Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
f97aad40c62f14ca3c3b6b2eb45b8d52_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f97aad40c62f14ca3c3b6b2eb45b8d52_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f97aad40c62f14ca3c3b6b2eb45b8d52_JaffaCakes118.html
-
Size
519KB
-
MD5
f97aad40c62f14ca3c3b6b2eb45b8d52
-
SHA1
85f1c75ce0252a4a8e71db19993c35babab066db
-
SHA256
0d33a18bd1552755926c5bb2b53425b19445428bbbe42d451f0591798304b611
-
SHA512
bda163bc01ffc863ded87cbf0f277b5d631af7f5a49cfcb50495a4de869d6c04850055b79f73962849b90876decdd19763096d1f1b4f6f0ae1a37335a19eecab
-
SSDEEP
6144:sRsMYod+X3oI+YReJO4sMYod+X3oI+YReJOAsMYod+X3oI+YReJOm:K5d+X3SJOG5d+X3SJOu5d+X3SJOm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004c4961fc15f734bec5d4e903a901ca8c5d5d086c3a7076800a2812e55765de78000000000e8000000002000020000000b5277ef71ce6d6335ab3971dbf4b5eb9e482397a11d390073082f4eba2c111ab20000000e884cbdcd34bb107f8b1ae6405912df71c92097d29d1231e3a6a8fcdd2a502aa40000000a1612a4281f3b6510e2ac5511bfda51d2b42c76b1e00569f972a4faaeef6e0f72a8664109e84e843292fa0aba55621def3fc53170e82cee27883709414745c52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3DE53191-7C71-11EF-9DC4-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0247a127e10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433562995" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2488 2248 iexplore.exe 30 PID 2248 wrote to memory of 2488 2248 iexplore.exe 30 PID 2248 wrote to memory of 2488 2248 iexplore.exe 30 PID 2248 wrote to memory of 2488 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f97aad40c62f14ca3c3b6b2eb45b8d52_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6863a022719d53fe40b3fb8c30fdc4
SHA1f840cf5b0e05d749239d6e2a9add3e4dc9ffb8b5
SHA256aa371ea15fa3aad824fad335c4dfda3d7f22a2a2c5884cd4e629dd6138fd8298
SHA5125e1cc2f4b4362815f5b26fc30b18a2479e6fe8653f367bb0187fedfc58cecff63c121c691718e65a18e318d13b65dd89988c62ff412109466f2b9a98b7627c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4ae6d19ff18fee4c98b98ca6466d7b
SHA11b6936b5a4bd2f6b8c72ae9802c8aa88fd8453b8
SHA25607c4635b27afe3b8ff7f2513569a7d4555b123fb42d3b4f23a60d1c0029fc5c5
SHA51239ff856a57d903911ded53ba0e6c2551e70a5c4abf8155cd0bfcdb7d9ef5d61e726a93291075f176e4e851b5b7ecd13f50fe358b43932fecd0b170952379910b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54beaca66b210c249a944101fb3ebfab4
SHA11df031b70bd608b43455e372e74ee12f9c468ae3
SHA256bb4cc23a4e21ba667be7b4af377e750115ccbea7a3c6e4356d6209114d1555fd
SHA512fd5848b1655a79fae55d374a58a0f900bf1426fbb8bd10747f46f33e72d4457f8bee9407c8bcac6cdc4ec73065ce895aa9f9271c4a8eef6cd3acc3e1c4b11f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce8a8e7aa557a75782501a3a98d263b
SHA1cbc39fd6871d8b8d621d7b824a23f1c580f2445b
SHA256bbefe814a3510fbfd2378f8a00611eca071d3596ec9f18bfef570138647156f3
SHA512bb3d3ea2d953e37887b8207af662c6069920c0e66d3d406ab7ce0ccb6197b776d4ee40a2865a78faf1dd24423707c394558e9469618948a18691ac930363e00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ba58cce47744d00f858f6e2f6a6340
SHA115b301786bfc251c6862123aba9af93aa38221bc
SHA256e3da20e9d9dd0ff1f7d975b8b9b0c4eaecf5e57f329752efc5865918cf07bee6
SHA512ced4f80bd9649580065f686850293bebfdaa3bace6f33682fb89006e8af5cd841d00eb3c47eb990256ee04a2aba649189641b0dda8889d54e65ccf259e83c5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b7595d59f4725a2573566003d03760
SHA158e85d6c9dba6351b9dfafa5701781885a129781
SHA256c67268a6e6e315d92fd1601fbe1cd09b0abc1463abb4eb05d566bc01219259b6
SHA512e9bf1fad943810808254f1b3b2581866bc868eeccaf9883bc03f3fd44bc6105ceaf40a9bff8dfc2b4509b1c36742297325b2e56df5783f773518577edf4df3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c84003c46fedcabf37109aea7e849c6
SHA17050667704d52799423506223af74ba580354557
SHA2564322d752028b393bfc355b6f008ef06f5b9944ff885eed072cc01d3250b81cb9
SHA5123caa4a2b9e18afa38eef51755fc08f273527a32d2507257c875df4366285f9b8d4de33e6ec2fafec97f9b9e8049a4af964413d1cb34180ae9ae8d2e6ddac1569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a8b5e3bbe699d28f69ce8da649e4e7
SHA11b8f906e114e76a3a1305f2d8ffda1b2d41748b8
SHA25646716f4b776d0a7f096982807fc26aeef135f5f55e229c4776c40c9f31e7be9e
SHA512e988d9b2dc91237425b7de58280474fb1a72ee22bdd9787c0342fd65963940e6cd7bdd595321c6644a6f6584590c829ecd34a671502d3482b7fa700caba5a5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af4cc4afc0ace2dfb632cba3759e362
SHA1928e811f65dca9604705d452dc2cdbfd9a4856f6
SHA256921df063d71fb8167ff9a69e0d99a2cbeab41f5ba1dd5291de39e73093011cb0
SHA512fe035a447cec04ba2eaf4176481d54196a37542dfcbd9d8f0cdc9c206eb6c1d5c0ee47eafbc433f13f1fcc530fd30eb4e9c31a299091d9b994584a94f0572a81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2dc059dc91e1e08875de28627921c5
SHA112cc11ece199f8d97c906281ee0d673801555b8e
SHA256eada0dd4cbdf62062ce2f64d48ffc3f00f87d16cc7af7e56ac4c18649ae6194e
SHA5120855043a5f95e3eeb523f5c4fd2bfbb48015e987b27c1b718bb8939d38e5f438bd4c7ed4ab55617fd5da07389ebe5ada388f344bbaa4cb4e6db0d76bce6e6c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fd7d9c1b4d184c5a585e0de8c2bd56
SHA187f7abb5f35764819f9a20c90c1695fd3a04a13b
SHA25652b4e089098971ffd17d29d539458fcce2b7dbb532a7949953814f1b115ab841
SHA512f2ce1cf3f332fb4dbe79317a9a49ad802f79eac617028416b880d6fc1229ce377db12c8beef0364d016d3a4cda608428269be2e23608324ced78924a3f1f7f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec233d733e0cd002971871933373b228
SHA13ef05b401adaa4ef5e23520beb1ad28a55157d2b
SHA256244fb965535a369bf227dc185b9ba72ff0bd6a950c5903a3351b8ea7f2e1b997
SHA5128610c23be98e5ff8e487d8fd103ceb1b33a8d26640794b398585370a1bd01fa6c1b42adab922674e71186daca3388c51500a8716ffe66a57a6b05672b416a393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e877a7918b35c70610c7b0bab36b0cf2
SHA10b827fc6f6ffc45ab9f9e35364de1368c1340e2f
SHA2566f8020b1db136f55883219b5dc77758af7e654a09c269a624dd0af059ce22bd5
SHA51238b81d1c0368d539b8ccdd3bdddbf754e8b668e20859478a81d4e2d1d1c8732192be87a77b67708556d41502af32f99ecfa1aefd98da162e2baa26874c0d3367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecf5bae3c5f6c3a9988f8e6618ca74d
SHA10197c81b9f94fa4c0dfbb7e5322a73263afb406d
SHA2569307e79fc4f63c01a36ec1fac984682221481317051b4ba96cbcabdc17c16ad9
SHA5127f73a6ff7de29c9f00dfa692ba6390fcf893767d4125abd0ade5767bf389dd061b26d96944568eaf293ec26ddd394193a47feec5506839f9bd33212e5ba8bbb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59052e6699ebb50c6157c61313c3e9aeb
SHA18292d0c2f49f24150dd5edab1e19cdd1b8294b0c
SHA256008f63035c5c1df2fd8f57df0b0cc88a19e52589e4ff854ee805ec3fee2861fc
SHA512480465c10df23c3601d4d6686da4f9c6c92387930a7177c9d0cf3ce811f6d923955e50ee7b8debdca1e1d475a51b66aa508f954d0d4ec4cd9ee0446e57a370ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc36dea202e11092b81b7200da6cb1e9
SHA1f1c337a13f8a025517f3fef21377e469db3740f6
SHA256bb82e73b9e1ff0da0448d62730bd3072488064d7541c2c56c2b137806920585e
SHA5120009f8b23db90ebd4aa772173924e05110d6c5b8f11505c4f0b9c5ee32e991d3c7e51dc589d6f4b776cd986a1517ec03e3fbc1187d96f5eb3e1c1b1bf0738974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0ea4813c4d0504abcdc50a30def6018
SHA19b7f9355525f93b241b51aa9b552e24c1258ee78
SHA256d148a8175f2acee5c79bc085c622c67a91b6816122a45af0ce4eeb0e28caead3
SHA512df1307bce58cf25efd84c4f23fd65f946ea2b77ed51dbc99e5e65c2205a6dda446e035fca4d50891dcdd26070934d28767f42cdd51d95bfb80e0424ba5be7b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c31f3fd660bb94b490831f37d0a35c
SHA1d7e89aa641139cbe35097ff0cdc657240cd8de3f
SHA25696ae3332711d64bdf06c4f1404d2703a2e29a8a10915640c8e638e201b8d1a63
SHA5123eff276e543b890c3dfbc5f1b4fc1fde60d0a8b2280065af777b005d0bbae3cdf2ceb0c27b92919b771296463e526774f0d9d04811ecbd1fd5fcfa279a3d7c45
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b