Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
393e1d3bb8631d86db4cfe1f0a03fd51_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
393e1d3bb8631d86db4cfe1f0a03fd51_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
393e1d3bb8631d86db4cfe1f0a03fd51_JaffaCakes118.html
-
Size
24KB
-
MD5
393e1d3bb8631d86db4cfe1f0a03fd51
-
SHA1
7b697314abb6ef84e71c83938058459846e515ab
-
SHA256
b2310ba6d14ef18aaa6da13d212cf0d297344daf76fcfa27ec0c33e55da4794a
-
SHA512
9684e1c11734a40ec93a10199456f9d1160c3da3fd4f362c14585def7e7aa997ffb436ba47ac26468f8d9e3726763437cf34e024ee70ae79fa447ae905c26897
-
SSDEEP
384:uT2YKbPR7DNd5P1od0je3fp944WubqHGZpUrZ5JVXheZfnAwk:cKbPDd5idme3bh/qHGUrZxRmfnA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000ce9be210a88c8eabaf86c5fe991553bc3030d70c1a859bb35c01a407fe490f07000000000e8000000002000020000000c36374df3cba57c065c0915f7953535226bcfbce48ef105ca9c58a431fba09892000000045f819c7231529fc1a17262aae374dc1b9635a1e5c662a364e13babff708210140000000cb52e56c8f3aeeaa23566db29a6a751267534b9cbff03e8007b17abcdda656dcc14168bc44a4ccec089fb896415f19f6dfb697105b1f3c2b8de9a68d84bef3dc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 100475c5851cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434885715" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFDDCBB1-8878-11EF-B42B-C23FE47451C3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2472 2440 iexplore.exe 30 PID 2440 wrote to memory of 2472 2440 iexplore.exe 30 PID 2440 wrote to memory of 2472 2440 iexplore.exe 30 PID 2440 wrote to memory of 2472 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\393e1d3bb8631d86db4cfe1f0a03fd51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ed2ae47a7daef1ef9f24ad5837d387
SHA161fcad5a197762d0ffcbe3a58beb31514fb17404
SHA256b551f2b5a47029d0ded24655a7230691e8345f1e081f966440ce66ae86e048ea
SHA5128ad4287ae92d20024ff8300220d9bf8171e6f4d876268b0ce5b33a300203e5bba11d21f1cdb75a502764575f5a971fd4ed572fb77181e742cd07c7ceaf1c30a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab6106c7181f448f3ca06497c0db23d
SHA160a251b81859e20859e369c9d334f57a1b231bc4
SHA25671c5e9fa868156a18aab61bf8a7f3b240fb1259cbaa8365fbcf682ba3f5a6d53
SHA51292a5c970a20e05230fb86fb936c1e19cf99f41d4f2613333254f7d65ae6ccae2ffb592d2f9735503ad25915227fec0ce650fc1bce02d9e7af0d9fbc9afd46e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f84dc9a2269e14d1163c532536cd46d
SHA12475c05600bb498166a36981e661fc6f6e720aea
SHA2563d4dcba9174a331fceefeed151c8721df66118e09ade04d7668d53c6f04704e2
SHA512c90c75ad6339735334241e7b986037de6b86f72fe684db10ef0ff8a3b1623829dbfa8c2a93d4de823eb046a2de51d322c06a1e68c0785ea4f931021bf707ebd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ea1b65d9a08427e00d704beeadc0dc
SHA1cdd7d501d09d78a70056f4dd49a2bd9f01adc8fe
SHA256930c5cd043b20a88b2331461f1104dee47045acab1e1c0a49d5ba6070b7aca39
SHA512f361452f5dc41196822231fa3145c813627306d6a20daea88ade8684b9f7ff383610802138aefe3f289d30e21a4cc3e328b2a7bd04864bf612d097e357525222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549cdab408d4e9b69297adc85fce1cc15
SHA104994582e492d091d7785e9f188032b973ae4985
SHA25615b00c5e93024081276fb75fb74a0b29d4024bf2dc3f55f010b4c43621f40bed
SHA512a0088412520d72991386d8d011a2d4f0a648a2e6ec9b522d15d75b59632937a00de3e9dfff0ecbdf869e9534e81e413f879492d37e050a7bbf29b4154cd1029d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54435bfd02d062a113db475af7d3f01f5
SHA187efdd90ae2dc21597b46365a0d150f75e4b82a5
SHA25651fd82a43abbb729489bfdce2e9493b98670798714cdf907602a034965f9c07c
SHA51266a07f626229764dde67f553d886cf6c655a6e6c8c8533638d4af03e94e427dafcbebf61397f0c76296614b040052fab6d9f0fefe6decd437b8e597e4aeec540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560752465d7ffd09d38773d000225d02f
SHA149128c43d1192a1a99fb88818152b0e402ce3828
SHA256e6a189ccb99ed3ea9d9101a01afa258122fa9d78972fa4b497f9b6200ca28e74
SHA51257bcc7c9b67b17a0634ce7af18b311e123fa2fc0980b0595fb89d438e3511b734405e1fdda932e949f47bc5b208bb544a74f7a4095703575ad663deb760fbcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8392e252893bb55f949ad6d048cc58
SHA13cbf624a8213e9377fe37d9ba90160662356d3a1
SHA25640b846a5482fa7f2fff37099926f8e2a7080d0b82af002d6d03fcf55e929e2a7
SHA512793879c8c0d1455039b4fecf079ea4e36735a5a635ac8e30efb8310033e98fdd9f6fd6f32933fca81395f56e2ffb5cc3170dff5c1d205ea752fceda5004466f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5388d7371790633ae65e30430ae05a6de
SHA18c465a0f126f328b0e9e87dace7eeebdcfd29627
SHA256668bcbc2b0145800fccc701f0b28b66c55ec9eeb5773608042d81f60bee52707
SHA5122aac17e50a5eeb982d0a279894e4def59d32a4184d84bd5a26a6ee7cf604feb2cb790d11d974d55019c674881de3f81def909c9bafb08c0bf755cf661480632b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afa4dcaac3efd503f987e8860a2acee
SHA12b58829da05a2cf7fb207326fc912d3675e9d5b1
SHA256fbe5ed610e1ea7bb1268ca38c7f70a36b25e14b518d6cb0084a5c44b3721d7d6
SHA512da96dd0c8317fb9752f355ec7fa28116ccd9986dc24a0f9fc7537748c874993e139d9f43a3fd215b05da6361f6e56dd3de30093687630d6d06265fc180a7756d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a75021d5696780d3c58abf512df2fe6
SHA1984648cad8cc91c4357fabad1d6d5f19805552f9
SHA256afd9fefc6d8336af7edbb7b1bdc756082891d7b6e7ece50498128ccda6d35f67
SHA5129154742d28c2f001be54cda014d1bc0e4f4c23f065b7fe0b36d45287f48060c80e22e19b827a1dccf3167749b01968bead104b6fe229d857844377083418997c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504382e85c4c0a6a21b6400c345b3d9b7
SHA12838f20e9e1ab8e820a1617c7ba843ca95ed659c
SHA256f790ff597aff0035f65f4ed68c7d1aafc3d2d2d08237a1fa049f4adf6a1d0cc5
SHA5128b655b69a54d5389da8b391465e8a5f6e6472133b7e06f254a493dbc37e43f9a9786cfd76f07b18146cd397cb5f1ceb0075431119814954cbef173d664fbe2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52db5e1ee91a6cab60210eae33de869e3
SHA12706658538a5172a4e0ce6e6253e2287e09407a5
SHA2562ef6f0db8466092d5e5d7fed570a7e3f867e6994b878ba0c86d961d06b65a5ed
SHA5129428161a2d0b936adf21e6f8e888e12b47860695c2a15d42fefe527e4fe35f858408494ab2abca1b9e5449699770c0f28f306cd43a34efbc9832ae4c7507db91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b91bb5a235026f0bc6dd42521041d4d
SHA1ff6ee49d9de7c207d45e4bbcee515282c23a4dac
SHA2565e30398ad2e054056cd428a331276247f39f3d00fcee362815243b95abd36717
SHA51293b29564a63b7de9c85055e4411e7efd2fa4e1e7896540804255b4090707e8fa2731766b14fbad5e30216d49902576eb2c59f8b03c3845a9a2ea5a5866c59683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f55400e7c334ccab8db6c2c6c4f0b3a
SHA1df6b53defc706a98b2fcbc6a1a81e0e710fcd441
SHA256dea02d11d54d87ecd2c94c15a0cc3aa7b1d0e24674df0dd84d889839a0402666
SHA5121e6aaa2436cbb6ca63942679c7bdb44c7b9146d44bcbb14162f8641d2d32f494a6b3325730d613d200db41f682a0e884abede7e1241cf829239d4b668fb77748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563aae6bcb50a9b655315cb51e946b918
SHA1d8643ccbf2e913fa0356eafd510bd85b5a7c1f0b
SHA256824126137f2233f50219f9802ebecfd916705b18c43dedd0a0eeb1fd67d9d329
SHA51233fd87aefbd4a25b3de5d80d1aa83431303b93ac871cbdaffda10e21c07b5d147a4eeca02996cc8c0c2a7b3d822cc4cdd96cfbaf3bde9ec4160f41201e28771e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f9bc58fb1bc89c2ff8d8a3db0f847e
SHA16ded40bd252d15f37c523fe4e651776f4ea17fe5
SHA2564e61214dfce218a7b9a2d7f49780d2d0cd6f5f3ca3f0e2ea270dd966452402b4
SHA51255d387a23941f972a0ba1c63d8a6dc639cc1634dc9cf151186a93fa188aa89f62adefb9a6f967520377a3528d9cefa9d500d302f5555980f4df5ac4efbf0411b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598dd9dabf164a5f35888c86a2b5e80ca
SHA1a02facd851e1e5ea12ddeddaf1164cdc336a8712
SHA25611b4db37a2d7872cd3da0eb3ff69e68dcaa14c34292eb1fb96c0ac70f6308695
SHA51245ae1f708bb2af6175d33d4d73dd20039cef1e0b7b1d55519a9a85dc10a0d743d3dd986d262bfb3e8293be8b8aaf152a0d783235ec1285d4937359f8bfd17a3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b