Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
1301d4c2c55cdf8376deaa282960cc85_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1301d4c2c55cdf8376deaa282960cc85_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1301d4c2c55cdf8376deaa282960cc85_JaffaCakes118.html
-
Size
10KB
-
MD5
1301d4c2c55cdf8376deaa282960cc85
-
SHA1
fb372609cc1cf1ea72eb20f8a14065b02c8f5eb4
-
SHA256
6991acd40072385064a8b7b06f1e27f39ddaa8579831efcfb9231b3b9c2e3e3d
-
SHA512
9420e1a587f4651e7bd8856ae555df8b7c1363452fac17e6dbabe2efcf8116dbfc1a507844db6a35d54dce95838c3126edd5073f58f30e924205c253d7b7f448
-
SSDEEP
192:2VWlIsr03jA8k/w1wvqLkZOBmarnL+EXg01HR6uBuLbdU8d:sWlIcujA/guOBmarnL+EXg0x6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009265bf6be191c88bf888fa72665514ed2e33c67026a40a8cc5085535956f9e5c000000000e8000000002000020000000528c85c0e30b47e22091c26eb0d42b0518b5e7c2547dcafc39221e657b21cb2720000000b398f64bd2c1b0647804cc903b2462661529bd528f6a07441da9e620b828f4174000000003acbd1d2941638b7aaf21b6f9a9160021a98b185a1adbe0561a693cef3daef6b2b2f7cad26d7894a60e9718e9e5c1c881c524eaeb5387aee80ce1c7a54b7dd4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DFD0671-823D-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202bb9594a16db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434200423" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2436 2644 iexplore.exe 30 PID 2644 wrote to memory of 2436 2644 iexplore.exe 30 PID 2644 wrote to memory of 2436 2644 iexplore.exe 30 PID 2644 wrote to memory of 2436 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1301d4c2c55cdf8376deaa282960cc85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d546f9e0c215663932e1b50f4ce6f3d
SHA10cd8a365df9e1ddb3c099e620ee613139bd76622
SHA256b9e1dcfe1724af2a04ffa2ee9e09fa83f657e39949caa4f5476d55a2c1ec511b
SHA51282a658a6c2f515d4c501676c6bd5aa475d9c4982028b1a1970a8eb6cf599f54f96f95e4910e6574cb7330edfd1d72a880392a69021f13763c90fb3a410cacec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d051150526cf8b4bae078ad81a117c0
SHA11df39a29adc346244dde6ea94d71d412a2cc7562
SHA256e1f03704165247389b0699761f4066e83ad2b1f67f553f985eaef8a4e567d65c
SHA5127594a675e65c74a8b653c02e78fdbef244d4914091e5903f0a5835dd5937febfa35db4459cd917ea1ec73251874cdbdce04788da59a54f00de0101c278bd1d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12c67a5c5d8c7047a5462d2d47e0b5e
SHA15552995475171ae21e85bc86f5480d026becbc5e
SHA2568af2c978a478ae1ec140125d306e98c2599bd781092f9f201d5a206578f264fc
SHA5129371a15b712910c5960b7fc93df5a5186fe2fb6ed0f4c1c0a71a2154949e05df8451bf28200f7cb5e1ce8042fda04e8a606a2604fde70c8a3c1ad35eb8f2eed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500bba656623cf1424742f0bb411994e0
SHA19cb94cbddc2f28750c597d48a07e6e9391560eba
SHA2568c55fa3f0b2cec7b7e2f56f1c939adacc7aa0af00a4ddfdd8ecf7f797476e0e8
SHA512609cf9497b7f86b20e9489edb17cfc59e9e96cb555058ee47a6c37cb5d9fa22401c86ec3ff0e8dd9c3b77c9d2898063d14439747313f682dec92cd2e65cc8316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6e6af9b5ec361df189998e23c0eb36
SHA190529180fee9b809335011b5aef546a83d479af8
SHA256e0cc78d7c82b342a9c96ecf89fe76533a6fb599a869b79cb326b0c6959afde33
SHA512f6f65b76ae6111462070023bb7238c0abf15fb5233b8056574be4e1cdd71fddd862b994ac7cd3c36e04cc18f8028b4dce8a53c1e2e679ca30c528680b3de2176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc84bf4dfdd790aa39156d86d554c4b
SHA1fd7b8543cd82caff1407fe16d016c129c1acf2a0
SHA256f5010c12fd809b444b6284b3177c202ad4760db814d3dec1e1c381eca8a64a9d
SHA512dc2e38c91c1ed4832ca8f877e182178219e17594e44bee8f83d8f5ecac1c6f5a1f8b54cef14bbb124426c6b543d466f350ba034e7ebc4bead9892762b804956e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755cf278badccd9800ec81092544ef19
SHA1c4c3c71424edad21b986e3bbd2d12ef0aaf9198a
SHA2564d4e6f3bf0e6158fedb7a4330092d71f8b3759c4a362995b666d07a2612de482
SHA512bf6ccf1e534ebb24d1c1684cad3a0769c8ce465d90060187d9d5ac8e315893f5c0c9fce97cbb880dc6a0d3d98cbd97308a7dd5f8a59c5f601ec830a640ed0d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177e24e395ac9d87ae63fd26a9c597c2
SHA103e1bf29870366964c324962c8c23f0af6547289
SHA256ed5e8194afbed388ec27db6344f66936b8c8cf988843dbd49b74b1b9a13ec0f1
SHA512619ae4a36aece28e658855aeb3d5d325080a6a28b140728c2b925c9cb3bbb1c2782ec9ad8da43c4503aea1404e2803c8024bb68c374c375b6b72bb3661bc355c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fd9f2af674ee72d4a7e6c9e39fd24f
SHA1227472c08bf5ecb0bfee5b0e19f42a5b26fc9624
SHA2563399def306ab6a86f69c55bde733721c3f1e41fe32bb3ca85fc5bfff1dedad56
SHA5124eb947a755ddc222c4a09117f52c80c027da819a45741e74b52747c892ebbea2a5660230b70bfd170c154b90297d551336a70a8ba04e51ff47f0964e9116a0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3e4d011ceef2437781eaaa198f3293
SHA177127dbdb7661e90b9230f3241cb865042993c0a
SHA2566483123730c0a3b81ccac3adfd160b788d75fda953f672308a3a2d4f1c33f990
SHA512cee411850c8deb852329aa34efefb7a60f43a423447b214e4eb25067abc2c2da57adabb7bc0094180c477b0de5a68cd7c792dd09194c08efce1f9b2abdbcdf83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560fef32e6cc5417002a070191a5cbb08
SHA1e0e6a044ec23dd5a3d4eda36a571874ac8a15c25
SHA256e53c7657925f136a65432f51e802120c1b03880d197dd43009d365991c71fc08
SHA5129091c695519d145d394eee0b92f2f7f40af47918f736b268ed1729b3accb7e4db8e8f70f1a1c31fd6ff3787b3b332812b13eae76a81e4b4e45ba59a4b7c9f7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e84a7a1f7507054751b18b89d28600c
SHA1ae46ef4fa77f2956c8924ee9b67466d5d12eaefc
SHA25672c2d0ae6a7b722446d84d15345a7b13956df0100f0bff8d9763dfbb37484794
SHA5124ffa75b44e3f68c7f5468c990be36efee231617c604f0373eb732144f67c97504e25a89ef70a692b3dfa7474b28be1748b9fcc88a00e78e0e932b2516e033486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8983eb5e6a511c785f8160dc42fcc1
SHA117c2aa2f746c51f7889e9aff8f6e6094bd98edc6
SHA25675d687c3d8953f336f836428008f5c8376a6768de20aeddc31936203bac55601
SHA5129e9ec9dcdc1848756d78e957975f54b774e71428ed3e93dfc3b060205bad7e93731a839d85075a8c79cef62e4c9e179305272c9fca3fb3abe70f8d54f41d764e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a54fc6662d844e0d385653c86b0bbf
SHA1ac692f9cf8cbe179d1292a5a54c7e8fd292411f7
SHA2562fe6d1e963c29752f754648d6cfbda290104750619a4f2e29de60a5dda80b870
SHA51222c239e52c5653cbce71887399fe4923345806c1299e40b3f11f75a121678a2af6c875b626cdbe43732a3a60830ced12a4c7ecb1f0297c28572f69869cc4bae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b8d35932f0f2c51f9675efb3340f32
SHA1e8d163839a9615c54e6630a4f297e7df755ae5cb
SHA2565575831e5ca53f4ebb94c85fd0caa9e4880ae09560f6869106d743eb4fa10117
SHA512049e89d94d00cd2681318e77c435546171a4c869182d5e76427d59dab3b1d53478dca4385180ede4459c94d6577cdf7e48516eab341ec93b0bc5523d64c9c3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ef813f16b1103e1f010bc7783c077d
SHA18bf6572d70c125d8cb39dfc179a644aa38f01da8
SHA256aa4ceb70864c0af34738f6cb86d03d38baebcb72abe7a60feae6330fe6f1763c
SHA51254567eab336f6ad4529bab20c98f11156c2dd801674e1d40f526d4a8d55f6dff80a8635ffb86f589e25c1c524bff95b938524c9632d4f2c4d4609a882cca55f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc4ccd275678aaa0db4ff042c55ffe5e
SHA1ce511bc09a8ee5ec007db96afa3b10ab9823e7e0
SHA256d98d052672ac70237399b88da54898eb9c7d0524014a5f12bde8ada556f81395
SHA5123e917d416c78769ffc29f0357d0591374f90dfe142c9acbd8b3c6badc567fbf3a0a21c706258f673a158ba79c9b40c67e3d2f84a0ab26b3f541a456bfc44cc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6e4cb912392b96a35e73d75b3ed68c
SHA182b19df81c47e523210776283e0ef206b330d1e6
SHA25630637c58b21513771dd1cf6c5538cd2e85eb183ba8663507fe6125492fda9670
SHA51250880bca6683dece6324c1325e75c5d9d0c7175cb77a09b09b9e159bca373c8a95db65705706c97025eb9bec3518ff4709f36a7105fb32dc7ba912d037509fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9aa8fdb35be54d07f1a572dd2a0f13
SHA1c893d12aa3fdb86ce78ab748767f65a1dfbcd649
SHA25651e7c4f4580330a459dfadac661ed5dd3b444228a80bea5a71ba04468fd1e916
SHA5120333b785d1e8ea485308b02cd2a4913f8711a8c80fbd1930139951ba628d3b93b6cc37f87f9ddcec5f8ed0ac0da54bbb983b40dbba7c2c2abf32e9bd0829f613
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b