Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
e9e56f10b8869fee36242caf00b11439_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9e56f10b8869fee36242caf00b11439_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9e56f10b8869fee36242caf00b11439_JaffaCakes118.html
-
Size
27KB
-
MD5
e9e56f10b8869fee36242caf00b11439
-
SHA1
c2c74c2f62dc272e1fce667462deeafb2d4ef8b8
-
SHA256
8d4ed0b17e8ea37e90ac082afc171814c40f1919dab9d2463a883577ef886dae
-
SHA512
961b1deee0e0560f98f893872b58fa18f48a94b3675b5804409b47c011f073488d0ff8e99c8bf43985f8a858356b612370f37e82a971ef8a7c0b70c6f3fa3f6d
-
SSDEEP
192:uwvob5nX+nQjxn5Q/GnQieVNntnQOkEntesnQTbnBnQ9epBm6ujDNQl7MB1qnYn3:uQ/tUr6D8SfYK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78EB6021-75FA-11EF-B36A-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000edbb9f4a14895edae52384be8a1fa8a1f34883a6fff3a93753902eddae2bf618000000000e8000000002000020000000d07e4559253d8ac4fb09a8b5f84f992b05176ea744c65ae25313f6499a5751e920000000f1cbb3e9c97ac814548db1203db7ee4c672f957852b69f8ad5bd7bf0fadb22c94000000074d86d42b361ccbeceba95d16ff802ff18b8f958b4c99300a9c250b12254f87fec94a65646a8e257ca3697e1420e1117242c902b78b7c2b2fe3882b364847a52 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432852278" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a056174f070adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1332 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1332 2260 iexplore.exe 30 PID 2260 wrote to memory of 1332 2260 iexplore.exe 30 PID 2260 wrote to memory of 1332 2260 iexplore.exe 30 PID 2260 wrote to memory of 1332 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9e56f10b8869fee36242caf00b11439_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183d3b5ea18ca98b5ed6f1d32d8669ff
SHA18fd47ce6c15146f5892a62ef030b21947f3a2f16
SHA2561b7e7432343e9b826829489121a3c195248edafca2f834003d45f3ac833bd455
SHA51238bca29f3a8b50187863f30b1932ce51c24f1a7907bbe88da82009aa77a7fea01e39afb3d541f51551047196962d590a1497b0181cc616243642a06d08b14f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9ac5295dfcfcc884e64078f9df10ba3
SHA1612157c2937913d647612dca991675a076d79739
SHA256f1b91ae61b020843732df5f011360a3a2f4815215e39eda5ab9ccad16a35536b
SHA512f31ca87714de5c57aadc5027590b1c3b59ca774a4cf9d4948c924ef6764412b63f28e7bb1cc33c6e6665806e9e11afa26f8bff5d2e148c5ab9f21f0f3a9c7b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3acfa33df6eb17f32b31b60b577836
SHA11f4a0b3124c396016b4dc9c142a42e376260dcd3
SHA2569a7ceb52f600a96578842f3cb03e253d22788f8108436947e85b762438343818
SHA51219f755d2dfa4f2a6b1884bde66254542c1fa9d4a1ddc812863fbcd4ec2daf7c26eb9192ebbb6506476a7ffed31740f18cce229581d7ff4d42d12879f354a52ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d40e65a7f6a25d9013dc45fde8917d
SHA178abeef0e105adf1bb140d6b431099d8cac50fa7
SHA2569fd2808fa58265608537a913046943ab734bdf17c40712cf028046b2f92c295e
SHA51263985c29d85d26c3648079fef0df01a19c1ebd21654519a115bfcb70a5d75b0cb6066f6526457519b6676b7c7bd58739b566e96b02ea9c02a584c3be7ea08195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b919692cbc2b231ac0ed9717a03f45
SHA13889875c436ad31d170dcf87526d5a7e21a7aa69
SHA256d5df253f8147ee5f9a50ea66e1205b32f20d5f1eb923b6b13b63bedce0713111
SHA5121919705fdbfb51019226b1a019b66fea87e9f080b6bc62e3017b5f03e288d3ef3a90121329f46bfa4d595bcad87dfcb4302507bf7a6285c55fbc9b2911f4aa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef6098fe8597eda0ec685bb3cf984b4a
SHA1749a1515a5bd68260462aed72ba506a2547f0212
SHA2565d976751d573b6baecd70478374fe33822f93c6419e41a783461eb7fed562f29
SHA512e9f7b2ebb1ec1499b87209c54ef77337d14f825683c9cf6bee894a27ebc5825c956bc404bbb33ac5529059a256268411abf2a887f3f92f7801928b7d0f7a5f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556855d583d8dcf2cc969ea97eb341f1a
SHA1d12d159c2fad0b54d1778e05954a4b36f019c988
SHA256e109760909aae837cde17b779272fba1c72666819c1f57fff98a6b157907485b
SHA512822e421510e5bb2a9bfbcc00c28f2a45a94633fefec688185910d07aa41b1ac99c5358fd8c995b20ed2a5a5cfc76edb340b3c670a188607ad814edcf0c8776c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d331458074c7fa62b5714eaf620cea
SHA11a65c52a8bdfd6a5a51cf54fe4aa886d2de48eca
SHA25611fb44068dd3d55f1f08cceb58a7c6410ceee4aff836baab6455e9c43ccc331d
SHA512df4678323414216976ed622743db654fb58739ade68f63cbe103a60cdcfe9abca6a165fd8de4c09a992b99e8c08fa42da40f6f08673242795e322410f4a01837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0bde14b89d584275ac5544c9a0d0e0
SHA16dea3021a772650263dd8cf59aff6be25284af46
SHA256f58989da5bce0f21a9abe18261e90265fe8cc0cb3ef99e4da8e3c8a95f4c726d
SHA512416cab1eace32517061d4d219cff30ffdb964b6bb6d8d6be454a53c9a69957bd3d617ecf375349fd922b01b88203e373f583c25b3cf452a58d1b41930a948431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57407d4eb8e3d1c02008241590d565331
SHA1f6eaa0e76e5390167795deacd289acf0570a1b59
SHA256c0a55eea1fe1c05e16b0a1c67101d339c3444c7480147a55baed69b404e60924
SHA51241fecfa9d5053f185eeae5788dcf5c4b54047240da89a6361adbe49ab7f38603529aba9d4fe08541e7161f0f18fd1b21c6096357b9e02b1f4b838bdf0d9322ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181b13698268485c22ce3246f411b86a
SHA1c4c7146fd7d5ad147d8ecdb92ca42ddf76141899
SHA256c456b791d6015cb4b123c95fefa0e4ff1f7bac36d7a4beb1d2aedfb609c4f2b9
SHA51266320a5108d59b6365e0c9faa90f805626d203349c5987d3d218fa35af9450e3ecb3cff8744bb9e4344579de26990d650c26456a2e6572d684607f8ce7f4e6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d05a196b3c2b91c09a365fbab0b437c
SHA189a72f76a74e228ac1ef85404d96cc86e2a72979
SHA256d79a7b4862c084c4365885972a78b03c6dae541c1aa72186a85f773652c1be6d
SHA51257402ad4dc453f4dd17fa501ed0bfac6eb2b0c4987e26a7e47244c60d6dc0674f979f07ce747692f0c2b84330f0b4613c396f23a5341953a78166073b90b6016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6191de31cd501414da2530f9d62c5c
SHA1f5e0de8501da53abcfba1a4dd20125301a15381a
SHA2564e8ec6615523b4f35359f496beb62106402f4595463473bd98badefc74c6b7f8
SHA5123fba7e6dd82c85316977013c3cd33860f103aaecdb5d24c16fd55574d10408bc51ec5b5867578d4e125e710454d039089d9a017f1eb593514dd189416188c60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e1e78303895d804de80795098c47a7
SHA150c06b2a78bae9cd7725c0ec1ac44fc60c6db198
SHA256abaa313b5dc5c1ca4ffa9bba59818d48e7cbafb03b2abbf4ad5e10b0476c23b0
SHA512f8ebad29270c4d12f3ca73a4f41a21cab5b02f6f421dda03a20a083773e85ff17b6e0e7d89ba27bca44c692b5eece4fb61d93ce6adaf5555e0c1d71949283fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590723485811fb9dd4e5186967f8a2c0c
SHA1351479c11fab94b902025bd7c59d3b5db5ae068a
SHA2569ceb485cf45909b76fca3c9831d5b75a09e50458f661fa4072a6ff462d62438c
SHA51293cf37857bc3da7369b8cd0771b699f3008d09306193b495009a2eff5e20829e0da4f618339ccf04da28dd1b8557da464e2477d8c919ebf2d39ca0b84cb4b721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e38b23a599c8ea30901e4a34c2dfefed
SHA1d8181b3d195fd6c55dce24aadb7b245877aa4f02
SHA25605b25687a891c88088df2454a68c0d939e989a6cd074019fd044f61088e2ea89
SHA512df6f3d62cf1c7c48e1c276bf69a0b0c1602a1333397f045b951e7e344d10b98a47ad4ce9e6db9bcc46d6ac0dbbcb30b82dcf48af9603cf2a4b1cca40dbf38dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275f2e634c2cc95e7db06d0c210410e4
SHA152289b0d6f6cbf35deddd9534c2c4f260fd4cd54
SHA256f53492eb8ee55c5b8778b296aff9d2738dcd42b6678c8a677ff139a9ad6b5378
SHA512273e21a7223598836bbbeeb2d8f77f9ba183ad2915905d34aad41e065823bbc66ca8b1d33050239a5e1e1ccbd423962d1c3b1c43ba2c71a6509c8501d9dd752b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b