Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 10:26
Behavioral task
behavioral1
Sample
ee4e9c3c115fb8d14fbc59bdfa74d60e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee4e9c3c115fb8d14fbc59bdfa74d60e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ee4e9c3c115fb8d14fbc59bdfa74d60e_JaffaCakes118.html
-
Size
4KB
-
MD5
ee4e9c3c115fb8d14fbc59bdfa74d60e
-
SHA1
663a62b2b12aac4cd499b0f1335bf38cecba711a
-
SHA256
af983738e866380d0a4cadd7dc1015643613abc17cc4c13e171e49d8642167c6
-
SHA512
0e0cc5903bcdd3073a52ec7ef635f404e780540cc58d9931e095adfa4cadc8d41ab5c2119e59a9801a1abc87d18bd8cef586f6aeced7254f12d021ba9381fd40
-
SSDEEP
96:8y+cAl5azln+DtZogCrfd4mPaYM+ViKFe8LDmUbbSOSVIj2:8OAl0z8DjyDdnaT+IKYQDmZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000377c9120775ea8419afa023dc7af15460000000002000000000010660000000100002000000062f23067de319043bfc96d7c42cc67efb517782cad862ec3cadf8c662981e973000000000e80000000020000200000004162c2f670afdfa59b65b8f2db4f43e4eb471a44f7993e132570b28cc2d687e8200000006347831f18b1dabafba6dbb1c5bb4ac52f3cfdcff97e01d9bb61a752735d58d940000000060df76cb149bb3b5c69b0b29a6e41b894f5bf916f870d55cb300282827b1e7b26808faafeff5ef9bed9bd4ddba4fae063f114d8a71b29804951d34f7c0663b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804f68b2124edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440333851" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDFD6221-BA05-11EF-9D09-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2676 2776 iexplore.exe 30 PID 2776 wrote to memory of 2676 2776 iexplore.exe 30 PID 2776 wrote to memory of 2676 2776 iexplore.exe 30 PID 2776 wrote to memory of 2676 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ee4e9c3c115fb8d14fbc59bdfa74d60e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6dd0000cc8b42bcf71d67ca2c455bc
SHA14922e9f6eac4d6650f444f2cc5b6b96792ef4582
SHA25630ff065c9eaae01a64d4c29d15183cf2d718a2ac2326fabdcd39cb7f14c25da8
SHA512079c605bee8c9f2e684e80a8753c35887691493d3406e35b8c1795f5c3741cc321ba2d451795451eb81034a2b943d285ff522a2b2d44c439df2a10f4e5b24593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5ba7824cb1bb4dc5b397b3aac6f631
SHA1eb68514fb32cf7dbcb6c620a0862e094b69635af
SHA2560b9af12ae6991c895d4fd4e3a9bd0e57b72a652b406ccfed46b01bdb2bc4c8cc
SHA51279a77ea71b66ca4735c0a67b43c4854a22a4aa08f8df162bc04a112ff5632816c9645289764925fa3b69ffc02be1361d2d87689d93ef3645f93c5c5b914539f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f837b3f8523c535dbc8a443590e00c3d
SHA1374287f68e6cb30d3c2bf51b850b7f7fc02f0a2d
SHA256988864ee6b5f22872bf6c2852e4300c2cc15523a2615d5d1484990a486935ab8
SHA5124d704f362ff95cef0cd83ef25632ad14866429a880c19e8b8f7ba052a97646269cf2669c28a21182a65237c431acaea854799551b4c7be336cacd61db503b7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a538f8e8f7a5c1ea66f1ce441bf2a30f
SHA138bd9b81efa229c3d6ea6d375f4fdb3eeeacfc73
SHA2562747372e56a75b9cedecb207a8a3217a0d143d9e2842948fe354058c659c9fe1
SHA5129464e034a55fd5631d12a0c4a7a8dfea0b08deb47c78ea4bae7cd75d71f1d020b585f2d9f80c3a43950bab36aa2de751c476ceb6ac5bb7ef4e4774cf90a76641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cee4cc7bc0db813e163d328bbc3109c
SHA1db8972fb7e955a533ec04dbbf55673404a85fb77
SHA2561de4cbecfee447618e4b257a0b163e33d6770f064646a3975563913f184b6f11
SHA512a747dc6cf07d2cb62bb84f7f686c40fbb5513357428c6a3ead0e6eba21de94edfd425c6604f98da6fae53d6a024c8b711d4f377e76c923cf2c3242250a176256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404559c8029f5b4512180a5fa6bc87cd
SHA1ac55893aec20b5eb19999822031a73fa93f5a796
SHA2565cecff9be485062dae0c3d3370c5e2623255c44c21008a8c7302cb59fc572fc3
SHA51238397923d7d68268eee309ea59b8d1bec49c1ae7d2525923b658f705792bfe0e3d36f99a6720c50d93f936133e6050856ed13ee60e44c1f9bb110af15b9cbbbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeca3f8207e85bcb12268eaafc8547bb
SHA160382c4cfd0c52f78e854852da6782a3acd62286
SHA256a2cd5c64dca791af12885b73a303141f55f0b31d10cb9f92f8d6eaf58488ae7c
SHA5129a0d74c7f25db02dabb297d0fe452b461fe6fdfac0ea688883d0e7202722a6d1166008d20d9996cc4a1d6a90bc5da4b98b73f707e3ec75c3e796bacb181d293c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea19d8467e0a0bfa2f0e449ab463d89
SHA129882c41dcf5873b92dfbbbc72dc4da282d00da9
SHA256819c721c88618a5ea26afe2bb03cfdcd44be171d904401ff5707cde2f90f6552
SHA5122cd78b7ec1159e09197b480c18a08600aa3798d98fdebfc8525ce36b42a605fcadf62b4d78d6e096b7b4e0c273ba0e336505c1db6727c75b68d5c1e1316db05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fce67ee594cfb500550c9314fd7ceb
SHA1c62b37ee344ba3d501b84b7afe5a766c95cf443c
SHA2562b92f1cd65530ed69964c9df6c1ced0c39aaa638e6f2847231e70abec6164a68
SHA5122708f0d28ecaecd58514490d2e673222eb140ed86ae308c72245c95e6c8352ebf67d33238d68ade1cec4a29739a1180e4ac8cc4166845d9604e716a6ab98beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b139ccbc4702b5643fa672bda5e7cc4
SHA12959f9acb63d5168bde7505a01a78f7fd43a95e6
SHA256b2751470baff16db5f2802abf3558934744cb8b433b3893df948ea7235e836e5
SHA5123df40167f58baea32a8a254547e34c25c6935b68fa09626ea8b568424dc93edf87b3136ce0dd1e72cf9096c78f8d156bf5c6a7724f0de0a7cc005324c833f285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5936eda5f26469882cef83d7592418298
SHA180ed0ac1f6fbef36ca2ad0c9147687a531b7f8c6
SHA25639f017e6a3aa892fd22f08bd81a5f32e0c1d4b009ab9d5380a3cfd0cc367ccb4
SHA5127b20c9019988a423a4bbac933ea05988ba61e1cac5d875b755cc48824ea19c6420478b48d84abc2747528ffb7b32f54865232158d1bb9246acf1510041bc7fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597544ce00beb3dc232e9ccae4326b297
SHA101e0e7d67fd051619dde9cd9bd21e8b572cff8a8
SHA2567feb3a3e592c811fa61ba4db0af9f40f4325d65b4695206d9e56f6d3fc414bda
SHA5129782700e6f24f823210d9cac91d356550e5cf86e7ff0d99083afc33c2d5598d640a2b8d236162f9f73e30e9b85842b30f3bd833d908a3b8eeb17972e6fd54147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b776cb31f9e6aea629435918b8752d99
SHA111ea199b8c9d5f6af1f27d87ef781e10f98fb407
SHA256f6e6686c8cbdd4803b08ae47734e8ebb888e76a5959a9b4ef05ff9bd96813254
SHA5120eadfce736c8b57a0eb25f4f4834edb7c9551bae80364bbba14caa6fffcc59b3ba36521afc9cdc039567e6fd42f91b8b00581346209ae68b2e8fa35936a8bbd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56369e22a708c5a77ce400c639d2e6f17
SHA1d6c6427a31fef877fbff8fe93e65fe729f1e2c8a
SHA2569f143f4cfe6fcc551c37c837ee1be82b2650e3a7de392625858b9765f236456f
SHA512298a61c1100ad9654277b7f4f1d9e45f60e5842a68ac8f8e2e5531002379f2a212b1a70da7b37a121f8f41babcd75a90a5a5cb4d19cbd307f727f669aabfaf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538d3ddc471c14315eeaa88f21d3cbfb
SHA15e3293bf24576854069be5c2cb8d5b36d24aa801
SHA256c7e911a66a6965303a1f4273f5eabafeba5162ee125288415e114fb2f88eef7d
SHA51280bcebec813f145863c70bdab5f2b9353eefe5ee00f06eb15bdd0e1500981c0052eab14aadd5a4ab15beda34b0b9a55614b55284081eb757fe28d31765c25b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c351dc2a4f64bcedeb12b4d7e63e398
SHA13a8f4247de8a292d09e2d1f66917e69a622499c2
SHA256468e0901aaf4e700a4e802226036ff4ae89b5aa631fbec05a8fd78e03c84ec11
SHA512b4a81a0bef79110a376305f222d927fa4944fef9079e9d06dfa04a6a1cecc53e4f5186faa97dc0b63fe61eb78c9e5b41a4a492d4ff382b9543e07f09e595fe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4fd1d4687315faf88451cfdce940b6
SHA196058b02866ed6db1fbc6a4e8075013badc963c1
SHA2561e2690ba2baef64f2fc23c2aa6b7d0230a9c942b75701cb95ef730840c716d24
SHA512de131e92e55afce4cbe7cdb611e336a392ab19b9706c88b3126b01eba76c73146fef8f4b23544b1ef564bca2501b81633352201cfd90e53134c2f53f19beab3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d611e6df97f3f2655a76359eef73a4f
SHA1a0e1d30bba4ada8f72646f395b30322a400a5a46
SHA2567f70bb315e4c83ac059c112dcd288d9744e10d213a0bcd02e53ac646a93a69ac
SHA512c27101eb3c7c1e90f0877a9358c474a17d02dea015d7dedaee3bf6b7241b69b96f7fe762777a2652b8c300b5b044ec7767ee05918fbcbbb15f52afd4fbaa17ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4a69d26483dfede134f268837c2649
SHA1ea94a710e70b88b6aa7692b62753d3c653e1a736
SHA256e157b16e838bf769197c7f6cca6885a285931ba71c901cdd4022968ac2726e5e
SHA5122b40a9c7df1a398a6e2000f28ac2e0667dc90af8b4dcb41c4ef53980f2de524f1cae8fe8bf111c90eb624b8a280ba72c3f562c776f4f7be8f48838459e019017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8f32ac50f1c54efc30a43162539d58
SHA1b1dcb14bef61fa63b411d8fd32a4dab83290a186
SHA256ab406a1be0427386f45eca57bdfe7709a03c17e14a02371de7962d611c25c2f2
SHA51260648fba38f8e9df99db772f196d6e7e6adbf05e42d088203b30ab53cc9d211c465111b68ced4e83d99b774e9ed18ac0a4cda7987444823114b0e7d9e8b37edd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b