Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html
-
Size
190KB
-
MD5
e9fb259c829291bf63e4ed4d825d81eb
-
SHA1
68543107c3471b8532248071a7114cd5b24f4971
-
SHA256
d25f2e2e712e4109e47a5466b76fac0ee9987f9cd2bfe6bc09ab40d840874907
-
SHA512
e22364bedaabc8ff0101f1048ecfb310eefb9a88a5df0ea611a79e34ada2578583a565e59b66932bfe2e460a864931d945d86e8d02d810ab02e52969b745940f
-
SSDEEP
1536:SUieKDqnlUy/5v+949x1YeQe/eWsEyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76L:S8lUyX1XyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b118fa5289f66a0452fb695ef807c0b75946bba6d4ab26574d6168f1ba527cf4000000000e80000000020000200000003c0132de5502fc7cebde188d8f3040aa061cfadb3a7b7b5aaf0f2666f90b7f2020000000c3e453e7fb534b78b83f794e052592067a6895fe1de5fb9f5ced2a9e7e47ed534000000005575a79bfaad32edb3efa07b249d4167cdd1523444b8c2f965b203a70e28232f7f97aaed92b1e1c14e5e474db48ee3adf8e229d0d214a9ae939c856f51861a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432855846" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7A2E3C1-7602-11EF-B462-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08e369c0f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1968 iexplore.exe 1968 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2060 1968 iexplore.exe 30 PID 1968 wrote to memory of 2060 1968 iexplore.exe 30 PID 1968 wrote to memory of 2060 1968 iexplore.exe 30 PID 1968 wrote to memory of 2060 1968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9fb259c829291bf63e4ed4d825d81eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb85d9ca3cb1a2d5c4ba155e639affcf
SHA18933217996cb9517ceee5355b6c0a8a0dbe77842
SHA2569cfb8074229c1d519b702c5b4df6d8959f7345fe4dadfa64527c4cc96541a225
SHA5122125e62351949898f2151b69698c79e15e36844f11bf623717c0c4e366a2361f7f98f7fc1ad1739288c9536174ad79ca18b96edda001351f1471fd972ef51dc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5393d3f6f8392a8a4d316d4b275a74528
SHA1d02dc2f2b1b872d8cede8a2bbc3ef1fb5693bee7
SHA2561a6e552a3fbf807a32a9b5ed0b1c9d3ea903f332e2c5fd7352db129ec8eeb2cc
SHA512fa26696ba2f28ff49ab98fa4ae9d3bf64dfc5667bd47ab8fb8459c7953b85f916333b3d8768e81a756b2a5de27c9f023d3e62f13bb9ba945071cae979ffc680c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efd421a50d3f2282d5f261916d7cf571
SHA131cb59cf63ea6573b28d98c8b3652ec6a7eac008
SHA25661c04199a14373cc639551bb484b2168c3c6a742f38c2722cb6a186f5b393379
SHA5120d02078c3614a854857fc152e236a5617ffaea4a27695b262557476c9eb4afa019385c2e0fc7133df2dd6f9e1d6654de4115de23943de777a9f1a1224344e512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296ee1bbddecb6d376a445369316cfe2
SHA1590e487b6889f2f839d22a0e9642a8367d92b3a4
SHA2567eec2bffc48cef0c6a4f5bdac0e526be572f285b71f912e0bcfa5be0db1eecc0
SHA5127cc0b467a77568be6bfe3addc6d28a18a9ee4408b407b880c7331d0f4b20172a4d222a85e2c36c043ea67dc5a31210f6df57042fdbde8490f638b132d6cc4007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d6e499cd12a06ecd6fafefe4be81bf
SHA13621f150b12f9d2e009eb7e55b631f2778992f4c
SHA256f3e7cb35d874d84586eedcba2d9f84ab22e0904bcb843dd786791644665318cb
SHA512c037622d2c4f9ae05711e0677a66ce597b26fdadc7f4aeef886531ed37ea3eb9d407b7898701d96dc5e5a7d9a8189f3c6d2e81d045eeaac57b329346d5b16292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aac0a489e74c4ad63d251b568f7a7bb
SHA1efd4458f95d9fe96a4e95903906892c05d5d1fb9
SHA25601ed0dfe44f4f488011873dd580ded2c52774eed0ba4689498782b3a88cc32c3
SHA512b7f1779486274020881f47be669e3758883cc021d533b46dab5df926341ccab362683be914b6c46076d9bd650a694d6d8cba6f01de74cfa1d925d0cc663c9823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5866bdc3abc1ac412020039b871c1e596
SHA15f52f1d3a8803d9fcefa8e9e2c61a164a0d71bda
SHA2564a2c922432150134aee91047b40dd4b509ad1bd8f701737e995833808c885a24
SHA51258955309926a2d468ecba5bff49cd6efac498b870da64820cc4665ebd2243ccf2bbc58635b508671fefae9b0c7600f530af0dd99d0d4a9827ee75b5b6630308b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5febbfce6ca58247b0566b12b68ec0561
SHA1643b3dd865901b2bdcf5351c0142cb43e00697e9
SHA256786edc35e97835e820e8ec4c5c08a44ddddc253ecebb670a173c91720ab9fa06
SHA512710cce5516af85eb759bb2bc1883e433c498ef895811aa13bc08047ea0951ea30804bae7d66d47fc0a4f74a905cc3c8c0b47b77fb206fbb56504c2ffdf60e1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226c23038e00befc054a4c8217e60c82
SHA1fe997fc1ee2a29ab5a53dd814e5f08f7abd8926c
SHA256faca952099af71859faf0752bf38296f46886ecb6c514e39083b0100e5181722
SHA512e701be7f21548d2d07ca06a6973049f67fe21333a1f53872e213fc0ea3ab1a1c71bb3f513240f0a5d8ad294b50a79a841ab949ef328170c890deff20324f8b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a6f0dedcfd1aa1d5a7b26f3374d787
SHA1f565049e3b366c81aa3f434e37ac684ac934c9dd
SHA25698e3626bd8c84c454df93774a621a8c009ab0df56efc2f9c43dfbefa8b703b2a
SHA512373f407af7e1aa5c73db335410464710e736a692129dea77ba4a62f41fe61d9c6cea7e015daa03b2795924f63ee465bd180f872b2f53f647dd6ce008c671d7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4c0c0010a68f9994e5cbee3364a466
SHA19f778e662cbe01b95e682e233cc8c608f7739edb
SHA25612c72f4049b224c69b06042fddfcd83cc9bcb9c7f0c67559dc0a5e90f1dc8eda
SHA512d7dc98f09ab985a333d936d3ebf0e7b616e50338cd2938099f4bf1ec6de939e1a09dd997ce462c7bdb007745df8d4dd2ad8242c480aabdf9448b5a2eddf3c6d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29d9449629064f2bb518d1ec2aecee6
SHA1a5490cd340a92f99aa6aa091e28c119bce502655
SHA25657c7f36bb185dbe2c5aacf11553121122629dc2704c36630cfbc826299853d43
SHA512eabccf7fd9da6bffb263a561eed96cc4e825bcf6bd6a486c799fcf5f47cbffc77998c3c6b548dafa227eb61d175a028783460676d759d05103c76153d0236395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864ddb0380a280feec36b68dff4dbbbf
SHA183a172fdfebc53a19402c0ff774c54cd5ac3ee05
SHA25609da77d6f39ed5c913e2a308c8f7ef979670cedb0eb1f022c4bdbfd9553b1032
SHA5121506737aff2bbd03c97ca5b0242310ba52f1a72c3ddd9cf261ef9c28d1e0edbb15df85cdbc1b32e3da61c48dee6b77541de7887613c333e49189036b7a345608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879ae41175a2341c2f3906a57aa79660
SHA147d747baa4ccfff007b0b2ae8ae9073f5415e3b4
SHA256b7636fa8f2f78d6eb81dd4875ae190e6a8aa022d0249608850786108cbe138bf
SHA512387552a094562771cf01ee08b40913422ff658ace87e322d07d7d0f56850c7db7c7305b1687a2b34b4bbaec151a08b94055141779dc428490ef80dd551979b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5b6b4dfda768c78108ecc9ce548029
SHA1f9e37df88f42f4d38a82ae467ea4f911c4d19e27
SHA2567f33b66a2f145e595a088ed62d638816fd36092af45f3462f0ec71836f320c2e
SHA512ffb190524098fced664f6424c24df0c7357d8ff0da5caaad593d5a7c7575edc5f8300a24dc9eeea837ab1e598188830e903d07338fc7cca16580f46bb2b2906c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7e4a198847a9dd59568dd506b8b83e
SHA1ec9e53473d383d78c09cf8564cfcba73a40ea9c6
SHA256f1aa3cb19d604e6d922aa38f352861e27590a5abaa055ac61dfd2bb9a5487a4b
SHA512d12dc6d518dc58275a28c6a1fdbcb64c6842ad1a4e06de653484bde7bdaf820408f8f866e8a43337b27857d3c4c22e5bd375c71e37338af0d57cec0bf0577e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2508a4b7aed31722fc7b2a9d5dac2e
SHA157db92cb71a9abb2562b571bd40a09cba67f4f0b
SHA2565796062277375c495b2a32aa326268c2a29fcf5ab3a4dd07e5d85f3120170d4a
SHA51273a2c3d0f95d22f89fb5e5e5ca35adc69650d3e7642656cad4576dc5be45032d5e1a714ededb842d8bea85c1eb460958d959cb26072d264f419b7beab50ecfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce4a5e0e006c76e8300e8e016f2dd44
SHA161653a6a6991462341a92ba56519631a98698d32
SHA256e871795d7d23f7585667f90c3874b579bfa664932ce96c0a8ba67ce61b7c09ef
SHA5125b47229219e4fde280a5c889d7b5ef12729c2112726af8f80d1df43884620b4d1175e78b452e755b664b189ab5fcb5a8da1d0eb1a0ecc3d21a3829a74e782c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c669a44ba828676cc1620d0e8636a3
SHA1edf041ff95ad076d32360202d8ed5d36ea267081
SHA256edc05e9840af55a15815269d98d9df031ca47c6f5a70071639eb0b54f3b77c2d
SHA512804cdbe5e862071ff0afba83690989b3c83a21290783ebdc59461ccde6f720461be6bed9d59eb614f21d4696407f84d0f986cbde63098487aaea1a780791b249
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b