Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
ffaf70330ba620c88df3eb34ed4bd565_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffaf70330ba620c88df3eb34ed4bd565_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffaf70330ba620c88df3eb34ed4bd565_JaffaCakes118.html
-
Size
3KB
-
MD5
ffaf70330ba620c88df3eb34ed4bd565
-
SHA1
71096da79da896c1b5475105430b9db988d6a08a
-
SHA256
0c269e868146e0479c1a7740272c88251fccb3d7035efb1c3a3a65c98101624f
-
SHA512
8ffc57362af106d0924a60ce7ac57dcb9fbef4374bb013ef111d88d7abeb1e17b8f7f5bdc5adbee6ff0c323b5b7319dc0a72b2b5f981fb890942343f1b0bd799
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93BD6AE1-7ECB-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000064d1e1cd826972d9cb714827e94a46fa514075ed3b145a5cb5b1595bdb62775d000000000e8000000002000020000000fe3cf3914596327ed1eab6d86577cec667f38568d4bf981c241d94133cad238720000000037d368beff43c662cd60b6064945a1ee6392cc135492ab58b27d0981f94f934400000004eaaff5a513ecc7f6c77ffa25ef99e8268c4a6aaa5a4d099ad1879714680b30be12cd8c701e77bea859c319de8425f867978c1aca4d76077a6c6ec278296b073 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0486d68d812db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433821696" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2780 3060 iexplore.exe 30 PID 3060 wrote to memory of 2780 3060 iexplore.exe 30 PID 3060 wrote to memory of 2780 3060 iexplore.exe 30 PID 3060 wrote to memory of 2780 3060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffaf70330ba620c88df3eb34ed4bd565_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0170b2401e90625c95e938439e3596
SHA1830b2f55b51450b189a48ab7f796607295bee5f0
SHA25690b1ba8e854fe136489f558ac77f64d2a3db1ff8a580f22b0bfc5a034f84192a
SHA5124e041493f509f6f0422dd49a40f61aee01eaceefb7d092439a77ca78b5f9d235f4d1b1dd1b5e7f7d842e4e1244103ac9b49597ad102e34ca9c24bc995a37cf89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637130a528f307b1cf5599c2accdf2e4
SHA196eb9959091c0c6e5802cd2819302e869fce00a3
SHA256322c3085c75e1d5fad7ad80420f01c7ee9e6113dbe1a26f7558757865d1ef02d
SHA512deec310792eccb1e46e3fb3b50a9117ec9f0c051c1d0013aa5f3b1386d00d6cb2575e7d0a4de1ba49cd1e84863caad5ba4cf5331585aa9d8c9f4762ac0287fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6f1828569469370e8634fd2fbdbc78
SHA1b3da40f27468db8265fba47ea3dff20462f629ec
SHA256c266055e2ccd9f754d107c584d756329405a2af2ffa940e3f510eb9798a25583
SHA5128685445cb310c21a41f6e4aa1d1b9284a7b96751f0f78b96b7d9bbae5371e87a794961808422c4dd74fb41bea2f6f61ae737e4cf7a1606944376c4d840181d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fafdd14ce939ad1faedf4a30cbc2b93
SHA1285844257588b2bd4460c0fcee96a65ed0245144
SHA2564626ffa26edd034b285712b6e549a83794a7199f545299d08b7c55e220ae03ab
SHA51273a2a548c29927f2fa699fdcef97a53be815abc1f93404532558d99462de0d30544a40821aba25a8c77191c138d38ec2b988e7a2a6938976db2c5afab9d034e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c2f0a8ca55e8c4ebc6cf413e28c38d
SHA179585d5a328509e69996c5df3bb609f79b0d6325
SHA256a8e9581ed96548531388ab58dea3a0a72f34d6ff63a3036f5f80ad7751f8e80c
SHA51218aaf65f254817f58c27eaa8b157083432a08eba64d290ca0d0d906615046e115bd3157130e9727e35b1d0e1ef1111098d2a90675d2145b9ee12e18d5b6bf338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009660d791d0c0ade7673b997d833ac6
SHA1acf54766077c00baebb392fec922b7e1b15b3d2e
SHA25697bdab6bc48038e101333c4158d3ab6096a4f8da5cc8e4a8680832728b1c7e19
SHA512f17179752250067c29c5307cbbb3f2164a97c9542779697857c14e73da3aacff3e9a96dee60997e8a652fd4a65e039dabed0c3c9ca1b68f32709add35b8d5b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784341ce371380ad4b3d4c7204bf7789
SHA173df1b478731dc69114dbbc9614e06d759270fd6
SHA256ff8133d44a8e6643bab308978fcae1f4a9d3390d615f4d4df5b9bee0e51b4e93
SHA5128367422dad02c50fcc6eb5ff4b08e3a89fdf412c7093025b677ae4845a796c0bf8ba9cae5f4687be205bf3e6095c271da86bf2dfb0418c88abf2f98b2dd79854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba2434d81463718296b5f2f275543a0
SHA13398c6ddc1557f7781270be0bcd4d14a3764a3d5
SHA256097ab92e7110b213b66588a4499f90a28fc57c18aae19fa26fa4a011bddd6944
SHA512b896bc9b5770bff2b565bd201c7eb110c0ef2e35d29955b197e0bafc98c40f640cd7274cfa8a3eebeac1c4dbc51c9ae3e62b335afb22b0b1a1e9436080490f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545877ceed4c870ecfb9d1175d39c3457
SHA1b993aca987115c6a4a9ffa39531e8c0694631669
SHA256732aa8aee7d278802ae8874ba32e5b97c6101601bd275021691bbc2f1dc39297
SHA5128a4abdddf740a74cef82e3a049a9b5179d83c94453245643cadf6c146741b71bb5fcfcb57fefaf05b6ea15cf0724883956028e56d7f3336566359c57571e8c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a69a19750836407ca6d65f85b810d94
SHA13a49b8f7c99d8c450c69024b8b85ee6d0596d091
SHA256ed52f4e1f677a3174755a5273b34dc5f8fc5bae7fe8d47ff9639a24f14a3841b
SHA512c97d90687b860975ca1965f8b268719ce43f1efda2794ac54c05c6ba5d56be5d8aa5c6fa51bdfbbb8469fdaabbeaebab0645ef9bef62c320eb68d733eab725d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55996d4d2e7656743f2181dd70811dcf9
SHA197c04a4d03a501a05f48778d225750d3cebd7ac4
SHA2566aeb9df87e10895778a8cd4bb1bd621233183e79ac7dc300b71d6581114fe4af
SHA5125e024eb9d62a85948d154d75937891309fc149735f5dda9c092aee866503dd11573a80898542c2cb62311cd876822f5f92175ce49f121dc50bc593d2a7b39f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421c0214c8ed4a49f55e2544e52816d8
SHA13e6b514a6ab12b419cc9f58f26a8cd3980f3da2d
SHA256df5dd776f36a5c50de2c7f8fc46b9ca59003ad1efe1fd884c44e1ac88bede7ad
SHA51235ffd9f66a79a13521c57cf7ef4a658d1dbfe1b8f2d8722141a4e9cbf3e44ff2d217e4fc61809c49c06f2818b115aebd348bdd77b557467fe4ffb20c23ec9fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd7cda6fc0f793efc722711329675a2
SHA114dd0b5957dc1b3ab50380c8521fc4d350def3e9
SHA256f24e4536a47cb0fafd79919344c721ec084565c4bdd8816a5bf3df3c35200691
SHA512a7041d6517f1bcc3b9202a885db5061c3d64b88280bc44367549558e9264d81d07c3ce7a441984a36b6456f3a10115479f988b005d694bb501aad442d4d47f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae623ae5dd8aeebb031417bf2192b159
SHA1b9432330dda33bdb3d722f7aeb885151537a02ef
SHA25675bc3b6952a45355298f95dbb3d54ddc2289539f8fb59ebdbf67bee69c1a9090
SHA51217115b690aa39898a3c923fa93cd35d26c8459a9bb9943a88cbdbcaa0dddf5560b2585b0831c861ab15be2afc7d8930280a7fefd5c25ea0d95eadf88c6b46a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5582a09a6fa246604fa66329d02a14455
SHA168dfe7f57ba5addeebd72840b65ce8e77756c8f3
SHA256b0d82b2249ecef788f1e34a68713c2c74dcabaeb2f07c222947b466575ff333f
SHA5122593e745e05852d7f53b65c76ffb0d75460c6b66a0a7daae7012b43e1083346ecd75c275f42f6bf1cd0cb304fc4b1899b0ece5a432b21bd7b8f22d41d8134603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573fdf708ea9af1c731af8ad7f57bffa4
SHA12df0bc1db7a551b6b9d81e8e992d5ece9afd60d0
SHA25646883a81440dc732a006382f70983b434eeb1abbd168d1ca01e444085813b3af
SHA51278f1058d9b210a228c428d4986dff7a56e93e9a901dce95e47f295bc93208267ee45bbf365fab49a08cd265dc23dc357ec24692fcd152cb8e326030c72fbe6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275d359dcd000ab984c54101e5c17a9d
SHA1e4a6798fa6aab51a1e7bf5df047ed57eb700de94
SHA256fd98234763b59d35102ac2162e9ef3e6f8d2fa179c59c43fe869f6de1b63ab73
SHA51292141b73964927e3c6da896e069bbe4eeca54b754955fe9f26b15654ff6d458ad595350572e7c566ef65effd666321f2119019e758f9c68eb54efefd7d2bcf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b9de36e0a33034ed5b6d2b749185f6
SHA1775b4071b6c80d3a381269c4a04f04a6bbea350a
SHA2567529c1e9ca4851fc45f42fd9fd6fb6218045c800a663bb9f89910ecc9406c2b1
SHA5128c51395b7fcac8a1dd77f90940b9b924174f7037649a34bdc6acc4d99425cd0e1499e04a441b9c1800fd837e9ad40bcb8054ca7960cc418b54c43947ea2387d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55422696351b103a3137fa4ffb858aa67
SHA1701dd848c34f63c2018aa36f5a9918d40368ac98
SHA256a67bb3cdaf6a0244c2bccc13d3cffb4499470bbbd1fa65b95bb3d2b05ae3d354
SHA512b3d05a184d56ca972496a439f69e763efe159a3b463f211233bb6dfc1533e66037402691d53f0e18cce3d1ca2bf77e7c050a59ea9519b0e4071ba9c7bce4d0e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b