Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
f61a1aa7c7b60b78dd0faaf580f3b571_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f61a1aa7c7b60b78dd0faaf580f3b571_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f61a1aa7c7b60b78dd0faaf580f3b571_JaffaCakes118.html
-
Size
32KB
-
MD5
f61a1aa7c7b60b78dd0faaf580f3b571
-
SHA1
144c342a159337060f00a4b773d4635b919056b3
-
SHA256
06bb7f463b6cd7d042fa98b96fb73752a6b3ea1d436c5d1e56445ba95f3dadf8
-
SHA512
76c24d3be86701a05db824eabbfc1dc49e67c94ef98d73a331eead02c870e5be595dbda40483538c11e8dbb1a29289b98ca3d5bf1b0e924a130ddcbf83fbee19
-
SSDEEP
192:uWbVb5nq9nQjxn5Q/9nQieQNnJnQOkEntXTnQTbnxnQHMC8A1bLU/IfyINcsitOA:JQ/NqOLuxVP2ZIAlkHOgZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000bf902818274bff2f6e7f8e1e0ad1a4cc8aae7da13b3cf43eeb0b10a8733b211c000000000e8000000002000020000000f7d156ecee2da1a23aa854e0dcf006256522a5762fd0c262194b01870efd2eac2000000064e303819a3da538e8df742eea797b70d26541e8f890b28077f74af7524bac0340000000876d756bb5fffa7146bad6ea8d667e802560d3f634bd4488375cd5ea2350ee98867f397e82b3cc040206d6d5ad57f1de388af3863dbec7ac3d921bd8819f1b7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433432318" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7047f5d24d0fdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC4D81A1-7B40-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 604 iexplore.exe 604 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 604 wrote to memory of 2076 604 iexplore.exe 31 PID 604 wrote to memory of 2076 604 iexplore.exe 31 PID 604 wrote to memory of 2076 604 iexplore.exe 31 PID 604 wrote to memory of 2076 604 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f61a1aa7c7b60b78dd0faaf580f3b571_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed701dd94260844a1f7c528f3b27adfe
SHA14273ba13b7525ea54dff839adfd216c34311fd75
SHA2566ae007fc1ca36cfca766ef77455c13f11002baf47f4ad5be952c28538a72cff9
SHA512769c0171090e02f58fa4a52bd54a6c3b29d8934d1f8231ae8c6910d6935c0d4f054794c60c40bac5683c2843aa503c67e029c7a5f79a47e09aa2737b16a9012d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6affd202fd426f62a0db5240b46c65
SHA15d57b078a1e17ddbaa62398da67d00ba879f3bc4
SHA2564bf4a969998cdca850d5cd7aa60088658ef03c8f9b81be9db5f2aab664932503
SHA5129e1bd7043d4d46d78ecb610b3022f676c690a3e6dfde4049326a64c2c7950d0cd6e2e7c2a1018fca6584ab35cf1e965e8a0c72119df09221a4e2248fa56916cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39a45e2e02d630c71d044d1779d4fbc
SHA116cb5450e3ad31af41c82c46322acdf41722f520
SHA25610b7155de0df5e4077d009e2a38472a7e074574ecd324b91322d1a2861f71e8d
SHA51251f2c914f709d81d2ed737c7fbeb41f4ebed8a4cc3ed873f885bed71a6a79e1c36112a597f4a79f883c385926d0ff06b6ee2267c528b2f1138cd0559e02be256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44454cfd3150c80b4977f12711346ce
SHA1536e6f9ca32284ee3fa2f601c0a32186c7908d44
SHA2560e14823e6dc23956af99efa8091691f713139981ee6fb759ce44acc86da861d3
SHA512c7d24c1b81837daa640e84df154b4450814d8c46676c46692f9921c6d07303f771e12d5818734c649f52644f8fa5eb4f1ba69f3ba38e9f9149a699d023144e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a24782ebc58fd1ae79a6f65ad6dcb1
SHA12ec963c30b95a8ad3858080403e53f5292242211
SHA2561c1414666b907838618056d2dc70f48892eae10ced90b40333d426aead784995
SHA512638e0dd66f64d34f33bafe5a0e29135f8b18d75685354ff416d525b149864b6ac12c917428a4283f98dd3af79163ea623e8cd4e2d54ded8f20e4c02fe3f36fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f00497b41041738a1b387b7dba10f19e
SHA1dc73378198f8d3adaeeb04dc340a0fde21ee3e07
SHA256c24613f8087554b56b6180084b5b4655a6511a50e2f78d7d501a76bad5ae7ecb
SHA512cfc44c1bf33234aa294f352dda0dbdf7f2ca5d0b119cb04424fb6531d537f102e1221e712e1d58fab34bf8dff11373eb21472b5c90f82062df31a1da14c844e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531017e1ed981b672fcaea862da117b5b
SHA133584c5c1a2f53e31d5aee6ea409a534a1d9a955
SHA25603abd4c43568d7050fad68da6004907bd5b1b080f6fc3fa1ffd137a5e59d4104
SHA51291102fb4680121bace9e398f62d53fc8ee37f7042ba22a4148b6cb90f174e900933e43897e8797ae9f9c5b5d8216a340a5ae9f90238e5aa7892f0259f89e5bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbaaffd268c5afa98105066c614ac203
SHA177d76a9e87ccb09b1862ace973750e0861631261
SHA256f1e331e3d22f0394e116dc5575bfe3a21f885ed1fb45a4332cbfa5a22bb52048
SHA5126cbf0a54d3f984eb5b108b124a53d03d634510ed7eb007ab546960a965b451795de4f591ac1d3e5401ddbb8f26b126a572692a9f9580117a1275fe170971a14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6eff430314c57d0840eac72aa90f59
SHA1f15a3631ef0e378081f80253c5fec0bf1d6066e2
SHA2562fd7e6b884d84aa89f870509551493589ca88dc9d396eefedd11863b2bdae689
SHA512acae3ff7637b09caa83757777bb7fba8c6cef2c440c76b005880627c3d1067549f119f37fa2b7eaa67ed5dc8c09fc6e7a2c3327810fe322c80f1ce072b811267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573454f9b164660404376ab67fce6242
SHA13ed483d72957149db1334ee4f01cb81d7db0fba4
SHA2564dea6cd156b2c319fa25cffc1c58dcd16405a61c56bc7028f5391832056fb7ac
SHA512c240655010d1efc3a6bce97f724d2675b67cc932d2f4804c1a9346ac4bdbc47c2c73c314b672cc451a777492661adf09fdda4ec6bdc5ab5837b95e537aa567f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5632d4d80a96ff4d20ba66ef72be626de
SHA1d17ee5323ece443746df8adff1b0691bd5c8c915
SHA2565aa20c53de97c50a51e20421f6aa8f6c5b0c7d16d3477e8e481f1b5bcab2727a
SHA512cc16f1850781d8fb9339b7ce746398fb9de671bbaef2c62586a662bc9a56fa1598706838a332a3aa590e6f5ad8ebd9146f91f1f148f64d8c1acd7e7a87219e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c95e5dad7e7b91439c93e6c26366f0
SHA1cd0580394fb111798e1dc5245653c70a8fccc8a4
SHA25668b8219f3eb2b7157d88e3f0d86f6c0469b0497175d6ce1eb97c9894533b3af4
SHA5124768036e9cefc42b3b22edded2156dc620530cf6708760f67c38a5b018ebed8f4b580e76a4b02a7c6d9ddc1d80d227a457a47f6ff1c475fe13da8b4c1f24b5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24236e775a2f3be34d2f805ec1840e7
SHA1511a5b2d7213b6e3e6720a5b724a16d15a4a0b8f
SHA256c4e0ab3aad700a9d4f094cb5c8afcb357b3cbdcba899be7380f78c34b905c8b7
SHA512e4036cbc37a25da1dc4361c656e0ccc2ca30782163b44c441bde9472a3cb8b77006d2f7b7aa1183c767838c56d45ea1c30061c3498085a72c81e217805f1f50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f1bf1f29f08f7d76984f1ad943bf84
SHA132a55b8b7abb6472cecdb76955fc420c422fab10
SHA256d39612c0fc7067940eb827c8322bd0032c885a143fa4c55f496f45d9ed570b5a
SHA5126bcf2a09e8ce9f4f29e742a667b310b1966d541b198d0104e2d551b2cc84fdae06cbca707c56f4dc7b07796c29869b2419574ef0f6120609390010233a5dacce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556717f7b3c445db72ea555de4abb65ec
SHA19470ececa296012ecefb213731ef9086ce236789
SHA256ff2b7efa9c089f41be1c9bcdd5ff44a88b29a886abcacc5c367f325e2f835abe
SHA5128e403c76b74a966fd9175a91ccc004f1d5a3c23b4499745960453ad184719fe4ba7ef0ecbb7d17493a607ae0248e9898d6ff420aaef68123fcf09153c0b6cec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c4dc2f401077bb3570ac115e3d4813
SHA125832cd9b14cee681c6f812010289eac994f4251
SHA2562c6dfe8f215a9fe81bdcfcd935514404e25ec999d93b2248c4faa354176ec38e
SHA512380668a6a7989a38357b1b4086e0acb7202b1ff9c6aca81c77c0c0ed791be4adf92af09dbd0f39fab8b36c2abb1fffa7f09f18fe5b8578ee51c8d84f6657beba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6dd720d64254f1e8ae6d51359b06b0
SHA1ed57d2f5f15af4d71d7bf042f67778bccaa93112
SHA2567affc4d623c812c87cef702827b776544e8431a8ce7069ff1ea5ebd7e67b2db2
SHA51284cac2bac0705ae339b81ff99055a4c7f233de5dba2adcdb7c4fb24166492bd271bbb254075ee9f470fa41d13af032ff27f86879d2701af1f6f19f52431f80d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8894dbe452c0478353c9b566daec47
SHA1571a1b5548cc95d19bbe579dbf96438b1f380de2
SHA25699a69e50580cbcc67a2800205426ecde513f545e67c49fe6223c89dee403f83e
SHA5128d2c7591f05bd14cb47d1d4fbaaeb44e111360898ba5b5801a51c2f9af454e675f8ad575b2d645bd6c8173f9cdcdc3706008d381e4f097aa3c5807909fdb25d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b