Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
be7f5970a9c2b0d69f1db1d21fbcf6d2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be7f5970a9c2b0d69f1db1d21fbcf6d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be7f5970a9c2b0d69f1db1d21fbcf6d2_JaffaCakes118.html
-
Size
213KB
-
MD5
be7f5970a9c2b0d69f1db1d21fbcf6d2
-
SHA1
0f4f9633f4f896b7e0db6cc09b079641af30b7ec
-
SHA256
6caf79a4aa19602887a188f64bfd3fa2c81fc1d05d0035132418003605d34f02
-
SHA512
b0d26d773ad66d80810fb37eb2e178e5bd00d87178283ff6b4e6804dd271d1333744f14d11aeb1accb421827c02b7b4d7afb591bbdfbf976366aeeb237ce9e06
-
SSDEEP
3072:brhB9CyHxX7Be7iAvtLPbAwuBNKifXTJF:vz9VxLY7iAVLTBQJlF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000caee5b6f7c2ecd15206241847bf90de650616299e50184bbfdd72b8abab2f85f000000000e80000000020000200000001cc8cfeabf69bc06bacc23fd963bb8b7c78beadccf55e7d7489932f7ab2d32692000000086476ef736924e61f31e0284970b1d74222bc1078ce42ef8a1064964531c6b39400000004ae2ef37eac5b9ee13aa8a2eb4c4f50252c7861b2cead6c41e667ce0d52a8cfcefed5f81cffeba20f7d5ef01a668e5d583b39d5dd8abefc57ef1b5d805d0f348 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430660896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a35f1719f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42DD1F21-620C-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2824 1748 iexplore.exe 30 PID 1748 wrote to memory of 2824 1748 iexplore.exe 30 PID 1748 wrote to memory of 2824 1748 iexplore.exe 30 PID 1748 wrote to memory of 2824 1748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be7f5970a9c2b0d69f1db1d21fbcf6d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584417dfda5bd1ae48634f8865d44ab79
SHA19ba9c0eb3470a1500f5a8864b1c98967dd878935
SHA2563777b8515f72b05954a2e4402772b076bd1fc1273d618b59b4c195883893beab
SHA512c0ed31217ea3a5e425c8a1aaf90cb672f8decffaee7cb373fc9503a08f39818bdcb757c6955200c22b6ebbcd0643492056200bbcdbb4afed03c310df66e0be9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c5386ca5a01a5d70f0b8f81ddcbfa5
SHA1abfb56dbc7e7f3f61416d36b1bd9afb8693358f4
SHA2569410c384d789d60c005d9e57153ceb8ea34c8acc03d0bdea9dbef8573af5d733
SHA512cebf3f35598398803d3389fdb7eb05738661fe9d0b52bf17f70097808d35bdd478c5119f3e5028d57e9975f5be18a3f96f3d7f60d48625fd789891969baac200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57aa98d505893bbf7a025ce1aca9bc2
SHA13dc07b80e2e083d010fe6b7811df282ba3ed52c2
SHA256018e05fe7a074ef0d3536339fad66778895ce43077aa73aaf659c27f2a6c506d
SHA512ae1ad5dd0179bcb419ef0c7c66fd407d5dba9abb7faf99520c864c36d4c5e569fad61ed841725e36fa03452dd2dd38b183f428ce190c1471f811adef65ed607c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee9671274985ad6221fb21f1be145a0
SHA14cf8746804132493e9ae226bbb42ab3839fecf0c
SHA2568e773111a96a0fe5e9e15b835dd2bdbdf0c9e07a8ebd7e3a1511e108f2834f0d
SHA5126a4cd657e3a6e765e186aacf550887b6730154c2ad11243965a96104ac296d63c99168f45d55d49aba62fb003fc22c7a2f4257fe0b31b31252d24b9a922cd009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543673bf4b6b9f6f13d126df6a8e6f4de
SHA1f2d76193c0181933e4ef8c74fd7f46956b1f70ce
SHA25653cf5c53cf9bf945c7e2097672c176ebff0b4db9ac381549167e0ea49fba1059
SHA512be503d6dedc436ebf2243f7ef9bd3fa7fa087ce1cdba2f2ee5c77c1ce2658289e57801885d775aeec0f11643c235e0acd73216659f03305e20e3ebfb8757bd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9af98d71bfab85502bc4ad736cb253a
SHA1ea8d73b5853d98b87f27625151a4b4178d71e2ec
SHA256bd06542570f29349145c3c82031d18c7b6d092d4ec82395d3a71309cb4a3ef2e
SHA5122ff7953f85a1cb685d48e07db03237e4b46a31aa4a9228974672b38b3962824c4e5186d9a2410c979090bf3aa50038dca4b972fbb48d8abbcb94580c2fed20ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae893f314c134b19e175b8d0b414909
SHA1c0807bc21d95a49e5a3aa631329055963d9a4dee
SHA256e5403fa7411146a3386db129311f6d48dcaeae1fffb72274308138dd53dadbfa
SHA512bf921a195fc86829ca13cd46a6bed363f382c201b17b8bedb52323febb49bb7c87310deeb3ea8b8201417136e0389703d07ded155dc0344a85117c3988ba7732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b9ec980a5533ce5657296ececc1a78
SHA10c442359a8a8868724f9aec420e2bb714c37657c
SHA256b36bd958c502194b892068f55ac59fe65ee09f91f4ef3f5f5a37a0c5310e27d8
SHA5125cd3353c56b0d7bd0158da2c3785f1c51995f2b4b17fa46e88ef4ceb8b2b2412521d9adbf8dcdfef71a86ab1339d652ee98263d4c0e317db751eb3dd22718423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e972f363ed786b5cd696a7c312f0f90b
SHA1c0553be70c958e1eab2fbb32bf42ad045028c460
SHA256c05166082ccccee2813f3fad7cb335ad5a906997eef31eaedb27d3858aa26673
SHA512727c43529cec610b1b24dba26bdfacecf29397bb905bb4b733a9cd5518696e2d1184677f4a425adcdc1def1209933b28906e0e432c8dde6ef497be67a13a2e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b9b665951ad754199b0c58ed5375fa
SHA15a5033016e6ac8944005bb982de5b3799fabe8b1
SHA256b2f5fec9e62d98207c7253b2dac415e1249ac162f133f96e5a55e5054b0f5fc9
SHA512c25651fffa7bfe0c6cec942432a46ebb3fc90283709160337a3e060653fb847002b670e482afd13f8bdef4f4ec685a42bbecae22aafa50e469a0b7253d179a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c2483b6c39000362156aab57151407
SHA145d010e08ad45e5cfaf9a3d0ecd66a9019cff4dd
SHA256c873bb74be42ec6c1a75add54d22d28ad3f34620e3eeafe9dc1dbc8636593d28
SHA512719d727f49998bcc3c0f19377a286ce3388efb1cede77caa3333f877b53a38f78c4bc276f7eacf7b865ff43852b493dc8259791cb70da814c9f5714ae094e7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce3470d8732567864866f1617f7a49e
SHA1b88f2c364611d0b73b68969345027f9dda658445
SHA25616f639a5c4d95bec24b05c4786ebe0df9946d71553860afc0d51758d37d55d8c
SHA512d41af9de65487b04cf55fc703f281daf938ea05b91a63549b1c84cb61f4baf01d62d29890bc8b5047aef5f5e5950c4e98f03248a485b60f699334a4db380509a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dc47c4d6b0836f5e24df16533558a9
SHA1741079ab9cfb86e0a93276bcc33f9ba31db056a7
SHA256b114d2bb121f82d3101bfee96569697f4c62b127e4a330bcf37486a1ed52b62b
SHA5128408a5a9d9338201cfd84201a96080474ae7365f1d116c3ac0c8c2747e08f95f962900a303c173e7ed4f43e9676ab6231c07b45eaa007a07a23b41c1efadfc7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597da3b67ef296a5df00576af04795b4f
SHA162c9c2b7bf9d9c35be96d96ad4ae4294e0787815
SHA25604bf953b49b3991019dba3e77581d8159ffc6230218130660d257b8379844d2a
SHA51208aee2ebdb6fbce1dfbf01272d7b45501548b81a90c753d87475f119ab84cc710b50ff2f62d699b0c23cb91f187553803ea07fb4334a887902c47d35d10c63b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8d537720fee7371682b31471b9f43a
SHA114a336b88b41c96ed8922bf8aed323ab9453e505
SHA256a5e437ea219073a7f2ee47ec1e7972391e292b8a4f022450b2582602f7b9865a
SHA51283287531c7bbd9be081176551b742b6a6c979231b1b83625d68a6ed36056ea0ab610ab480b5f2c35ebb91f3ba2a167b895112b8415d531cdba0fd80fcc6b1cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c78ca50797540af6e05532e40935e3
SHA184fc60ad637c901df84d2b5963807562df6185d8
SHA256ebdc520c80e242a93bd3a179804d2e8137c76b7bc0ec68d00865b107c2aeb8a3
SHA512ccfd5f653c60a55c21d26a469f25341666aa55c3544c20ebca7bee447c6202febf572c51fa2d3df7054e77142c806f09000cd260c38d784d4aedb87534a9b185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bc09558ebe7987d517987c1601daa2
SHA177db33206213fa85fa0ebcc87dff3164d059d2d6
SHA2567c04fa18d5ba400d924c703cfa99d95d538310d153bcd4a1dd927b99d4245b43
SHA512cacde8b54efea284cc2bf4cab83a4849ce2d18e4b0359d78c8cd7d2727ccf745c36cec7ac0904096f43e8718571f481c00eb5544ca24146e9d707d70dadcd5b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b