Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
fd0755d838c3eeaf759dde376c6c13d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd0755d838c3eeaf759dde376c6c13d6_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fd0755d838c3eeaf759dde376c6c13d6_JaffaCakes118.html
-
Size
32KB
-
MD5
fd0755d838c3eeaf759dde376c6c13d6
-
SHA1
9a1c5dbb76a9d9a2166c24be35846b2d70f6a284
-
SHA256
ea71b4662d24b4dbd7c00d7d936cf0f9ba8c749b553a9374af6873f9692a2d36
-
SHA512
78059ebb7a6943d0a82317534349f241479c239beaf353537029cfa9a35e7205ffc7f1c56b1a824fffb8e28f9b40b3bea6ed38e9f63c2ea6ae1d48dff9a52c96
-
SSDEEP
192:uWSt7m1omO3bS4pb5nji9LR5wWiEEVWaSnQjxn5Q/t9nQiehMNnSRYnQOkEntfRO:IQ//3xg3I2qrcrsRAmO3e4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60637c00e011db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433715004" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A481811-7DD3-11EF-A58E-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000787dab960809bfe5ef2921faea12bc7f12f42dae8488f027980bdb00c78cf0d9000000000e8000000002000020000000484833eb51a72fcf8e43d8cca61874526a668a3534e90aecfa497baed77e1d8e2000000005fc31ba7bfc77e8f959769810606cc4639dadb47a39bc4039c180c82200d6644000000019a621bb0dc923800696a9c6810d26c60337ce705b30db6af70b963b2b2234a7156f3bef7b0277dd44564688ba652fbd09098abb2de982aac0fc40b507b65cc2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2536 1152 iexplore.exe 30 PID 1152 wrote to memory of 2536 1152 iexplore.exe 30 PID 1152 wrote to memory of 2536 1152 iexplore.exe 30 PID 1152 wrote to memory of 2536 1152 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd0755d838c3eeaf759dde376c6c13d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae3b86b1113df314ad9f02393d7438de
SHA1c31d5be61885695dec63353e1a5c965baeeb3685
SHA2565b84f20d8c564a9d240b747bc93401cc40c4f242d996b0f08dc3563f20e0cea9
SHA512d057193ff2286e2a86333145ed453462b5ebe413b1b4d07e8bf1af3c12b7114c933cf978afbdb235a13c5eb1e6860efbf2633ce74a6bf4095d8c9fe55e5e7206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589524fde9a77965297d548260bd96b7b
SHA1934f6e7ea8819bb598d60d43cdba2861406e7cf1
SHA256bac0f16a325f33f0037b335ab1e5c0fa4daf7e2e5c808901be6b2062d2156b93
SHA5120929047493edce6fbad5d8fcf1a4186b0e47361176e65009767a3441810cba5f8f4214d3fc867939a0e1054af554b7f9698103d19cf57a70a0d5be5407839f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e437423efa1be7e4bce2c8b37e88c34f
SHA1159a27de96b698a858e9bc15bb07ede5ca7aa102
SHA256852659e69c3458fe52a742dbfee75fda1bfac4d449b26a5ff82e0a73a4b7f315
SHA512e45539c0c806354988d72f73230ff9c01be536112318a74763cf40cdc032aef14a5045343ff0daad8b66e25e5366235f721a76b74cc61def89b80e93019529eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca1b262fbf70717feee066d1e0d6b85
SHA1e2b5a1b8f81d10f818acabbb850c15ac5e83456a
SHA256dc026321926c11a62f4f78ccff20f0c8f8a223821f6e2f5e87f63a27429b4963
SHA512ee4dd7f2bd1d94a7e65bd9f21e388302f2fd15a8ea2d2ad2b08b51bfe524012502f60a302fce1613bc8e8548c0c2fc16a9961ced86164f9da33056f77a517655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c9752b273b9647cb7c34b7418f6c6c7
SHA1c5b88c2621c54ca4c5e956f819b89e8c787e3957
SHA2561e53bc8091018bc33d27f8a932dbbfcaf1cd13654c2c30e1b60bb9fe2b73620c
SHA5122bc04f7645154a503cffc091fd43ea7163beb331381f53d866e068ca090551827273d2bce91fc0094e2a34dfbb820a56fef1e3f16594ba90d97e828315d89061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559c0493b484b6b95c92fc0c4d51d956
SHA1803d7237a8966d88329d520572300f42df69cd4f
SHA256a457182346967521bf322014c340abca38d98eca1d168148c368b5b5fb096e03
SHA512cf6dd476d4d9c8675033ff50ab2b33b16adf7003e68d9c2d089d1c8077b7676890118b4020311669be8758d0e8cc1fa864b0d3400231af59b654b00efa8d46de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589766d5d70429534be3e5184ff35074c
SHA1d5567aad9634e924712b85876ea6e3180bca3588
SHA25618b40c0ecb31ebfe44314b65744b334cedd32a3722d015c89e116ed4c28c485c
SHA5125c6f9d3b66215786de1bf2d53e2ed098385eaa1eb06558fd53fb6ab3e6f0169ed6533e79da4468e3f362871761a9d6efa600f8a5e8792250a9701c075b046de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833a214ee83b50e97123db57e54d3069
SHA1d7380ee3ec171eb9289d2771d85fbadfb901c139
SHA256a89079f31338253caa7af4359bf1936e543b71975890801b444c9238437d0982
SHA5127b3b0c877f209a80f6e19a62bbf79ee1aafcb582a12bf1dc1e71913e1b49769bd3822e5d61027e132324d5f8b6fc7c9bda2459355106a030dfac2e509eae7831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f89341fb81ab8645e817d67edb0cb93
SHA1eba273e1449beced55b96d409fa4c6952ff86540
SHA256d73edf97a6a9ab2cac575e3ad356cf94da1ff9ea5cd4819d3a96db42cc84db3d
SHA512c842b81d289fdacf984eb17c8f253fa23ded391824abbc84cfa0894d0425c9a09ee8a9c8f09ef98b3ce99d798791027138884c171735d51e5f8fb015c9e0dc9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da49f26772e01826af5d73acf25edba0
SHA19cfd9c0ee4bcd61e2de8397db69c4aae9b934461
SHA2566ccc338ecc397e6a468ca042387042fd466bedc87d23e2c829177ee3a37ef4bc
SHA512381cf9873a9dd547249eeca65c385d3feeecc3cd392a42f6666173e7478671190f3696cde9529f57a0ed1bb1e4c3db7a8342c156e868a62fdb85328650aaaeb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a91f5552b4b45f7225e8df31faa5d39
SHA15ac6ddaec6b211db25e26bf2c8a625af2b4fa19b
SHA2568d431fd320ef8293da66ff142a4f165fecb4e1ee02cb9ac0d4dea25dab13b304
SHA5120fddefa8db7a38ec42004910f2b9ca223e973cf3c65bc51135f9f11182af6b822fdbd79739f23272ec121e389d30dea66bf06ff8a20843de2de38a69c5a45c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50150d014967bb4460a827d30b02de7f0
SHA120db1f04444a8a715c100ca9812efefd5ac327dd
SHA2560911effb26a6dcdab211eb639243dad99f9491ae9eaf08bcefb3cbff8103ae06
SHA5125574a3be94b23b0af9a2b9fb58f3abf353fb6306e099661f7beca27c3aa29aef566bee1166a1d7aaa3aeab966c13737a59e8a4e4b3d736cb52a346ceae3de386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbffa8941e857eb8a689d4a46372486
SHA17436de5ef3030fe3019bb8e66c539dc489a7a1ea
SHA2564601dc112ba278e4a0198b6dd597bdfda6a57650eff405962ea1633aa6341725
SHA5120f803d456ad7b713d631edcf7f4ca99c700ab823ff79d788d4161f73156c3f40ff89c491b7270bbfcc3ec1bcd360f3b99858c01e1c2be4e1134eae6bd51a357e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5dd9be1ec0ad9a89edfee9de8811a3c
SHA1924b26d0ee116e1270e1c8997d032f4e8c8b7472
SHA25666191bd117b3c8adb077bcba3f250f6e022a88ee40bfefb73ffed6f53e2a7111
SHA512313089fadaef5b580c741067f9cc816e012fc30ba03303e3a37b6931f30c819145aef70f71174823695bac2ba4d8afd7b9cc2379db5601330ceec523b2e775c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b859c7f6fa9ff15053fd1d7d0356d356
SHA1f4699a2f547d436dbd2e23a598cc7fb153d5660e
SHA2565aabdb24b110dfa6f771b6d5cf96f4ba183f907beb640195e5a76384fcd761d2
SHA5123e61fa5c137ca6a3bf025049406c1db782a5832d71251306870b71181416818d437db14019cad1b6c568c2e99f9a2e229118b4129cb60db804bfe9226e0046a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aadb9abdcf75b757eb84674d528ca1d
SHA10ff1a8db4e9f03b9ae6e5d06763dca90193a2bf0
SHA2562d8c1d4ed1dc769dd2bed0ad781882b979ba11c9ce780a12b2c17e91adb8e9dc
SHA512af8cfaaafaa678d67f9e6320b7eac617b67839ac8e2eeb88618aff022032bc7a476c8e48a7e836ef906e34f74b2b277010c1a9f33a7decb0196b9bd9bee205d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580688337a0dcdcd6df82d5c55f8c6edd
SHA16878ecf6db4a3952e8bcbc57f331443a5bf29878
SHA2565d58dd8fc86f66cf71fad83116a56a1f02b0b902a3bc684ca9dc26a3006e787a
SHA512d221f0d6ef75cfda85875b665d23530957152bbbbe80bc97ae2970960d473e18f2dbd9529e46ab0fec1069da382ba0258a301fee5e0d5aff467e4e73787fa9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68360f3db5705de7f73105b50feb3ef
SHA1508a2277e8ff8175d685a16f664c5a3a0a5ce7d6
SHA256dd0b9faedd0fcee6497fd7eaf92dd580d5250d464883a6cd6d95aebdbb7f50c1
SHA512d8c7b038af3973efa76da67b04fdb3a99fa96ce18a84f9616e09a9290be2befa242f0452aaf0c0d5317b7fb573544187698c4f3f5648334ab53ff79a9ccbaf4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b