Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
e31ca3514550fc85f9b700c61001c43d_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
e31ca3514550fc85f9b700c61001c43d_JaffaCakes118.html
-
Size
4KB
-
MD5
e31ca3514550fc85f9b700c61001c43d
-
SHA1
f8554ee6ebcfea2a5d388ca80578c70a0e15347f
-
SHA256
d453fe57aa2b58ea9ea4be4ce71df249f1cd7e368f7a265a8ea7bae24493d8b0
-
SHA512
e1031f7e5150b18f2393e1314dcd2f4bbfef115e6b13aa20f53c19d673f1f86806c7cc4e6dd11067d2177700fcd5ea602975d62f85d483d24dd607559b2c6b36
-
SSDEEP
48:t8xELTJEa+KyvL+JZavtqdv+uTOvMg93qQk6kkmkTTi1Nakpn/wtEEC1gZy:2EREIKL+2tqdv+uT093qM85wtEtT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000112138c51ce1c468be7b5e0208342ca000000000200000000001066000000010000200000008c90fdefc04ed385401fd4258a30409a371e5317ce2580730ac1a341cc344d4b000000000e80000000020000200000005c7a391c41fd1df0cb8d9474e0526405730a6bd81cf907ae0424ae827dc5136320000000543233695e292a45f344a0884a64690a0441c2861307b7d10d4ec7f354910876400000003bf4ad39469a6088ad094b94636bc625db958ab38037bb4b5cf6a3875c790a7e9984bc4a4dc49a9df3fd274d4762c740d7461e6f75b3ff1eef6abf9a8cfe86ca iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32299CC1-B87F-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440166059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f82e088c4cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3032 2380 iexplore.exe 30 PID 2380 wrote to memory of 3032 2380 iexplore.exe 30 PID 2380 wrote to memory of 3032 2380 iexplore.exe 30 PID 2380 wrote to memory of 3032 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e31ca3514550fc85f9b700c61001c43d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2cd55a578e5a46d10fc3f7a93d3eef
SHA1f24b4c88d014516ef48ed1458e3bed70b4ec1b9a
SHA2561e58116d7e866f77db4f4c0091bba13234e619342ec62dde83fa3bf2855f97e7
SHA5128a0d667cd6d291f2008bf4f26a5826bf569918d2ec4450ef86404eeebf7132d9b9f9edfef95b1e814b3d65f21aef81377240962e307790faabdf9b4aa7f5b249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78f340dfe6eee3ce4dc2e819b740663
SHA1c5e552b556138f7f19603dca94427b3f49740f6e
SHA256bb53733e481ebbecae42b23cd08b308ab99b1790bcde10c3866409a50533fc4a
SHA512cfc32843b78982c34c6ef9b7bd32d70ad67618156133403bd8d1c770af45b07f8c6232eaa439c99407cb65d9114acdf000797232b06806935df9f6bfd788f762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4650f6e0ef995af46cdf4537c01669
SHA188c91719d78dc6228a2a92b066c06c5c7af276f3
SHA256c4cc19deaefd665685ae92c3859a8792072cf32f59cdc11a8aaedae635c07027
SHA512e2c46368ac7cfe9d29e797afe5af5720f62054f936985efaf4cb03c78f6d375b085c1f4332c1841bfe835e8cc4d50c8a5047fdaceac28b3da5d96805a2001487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbba4d5643c4eecd9b23a19c026cced5
SHA1b3898fd99e92d55e3c8c514810052a854e494fb5
SHA256dfa8b3f9af44714f61d90ae06451b2ba5b8851a97f5cb0f69e93bd133ff3c5cd
SHA5124db043da3ed26f52979d7643dc4c7b1e1aa46bee3be9e48dff46031a734525213f8049e0c9650dfa0ce561eaad1f07c79c081d66c7e02da8e01e99dba8fc55c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58778e52a14c94f95240b8a6d93f21bcb
SHA151cecc89f7dd8515c83a6b137cc01e640cf1d4ad
SHA2563fe670273af363f962b28b66f59522c2b9305865da24b40bff37ad7dbb295b06
SHA5127d05783641cdb565b708f16ef4d4a7c68890dd6fd31b6456f246636158cc8381cdf89472cb20401ef07ad06f93a635aa12af53925d0fb953b757702080e64710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50688e0f5b8c6176c06f8d52a1b64f69d
SHA1f0b75b0eb4a9748c2f11bffc9b2c9781f549cdaa
SHA256c690de373849c9b229f816276eb69fe0149edef9cd94e06f28fa4054db517f03
SHA5129a0537ede1524ffa49e95d5f35c8828a98263505b3d43cf3ec525d764982678a6756721a0ab6c5f7b731b692c164958cfd00c9cee73d6cbde3a127298211e383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706d366c453d23d1338384a36111c76f
SHA136fdb6efab0f6a2d4865aacb32d633c9bb56f995
SHA256ecda944cc5ed63bda961cd0c3088d1f125ce0876119e36873583271cfdbccf53
SHA5128f8b144d3b8ca42adf396a3c791c99eecb2fdcf1232b8761829639a4c74a5cbe27c720f888a74bfbd18e6e716c0e57f4195edc6bb3786b7ea2b336e603228592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48ed2939eeb69ac0b713165e5e09e7d
SHA19f06317e3986edb61e25b89cfc84c866db3d6f95
SHA256f9e0d3502c997d93a3c893c4fe9d7aafbbb845135d5f5c467251dd675d2ec4ba
SHA5126c259538285401b3d006d1c5f9998a8fd56d8ee4832ebc9f5ce5d13268ca1652606d76a767b38b216dd08dae06df65e0f996001eb135e2234e6875976f42b130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6ec4662929f5dd40f7075727bcde39
SHA11aeb0b8339dd3a6c91ecfe808c6b1a3d1d53653a
SHA25601bc047b48725d7373ca8e5cbbe18b525465178cbabeab23bfed7a4511544a9f
SHA512074c5640b0ba63a304c10f549d1a3e99cdcb73c1564de87d48e3406facbcd310fadda8c5efce10d648446b8049f86eb00def123b28e99d54c183457a60f3cd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26c5f1f30ec7118b8fb4cc55c89ddd4
SHA12efe286f7fa741e1b29279f1a768d99f005441f2
SHA256fc79decd290ea6c7f8a305121987ff111061bfc2fc53cab5bd5a1b07a72d7553
SHA5127eaed2d99dd31bfcdf7896f1c2fc9fc10ca7a617798aa7ed9fc2043549b683a22a1d77d2e092fbe8dd564bb13255fa34b6e080f8bba4a8d272db7e9da881a36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c7138761dd3960e3d3bd1fa20f8358b
SHA1b0401f75532ddd41a55420efdd3d931451782f67
SHA256416c56a26e27a93773e90fc393d29a70b52f7e505c6a5130d9692727613c5d16
SHA512cbfe6e9decb1f0df08f60d00908f26b6e6d9753aca344c8a1e8e07ee17e5b276e27c28fd8a3c7b32ca2baa6d2b1e6e6d7bac2e3763eb2f44475cd402908f984d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df30f77fa5920f6663e62b6a73c67bf
SHA14351da277a78cbfed6de3ba46b9378cfffddeb42
SHA2563cfb533a222a4ad91c3c454c639de4ced21622bca72ec93767978498b9e0cb80
SHA512ad44e7f3aa7346e5cb358d140c9462f7232c7855d156f079424bfe828f96883e17e692171342ee24cd2c0c9c21ff254bfa455900b01c60a92ff28118e669f1cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547db5b98be924bcb001041d0d1547b79
SHA1b29450b5857add195438fd401917f8c8abb75295
SHA256d93380ae30678766c4569abb6fc12afb604d2a95cef79e4736ee266e9b6ef285
SHA512c08f11b7887c7604d4a952868bf894074df8a2830c9d8a72a4e308027416e4cc802c6f00d4eb460815f60f87ed8a193d254347ef3c539760d7999f04694fdc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c336447d177fdd72393fc6ca096c3114
SHA19bb0badc9fdd42c6f85af4bedcf20887d2e5b3e5
SHA256918b043f1ab1cc9507b85780eecfb23b27b2f213503fdced7896e0655deec3f1
SHA5128b650bb2cbe92888b64d08ac60782fac03425aa9ae09a218dfa6b20d023f43c7cb0f2763f43958f6ec904ccfe3160fd007dd3a81ae7911a92659dabcd05b0e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c05c2bcdc94138c7c94da838e59191
SHA15672e56981b3c2f0b0fb95b7621d8234601fd585
SHA256a0cad7025dffab12ba1267d4093261883698b61252ce1bfb69f0c790f096d3f5
SHA512f6422fc4c2140ddc1eb743fbe523d760977cf9b578045edb1c9becf2109869b215dedde1373174e4510782880bb0aa05b2861eb97eff14e06e5896c07ba72896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52445bee4f53f9240566c0d00e4c8ffb5
SHA1497508f41ca674272edad6c64a31ed205bc02a0a
SHA256d8f205fec25fa7f1350c4c5c301aebd4629619d2e45854aed62ed73d751f2336
SHA51210e0f7f0ddc9436123b3efc735c9042a3a63a79e6b96f361455db3d3ff2954719fea604dcdb69a3cd50a9d31094d3dc67b9bedfe1654ebd705c8e8c17786eaa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b806341eabf851b384cb2c04155b87
SHA1efc1553d6bb7ad793c6452916fb7b8ff3fb3d7b7
SHA2563db4ee69b55634e796b7279af357329b36c098118e9f27bc5ba019a879c96a0b
SHA512a6a7d8092ef67354d7097f88b6acea126153d68dbb9a8f588433b456cdb0f6db43985d6b68f9c37aeca78f9e75c7439802db25aa766c11e2ab235e5eef14ed07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00781e2921558bf1fdee4dc776d5274
SHA1d927c8b05bc9e0475f7adac08c7b0d5ceebde80c
SHA256a8ad8e1193151b9499dbf3fd2c647ebde109434c886e2ac0f8bbba01d4af6814
SHA5120925942da2f5ed1859cd1ba0cb29a1f6cfe95df460e5d2782ede9cc819c10364aef53fb4a495a95c2964a5efc5dfa9f4702b687341f7f79f1024aa468c7b2128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59226296f7479bf942eedea78ee9ee6ee
SHA15539e8ee32766efac122e895aeb227daeb50e1de
SHA256c8e734fd30ef96965a7db92c1c781b2f08e4db76593e324fcf40e3f9152adb43
SHA512efbe01fac172b167caac7c0e2a9803c2531b95900347f100b82389fda2a6a856e258100921d682baa15ab752a043aa342c09477af3e1998a444bf8d3a0ba115f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b