Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
f546f92c615114978bafaf237fbf5eb1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f546f92c615114978bafaf237fbf5eb1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f546f92c615114978bafaf237fbf5eb1_JaffaCakes118.html
-
Size
48KB
-
MD5
f546f92c615114978bafaf237fbf5eb1
-
SHA1
4d06105ff89ac5d36b8602a60de2aad965753c46
-
SHA256
333767d8a122af8130a5e669a3d331be8ab5d68053e3bb85c330d69eba6d4120
-
SHA512
78f5697944e5d8413f53d6919843dbbc8c1c9abc7b903cbb88cd64486bbaf13612586fe6a1bf08f13bac60132eaf20de3abb2cb7fbd8b6b72e51f6b30f114504
-
SSDEEP
768:V/Vt97Rycy2aWzkHa3Z3MSuBTSaemAELdjqckF8SC0/ZuOU:Ht97Rycy2TD3iDZSaemAELdjqck0b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000016a61d0981a8b6b4a0db833e4b42793465d9d8088807cd047a313deaabcffaa3000000000e8000000002000020000000ada6df3a4be1556722e809638b5a1cef2b2cdc1c35e6db740ba2ffb8a72ac3952000000044ce6fe256595df54561a4f0764f1f8dedacff4cf19ff1fbd2c195e3281d5fcc40000000df573253c6e8bdaab6f2d42b1ba5f7e7f269b456d0ea905554bdf758d3865d69b98350cbc500507fc08228b2b4f51457b7dd63e80d8f7ff23d821b658c1ec21c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433403641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{377E4271-7AFE-11EF-B945-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0071b00f0b0fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2816 2644 iexplore.exe 30 PID 2644 wrote to memory of 2816 2644 iexplore.exe 30 PID 2644 wrote to memory of 2816 2644 iexplore.exe 30 PID 2644 wrote to memory of 2816 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f546f92c615114978bafaf237fbf5eb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01011551596c3d1d41e473f975e0c73
SHA122c549be1f3a0085d2f9f23a2953223b15a90dc2
SHA256ac99d54ef711a9f94555b3031be017ec1a05441b990e655297a6ab58bca911e5
SHA512cb2f4c260b7058d6e186f46a80ef724e99ee5bb67367e1cf2579a67e7e9fecee009b71647d2df423f959475d32e391f23f13031c7530f6166d21df1d07b17324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff635c9b9c4c342582c9985a2527b6c
SHA1957f80c610328b586800baef3b44f3b6136d2b05
SHA256f625bb23d43423507fefa357ea07517514f9bc3a65554b6d4aa3454c3886d5e8
SHA512c4db7ea9e86fa3fade9259f8bbe2bfb83d7952fc0e49017c68d473d64f10d9c98a1630d4c3f9dc08a58cda40f1f3d2ee42b292a11c8e0ceb1cdf1b1e33e6bd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0543a90d3a51d1a03c6fd5faedfe0f
SHA1c5d0473f4589a393e5f7e873dfde67b44c1efaef
SHA256742d041ee58dc0973465646b95ceaf33dc462ab7387d7d570fb29835c47db7ab
SHA5123aa8b5d8939294f0e75d05a9bfb5b960fa27775a2f50871615d0bfe7a8c91750e3b7a1acf06838f1bdf73146af8b612dd7d52135443e3313d9877fc6412bef7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d778712fb2385412ffd4a2fb24aa3500
SHA118c79fa6d52879deedb5df30f7a92c9c868334cb
SHA25683c37d7beb5180acac944bd462502d7f668fd1e55bc113a54adadb149dcaa11f
SHA51203101c097dc750127867855a253aa0ad84872a629f586cddfae64ee9c28f213cd494ec7b2189ccfa51692b224196288ba90b2f04201b808b34ffb0a4999676c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6e5ed313331ee97ec2365266f8e572
SHA1862e8a13991b7f29c2ca899634487f8674a22201
SHA256fb3a44e54cc534bbfc59dd4e6910deb9a6320535f122aa54bd54f54e2633e5ea
SHA51266fa7cf1546b202ad35b5aaead82521b8c1dde55daf7006581bdd5e9fb0fc6704d3767e95b1cf7f9f35b102d86cfce5907e10af94e4a53d86257c7a5ed052374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed53c312d04fe9456ffc896f8c6cb68
SHA1043638ded0d87fec821487a5fb3beddeeb3137f9
SHA256ec545b38e9fcd4be3758e7a4baa1ea5544b46fb6ac0bc09259b5a3e3ff5adb48
SHA512b8a5411de252abdf85a9343099e9cef76161f9a4a9598a1d1cdf824874d1e374bf458f0b0768e63a04920c06030e575b87121d0ac2381319e97c83b237108b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a55c3e11a834edc316a8c759fb03aca
SHA10d4c2fa0d0862e424ca4d71dfcc17dd34a9b7b33
SHA25612d257f9b7bd9ecd745ae20aee6f749dccd10abb4233c0cda2418470873c97d7
SHA5129cadb8ac16471b0c5bbacae1d85e346f3aafbdda836043c397875ef5c13b23c332e2f15fe4136a012185eb4e10725fae9d3159cf04cff24befc4753a1c05bbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb32d7baa180d2b28b87fceea99550dc
SHA162c4a7ed52b775535c14bf8bc3f9a4a58b29b3db
SHA256702eb445200befdbc3071f58404e6dd65b932d71ec99e5b919bd28a3746c58f5
SHA5126bcbc6fbb4839e920aa821b0590b86e68c2407028a80a00261cc2199fe32d27c05cb0fb1026411d36bbb2f7508155a116d2af930747d72140d69a1f9de5474fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839a162d5f5f18496bc6cab929352db4
SHA1d02d9afdab7e2b21b438510218c28a2d0345dd61
SHA256e9d54dcc0126871219ceb4ab4363e6b44ff67ad4df25df200ae125f2d51dde43
SHA5128cf92104476f1d0f82ac8e4d9ecd4923f58a5e997656aefb6984bf52b1a54442771eb76470543b75d0ee2f0e1162869d193aee0d1f2bf6a3c57dd6530013d8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efd25f9f4b54c48a477662b9f94bba5
SHA1408c4218c1163c6c1d77ddcd50652210b11cb93a
SHA2563d0437b4e5fbe340fd380e9067c169d7d0ee68b43f447fd59a96c10f7cf0bf81
SHA512104d96dad24aaf72b5d81013cc8f3c323a220bff4df165a4f8b7896af2b570be76447f3c7256c9bfefd4a989461c61b9ba2a3da6a9931f2deee9080f5af4a443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675e69d9ece8d0ce9cccfc28fd643aed
SHA1c768ec9f89946c2236edab151384739b988e2ad2
SHA2560c3a579ea1c3cffbee26bd5a00bbe7eb4f3cb07c590613eec98891cf7251f45e
SHA5121112c55ba7b4d78f08994c73ad6a2c29d8a546c21364160eac8e9171942d311ad6389cabc1707c62c7690873eb02dbf33ebd323bf7026d2b6253710c73fa4421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a569668dacb772a34dba01c5fa82d26a
SHA113ffc76c088cecbf498a8d5af56329f87d273fd6
SHA25636bc67757d52b4eca6a0ceb53743345906a180e044dcc11a286e8427a89b0f04
SHA5125a4bd73e36cd046e9191c16cca8884c00d49f0321e8490e8b9071037860ca1a938171a29ab82fa05559a011a8e699858a9dc8ffdec9c76b9f35a001693f5269c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc5ef482a4539828747da175fa12656
SHA14eb6b65943e580e8430c9baa5d85e7da04c15897
SHA2560e9a6e9b69a31be4c4eca93a5f77fe9b16aee78f25e24d2d9c3c45aafce436c6
SHA5125d55b77694b952159010540fcfcfb86ccb6a475a6739215fbbfe6a0321bf4e9ff5c3d50630325fa44778424a5b80941b62dc5a9039df6945c703a6fc79ba7884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42d834dc4c9ff567f8df83b10628eab
SHA1226fda62084616801e0852f1b53d43c6825e92b0
SHA2568ed373270fe023351a450b1c94a0ac0ffb5aa2701bc5ee13a39d360d38241d5c
SHA512492d085f7848bf7ce84fb9655d12d2c48e660fae584b04ccf1e4eba1f3204867c91e2e892e9871674fee88e53f3c3f34cc08f94ad1bd5c13a645d92b2dae18f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de3cdcfac253a3b364c155c55812c9a
SHA12374730893277b9302238906d6ff4e35b4e53fda
SHA256f00cf0b96df92de0bd7cc304c821b51321d517612ab38b6196efb0cce7043a4e
SHA512665217ca8946cd29b9e6b847b5ed214a97783aaaf7daaeb7c04d776ba74b43ec6fb3055c18db5f5553bef15cee0ff550ec8e12b4b120438642c3a30d060d8701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0299a5f3484f51ba7c5c6c9c11b610a
SHA14708814cf962f7aab7740b2eadc3c2720fb873cd
SHA256782d5d0ebbac7029191eda40ddde8d3d34db9930313bde94b618b3f3909af2e2
SHA512c3a7f0a5359d1991aa6f3b6c3138838bf6b123f5c03075d380521d20755969c17ef1b502b6ee539669c213a28a8f86907ea78654c417e4e3c0e9881ae85cb442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5174482573c044b471fe33cc5bfee18de
SHA1713a62e409991f959a463ed2d4be11e65fd9d9cf
SHA2569683490593ffcb01c4c46cd92a9c892bae7032663089586c4f1e81b288c7c6b4
SHA51215dbcc29c8854872d016d589adf5f50e3bea0e18ee9b023693a982afa505aea88924c9135f0a1ef242612126f76771de30d20e599589cbe80262cc738b99b365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae7308b28bc5ba3dc6be320a8b02ff8
SHA11d1ac1a4f0a21e2c73ea19252016a9919c2b93a6
SHA256029a85385796c78cb466d398d4e8f528f46b58cb840a6b02c41971b936271383
SHA512a6f22a473d97393a70f46f798f10766d8340867ce8cc5f5ee96326d01f0fc450b4194e6671b031f64aa03837a4341373e30ba09048f1d67ca616836c85c8ca77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52ef616fb5ec9d222ad1c2b891fcf78
SHA17c2deccc17f184247ef34b5b7e83f8363132b94a
SHA256e15fea9381fea95d77efa14adb0aeb015265b3446ad74f3f3bb5bcec3fa07733
SHA51223521e8966531a916e0f70e244b99534788666aba73fe1764f35f217a49672a55179b589dceb16d63f1b2745f703f7ea760a6d0f8ad5f31f3dba82186086e6c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\iframe_api[2].js
Filesize993B
MD53073c000dd5b69ecac3c2688c740dcf3
SHA1f0bf95a72b1405a7a159ed8aacc52978436ae2aa
SHA2563a64796a62838e6b7b14d9525fec88fcbf20b461fc39a018a1d30c9802545415
SHA512fa4e6351dc3b66d02bd7846433799b58e6e209edaf9e34fe990130a5514c21fb63064d486d63a5db145b36c24cf4fa606f3954491f4b5b62b18077f275a98bc9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b