Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
3d415a0fec772dee26bd83c2cdf6cbd1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3d415a0fec772dee26bd83c2cdf6cbd1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d415a0fec772dee26bd83c2cdf6cbd1_JaffaCakes118.html
-
Size
139KB
-
MD5
3d415a0fec772dee26bd83c2cdf6cbd1
-
SHA1
89f8de823c64f4d10bf96c8acbea08cd20bf1044
-
SHA256
316ef3e272b4a532e0ed0c689f09fa8b0736c0cf57fc98c1d78fa8ae5c2ffb70
-
SHA512
78efb543afd79b36efc062ca399d23501c65e9dfe9effd4e2018eb2719f478a20a086df89cb65133890ad6de4cd82577c371fe443c8aec7b8d502428f6633f73
-
SSDEEP
1536:SINm8RGFzlAtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SIKKyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434947876" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAAE3FC1-8909-11EF-A4F8-F6F033B50202} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20860ac1161ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001697175b902c0a39276c509a364b712820695fa94ab8a34dba70882fb9b1a5ba000000000e800000000200002000000086c54085a0b5af221d1eecb668f33e3c7b3baba5a4dd99bca807d69d397b5819200000000c33dc89f43fd1506a71a625ff0873b1f46768734dfbc8a81e85d8e85992014a40000000e7fd5afb90a26a679730f150223e370b590aed59cb1cd95c691e9c66346ac4e14c0a21b748ca840ce4bc765b8e75a3e0e81e76fa23f4d7eb28753fbe5c18f85f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2744 2540 iexplore.exe 29 PID 2540 wrote to memory of 2744 2540 iexplore.exe 29 PID 2540 wrote to memory of 2744 2540 iexplore.exe 29 PID 2540 wrote to memory of 2744 2540 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d415a0fec772dee26bd83c2cdf6cbd1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda0decf3fa0e2da3afa8ecfc94992f6
SHA100ab6ef149c9aa715c57b834f024b514ab9806c5
SHA2561d3c0a7e067af9f6d635dda7d75dbfb224fa4bddb070e29b49bfe630a3e36201
SHA51279099db5ddf43cb4c47edde0f1e286cc2e225636bbf9abacdc118da1eeee312f32f7672814e7e2a23b9927bab606911ae821704259b13050cc0fd9ead5d73647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea47ad71a38bf1f72e39a6c452b0ff63
SHA1fa2d5995e28aff847e0ba81f796683014205a2ce
SHA256307f4f5c7e1a09b0e98b089c11f9aae0d0d3bbed3ccd84bed61365253d648b07
SHA512d110c84eab3f500d076539fc3b65b63cefb90f9c92e1cf624e515acdf528baa107bcdc0e447482c9cf3c6aba9d6db277115eaba8ea43875345b4900d43810880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad8fd709dcea40a6b61e4dccd89a08d
SHA14fe6df5a7ba79baa209629d1426830da256613ac
SHA2561bd2f3e73f4bfddd8c2e04c2f6af9eb8458923073a758a2beee45c6eff3ae151
SHA51272cb40aaf4dd2728b3ac28c2dbedd3c6d94d0e941b2292070b21e6084d334be6c8c5ad230f9fb7aa41e6b7cc5cb4c9659f12da29687b839f4787172130e3d3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a78724f4abbcb83c7c032e365d5de3f3
SHA146ee5eba909756a44e36ea41e41a97542749cb29
SHA256b2068f025673bae433ae40383f5c3d9ab9afd72cef1cf9e4c9331aa65f8e645a
SHA5125c34a8d311dfe2b819d6632e1b70e4d42a4e3207db2614cdf46b03e453a363a93c86be94956e83e89f4871a7cce45305fefbc2ac9c590e721358d5730d4dc3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0b00aa379ec8e4bccc3393181f6f6e8
SHA11c92c2b349133cf7b90420f1fe1b315df026d3f2
SHA2562dfff7e3c9c62acb956636aa5101a54c97fbe48e5f70c5ed071d77ff64b1779e
SHA512c4d58d58157629df3a085d4cae7b6dfcae792f77479bb113167db2cdb84ec4b66df1ee220342d2b3e631ea743c821e9103094304a390895883dfd3078d88379f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc7d0a7301a54c786fd8abf93cfbc55
SHA14c2cbea821d14d8847778e56e970c290a72fb685
SHA2560ec367afa34f1c855ba5d83f7baa17c216656852ff81cdf128f33ed3e8f3add7
SHA512904b3f9fc3a9839fd0646a95bd7c562b55ebfa6b3d786164e936f7d4ea486846f67fbec33025b3b778e541836250afcf57cd49193f68b75860deccd99f769775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18375b05457ea3943a46086e6bac9de
SHA1ffcbda9c808541f8173c33c32b30dad25a7a5cbd
SHA256d1d0cd9e7d055b535f6a91c545ae80c47d1588dc33a340bdd7ec1022bed25fdb
SHA5120a322299e380d4d056917bd3e6d1e430d024babdd6ebaaf759bb30910508a2ca589ea02db115a43ba776598f9c8498b8c0b974005f4f35d9d6ff68d300bbd88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cbdd3599c5dee9cd1db7eec18556a2c
SHA12119390eecf402daf4e091ee36c00c30f92f07d7
SHA256fca1da8e5969c6517fab740625e3b9464ec5c933f85151b675822ceb91786ac2
SHA5121db0a07745518c065470521ae9024d43b401925a587e6e9db0477351bab1d608ee4b66c609a23bcaaae7c91a79812f54df180ae60f28e7feed594590533b6518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edfed782a32f0b8e2d10203ea72a490
SHA19f272cea92ca438b13688110e962478486549e7e
SHA256af791f4cc8676309b67ace9a69123d32aa6a33641c89e6142e58718c44e6930c
SHA512a70a9f952742bfe194b4fa3312439e1bac1f0d3416e9f9752f2def63c617d1289063a24085d8fe4bf983e91cc708adb33e3ba6aeb6f9ede2d4b8361d8f43b31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfe8f148ad4a3b519799ba3d4c66ad6
SHA16544669edc2be1629805e782392bab3632849f2d
SHA2565a787e7938957632843a57a4de01db7cf5845aa5d959caf898cb81f94bd415e7
SHA5126be7bc913ab164a777ce3a78925a333bf7285ae0f6f825e68c0e500ad2c1c6209bf8a32690fdb252af0b74b564b3b1342b72d545aa2ae451335bc4a3e4bc8bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fd39d05a026716be116497f68d8d54
SHA16fb8c213e3039f0023fd691ae34f5743874dd607
SHA256f5a23a8748396b50ba130e7c29b05c3b5bf65b8b379bdeb34abd306dd702eef3
SHA512cfce18b4838db931d7e9b75c4d2d0b0dc88e331b3e82a0972c63d1e89a1a6c8f6b81da1f0668b635356cc5952c75a8bdec13710db196deba9ed40569f29a709d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc800980371bb189c620deb6744268a9
SHA14000e2ac8f63223ed94824000c586141b8b5c583
SHA256d1c5cb9186847d4167679d48a515dc9a672c7de8af2c857a4b85638d62f1f814
SHA5121a78623710c5b37b756bc4035ce7533fb7d34a9f0af3e4a8f38a5ae86a416456ee138680334bafa1e625e29baae7764ffcbb1a8ab092371efe23bc57f8b3b441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0b463a98f54dbd594b43422aaaa261
SHA1421a905d88ed2ef583ffe2afcd32bbacd97baee7
SHA2564da6d3b14d68dba7f0f0609ca7ab81f4ce6f65622164135b81e4eff2736531a6
SHA51229463e6d09ccf8d0872ac3b1e4d45afb830dd810e519572cc8a53aa254a2c6513f9428737f1bb7f01fbcb5b635e233417e9c20053fc0290fc2531a170e3d49b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a256795a4d4b4da635f727bedae586e
SHA1a0a484ec20ed1376e41ca36f0f52cc9f032280ce
SHA256ea23453636a4ef7999aea75eceea61cf6a7ea27c0d898684335d2dfb93205cc5
SHA5125a94603854bfef1df6166d7294e854f923801f75ad2d38229e849a14a9004efc0e3f7036eb88a8e67d92077639672996208b8cde2f7e046c6c95df50cf32500f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72b32759c22f38f068436cce3fe14b0
SHA11d274d12d5a1b7aad635f6b8c8e02d8157db8d20
SHA25647a8751a187e53fe9b931a0fa0ab3e19142acb088d714fcd02bfe3c5ff397832
SHA512f3f5454381bb898587fae3511f1caed1c62350c42fb5251b8e76135db54627c5faf0aa665f65f78b4ee90f009c12b8f122f740e1eac98bf22f01d0c49564649a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc4712523665e5d28da0f857c21fefa
SHA1cd55c40ecbcb8c188e27fba3a2974d0065487d82
SHA256bd84d58e1cca8ce0ff6f12598029416f0d2353382f7085a7daa635e40a4d37e9
SHA51217bcff7212e3038020cfed14abc2736a63af47f4f2fd44e0dd4d00f5ed5d907e2f1953240666e5cef6a338f6035af122d9d052682bae16411ba57a9bbc072229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbcd131bca6f5c5a16ea5c3128f290b
SHA1ca36c9cb16ba27fa16dd2f7f068f16b927f1b7a0
SHA256e4a19ce9c148f327db32d6bd1a4554ad8908e25a6cfd92afd356dba058ab2196
SHA512be91484ae16629d825d63611b412e916dd64d81ea49dc6c11517d0107dd2a96b66cfc319f625c137cc04d807c40c72039a732d51cb167e3be379541a5c95566b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07506389cf8c0fe41f07d26209b6c5c
SHA127ad31919a47eaefe7aa313db0db1a237e170b06
SHA256bf892541100d43088400891e17b795026302898ad5bd237722d65bd16cfa684e
SHA512e189e14be73995771c6ebe2321d5b977ba7a27db39864b0eb37842723a90f8bb45aee01aff92766717bdcbd41378a101abc2bcf636455e812efed50bad68f433
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b