cef066c3989a583af16f4fc4028a6d451
SHA5126172dead754075ed7f1e05e89c192f01b520b2f2523505e5008746ed44f312abb83b6048214a808e41223aec11e659e6c017d2ccf96321f30accced79b1a98b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55725dd98148f1925a34b15a6ff539887
SHA131decccf18913763d5366acddf9ca30958720416
SHA2567388ad54ae08cfe0b88f592971288761b967bed3f3f186e9468b4a5387868aa9
SHA5121a01a5859afce3e081944e7a05107fa008fed8cf803704c5133fdf81422d5232e6b38b3cf64c802362951747ea6edda1192aa0305abbb5fefaf585ba1b0e0d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0aad6003aa0a3d3001a8366459fc8d
SHA1aa090db76170b8f68f0f9aa8d8396ec5ae7acd25
SHA25655ff14f0db08032c2608f4179f0075ee7a849602cf107c33b1a2325e01e80733
SHA51249691476598d5cf90426f3caf53c7d3a12da3d756961abaf9403d78230734a34bd6830e47831dc823be5a4be9bcd4d0a41a01ae36247bca8ebc6a47d13a2bded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57625394be2fee1705a9f8dd8d40d9924
SHA1c9fbd3492c92e583a2c1900f1a8434006e5b150e
SHA2568743cceb9a87880b7ef1060e68eb2c4a455483392211263dee501149d6ccd0cf
SHA51214f83ee0515c774af56efc2e27f48b05cd1391f77c67a48c97c2b7fbe507b2d2922a4cfb417a9167b92d85ec9f2210cd4bf5d79462feb48ecddbc4d2002bbf32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe768627c502ba89429449bbc285c93
SHA1ac92dac7806447a4f5577d8695e4a6e974cb23ca
SHA256d4eee547e542e9e6c47a1e8012046cd3a0ce8d5ff82d9f752e2c824599f53bd5
SHA512375b09d41f0fd2f0b1cf33e3e41c55cc485db4fcdf3dfbdf0b1c7329b0d04188f55f7d7b3a5b5c05a942dd6ee05acab677b74b2598eb4be23dd35fa3ba43d6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2a9f86f8be951a56947dc80f27a69b
SHA12c95ae2d552e03188fe525dfdd4fd7c65ebde9d0
SHA2569fd0db9a8ebe56408c0c53c7249953e8c4d90da4e1bc3f5bdd2970bc1d5e47f0
SHA512c405dd918a63097bc6c37b48a9e53819001c57f341c2d2cdf8d3637c36797cd222c7153d8ed7f0e9bbc4e4855d167ca6144c2e5b8db136eb01d6de408232c043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2fc1490ae337541577e8cdaf253a5f
SHA18ab6e3f1402fd334dbfcf3ab7b696029e4463fdf
SHA2561d9e26494017a4ccd74da4c6bfb17c0a7962158b3b7970243a0eaf8c7d6f818b
SHA5125641f9fbcd6d621ebf9b027547968546c1fe2b78f8f161bdce1f47510740be6191482cd97eac9c8b2030facab0c1d4cf7f0c391c58968c1e16872b796382f54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c15ea242b80399f50e8280a5129746e
SHA1c247d4c8c9f4cd91941b50a3055efe51d1915e81
SHA25661ba755062a4dc26b6e45d86a103683e1cfd5e10dc8f7ccb51f545faf63ab08e
SHA5120f7b017718068672c982c3adbc2696703e092bbde681fd7980063f28b3f478f2cf13a8a6eac87b29af21a9fe80bfa905e18ef6b57de7d1061d958b753f0608ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586be9c8ea11e02d35ac45ef78eb99f97
SHA199630a8bc8279270837461165780bf3ab9fc1557
SHA256123cbff028342b035f4e668d2e3293080deba3548730bb6d1ccbc7bd4916fbcf
SHA512a81d4549e0bceb9b7fa4f976da37c6002da4fda9a730a0a6b776640fad49b4300b0a224cf0893619aa326cf799995ce90257fdf124cc5539a52692ba6d921958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe6c748aefb4c54e39a8d3397cc3a5f
SHA17c16926827a123e37d7ce85fce9a68b33d863e6c
SHA2569df191450fc5fbc28bf7b05f1bf2e15142e29ae953d47edbb561597721699d9a
SHA5126d50b3061e922ab8fca21077b149ced879044081b1505fd43242c200f03e560e038443d6c68e1f5cf5f9c12d8e60b1a353fec50fdbab45cc483d30b73a5826f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c724cb4627bd86e1e26c75ba2ec4af
SHA1a870a2487cc562123aed96e8a8632e2d85df3b61
SHA2569fe0d4dda290e6bfe81e71d23b463698dc0f09f9e4d403db9ff992c7cd0c8223
SHA5120ac86e7889be7cc2a22318aad15355c51bb64439488d2b8625a323303225a52f04684c3c5551244c1101281a8c25cf2bbd1ad40a775c535b714a2960f88ca3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5be724ce3d9d339e2ae7dcefd8ce89
SHA1a11e7e562618f452a5d158303cba0cb4d83fb830
SHA25654ed8c75a5541e9aaf9ab5788bbee5d0d4cbd438a13d5e221d304573f5a32ed2
SHA512b366fd0404e8945553f453a6cd8d027218bf3e9f46a99310176fb1c1a3768a230f5db7c10ab5e29859f02dac42a3f7df236db8e5cc7cf4d2ceddfb17bd237871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a7d94bdaff1f3cf00563ddd202ea58
SHA1c2a4f7a1ca6d146dacc7bc0157e3ae55cf01add9
SHA2562832e1d057c5273861fadb0bf046f19b6d2d9684d5fa72a03f8c46df750c3518
SHA5121dc4ec950970e5529da369ceedbe84643179c53113a5f98b00538fa36268d446928079cb687b5084daf02ad439fc9cad9becd84584423d920f59a71d9c9c6234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2f4086c82ff7165302eb6c1dcc84eb
SHA127da5c58cc049ba32dc3d1fe43f8d8cc3c18074d
SHA256b4f18dcf3609ef31da7a591903ade4bd922648b32cf65ac8689baea0ecf84336
SHA512102130313a698e96fb017736998f940c593aa145aac32082483e8fae73ae1b4561931aa37e4a3c7e97284647189710a4bcf01de64e283941bea9014a3482ef99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9c529df74efd6dd7482e8be54c15576
SHA1727cf637b636eb0ed2bb32a429774bc2b4fb8b5f
SHA256daf090c047e70f6ff1198a2a31d0b9d419a36aca1e2bd9005edfb3f27fa2f676
SHA5128efa62a891bd4fa1dc373a42fe7086167efd14ba607d6a561b6cabb72da7cf5513e341a023f5fea3ab2f2cdd1541ba5a655c2baedea18292a18466af19decd50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f547c22f75a973a29b103215d20f42
SHA1d2b520c7932abcdb40ca161a70566478dab9463b
SHA25654bc1badb526229c319dec6f27c8db2b7eab7490f98dae88d547595fe2c3887b
SHA51208e1898dc56c7aa395513bd9c81917fd1a0af9f144d5e5a9fbc195b8d6738f1b82405531bd7c57c8b00b53e7919ecff611ac6749ee6409200ed1245cc19b71a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b