Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
a3f5b1ac89072ca7c34cbbdbaef843c2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3f5b1ac89072ca7c34cbbdbaef843c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3f5b1ac89072ca7c34cbbdbaef843c2_JaffaCakes118.html
-
Size
6KB
-
MD5
a3f5b1ac89072ca7c34cbbdbaef843c2
-
SHA1
0c51f315dc02c2a0a4af8ddc587fa86f81c0f0f9
-
SHA256
1b56300363733086df93811cf5c6e46ac1d765c5d57e08d6f0b933a9d4ae5119
-
SHA512
dca6e5d8a124c81d4bcde3487ecf1395b20ece4fff02f04ae43ae6c23583d1259719d9e22e387a5354a63eb94f4ad270861b11395f151d9a06450129d1ede168
-
SSDEEP
96:uzVs+ux7ORLLY1k9o84d12ef7CSTUnV/6/NcEZ7ru7f:csz7ORAYS/y4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430087237" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005953d908cc48d10f0389fb5d526697f99bb945ca27942c676fec4f4452e86b91000000000e800000000200002000000022524b0ea03594908efef593410384ce65fd27b8c7747bd48ba4566e248f84bd200000008b9059b836eb34719793311f907b826d1cbc20fbd074c93d50066bb39f7726f940000000f610f5ad4a9530edcc418e3ccef1b98057ad96372ba5bedfefd604013e9f19121e3308defa2ce8f01424922a3bc0d28f539d9735f25073409b61061f1dc408f7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B72F841-5CD4-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80170389e1f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2764 1900 iexplore.exe 30 PID 1900 wrote to memory of 2764 1900 iexplore.exe 30 PID 1900 wrote to memory of 2764 1900 iexplore.exe 30 PID 1900 wrote to memory of 2764 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3f5b1ac89072ca7c34cbbdbaef843c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ddeedbd81d45a0db1efc5e5d0aa73a
SHA1ec09cb314049c5d3f4c6e32a3b43e79e9fcdbb86
SHA256b241d531aef62c84fb96fccd74c9c291a082aae7cfe873c3177c53f4a9821eee
SHA512b461daf960320672a6a34f640a44135dbb4a8911aaecd5f87d6ed77100f19061460fa39a0587d087801a738a3e5ef576140e0a6b040aa0436df2477a4bf67bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf4acddbb3fa067c3a378fa8ffa8920f
SHA1aea85649b0e9216f2de928f88e6aa00ad3f28636
SHA2563fa3128764c1c17c687e77fa8c41f3f80f1c3cf1c8842cb8595896018f11d7c1
SHA512019b800763e821a4b39fbeb3c8389a4ef5676d214ae3080a6e0839b296f6a40c1f2c409bb3ea9b05c1ae29037b463e19050a2dd399def15dc17863ddfbc9c03c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe129ef68a5f5c5a80915bd520e7d3e1
SHA18173fc91fd88062e85e8969e41009efee61d16b6
SHA256c0eeb38ee4b2f182c8551c61048e260a34f834cfdd4d93ce9c6e564810da1c9a
SHA51241c229a7c8c92a6a264fb072e64044677815573d81d7c25c509ff6abd36296f76db9f21f6579f6c2e6f9e78e28e57edee01210432c02d71db4be542d8a9cafc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580782e00fefe2b195a1246709437653f
SHA170e9452ced7b29151ff423d0094158a2e73974b1
SHA256e5cd086664df6552d2cd061141d3a5ce7cf1a88b14454ade9af1538b41074b6a
SHA51224266b480551642af9b787740b4d809dc32a84e882fe11f5b57175f67916a6d3c73e479cc31535320707c6a6b88ebb666cfe4390c69f3b1e995ae6dfc54acda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f239b8e260ea5b108ef53ad4df5dd676
SHA162b51c8ffec0947ebba1c14cc7afb59e44698069
SHA25641e417e51b98299f0d3d571d5067d1e1514e3ce8d4dc235ac9eefa909a9567df
SHA51224aa706c3e51d29df17ebd4f3e9bbb8009bbc6746d542fd8709566a62f5210c01cf34c62da477ba30c392170159bc4eb55a596d1af9c6f695a789004d416b2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585feba989195443e217ce25900acf759
SHA1ef163ddeeed4d4dd2b308fcc71693e9bc4d74909
SHA25622b8531d0b81b9392f1da0ab338e0f97e18deadbf2dd48af26d7178a715e8a66
SHA512e9b5830bf4e7aa2b1dfa9e9bfe6f6a491141e1f5adb2e6f31611cfd209727338f939a121e6ce67b974e059b59e34af177bd98bfb6cac6931fa6b799d3ee47da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae269fe0344415440fddca310d756896
SHA10b80adbebe6ca892ffab9a08b24b62918c42c4bb
SHA2560c9b3bd5e913f7def7d0a0aef5b01c33562fef4019d72b96f0670e1fb45ecedb
SHA512459d43a4b5f1101c59fe31238f16139fe434d8a6e6681d267137a54a6befe34b6eb7a31ba62d96f5bf00483bb69feef2b2b246ccce6705b56ff43a0873bb64a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7b798abe841346816e33d77e964469
SHA1f9f56105880a9314a09f69a302cfddaace51f98e
SHA256dafe1f99ee4a30e4901b0871abdb372c0752b66645c82044fd4e49dee3092580
SHA512fe376dfe73f4c02547bdbdc2bf4cf3d48d4fea5887893c70d461cbbeadb66a1e74d89df51f99dcd5465d692400d1c974995125064c90ea61f05848251e10d7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2db19a913b3c98478464039dda3162
SHA1f3f2e528c7455ee837771f3d748a1256f1ed5c79
SHA2569cd6d0f8390c995b4ec8c0b3dd147d0fd6adef24082991d149c87f8ea5585247
SHA512f15b7d2d1796cf014ea24b260ba46ed754005ac7bb3309c1ad17b134374a50b229ad21bfb81c0642ec66fa2a9c1af2bf14e75cef177207a49113ddd64dc783fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1174aa890d3c374f1f2ce922bc66951
SHA16db74b0b391c89e0ddb2fe1ee00f1aaed9cf8a17
SHA2565a9a9509be8f258cb0a2ba7d95bddfadb6953e92ae3137fbafbff238ee302ffd
SHA512cc804c33031cad816af8ddf04da81b84276a788085b1a28558edf1fd958c8f427865ce17118a42ba5968c5b368af0d04299f098d34e74ac7b3414aae1d4178e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba74337d429fbe2b63c198bb31f6c7b
SHA1a2bc96ae40996cbef4d68ace5d61e643de93a0ba
SHA256a754fb7c717b46a5c522ad3ed02868852771eccb6b4c076ebf4d39e6a81f70ab
SHA5125efddad737ac8d55a4c4ab159cbc55f195846e7790d21af369b59114e9947b9696e6c919606c24cdb16fd9ad43f8db73b45c9b41044f2d9aa025ad1ced278d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75002d6b67d5a17359b04ba59e627f2
SHA1d68738db87acd20547f4407cbb590af14c382b81
SHA256dfc0d442a422d476fc99ed017ed67a211be0c07acc7c3ad19490fe8da7e011d5
SHA5129dbc6315ef5a301785fcb86591fec0f9dd2839d792c2494305abd44a2f5fc3f0ec962171dffc2f5264a8cd92d34b1953cdf91a2c404e20aa2879a085186a73e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0adc10c4d6f6ad16375e60b299fdf24
SHA1ce44cc29041c176c1db2549f4c94cc20342cee37
SHA256841ea311930594eba55e331e5077ec3f7d4cb53ae5c661da1d5fce1327503928
SHA51213e86e0b89b9b2a32b4b91006445802b47e732169e05cc9cf490145f0127c4bd171caea096c3a4d1ee6a0057233087d7fe70c8c9fde22828803d5493a30d5250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c453142f6309d976fd5cbfb27ba235cc
SHA15fc8cfd8e62d18b6a7b9c2dcb39b48ac282d3253
SHA256c99bf845cd781707a73f0291bbfab4af03234bcdad8c345215455bb043bed0a7
SHA5123eae107794253bb59bca32717ca2379ccf9d78106e636a9cbb0f2e033f23010df016e4e8b321fe7784188eaaaa5787ccd9a83b95814b9cbeaa2cb18c0030a68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59948e7be449af7f0f2ede9046598ca2a
SHA1d3c58f1607f2dd706d9930805ebb66ef7724c203
SHA25676758b67710ca55ed1ce2efbe792045344964876a0a5d4cba062f07d1c97faf6
SHA51289f0d02386ac7abc2a64660b60d820a02649cc087aed37b3984508d358a8f94ec7ed3045fd4be93cbf035fb58a1e0e0874958efcd6a6117d5c2c295638847bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c56ac35377db6953653a9aef291050c
SHA14393989d2b02b305ad591c1bd22cd7d51a8aff36
SHA25659affa4680564f57baa887be82a41322cde18a8d73487c562416f3fc73f8b824
SHA5127e2d45ae3059c44faeac176518662aa589c568a5050f57f1fe4a62e3fb061e132439dc129f3acdbe0a28a22d62745d3a9dd84b1f64a4fd27be0c6da317ca17e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52800efbd1c7dc5a3490895626edae398
SHA19241fa79c98c1ac0ab608d5e5ba34d69082a8dfe
SHA25676ae9b9fbc989571b627c3674649a83455639f36a8ee9f8489b53cf1d9984167
SHA5120c936a507b9a1ccc2cb6985a49ec6187895154b993215063f0b5cab7dea8a36ec026ca04793116f88898f327261e7b36fb6b1737481ea9be2a272efe31334d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ec700458fe1a0635a77540e80bf480
SHA187f4a934cd6ebfddd3ab1ad191e25dc67800972e
SHA256969113951cc07212579d3f71f77536d68634b093fe685b1c18cc6e96e68548f3
SHA512e190bd5f1bd6cf24ad0fbeee1cd7c97a55dfc80ffbfade94b8c49e03666c9f3d1c45a941bc29f4b543dac650570ee5f3d0aa7e4dd5bfdad3118caf72e55d542f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e250d78f21a27af43cb51083182176
SHA1ad0ab5494275665ebcbea4053dbf3721f420161a
SHA25623923f694566555c9f02bc4448e2bd7f170c04bc4e3228e1bb7ec63514021f82
SHA5128c07617c58ff0e19de4e193898f586c7f7ef77a1c60568a43e89525e5b03ad70a2fb1083317bc18dac2bd5779afbe99e7733873c98071e30996f9901b42842a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b