Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
43cfc5b625bcb9a9f8db0bd5b9575e98_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43cfc5b625bcb9a9f8db0bd5b9575e98_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43cfc5b625bcb9a9f8db0bd5b9575e98_JaffaCakes118.html
-
Size
51KB
-
MD5
43cfc5b625bcb9a9f8db0bd5b9575e98
-
SHA1
cfd0f4655175705987511569f6d16df884b86246
-
SHA256
ebe5eb1d0504b1bc82aab2d0bb1084faf37010b8e3f9a2e495650097c83f3e21
-
SHA512
04da91f829b7c92e3ef37db2fed5e2a6d29d2a1edfa7c3c950e5a580832f9a13697c6b03309bb5e641b436fbfbc7b284fe20c48b1bff761ef494be37c2a84d73
-
SSDEEP
384:S1swWC5KjaG14BlXVfImTesGO9ehnKePnqaP1KI7PKQHgPrhmIeVU7TzW8WRH8DX:S1swWC5KjaG14tenqar0XFp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435095819" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008ff2748fc6e7aeca458678de8c12081c384992400cb4c8069fdd97b8cf538294000000000e8000000002000020000000fdcb701a4557140bb8a6c32d1673b96cf03c2c08123cbb5b009399ae98926f72200000000d55ce718072be5833a67c421ce45d6ab4b3f06c00fd9724f1c9a78d23d4dbc140000000091a96ced888c709fe97d65224aec489b16c13997038ca4911b36ed4b2fb1cb0148210c4d4d6dc22ee065037e6cfd617b28623a2f2c849c241b0a3859bd7e468 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a00430fd6e1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1EF8AB01-8A62-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2904 iexplore.exe 2904 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30 PID 2904 wrote to memory of 2188 2904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43cfc5b625bcb9a9f8db0bd5b9575e98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c622d3c0f8503f7264fdff8732d56997
SHA145ee265625201e4678a0098a3628acafaa0bbf1b
SHA256df493053b798d3f2068d75e983cd795260183e75abc88f19d1d2240239b6dd48
SHA5129cecfdd3500c6d451817ef490714aa7f4dec810d7b688078aab3f81692eece1ea646874c4d7f73d75e4716996111fbc284296959d762284c522c1b8cfe99da3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879945bdb6a0e5e580e0467420b5b822
SHA18a7a48b76777db2748522422d94bac26d5e2a1c0
SHA256f4c33b4d2718054b2ccf01a3c66f8f6f0e1ab3a5ec9a14b12f7f9efaed4224d0
SHA512a1e56046a8ee05e9ecf52e2f8a74554836895a397fc40443b286f8631f3a2a320db98817beaaeec1811c3eaaf86b01c20f2b4805e7ae03b40fa76da0b79841ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954c8aa7ab0f7e8d44e6bafc23ec1302
SHA16d2127454ffe5077c18ad73cdb1826e8c6d3d176
SHA256c35a4a95bd6fb179b067ee2452455bf8e6ce095ef75f8df4f23d34b6125f58a9
SHA51209c8de75ea791bb0eb3f5d67c0a8e53eb2ac46942cc89a87043fa6008d16c613b697c9dd9a9d3fd98204c205b4b01dd4551c7986156de80e038e35b3b7fe62ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d99a3fbfaca0e61db611b1b2580e475
SHA1f2c3f32b1b71f0545d44cc158430f120016837db
SHA256ea5060a06ce4f281a41629366003d37f86460b8cfc1c69ae35ab993169cb7347
SHA5127aa4602e1151b35164bc589bb79debaf3658d95dc9e49b94f3fde10a990a98d9733170a3a1a643f3386907c192615d0cc2e77303984a0bd995fa71ae3a01624f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3736914554f74c9c40a788f67f634d
SHA107caf77bf2d79bef9e06227786958d5e37894918
SHA2563dbed68dd67c580ec8a6c924434e89dd874730fc68c2db41dbdcd286fc0ec6df
SHA5122c643c9631dab859dafad2681c1e21328b50e156f8eaafd0a7ec329df3ffc0d791a29d08ca503d546926a2026c832b9fb40c714a85c4ca8b4fc5b0317a73ed24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531127d905b56bc89b83caa2c2f0c5559
SHA1529c2781e6c28049febdda9d50541f47f757aa15
SHA2562d29c640a312d9d6e8f522cc9e0c63d8e40e07c5ce746fb4c188b5951de812d3
SHA5125db0a04b2e29e0f644737e871a3168d5049197f0794941e56a7557a16053c2a8e456d52a3a27d73d99eaa11ab80a490ad35cb8decefbd92e9452dd177783ca88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f80dd7696d96352fb63859f78381a9
SHA18ede737d5fc161f28274efd921b90e3e9c728075
SHA25684f3d116d00869ae12e899045db954bf3f741f44c7ea4fbaadc780b7beaebfcf
SHA51246d07a46298abe142bdf8a429eea57ae373be9b28dd4152046d06492d27a3d20c8841e344148b280b28837585ec892c129056b9a7ffc383979d374333dc574ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525d8b64905eb3d11f07976d89e7f217
SHA1734bd08db22edf10b5ef43e1dbf2fb0c940a13c6
SHA256ea0b21c0a0683ed2c8eaa2e7c0187ae588f3e0eed15a28a28130a18dc201aff9
SHA512357ee9627a180b7f8fb9d36d2c09b5f1c13266b175728fd13714acbd0b9b3e3dcfe1fd8f05c44153c350a76ffd8a65a7d21322ace2393d2ceb0402ecb70e86e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61437a5eb64ac75cb77385f1a6a7ab4
SHA13f01b13db6b2512ab27499a29f0902afedc60a71
SHA256f1e41502e1cad277b0a2b7779a093e5ebdbd75419b2738245aa68bdd4b130627
SHA5121bf232dd57a24ae143ec1757e8100b4207b9df93222001a47568a2cc89fafc77ecb94f479cd2a38627e347b481806ccc87549b0866abf6f8d0fdccd7322483ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4372f710acf75a6e2f62422acd8db8b
SHA1f7df54fc86da8d13b4b50a4a04f55f79e47d91b1
SHA256aa50385418050d76e35e3fce73967d1fd9a859b3c044075da237e167768e2944
SHA512021cd2db28651ed5907780392c7c735e0a31e0ead6e0b1054279026416ea28b2898ada0e7d1ff93f49aa9dc8e481dea2bbab541c172dc07090bde7e086dc9a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa348222d6dc74573223a78ad656579
SHA13d7191b8446af4117714381a6221cc4d3b321280
SHA256faa6f12063d4f116c70e937aee86648a8f7d423083ffd28b69aff44ef580fea4
SHA5124a12a9cd9586f063aeffb0b61cf9c851a5b07cb53e8fb58dbceb278c145012c47386ba9e76b54faeb2abc963ea7dbcb757e71d0b53989ef097aff2c9fe1b1454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f3aa606dcf4f8307fc641ca458d058
SHA17f3cb26b8458226a45d9cc87e6f7c6231d17ea78
SHA256b39ed1cf232fdd2529a9e5f75cc39d4e330d23f35533be16944bf5a4956e566d
SHA512c19619100d02e24e6f83c68835d0bf374c6aac2dec375196774c1f8ff164425f15c98d9fd8b0b965728fef4a24906b3df2d8fc6767a5cdec73257b553d6544c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51671f3320099164d4b35d03ec903f35e
SHA18b456aa1607a1de36acaa9e52fb657d74cc462c3
SHA256100ec442add4e3b943592486556e63a8534c0c82f1591d9d7b7f942aeff9129a
SHA5122ca4c272df0f9a7e8524359059f4d04eccfd243ba7150f83354d3ff29a1e52706a662821c34a9a647ed8c08ad72a8f3b5b2340c89d2e9bd3c3677284883139d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085c4146919bb074296dc8d87fef139f
SHA171e7ed275d57eb1c7926c6fb9e6b9f243922488e
SHA25613bfe167c02215ca0c191ad700b89361fee70865c8524c6ae69d69f295566b38
SHA512c98fca69bb3b9170bfff553c3db0c29d68cf7eed868b28a45dff5ce904550c585284df87716697a616506077827d9287e99d41132ed1119515b681e230788fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af29c4d22b79f58e86a790f262a4e9a5
SHA15530fdb835ff1ce33c752d78b5c14753274c418f
SHA25603d6c5550ba1aa12ec7478c3eec4a36d282f9006a8ec5c44985f458c9e3d60a5
SHA512de618341a687fa2ac80531395395056c1249c244cc7f180f921f26f45c591f3453dcbd7b2637f2ae77475c7750e72e9c665aea08c54792a754eb73d93c94d6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f6eacb0d12e3b04be62043106e86642
SHA1db7491454be3fdb8c8def923763a9468d5b41437
SHA256632c69bf5e73227746d3807f2ec75e342b14f450e06fb045383a6145f39cd646
SHA51227f7bbb6ca81f18b6cf44400060f3e854733dd05fa23ee4c7b23b185b72d944f8bd1e74e58cfc0f2856ad5c2a2c1890b6feead2645f95203f9e36e2595b8c169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8916f4a02330ef06796248d918419d
SHA130d860cc369b65f1bb14720303659d003990cd37
SHA256556950ac723b6899975319bb6232f46c8ff601c95b2e23370fa9fae2250e92a5
SHA5122f4b20d06e16a990ec53122dd2121b4b12b216ec47396d5484d05fb2c3f7eaa8145968a4a1dd49a12602647f024a32f872b09f11fe132ec9eba0a3f072542828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4b8add08312c48aeec0a36b8eedfcf
SHA19b3e90ef963faf97acf715575f6db6a0e0432531
SHA2563134662bd9d66daf48bb0d264c5ad56113dceca38d0295cc7ad76d3370324f02
SHA512b1f897e5c474610de9e2d4a4d64045d4ee1fe5a4251d808ddd6adba31f7e324448d64dbbb767361dbdf1abb8f0701f4f6c003c485cc130ffaecb430f6f67e55e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b