Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
6915c4dc7e2dedcb3b4ad7b3b2581c95_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6915c4dc7e2dedcb3b4ad7b3b2581c95_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6915c4dc7e2dedcb3b4ad7b3b2581c95_JaffaCakes118.html
-
Size
12KB
-
MD5
6915c4dc7e2dedcb3b4ad7b3b2581c95
-
SHA1
9076cca6ddf9950105ab2438608793bbd179d958
-
SHA256
5aa000d9171d1a2658c1df6e7f91df3dc03a368f4947baf00f818cb151549166
-
SHA512
c1999ff0ef234c17ca61c7dcec7bdb6596ecff8a5606a1cbcc38da989f360c6a947b1175d605e6b14534f41c2f18eb177c5b2092c7f83b51dceca90577527eb6
-
SSDEEP
384:6V/Eb6fwiMLX/u5u1uNXVmfMV+GLpsyXvDZspC4tn9Om05963vWcmAkLzd95krru:Gfn0+DjZt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427933524" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000008956087aefedaaf50cf5564eaf10c3f803bf5224cbd16864a037ff80ce4848be000000000e80000000020000200000009e63186512c1f92536103c9f6965c09eb5005841720ee38f9a61b8105f731e972000000004dffc5e7afe0d5bb2b349301ddd6705fc60dbfee1d190066c7a79b1fd5f60c040000000003f12b51d129c28f0bc40cfa046794510dd57b917c395bda5f63af83c6d1cadb649f1f3875913bbf4b01967ceef32d5db3faeb0206f88a7ead714a3f3782ad7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B1FDE01-493E-11EF-9637-66F7CEAD1BEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d67c4c393569d1c8aa959fd61d3bc227e6b37f9ba472ad1e57c1726367e2b953000000000e8000000002000020000000ab6cee2522ea9e062d6156484fa478fc3e8c0bcb76fdb39d0c62fa5a4cecda1990000000f1a8a04f98318971ee0d0b16b2533e15adca2f0d94a4e6625229e44637b22e7607c7fa2107e667cd7f656192cac0b6c0e94c6ce33a113cb62473ccabfcad7972240a1d5bd02cab7fbfe9657d6f0a6205eb7d7f87533c2960b50659ce2727a597523a1f7c3ac9864f4f5b775af7583ca7d024acc6b23908d7c76419395d3483843fa1b889014a33147e919fae1a4fa2e6400000001a1f94039a66e6e974f6ec5280839077d652db76cba917b6adb86105e0fe97eebb25e16d87665b0e458f5109c2663b92871801bda3d0ddd07a51aff46c5f9105 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005c59134bddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2472 2680 iexplore.exe 30 PID 2680 wrote to memory of 2472 2680 iexplore.exe 30 PID 2680 wrote to memory of 2472 2680 iexplore.exe 30 PID 2680 wrote to memory of 2472 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6915c4dc7e2dedcb3b4ad7b3b2581c95_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c985bcf883c3fa6eda07f429f1bea3
SHA1e7f24af1e3190680a6f6aaef4e5790a96a012430
SHA256e9dd9c8c3c2359cca3e4b8605b221176e6044b9417a867d82b08c2c1731dccd7
SHA512b1064b8f6cd7ee0d96a492cc377441cd7aff5f480b008f076f3448cbc88930c51bb63c0214b7b8a5003ed8c0fc5703c9b372e7c469e0a6e9113a989d0e47d2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce527fa7521496d216b728d3708bda19
SHA1ad82d62ac925db5ebca6d780e1c90786d962eb1e
SHA256db0f04a8d1c86769c0cdca765076e0de9a79b6fc272ad9d3bb315f4dc655cb74
SHA512703739149a9890f85dc878d901e3016bb17a1f022ccb1d1bdff0354187ebe52339e3dc9ea08f684fa492d4d5ec5df3847a5332a54ab3cbe08efb7adc24c19022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23ba9fe08c7f5d6b8727239dafa5b42
SHA1bf28f3480e0d2bf4116f36df75d0a73bf762392d
SHA256972953ca38a9180d85cbb67d75d99f2242698f3655d661781590fe5f48961f07
SHA51288e641fffa1bee214116cfb5fb1cc8accff2e918f09a0977e40548780e585d312e659ff603d64790e552c629c5bf15d2b34ec937d87bd68398f4688e0d308d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3458324bbf9bfb0d339fdbaac2adf99
SHA1635caa105d2a4a0eb4d8d7d7772a1f141a3c68e7
SHA256275625c647d4a8b2b0693d8c224065295ad4fad64cab25d4df6b5a1c58cc5dfc
SHA5126bcc974047cfe4b27eefb3106f794e1a704c06c7e9becdc31143e8fd6a8bddef49bab5947e1258551bfd0a8802de50b1d8fdf16e8422e53da0644cb9071997a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c57aca76d0e6f9a96483dc4250fba331
SHA114a51311f065a37687accc6eca6d36b491601a10
SHA256be34d44727a5553c6249ab7f2ff0358b914fadfbd6f1305c5b8fada0c13c7dc0
SHA5121e1cd9b08a5dc4c5744fc987e0d8dd204a2ce141b4fa2ff7e51082031cc18e0a1e089449c60e5a4350720b556038c548954902e9de0f7c435e6c18598d64ce0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54a76b16c1f39394e39df8f7564b705
SHA154e054bdda73c2539f0a5fb6d45e4510a206259f
SHA25673cbabfaec2a314b7c1b328dc27f1e1ce1417bdf4826f826f4bdb245be353e2c
SHA51268715d515594eaea0a852c482b1e8c2f73b05d7fccec6f3e5bb8b51c203f6f03607f012430ada4e4905cba173a3b0886ee37872741d810a24c3d1b9d8a3ad494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f362238183a8cfc0c43786a3732f9d03
SHA102a260e4dfff0d0bb304b1aaefc87327739a413e
SHA256c01d2f0912095d03834646ff4b806b434bc901f44a9f80d45b0cf3bd94dbcc69
SHA512d652ee2193aa5c8fdd699099f6b2d2da4f3f2ab268ebc31454f00e69891e3397858870677e46d0d6b0af138b2f9d7087210145af629dbbb6ef25e4a6ae38316a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c626fd0ac059a0b4e4574d993b74bc
SHA16d7985b977efa4c10e342b635c0dcf4d72ce5fb2
SHA2563815092decf0b3e72d678874f4413db665e46906918a1447c8c8d7a8cca6ea4d
SHA5127d06ea2244291fb957ef0490fdecb58e934877811430ee1061d520cb7d635696b949f18b66416b66b64c835a9156c93f808846a67e02ca87ebea3d442e08fccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5602d87fa9934e8f0080a39abb7581
SHA1a4add617409b55ccbadc1e6c000c8a15d1662440
SHA256e376d089dda66a4c8337ac00dc1cdebb1d403a94a304c7405b8c510c479a16c1
SHA512290e32da77ebdaccb8c6b928fe4025c381c6671b55e800ddbcbd9c391d028f3b78963d6811aefa2ca688a57b8829e4305e7736a32324d89aab781fd0d7febdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004c4d4aa1e410156487d0967fc1306c
SHA18f9e1f4c07963aa3d25ff1cfaa6dc0cada8af196
SHA256a4f0daf5615343f03d7660bc6603b705642221813083b7e10a21b17d4e087d74
SHA512106e150fb46f4c2c25e709999ff74534c58dd3fb7eb522312e3f4485bd15ce4aa560510755cd1968dae6d6eafe5e2bc4da8d3c4cdefcf97dfd37a3f56522afe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9be31dabc91504ac047b0e988d5c92e
SHA134eb7f369c0fcf2afc460a1b459a2e647965357d
SHA25681635c92ae8bde9bd38e3c268c2cd7ab21b04ed518c7b477d993a3267133c50b
SHA51278d6c84f355596863b2307632cd0da07baf0bbfad3216b7202f432f5d1936d4dd7bcd5c3aca7a3a1f2292720b31b0a32a06daf8d903bcfe237d8a2a2272d0683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56628c6958cca6b905558ea3cb6602d3a
SHA13eabf4c23dec0b55c560ce9a638736f78a4eac82
SHA256cdb375cb21f1ddd21c7d01bcbe37184326a4d920fa2d8803ea53751b76f8e6c3
SHA512975ab2dd27d868f41e17421fea5473acfc632cb03fdc660c802f96e41509715354d81cb157e99b1a3dc36bdcaa375c5998d61db09f9080b032d7df5e40619c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592ef052862bd517da93a457d4b5753e
SHA13d6e023e1bc691154c434959633382b189b58476
SHA256c49ee9f348d9855593adb6b7517f7806645ac39d1613eaa89d970b30b6e1773d
SHA512a9d388d7e249cebaba28911cc16a89cec9cb42b8977dcf0eaaa0096b7f6d0cd6c58b89af3cc5af001784c66b0b5492ca66fa8aff3b446708e37f2e23ff625161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e79adb24757d3635b6c071ea7ffffac
SHA1a153b0afe52c296906c56d1a0c5ebe0245dda3ac
SHA25604cf0f6c8f008d1a8552a19535f4c1a63605ebe8d718b180fbdf54f691129a8f
SHA512c96ac0d6c6197bf58c7e0bea8998b7049f47ea90122fd9948394c07fc9945af84db22de9a91c77d7597175af929ee976daec6f73ac445af39f957af520a53712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04895b120fe5fd471881d8c39f572f5
SHA1a1581f9563744ddd49dd1a4d182cd890128053fc
SHA256979aa88fb0f506dc37301f47edbf051ac57a2f55ba8b4d1e7ae3b61c058252cf
SHA5123cd8d66312d47ff2cb5a5a7ff7e854bca0453a10ec368da4f7083352cf7a2201d708ad04983793da5b97cb6d540f1d7b013ecdbb6c703abf8b79602e72b11b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531576996663cd85eac01fe6effa160f0
SHA18cd48e93e982074bf4304edddb30e1d09ec463ba
SHA2560d20bd7968a644d616acb65c7e9ca4f8ad40abf7fa9718083cce781c78db6c7a
SHA5125fda8720c6dc5f08f6aaa0778bc63f38d65a9c6e2de92c0d8095e1c12da31b1c2863fa5e598bac5486d603844487ac2e5be65972c0a3d317bb46a181f1f5b03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e76efa324d4f20b55b2e01ecc7ab6553
SHA1d5eb8e90b2d44195b5ec8ec322cb87b5006e67b1
SHA25600547d9853a5524e0a8dc185ed050ea6f3a38d77c41296eff1e45a1024d0d10d
SHA51228c3cab491d462ba94d953237ee5628543c4a4148d53e519c414f52f4d3d6cba7119486d1e8d2fd3b246edefffd29296dbfd1b4a2a3fa335577849fbd8cd83c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b