Analysis
-
max time kernel
78s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
cf1fbaa4dbdc95e5fc0e2daa879d1354_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf1fbaa4dbdc95e5fc0e2daa879d1354_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf1fbaa4dbdc95e5fc0e2daa879d1354_JaffaCakes118.html
-
Size
23KB
-
MD5
cf1fbaa4dbdc95e5fc0e2daa879d1354
-
SHA1
0a7193cd746e278a7bad8ed04e0dfbe1e0226dd4
-
SHA256
bcb7d3429520137a0f2870552311a6144f4a0c8f79e92ac55c5a55160a065780
-
SHA512
03279502f2a5bd683f74df883e0983a90c7f846c02ec857f4df5f1ffbc845d0b91198ac3742e8ce92234cc36e85e487ab4e21cb527fdb86d44bf00acfb43004d
-
SSDEEP
192:uWfUb5nqOnQjxn5Q/xnQie8NnHnQOkEnt7PTnQTbnxnQCCnQt+wMBcqnYnQ7tn2m:rQ/zuDy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000008136d2fb09d85c301173a12513b3980abf52886b6f7d8cbb8f20b572bceee07c000000000e80000000020000200000001d9720411e937c8b3a4252dff95a474e5eb6a00d4c3845464478a76d8f6e893790000000fc2d76a66d1068f014f5cf449491973a2ddf3669a8cfb06c8c7b2900329d1c21d373bdeae1c015ffabe89a7482be005e473ee36f966db4a0097786d6365070366ae87d2938936f0d34574f33059a2685b427219e440ee50e31d632c46bd9fa01760ef0a64dae4624f88d9c061ba3f62b191d59fbf90cc5e13b84ca42eda1c92f1e02d081605a02d64552cd536c4e02cf400000009798a2dda2a5f97db503aadc695b5c4ab5a10a7022faf6c2c4cf63d2f57537693073a8bf0b9c49077a6a97482832a01e70c02537447ca2f3320050d574f9bb6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000f970aff6c76a92d0e19de16804880c009cebe47c9e849d9256a8bd3b3663c872000000000e8000000002000020000000a3fb711d3376078cac0fbbb0b7519defcfb5dda7a75e995598b5ff0acaad813c20000000884e6d5a2867f591d335894e78bc511a082edbcaf8af63fbb8d3dcd300f586fa40000000f1b6dd0ec6090a76fc306597315a82b729a332e5badbaf0096497f536236be002b9a5a9681b7b8f2d02910f8331dfd747c3fd847806b6521a8bae7bc699b2c54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431773615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD1A4C01-6C2A-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80458ad23700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30 PID 1756 wrote to memory of 3068 1756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf1fbaa4dbdc95e5fc0e2daa879d1354_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a5f7dc1fa670ed19e0abbe2104304c
SHA128f237b0465632374fec6f1369818516d32ca5c9
SHA2569463ebbe2718165564a9209f015500f2df38e481a0a53a896b14a3c8e4506f7c
SHA512ef67ffba0135aa9bf07e2d943e9cbf5add0de4eac7c13391061133ce2163737facafea1518d6cb74f89a8c4b2c0116c369b630085ceae888bf3b499e994a4fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50864c73a6e507a17b026ae41288c9f0e
SHA1cc0af7ca293d0df3fcf2b0586d546e606adbd0fe
SHA256cfca7c48bf4e4ec1795f98622c05cd4f4e8cc135f9c8b7b4fb7023008a16aa17
SHA51298e9c79655f7ccc083920f6441fc67ccebe3702114206d00efe2ece235d271625474716c653709258adb90b362cb44027e7b6bf0563c407cb8d2bf78d52ab994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59605ad43288f3af1cc91fc5d815d6ac9
SHA19fc9f4a63af3d2fa06fef4845588f0134bfabeff
SHA256c25c1451245efb436a16d70ee815cc442537ab44aa5b992101cad6d2fd38eb3d
SHA512e295209236db4464c74da7142171ec5c02be6556d0289ac27ba2e4e478f2b11389ad86fafc4af57837f019a85b654f24867daca3c57b36cf7de87cd1ac123808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59991a024f251a24d56bf465faf1e94ba
SHA142e441d248be695f54ed4167d128d30d8669f7ac
SHA256df9ab22cc6b90abff08bff6693c60e5c62be5b1bf4abc22af0a8f8cb8464d6b9
SHA512a97b7413f4c6b0c26c4b0f6092716aa425b6777cdfecf049a34fe136c6ce8622ed63452da8f3670432bb231f098d3ae0f5ce544be1473ae1ff72eb5e792ca645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9638ee459abd718017cb6b7b6c3de4f
SHA164bf5c663023db729dc27d6f1e0f035100234c7c
SHA256893ca751feaa4e15ec229a80ee6794416a153716f09f4a46a9d884d5b833955e
SHA512e316bf62831ed558853bc3c5492ec9062bbde338bbe121310c1b4005f52616f937fabd3c91c6a9df59ff4f830e19db38eb3b05ee9a0ab67377f84f37bd1ce633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b7b5130911dc7b06f1917954d2bc7a
SHA193d7904e19d90214be9764258e1e6f2f5a698784
SHA256f9e22bbf6b5414b880b183880e238fb28d2b6f5a9f0e1f5b34a512ffce3684c5
SHA512d924728d490067a3e8f583a3d9d7c0c7f9fe2020cfff98b66033841b1a534fc2aa9e3bbe23ac180f8ddcfd235092ed54b19594d5acfcab5ae5bf6eb6c19d8dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50561f3f9ecfa4e91ff53d201343e13c2
SHA1c872f2c35ff10391596794f9b2dcb95412bbe1f4
SHA25683bdd1827c42dae19ceed58839acb23a721ac71e9a22809e8a945fc4fab2f92b
SHA512fc8d225d152297484b2b32b64983191eeb4f93d8716187657784414f7695616ab00d671a4fcd0139cd6b9aeece6e0b1d47d4aac9261707dae7be7c2c7fa4eb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7df9bca26acebe814f56042449dee4c
SHA1a4160bd75bfc6af070c7b4c827dfaccbbe8669d1
SHA256873eae8530cc56dcfdcf159cfb5194201e33d5972e137d36600b05bc4cbee74b
SHA5122dcea6128ff06a5fcde7446f80ce6699ec71e0290e2a9c6bc8add7ae92b5722b3fc6e05c5c20c58d61535a4de9cc83998ce35573a079875de70c9bffda4a7591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef4d93f5ddba12be011c7be8bcfd0565
SHA1b75a94816d92873239474041343a94c7fec307d6
SHA2562bba27cb1aacd4d059246d589b9eb5e4d030a9d33424f16aadd077173bb59592
SHA51272b00517f73d84d9a04b3af2a071c7c4797437affef64c31ce99755838d53231e0315b888240086c9822fda7664d2fde94886e7cb6513548576f2bcedad0efc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9516eadef3f8c034699a036d5a1097d
SHA153cff3cad94bcc5d3c6312d03a8c165588e4adc1
SHA2560ae5f40f6042984d1fcd727d4d15b4541abd81a9968b357476961371cb1859ac
SHA512d4a5f7378814e4cd33dc7e1103630073e97ce4e78702a24db88d2f5ce6b8a9af73e510e615fda1e90d3cf1943b085bc46aec0e203ccad5fc230b53820f023e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519143861285a7e086a91fa702b6f8774
SHA1f80f26aaf20ca21882fd882dec6158822a85ec30
SHA256386ce70a64746ca757f499f4ebd921905e7a1ccba27ed723d6a1e9fc4b611d73
SHA512e10c2449ff91a700718862521e5edc2d7aef361fe29dfec7c67fe932e719fedd18f063e758b9b6f7a263af1b1daff8b2951662a37d16e63ff5d23d68cb8a9f82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3886c1782bdfdb1c8afe943d942956
SHA1deec827d995d7308d487cd342296b4ff9a6e798d
SHA256c1e9e5fe1a91959c60dff9523e7bc63b3550875a58f3d838ea5fbd2731c3d3fe
SHA5128e7bcc67f095befa6d8d712f8fc106a91a3ff2635c851b02b6995142e075c52667f2d526792b620453bcc51df445df9ec01aa2622b2c5eeb604073cc6c5a2498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ca7d5fde1e8e8a1d420318434f01bb
SHA1f58a6cfe831f1af86529517e87fa407670584ecb
SHA256cf6bd5ae4b09f82aa5c5a26d9e3dce3deb4e112f6c8b68aab15ed02c1395b5d1
SHA51229aa6808ea727b69074bcfa28a6506e9aa260c6c2c617a8529990cc7679933f24898162d1c02b62e9a544ed4df56cc83e0c2bf328c24e884a76a7e6044bffa78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfececc574b38dcf94eb437bac2a84d
SHA1f7b0a16780c46ab2873c008fcd4307ef6d03eca4
SHA2568a0181123cec4e663519148dd7fad83bd93869dbbc7f4fcb5963fc115ddf234f
SHA512cab35fc6f98079aac627eec817e59602f60a1b42dcb6ddf1aded6830b60306fcd09a379f0eb8db1ea5aa1cd39622ae7d4436ed4f426c6bbece0356eedba53326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe516b74a5c0d58ac4ee0f2603d6558
SHA1a8d65df371affbf161f8154981b5e3cdc49db52b
SHA25612dcceb8777399a9089ce60cb9caee3e7a4149c4e8caf850aacc60279fd8bdf6
SHA51292a589426f5ebe1e156f6d3d079dee139bb5c6491fc3284791f62ebf293b850cb37a056116e0887873f9d99dac5079da53002da892eb199a0d63141bfa78c0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12d4444ad4f1046932a7779862d43c9
SHA1212a9685142b1928ad2ce944a330132c49a037e6
SHA25603cb33af894f0c9f4c37862c1ccf3c5e0d75ba752c6636eec14df27943b91847
SHA5123b7a3b257b4cd4240dc7eedbf3edcfc702257cc4ee8eb2f558e4d82df5b3a5858bb3a177672515649a26a8f170a1bf44b05ce4e1ef118deff91051f4bf017c07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b