Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
a91290eaba676bdc73e0398a936055e6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a91290eaba676bdc73e0398a936055e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a91290eaba676bdc73e0398a936055e6_JaffaCakes118.html
-
Size
1KB
-
MD5
a91290eaba676bdc73e0398a936055e6
-
SHA1
b59ba063ec9f2d9cdf5f2267042b623d5dcbac80
-
SHA256
a3ba989e0ffa8d6f14a30ebb8819312c488e4f25e9e42ef0628e584b8080d6d0
-
SHA512
c2e140a6793f632d93b3970fa372f51a80880159ca68744b4c859a947dfa267340d11a082e7a4b497d216a70a6de84b26db7d52c656476028273312e202d484c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f86fdfbbb2a53ba34aadd03b170bcab2c13f67513278f725e41dd050c68dbd3e000000000e8000000002000020000000fb30f7bbb5803634dceac3e9da145225d8a4a00ab1685c03c0e496a7f01cc51d2000000076c7a79f3799c326da78dc1c83abdb946224e471570af78d12890dad8fa545ae400000003e8c18e0c3708962aec2887dc65669efc4045010362ed9da9534574bc425d18e6d00dd8f9cd1882500875e93ef09a3766c40efed481ad0712ffe7937a55145e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f6c2ded8f1da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430193511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{094E88A1-5DCC-11EF-A69A-C2666C5B6023} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2112 2080 iexplore.exe 30 PID 2080 wrote to memory of 2112 2080 iexplore.exe 30 PID 2080 wrote to memory of 2112 2080 iexplore.exe 30 PID 2080 wrote to memory of 2112 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a91290eaba676bdc73e0398a936055e6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536ace80c533befbea3d9eab83001b739
SHA133dc8ab8418caf8172606d045e089ede278a719b
SHA2565110d3890117c6aea1b8fb10aa567aab16f8f66d139c3e2b3893d85dde73841b
SHA512dd768b59247070edbd24b15268bcff021e400e7fd7325ed46f5736f9aaa68702481de1621d7944ba71b7b2966d6d5f937af48cb4c0e2525296dfbfa3520d78c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d83dc453d2f3bcefac9a1afb79b949
SHA14ed961049978db07f075739cdff0cfbe38497b09
SHA256ca983030992c2343b6181a7552798dbf635fd214b68ae835eb5abb0e2ffdac56
SHA512aea4c840af22a5ebe52a4a039ed66ff7f11159f4a7e257f6716a5d1d81f8ff02bdf963b616210b0dad0129a0a2bcfea57060615d13841fd1ba6dacb41c97dd41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a68163fcf56ccc5f49b0e245b0fcbf5
SHA17297d4dab1044aef5f832e084a164d83e316ce3d
SHA2561e9200ce7adabc86a0304cb6cfe39066070fe30d58d15a2e7ab327aa8152ccb9
SHA512d5d2bde93fc0a94765c96c2d18190d60afe0e1c13f7f465e9e21559b4c3bdee3e87f53c6e8006ac1d7df8675bcd8c77c704d22aefda7be348ca38c83f16297a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f6f217c6351e6c2f15e75c90213294
SHA1c24e0f671af49490c6706209c405d120d9e95d71
SHA2564887fb286b1fcde68aa95bee2ee9c365b7ae9caf5ca8f7b121d8740f923a6af2
SHA512176006425489db0fc861721a389b9d104b01dd3b423cfe411888bff67d5e1dafba44bc584d14e96f5dfc9f1779e879a0ed13f3a70d8e03f76f885189a431a992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562a597c98788c1c1e3fa9d92246932f2
SHA15aa719c6d05d1a8401062c32f971b9bd83478ebc
SHA2564faf28d6b4f63c0beaa14372b3a3e0a9157102805c9f005e26b40913962b3f50
SHA512bfaa8dbe3a92acfb556bcd18ab7ab5d3b8fb8cfc490abc589abe90fcf9eee93d08646b8e3af1f00fc1a61e609cf428e72f0cae8482102eb151e761247a712333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e863db595c243e9a3c2b4226f284320
SHA17694e310f59ffcdf157112e5499bfcd098683c20
SHA25668e58a0ef42ba6f198e1bd3b03f286e9e44f5b47c4469ecbde0c9a1ddbf1a882
SHA5122f0e7ff32006ba2250e2e7103608eca4d59fa9c57553d690a771c18534f486a9c093b1df35eb1eac43db8017e103914bbdc51baa7c9cb42e9f65a1c4ff65c279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcce3be0cfdbaf792ac0f4af7fc4caac
SHA10623d3746760394c769a8b1694886f5bebf4ea72
SHA256135036b4887ddf9042f642a69c5148f850374922c9e4791889594f6950db107c
SHA5126b614f59a854306773ac4801d9615dd48ff31a44c7462ef103eb1845859c6a039c7102c7a2338aa9d44f469ace1a0a1862964e3b8a0c81cb6616dfa077d3011f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240c2fb846ffaf5f3631e36d3ad6db1d
SHA1d79c223612fc06cc6f80026e49e4603eac88fa60
SHA256822c2ed96b41684061775e77ba734ae75a4be520c9ff9aac34cb441057454209
SHA512cb8149576866b64d46c54ae4aeffc4ccb96d4a34cf297c6257e090c734ea3b6c634c014f0cbac678f0b3bfbcfb9aeabac754463cbf1393ec4cabb126540e22df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce66f04e0f1f87cda996d8a24b186562
SHA13ceb6538026ae335243ecfa330963eb6d84566fc
SHA2569de5f1a35bba0a5a5e87b0ab9ea492c1e344c75504d46356362d85df21e2149f
SHA5125cad9d7ee4d0c3c1be0766e0cd540e5488a262e1a8150545caafed2e9e8fa641db3ab89c42460bae99bf8ed9aa7b4ed2fff85d490ce0e19f7c0d9a78127ba726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed60106dc36122bcda145d8bd73d448
SHA1e3d1d24d9210a1fa15fc4a70d45d0339b15d90a5
SHA256040c88fe3663f40190b2eb087e85d7e0437cc27c0658e3748776eb1e8a77cf61
SHA5121157c9aeb3362c9ba29c581cbe54c283a96874dea4feb41a4d10dec234c2e77c60879fff61b193321236f2e74c3a0f5a5062a6e7e9c9820aa87835d653898cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678a96d1c40cfdaea9977647687a0f4a
SHA17dd87b47bd0e9a9d20097ab02db307c593c00e2e
SHA256bcf90e10b6f6d68f224161550b2fafaa1e6d89bbbb67fa79db66e0dbe17669fb
SHA512ab64d11535c46f0aef182ffbcbfcb69b3b4f40e5420937a989ffdb8982aac15e642d5d355e14d0939bed5bfa7bfdf19e92186a757a159d66dfe6b5563d611b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520274e219736d1130482c99f503bf9ed
SHA181db02277bab4ba11f046d15762f63d2bcaf3f50
SHA256284dc0c10937e5160c8897aabc721382d66de49ee1f3e7f9d9d5b4cb22a8ec62
SHA512ed667cbe3ae20257fc131e00fbcc4939e7b5d4ab5b5e162ec5ca8516a3cd4b1ce837faafe2f12893326fdd0e417a433dadeb3abefd145f1581b2e1ffc1593fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587df3abdcacadd29e8671a072734cbe9
SHA150fc47dff900bbe3335deba8358260bf0cfd1637
SHA2560bd49ff1fa73b44105112870596b1287e109db320fa8535950c658f60276865e
SHA512177e7b970d320e7c7d7f6c54939183c71293c7a78d2faefeac6d9f3843fb703edaa23d122a47a952efe3b7022bed27010dba16dd2f6ec772fa4002f23588694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c755256212a8d1f4710a4f185ab42da9
SHA1f7a3c7321b498ed88a81f730ae1db2f3b80ed347
SHA256c58b5c8e92bedb6a74018650bf3cf62449a534fe78081c0a1eb6b8642d9f7109
SHA5120a1bf627898fd5567eb72ad647b2d0e63d221e416f994455b969010836b875ca6a3904cc3bbac033ba17e6f0cccf55bd4eae674032387859d2e99cf967a1fc59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51401ffdabc24423697022f1ac1c464bc
SHA1eb1dc1c40e271dd4e8c13561ea18c870c7d5f3bf
SHA2569358617f20843e90cf552e7efc379e10692d70703c1656c2840802a79215dee8
SHA512c2d0a62db112a807bd0708b0edb79d7a726175a2c82fd5352b3099136ef7650ae27c3c33d004b24abcda0fb10752a89ee8f27c3afca3aef7c27866bc6b1e33d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b7915e9ca9b88c4bfc3700a7d701de
SHA140dd663a0186308ca5c43b5e4e99ef865c7a5386
SHA25635f924e60d43f27d652d2e3fad5b9748b68cbe8385db2efb58d311c0db86937e
SHA5127479c7c9eeb500c84467c9d93ef5514c1836278917fdd5b52d2af6d22a3aa030710b87f4ed5b831f4a255549d6edb13066081cb2810570ce18a642d2510d8d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8518c6367301be84e8768bbb6d41d8
SHA1dab639cb979d26653ca2e926133ac62aff2ce44f
SHA25695fe9e7c5b40df2efd922ffff0f5fb522bcb17ab5fe63f812ac90ea74418822b
SHA512d7b732e48db30b65477a83439655a9d71572623764796e2f7053b92cb45fa2d8d43d8bc7a2d12b0ac628bdaab5ba4601d3dc4663b792ac8b0d547010dadb0642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521fe8851609a22ea531264bcf33448bd
SHA10b3de30aa8631ba9d6d79db681209767c34db8f0
SHA2567904c278080a065e070adab3bb5595b3a7cd73a444a6bc756c21e6c1cc87e18f
SHA512b19933c3648b4c0bfbcda8f789138b410f22a230475947d823baa15bb61b2b9367bfd7e42414ea8b2a2861f6f838ad75a12308a3f322cb5c0cfcd9dd141d8c80
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b