Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
e9fdc82bfc1356d2cef5c3337035e7f1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e9fdc82bfc1356d2cef5c3337035e7f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9fdc82bfc1356d2cef5c3337035e7f1_JaffaCakes118.html
-
Size
14KB
-
MD5
e9fdc82bfc1356d2cef5c3337035e7f1
-
SHA1
3e2ea12c7bbe94e0e3081c5350d5d495f4836808
-
SHA256
abe7bc611abbb88b10e485b403fcd000498ed46773ac30fa0591484a2583a141
-
SHA512
ab343e4b474e98ffebfdf0771307e807a11c19e6e2957d3f9d9964159173542f0a9953c16b66c00a14dcd48fed90c97c1f5d5c21da6c43e77105b944908dbffe
-
SSDEEP
384:CyiUt/0z7JznQFAi79y1wYMn2oi8zRQFWgijz/7zREVPL:CyiW0zNznQFAi79I/MbzI3ijzzzID
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004f0fa5100adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432856283" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009dede147874874e40860d12f566ff6462c271b103c8e34b2c8653757847e69e6000000000e80000000020000200000002ec406020d8bb36018363718dec4414b64141c30eff7d1cac83c4095ca76c3632000000015f349f5be0fef79444bd5ba1c0d49f3eaba959ea9309d8414a49ec6e3d55147400000007f8ef575aaea1bfba769b3d2738902ddc7a34aa08c3400118b584bf60d90c60686f874ff436b5bb281a6512972466a5550584ab166ecb39f8260f7760c2e8aa7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC1C4171-7603-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2236 1952 iexplore.exe 30 PID 1952 wrote to memory of 2236 1952 iexplore.exe 30 PID 1952 wrote to memory of 2236 1952 iexplore.exe 30 PID 1952 wrote to memory of 2236 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9fdc82bfc1356d2cef5c3337035e7f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c9ac54077625cd86a5ea82f13919fc
SHA172cc84f445a49f850cf66ba23da1831470bd9183
SHA256d42ec89e082dcebc66ce0c9396875b25cf827733493429535c242a13e072c2de
SHA512cd69b258c75c9910f9c45be5ef9c17d341a40fc7f8f87577c814f14ce92112e4e17a3d1655333ad5ca1a03d57f0849f7234aacead59f9130a511a54e24a159a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53520bc054c9959ae276766b7f91e7c5f
SHA1d86e68c5aaef900b99976072fedc7c8731999a5e
SHA256f77546a4ff1fb0bfbcfe4d03e2bebc0a0983ab39206a134086fac2215d2c5d47
SHA5124f7de4d04f35262eb8b49b9696c2c221fcdf4ccec131da5dabe33be287a0d956f36666748fa97ef818a45392fe36d8b4b5f64bbb56b1a71c421325a991f47788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590967b66a82c60a342ef6705b9238a80
SHA13ff115e7dbfa15a082feed1cad6ed4e8c4ec24f7
SHA256bdc59ac1acc41e133eeb93ffca0670bebe4b0894a3d81a6dc37b52212dc6e932
SHA51296cb9d863a4798685fd74e872882ac447aed721bf8680dfd81a7be5f873a849288bd6cab9f149c02c8874a0737e86f4aedc175d8ec6d75525e84ccd8da68a662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402525a9ba0bcf15e7337a8e6f4022b3
SHA14756b010eca307d4ad3fe98a648e3a895eb0ea1f
SHA256e2f56e98dacc1e7f0c2497db6ca05bb8c5ee1ca26761f2c7cea7f72a53bf344e
SHA512d8137bd3ec414f1437a5417d17f5fe45d181361613d873357478f04da6633483c10886c0f85c8e48a032e30a1b634a1b7b1f6d7181f2778df609e28412b009e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605e9f29ccc98ffcb32eaaaa9795a100
SHA1e4ff3cbcbd14a4c036e4b92dcad4bf868018039f
SHA2563f40a564702894d779e7563b959a7064a61a467508df50ecfa18521e1de8edb6
SHA5121ff54660067b4a3b239dc14c6df0386bc6683e9e78ad716bf8bef98c40cfaa8b8b1fd48d018d3ec52f653ffadb4ff6a3b4199bc8a65c340f8ba3797580cf3077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f57a6265efc0f09716ff1dca3d8371a
SHA191a341b5d90b9528a3a90d1dc806bfa24c4be33f
SHA256233ab1963b5d0a9c2de76b35d0f91c7f0a8146514686b417924a059af400a351
SHA51208dadd00bf340ae5d000393fdd09789228ed94103338351f159deac99caa33c4d5cbbec9f672ffeda7aa52b9b1f3d1b72f8382afc5cb22a389a1fdecd7568565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e73db07367389eb30e1e4362859a24e
SHA188bcb955d9fd3573fb2ef2aef11438f9c37c99dc
SHA2568faf20036dc1596aa2d88fa1db3fe24571a85f6b5b10cff51b64318320cef2b4
SHA512505733398159226a53d54ad78d55559d682181226adba62bc167a7176f3e5aac0c1af9c0646403c2273f4d6b9e79f9b5d74f1055175d4196729437ff03480096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fabf756d82378b6d7818d0080f18fe3
SHA1b718b9d4b8ae59d86722311cfbb4bde0a82c1c38
SHA25678e09691f11f2e6db4ef6f653dd093a0b646f672692d4fb3baac69e84a3640c5
SHA51261243f65c68aab11c1806df419b4649df69f7a312de1b1600dc06e0092789c5466a4ea951989f0b66ddbd39ee07b405c70b3c1d6b1f945e964b45b29233d1aef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c0c5696f2d93a3caf7e3cc59807d03
SHA111e7d8f0b8e482f30d9bee75b681fd634a6d659c
SHA256c1c4fe23893d7524e6816c9dc744d486b98455e0ad491ca6fd669467cdfcdfb7
SHA512a0499e0e5396fc4ab49872308271b1092aa711295349224ecf2e5c61a84d40dd47adf7f9788c58e772ff8deb12f9730f6ec3a5c447f8e74aceff63b38c01a117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6544fcab213943bcdabaa455e92d44
SHA17346b4a71ab36ef6e5f052e5faed51a6ab528959
SHA256065ecca019f8e7fe63f3025a028919b9a5bb788513b398ba90c7e67d189d1b03
SHA512052553826883569acd11cd4029ecbeee07c7812f23c153e7f619472d9d996e9f16f6e288cac720ed56c3a74f37f0edce1a4a8c12f3ff632401a56d35695ce513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428ed5da36582691e5795335c06d5332
SHA1087ca0f490d9dbe09a5b8e2ae26bf172f12f5f2b
SHA256ff22a9b85a588978b2fda7134008b6c4ef116d12b3d506522caf4b714aa2974a
SHA5120610d3f0afcad074fba076c1d74feabd40c5f948caeb15455f6cd19834013c775f9e9502ddcd52fe065a84d5dff4391aee14ca69b600c1e6a2b9c8b2405c9622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cfb0b78eee5a495a971909d4e314be
SHA181ceff83f4db7d32dc2705d3506d1ce64284ec71
SHA2569e9b13f56fbdc2afa85896c0135095f1b7e7dc466745b8d98e52516ebb6b78fd
SHA51267c9134de303f4c7bbfaaf7265c89b713f5445128a428b6f9d0e302cf250291d20b163eb9094c0793e41e3e019ca0e9c06b5e306cc7ac654acaba0ba927d9323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a18892bb7d40bde722578b90a7dda3
SHA1b91dace08661e775c51c83f83bf546e5b233e401
SHA256b8aba63922275ec0d182ebbe29004d6aa0e604f7d5579c0c5730edd8558ebc08
SHA5129f8b7382fdafb2add70e79b499852ac2cb8879926a18533f5857270caa976420e3a6934c9a7d18beb1207bd868b238dab75db00b56a8a83587cfc2290383d0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffff1c95d3bc55ae08aedd701699198
SHA1e98aaf459bcb1c67d7cc9af1b02c7efc106eb2f8
SHA25608e0ab4843326d2ec806d93d961698f3d83eb85efc23e3323f45feb6686a9dbb
SHA512822e1d1365d6658c33391e6dabf362a8deeb4fd5134de5e00cd9176af92c95045e57f19469af0cd99f1c2685cd7656707010e9b024fa8445a7885cbea86ed1bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559024b0bf374824e3b7a0f6fe576e523
SHA1bc15496b29b506de9910b568a97f36f49436159c
SHA25633b64e27e7ca800b4340d62f22be490ee162732f41df1b05fda3b009c9568354
SHA51284d28d2490ad77600112c42518d0837c42ed006aa245358b3137fb0358e6d2acab24d9e9aa5713dac94d402757fbacf7a804ab28fc0057a9653e240db44f500c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43b13cc335174e677be52f0116d8fb3
SHA1d5a43e8edfd0ec107eccdf63bec1c7d73f5422a0
SHA256aee1a703542735e1b98980098abcefedea35c3b999588866bb446d2f4232c4cf
SHA512ce02997fecb5a44e060310c853999489545a3d3ae69828921a70bfe6cc286130233c88f65d2a28a4d9505af53b5cdce5d6d23e69e0d304862f2ae379a6aefd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64dd055ee0972db32390693384a87ff
SHA1b878a7f31d411fed2d255be0dde14b12df73151d
SHA25645b4092354164dcde7c53e7081b0c20e0a7d40967ee29ed54e7045c589fb82a4
SHA5127d763a883902f39f1e9be9806d161abf1d38f973ac310e92939ed691fa2f230cbf6bda08d156202c1b821f63e4b33b302e9559e51eb535e68da9e58e8eacda56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c5b58f3fae22ba1f3c17839567cac6
SHA1cacf1295140536f146da94f725024911922e15c6
SHA256f9ea3a8e0317ffb16b35cef88c8b7a785447ce58852588e06f25b88c83a16bf2
SHA512bfc9ac2646eaf8fa1c20dfc3a821a54a93d3776827e19045d70d6a604170c4621c9c3097805fa73e53a3739dd0b9614c1c61066b84f1f65bda68fe32caa1b019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea214192d81402be2e60ac70ebb2411
SHA1e5df527a95b665161dac97a08ffb27902d5b591e
SHA256b658fcb09773c3ab9db1a867b8c40e6032767690a6c5a0d624a9af21d2cd00cd
SHA51203ba30600bc87577a8c6b48a2dbdeb4d08ba215df17405f4464c3d3f1273ea7fc89d1b51d973a8549dd974182e29a40bca8e4376307dd1991b49424c648dadbb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b