Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
ec14b6c1918e6d58684e390e89d36911_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec14b6c1918e6d58684e390e89d36911_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ec14b6c1918e6d58684e390e89d36911_JaffaCakes118.html
-
Size
43KB
-
MD5
ec14b6c1918e6d58684e390e89d36911
-
SHA1
72cd61aeab1e4f08d408b89499c89d57a5b78615
-
SHA256
b84fcee2046b7a2029eb30cce8066706e929321af1063d51cbea628a5a457d8f
-
SHA512
15ab99060a61cb7aaa9efa99d6b18a0ec371a376a77a0d4e56034f43375c7e29fcf1bf2c3c9df37c98bd60e3e9c21607f9a72473d6e063071bc28237c20f3de2
-
SSDEEP
768:jbQULzGkG5o5b8yjzr/ULaByZ0286ac3jK7UiOg66g8YzgVvW2xrqmRtVNaj3:wklEjihDVy3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000fb70e8e1ca706c6b541c095b63106fc1cc66fd8ab77f9e0e06aa6ece979f0bed000000000e80000000020000200000009173a30ebd3aba08c61c6b626d516412213182eb1cd48b0e441abb64d76976ac20000000881203bb90077516ec258c8ed9c36434e1f9a220b2da73736f88d35677f1e2fd400000004979ab5b49c4e067fada2e74223f205cf0ea874aabe4b9b658dead2e230b8cbaefef9faaad3972ce8cc5949f2e23e8c3f5a5c11fbd5921f4872ad36116f4b37e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432937510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005a46432a4f8d425ea9ef1725fec09c5c97d969e8a97e879c56f0ca6ff63c1d68000000000e8000000002000020000000ed8dc58275fa1d4c3f2239f6c00eaadb5af3b4e40cfd53d24225aa4bfc699dee90000000d0c1cd9ca8ef65f00be5fcc026330a021ecd504efa522c151f4992d57ea76c7715367076a51ac1c9ac865382f47e44cf4133a1030f7a126a7a377bd4ea6cd7e377d79319248b201085d5f2d52a1b595bf87e30777947231213b2460287b6ae0bf5470659cff7fe2e43f0da9f20272bf803a8b6681a336c58b0167c7b8463e2ee674d1585d37f596da8862d4f61d9f7db4000000062dd964427fa182f26e573f213d1db529d802aa50d1612903fe1f488140c6615d7a4969bccc8cb7d7e6160e0f455a1437baa34e39b0b829946ff9facb2cc134c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EBBDED91-76C0-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107696c4cd0adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1736 iexplore.exe 1736 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2440 1736 iexplore.exe 30 PID 1736 wrote to memory of 2440 1736 iexplore.exe 30 PID 1736 wrote to memory of 2440 1736 iexplore.exe 30 PID 1736 wrote to memory of 2440 1736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ec14b6c1918e6d58684e390e89d36911_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53daed591be560383a7f4d2e2605cd384
SHA1330642b8e7b395d36060ea1d4ea477e2f5047372
SHA256dfa8fd2cf0a906926021205e97bb63aa27e3ec22472939edf5c2a9c8d839539d
SHA5127f8a4a256ec99897bae06d4fb1d48af2d2eab217d03943d16ca61220ebde8bec177635d06228610aa4d8a05bb4ae313f683f70b9a7fdbec66817476cbf1a9f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162052084082b3747bdb115f63e40bb4
SHA1153ff4b131ec885d3e126babda42e226b77940c7
SHA25681e20f7dee260be40330abd142c6d3ad111f2dc807676aa270f04e962a11cf23
SHA5128e46db95a46c8c784b113465ba312f63341fa85fe20b951e3b600909bf4da985d99c039103a9a4ad15a80dc63fd40cfa79200896bffc98bfd138b4f441addefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf6c1f1dc0e2c076e8ba254121eebe8
SHA190bbf24715d11a7530d42f4ca5d817e804242643
SHA2564a05d62f5b5ab67e402b30b7f39a72270ebe3be43d3a44cad7c174ca773b08dc
SHA512edb4c2aeb338b5ab5733157807d146cdfc01e73b1972f9f8a13fcc23525aa0a67d0a9ff2b82df397a400390bdbc93e2ef0dfbde7d684ad421285f750945538dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e1d0be8fc463bd38ca3dad79c9947f
SHA188c3db049cd6c03770b8bc10603d983a8c5fc2a2
SHA256b0ba2092bbc9548ab81e862912af06c447e769c8b6196be2b1ab91bd99608807
SHA5122531a1da86f8e690bb9abece18f6638041faf35e6718ef72b71ec7d80d0df4189447447d47ef6185cf5125dc173bb8fb6fa716cfe7edd8d08da10738a13c1238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14c2bd5fe069c0c34da582e1469d424
SHA1453ce6c1324e000d51386760c5f30a2bcc5b4855
SHA2568582da30128acf4f0e9e109a6e41fe9fd033dbd95f8e02b8ed2fb193c20e1df0
SHA5122c948773072fc47b90f8411e23940c57ebd39f793a566897a54592faebc5ea67e03f8896837923da36c199a36154c7365cd04266a3532691dea71beb686e4e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e183c98303e36c28fb2fdc95f16ab55
SHA1a6e588f36845a64b601f8673da54331f1527832c
SHA2568c9db358404fd2dc1703167c162cb4da0c131861fe94321df0f6932e1709177d
SHA51276fca0fa3eed7072ab3f68361997dc42554d90f12c7f6548b97a293ecb1e64574015e26441a77175c2852cfdd89b09e5ba256c64af16e77ca72e2118007ab154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52351bf0c139b5d4ddfa029ce6bdebfaf
SHA18c0965302af467d7d8a8c0ad5d5b5e0d3284cf8c
SHA25644ddff0ac433058ce0b9c4af01115d37c49b3ad8de3b4fd1abd9a01018b639f6
SHA512bc9fef0f0a2c6abb197895c5c0bef2644f69f7dfcf68a411552c42331003508dc1aba8a9efd3e288525dd31aafc60928f3e3850233b90290e8e56b417787b303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfffb0ca3f43ffe04faaf01392c7745
SHA11af36850c12f58e3ac098d120df8f5a1a22ae2a2
SHA256de5248f5025ce5d180271beb2d93a59d7f679660477b69e209744ceeb36ba45a
SHA5123968a46d36e2a8ca49812cc6c4f545a97f69684c0588e93feb918ed9593d7d139ccc4729508e11391522eb97403608b902df43c4ae3ad89c814839c468787213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3ce3b6963fc8a3e1b319cc9646faf3
SHA13eb7c7bcdee8306902180aa14e61e1dc6d883803
SHA25691f0c2fe4299faf3afa96564856f159596ab45fb2fe6a9c72072770528f17360
SHA51231d2fffb58a99e93a8760720ae83431892fc12f273508ef8d314a09f43a4b9829a78326277ff71dd5dc328c6cb166fb97d094db91f7164a87ea0a90933e08b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed3dd52f38e4e274f7d5e1ae1d9cb16
SHA1deebe3dc74f03899ef189c41586aca6455738e1d
SHA2564d2275fd351109e82bdcda667a35c62ec33709b8f60a44f9b1895a4ee49ae170
SHA512d9a1b8d137e5df61aff017e8e4b28d2dc9da65630fb1219cd00f8a3ea5b02059513733e0b6317bb2f655fdec32a4f8bf62f3e77a7386cf2c183f8f26ed788404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145b43d6ddfa6692fd6941969b497d73
SHA12ac898a392e81329b329bdca63d7438fc91f1228
SHA25641b031ec357e553969cb50d260564c6f95d05a1c67fac85731ba8e7e035d3233
SHA5126d2e686e8fe2012f7b28377f037f71a453083cc636737d7e8afe34063ec340af33fd79354bae3ff7ef9b3cc049c3ca6064f6bb4b68344e9b4261d4002453570e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303aedfb2e199eddc78b22eead3f687d
SHA13dfc20ddd437b5b3dda61dbf5b65edb474ae57d5
SHA2566e3986bd6d1e6a806230d35696f2d2534d210ed43c80db2667105579219bad94
SHA512e45a5a5f5de093199f32678a31ebbb5ae7d8c522033339d21fcf76fdf3514a418d1d4b7de7bd7be4b12ae55784667d6c8574a918a468cf185a1f54a06b5e58f2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\22GY3ZCY.htm
Filesize134KB
MD57c8339f41b9e966a0478392a6137b468
SHA1de5fb0f6352e94258c88d98c353146f24247053d
SHA2568a9300b0fc7f0c0e3b4d74390952b97da876df42943fd1b615cece4650ed411e
SHA5125990bdceb4e283df4e13688ee5336fcdc499648d6e965e69c526d43094f76794068cdb00ad7833c748ee624ffc809c76e9e964ba5218f13d2bcbff42d3feb0ea
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\XQHSHNKJ.htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b