Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
feaf56548498861726c11bec6e27da59_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feaf56548498861726c11bec6e27da59_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
feaf56548498861726c11bec6e27da59_JaffaCakes118.html
-
Size
57KB
-
MD5
feaf56548498861726c11bec6e27da59
-
SHA1
6fd6b134440d3b6510c9434d756c81f4596d6686
-
SHA256
97003e31e088acbb99aaa26750e7e311a52b6fb708d77775adca308f712f5c39
-
SHA512
2b1e19fb82d10ecc0f05f07abec2822988cb7ffe1cb3244464762d3e4552086017f0c84207b4c8232be13e1e68a10aee3a4c3fe866f8808fe008b08175bcdf20
-
SSDEEP
1536:gQZBCCOdj0IxCxDYrQf1fEfsfxfLfpfufyfZf9fXfnfef4fPf1fofxfQf8fgfBZK:gk2d0Ix89ME5Dx2aR1P/mgXdgJo0IT0x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCC79AE1-7E6B-11EF-B36A-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433780587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4028b3b37812db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000a931093473f5e2edfea890a5f54bad075f31aa78dc60e64cb98be9b147f37bec000000000e8000000002000020000000d36d5b2b5db74260d3690e3ec00c9992e4a6c7495d834f345950664ed6d69cff200000004c094977350c876b31d2a58bb909317e764c4f5322d7d684c525251ba3d489ff40000000a5d7846bdb8501554faaba9e6e7b3b90c2ca487119ae9b3ab15c878e3a92395b1701cc6d716ee8ad1f2629ef54a829390276e0d8c1a18b990e145bb327553383 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE 1332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1332 1732 iexplore.exe 30 PID 1732 wrote to memory of 1332 1732 iexplore.exe 30 PID 1732 wrote to memory of 1332 1732 iexplore.exe 30 PID 1732 wrote to memory of 1332 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\feaf56548498861726c11bec6e27da59_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d6eeb9c9c48d33edc44f1df0c91dac
SHA1d17ab46e1baace81313893f170c46b2ab035c09e
SHA256762609596706922f6ba1aaffe4a754351a61285a3c722444f8cac12d171ca7d7
SHA5121d59e47ea8bdc9ea6a97443441250a7ead88eef46bb28e1c65e8ed087c5dcf5c8353a1231efe8320f73d5c2034b91cf04a15151d88ca3cefd1aac642b60304fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98d6ea5010f9fbaa9e70f16631fe57a
SHA10f144b06a9c062581f9c70fa8016660c2d91bd45
SHA2564bc44e6566dbe77b87460d244ac9ca6907590c8d711cb6be3dfa7f38b67255f6
SHA51243fb2d96441df82cef9c83673a9e45273f33d7907cd9bac3fae3943512b7cd76660140bc072bf3890414ce2a32b35aa9cef434489ebf3694d1da70792871f5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafb68e70e324947df10e55f76a0771e
SHA1c35a838a224876089af45563df1837f95b9b4548
SHA25627dd600d7bcf3a99ae2c043aa1252fe91e48a28669ddd4f1cd45babdb3de7ebb
SHA512ec79455195c3961f1658ee9db46ee929e4fbcea95ece8d7b8f213b767a9224554a3d89c07e238240b1ae722b5d72dfbe54f1adfffecf82fa47e9eef0188bf927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e181ea0d447c0d68c4f384306fc3b965
SHA1b1c395682bde165e55cd5e83a45c86a33ee7c2de
SHA2560b61423041925c723956b38fea2eef1d748b8256ea5360187ada7508f53346d1
SHA512b9f05de0f2c82ee5860051a0dbef723ae4eb358071badda8643b90b8ecc0743b8b720134d1b81fbec5d5f6177ae437381decf5fbdf9609dedbc45edaf4d7fdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d3e41a3465c5c1370799ba49ed7afa
SHA12ff132df5f54c57045a1b633e7924110a4fd403f
SHA256702715348f15569cf76d5dd4a35720552162a76b079722e1c284f41d356fc517
SHA51271846b0346b6de4aec414a5c9ad6e3edf03d4cdcb79b33a1623136aae98e6b491345c05a41cb84c0d70bdb71fb58f810629d298efa4f55cd23f29390fc7f652b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55879697e7c04edda4740c97e5344fb77
SHA1ea9d283971dbd61d0e5e004c348f670be3f32437
SHA2564307151f6720287b645a7f58a3b2303fb824facf2976a4d5e7cd60409cac546d
SHA512ef48c28854b97e5e235083cac43263c103321279f0a541ed664de9f699e2fa64307c4b951dda0706bbedc870e6ad37fda0bbc64837937436b6d9516b45e828af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565acfa8659a90dcbbce8d33660a77132
SHA1f427bf388a4d6f6adde4fb18280f1f6cc54b1f08
SHA256fa3ff674495285b0ec6915381143a8e39756eea831b25a64ec87f1396a0744e4
SHA512a8caa3156fa174922b0952c2a58391787bbf5f83db84cb348b79e91ea5e15a234318c9ac265ba8cf15138ad748f800b5d502ca424420814f4d09e7c594893ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee114b96d7659a132be6e3ebee43a69
SHA1e3b714ce07b7a2b149aea37c8b889bc179e90e19
SHA256d64c00444baac64c6c0e1ae7aec6cc376b17dffbe379fe8826ab3a8b7705ca50
SHA512675f0a54d73498b1700eb05e41e86025dd628bc9171262eea98930ab3be638daa7af0ce2375d556b3970d3407d7904e4d97f808ef9221ed77bdf5a1d8ae56be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59610d2d971ab5bc25836a83fe28422a8
SHA1081c39f9a02c18e663b61b3eb7c8f5a6bb376d0d
SHA256afeac2a0879b291a91a3821c76c74a7874fad73ac797cda3084a31c36d459b49
SHA5122eb9d10bccea3d97715a26af35cdcd0043384515bf75431cddafbb6fd2224709311a2f21afa0d0d0a55e116ebc484ea509feae32947a6f6b83f0f06fb9a5324f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a6ef9ebf6c4a89f6803d8309cadee11
SHA120246aaeb9e661d8a71d0b0944f1304c7332251d
SHA256d4fccf501b37fef1a00a3546c8f583a27ff43c3843517a5f8ab14614c8a2f1c2
SHA512c645c994ce766c0f4a63353e11e868868d43be15a4158a0cfeca9cc8600df27447601c68bf5baedff0a9b8c314987e8e7549732488c28e7db856bc815d39b107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55074a725ffbbc1710217b0427b064c34
SHA15f2e3134727dce7d43cc38ed53d6b070c13abccf
SHA25650a0bd74fc92e127170a4f736532972470b8a513ce0a6c6634c632aad008ecb9
SHA512bd22334935144396bf29a830a63823d640626f5d76046d16f6d717552ab77545fe2c6fc349b3426f6cd801fe22c6bfecfdfd956f9580a62c2e47476e72b66ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c30f6e47b3bc57ef5ad1f1a1fc01029
SHA1eea8847f3f53260b9e2724a5363a8134e283fd18
SHA256916be7fd7b3b78dd9a0f6373510c0ae06e6ebf42c237c4d3ce2a5b872dd70d07
SHA512dee1cd4c1630486057ee879a8717c4a023ebb8479325d21ddc320f1279a7844ac78bc553ac02739c37ed4a0a445f88d7bbfeba3a8388f9b333b6023b106ccda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d24bf9da9f82fed83157c2c849a34f2
SHA1cb92aabf4acff767ba922c6f5ca1ca930391c77b
SHA25668a7e13ca7b61258cb1f81e710e40facf618a61f17c315362cae5015176bcaf7
SHA512e2a864825b6b4ad3a3f649d8ac50b8b4c2f338b39d2d7a88acae658300a8ee980bebaf2712c7638b6970ef41d15f96185ea59f9e955c085d550ab96bd13342fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbada758ca217ea79b270b44bc9d660
SHA1f6b5815da387137166484ca9f2441b915893055a
SHA25636a54c49b454996949b8701390affe943c4e25b99d6df6643572e08da3778b31
SHA5125c89e77a551194a3d038e0d0a61cf67eef3cb5fb56042096ce19e1768ef0a279d402f309028f140ab50ea2cce4b282ad4f01bc222edc539046931e43f2a5e648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d3f76cb95a952e7692acbe161d99cf
SHA1771666b9f97ac5e5849a7a20dc1a8274e8ec0d05
SHA2564ae96608716d637c7f0130e0edcf5668c01a299561c5cd244d4c7f2cc8e23acc
SHA512e8001523cae72f6e44d198ffdb13ae16659854943bc6604e18fa562873f46c7bfef0c6a294816f8e6ec668b99f14bab1c8af0c93db980e9850bb163ddb0fec2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20a9b24d2ecff21d3e2c8fe3e48ebe4
SHA145b409091cfb84a9b8ab09914a7fa393fbc9a61b
SHA256eb3d08453e5a1dfa964e9b152350ab1799fb477712eff3ec2761e6c7c00510f1
SHA512f72aa6b43b647b7f72922e7c653710acded7fdcdf7fb64a95a938916b90ad8171f32da04150d8ed52e9336a449cd1f854de2eb95a0fc109a66de931a3ee9bd97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578fe4808a388be35587fdfb7333181be
SHA19fb424e1144ff7abcac94101934feb36973e80ea
SHA256976a0740d36f20e8cdd6b7b6645c9cfcc351c04f0df83a2ac14e3bd7931b9bb9
SHA512eecabcba58a81a32bf19972f3249db3f48402a4960b190b5d58ae7ea6fb0d5bcc8dc6a925c708a83674de01dbe915df77e3798b46e4f07ea3a9e53fda6bb8d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf8a43faa36bc3332a80b7da60271af
SHA1edcf92d077b74c90e3f55ffc7c83d84bd5cd3e5f
SHA25688bbc0e0f78acf7d54dc6a2a987c5603df5f0cda0e9ae872f62deea43832dbc6
SHA5125142b1ec368236e5ea962a2bde17598771930396b9efda7429d9c388cc044574c5a56bd77cacd3da3935c3993fff400330f37d94495a3979e7041e580086fd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51404cf1931a38fa57e601f649e70216a
SHA1eb77d0c74f8d7592d12045575e289bca86668354
SHA2567d568bfcc3da09c634c05a41a0208111747657ef0cf0da9fe25cae7e67a2783c
SHA512c4819ccacea6cf284a3c09cfdec82accbdbf25a3c96d3f585318c52e1eff2648d76a98511519a5a5c966ab6a2d1d189e33ad1aac86f56db196fcbeef7dc5f23f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b