Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
8be383fa9ca2db91324f464eaed2ddb1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8be383fa9ca2db91324f464eaed2ddb1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8be383fa9ca2db91324f464eaed2ddb1_JaffaCakes118.html
-
Size
112KB
-
MD5
8be383fa9ca2db91324f464eaed2ddb1
-
SHA1
e1093ac9b112b97f5fd27f421c3531c3c07d4fcd
-
SHA256
f1230f16c804a853e9ffefb314d1100de1ccde4b435e257aa221f4aee74e5bb6
-
SHA512
700b7b34d6b30ae8cca247759afd51cd73fd2071ba2a66ce515a9e5213363067026d78e4ee9cbc3ee3f2a29961c4b686d745e12c726ccefd7e42d191dabe2b21
-
SSDEEP
1536:X5GFbNegVTJdPg73HAfPBGsYs/4KexmWj+bFxLwF4HjdJX1l0zunv0xI:+TPfr0xm/gYLHX8xI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000005a17d7dde2dbd93baad95516969d60c6d2479d53f64a582e498b6933917157ec000000000e8000000002000020000000fb69c58d9c806e315cb0cd3a8c7f89f43cd6039a30c126a1b06b1a28c17dcb6020000000d4695d6a1d9e939a16c9383cf2e9d3f3bed4c268f554d28d90b4b541bf42ac9240000000a6428ff874dcc1c8ddb39f51d4a6062a05a951b40595e52c052b359c48da02a5bfa53c54a1720d8edf024243ff495489ab6490ffa898cb53a1c8f096ae006cb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000ea904216588922ba09f9f0593e6c81503fd74a4ffd80d1ee8174a89ec3c1ff8f000000000e800000000200002000000063372091d9ca1ca3e3c02f8af3e373ed6548dd4997c08d975ebd207012e01b4790000000594ed5c7779ba9e74a5fe3786e742b552a2cc04cc6c719f7bab222ecf96f3d8b91f1fbc0c0df0a7ea9c84809d11f07de7f945b3a4f583a46ae1bdec435bc51959b674eec5d429b035aa3b00ce6a9785526819c210fffb68476ba2e3bb50db25fd0d8e44332dfd5f23fea5968527a0d407e44a1726dc3c03969ba165b3dc3733c24b975b6b5dc51457b5cfa8b684c181b40000000c83325ecc7e3c4c7e2970b06da1911196b8039f4036876917cc86f3ac3f56181122430fe3044d80f5e0c6fa583cbe8fd6065bed94768c160c52bc8cd4c4119e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2BE63E1-5821-11EF-B836-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429570671" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707f14b92eecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 1140 IEXPLORE.EXE 1140 IEXPLORE.EXE 1140 IEXPLORE.EXE 1140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1140 2976 iexplore.exe 30 PID 2976 wrote to memory of 1140 2976 iexplore.exe 30 PID 2976 wrote to memory of 1140 2976 iexplore.exe 30 PID 2976 wrote to memory of 1140 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8be383fa9ca2db91324f464eaed2ddb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f1338d16d7f05d93ac5f97ee873cf20
SHA15ee703100fca9174f8065f09fb05d964566badfc
SHA256cea136ae1fcb4aedea0fd885636084f3c77b06e141a573132dc3358cca9eb8e1
SHA512b5989e53a3332bb0f57488a353b51e24a20d36a9fd75b3ba64741dd94f7787d8f9364501b6fb2de10243bd8b0c61adce1d5efa734a99741ec8b1c319e48d77e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2e115c4ac5ab762f83da2440b34ff7
SHA1dcfadfd58035cd90982b6344b628a8a3817d81d5
SHA256afc30bfca25e5afa26de75866b7a84caeb74bdafbfb5c790651ec0d297860047
SHA5120ded7ef29fc9fd60221e7cc0d9a2f08a987ad04ea9306311f0166dd8133093e942b87a288bd1dea4d92bebf4cb952962b44804a3288715c768cb617ac2d58b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ef09167b4b01bd117bbfca52ffa02a
SHA164ad94290213bab22502c0fcb5d1a670dd6ea675
SHA25691958d157c1647b2dfa7a29ec6ce05801ca589767585a1e98cc174a43f38e6cb
SHA512d895e2951b8f5ca310908b2ab6336d0f0b1105f4c3c0b28dcd62e53dc6080ee07ac81744ec46e535a56f060ab9e6cea1335742d3a451b759ee3d331fd537ed32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdaf6891fc2ac9ab212f90d3e7233f1f
SHA143f5165ff4c84c29dbbc40d415b624b74f3fe041
SHA2567a0c20e506d1002b45eeb6f8b56dca81123a155996bfb498b3a4743cff511d38
SHA512407beb5cd1a6c67bf01fb5fe3a608bae1446d6d88d9669981106192b599aa5d1ac005643dcb5f0fafe471568f2c1e9bc31cde63d0ec331df6a517a7ce51b1a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24cd9770a30df31e85420b47fd56b7a
SHA14d24e57bf8b0d10bf956998dffbc0cde23cf6ddd
SHA256546bb884f92c3b7d2e6f816aeaa2d5f9c1c22c23291041806dd4825f2a893582
SHA512d039edae319a8365ef646d125427af58be92cfeb48510851c17208dcaf09ff7541bd6fd8bc3d2cd89b35742f36b57e0a37de048df2d75c085909fc60e47d94e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b9ad2acd162f94a30c9b386a0e69fc
SHA1bba6fc8eeb01fd55f0b18441a4311104b454a6fa
SHA2569e4bf8aa3971e4a90b602590265ab718758b99a9f70ec352d30a31ab901bf5fc
SHA512cfef17c89c80d349e4f0cae8cc19736c914132df73317591838cb726e98b50bfa3c3759c0b2861c56c541e19dde4bcf8829f44b8419933f7b222c99cc1f02bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d99ea00af56a51c4777ce33851d4197
SHA15fd38f7a8e93e494ce332f5f0c9598475ab076bf
SHA256039f955f1339e877b02c544ce5fe38cae405865e67995565b124dd027dc3fbed
SHA51271c2e198c93df710cab84ad336ba0eace4a7cb9d3c7e79ca9b3e12c19eea9e87e73c3260d21e3c86849361f750ee671a4ff4f9d20b84ad9f64a090753b425a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ab4224b884654c8e896718be3d2e10
SHA1da4725bee8c4af7901fec0e109ad400353e297a4
SHA256f8e8caa0cda23fb39bf78bd776fe4c09b6eec3b88cd78cb67f060bb2954e2d84
SHA5120e8030b4b5168d623aacdf317d0cf8f793fa39f08ef13e4b658c6d26178287127b02e186116386e673370995203fdd0c2797654ec1358916da963f01a37f26ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c00387e756a6f0ea0f39c4e1aa241b
SHA138fc792be99095676e8ab0090eb7fa8fac8582d2
SHA256cea60232391f67ca22ef5d53920c52715687b165634e24ec1b8b432da9d84cea
SHA512fc4304c0effb2de635ab9a6588d33487fd2f749348a00c0b1ffdf9ed5f23f1fd2c453be4363a8843f5f455e1dcab8922bd107f52397491b624e7133cef3f0164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf3693862ad371dea54ba74f6d62d1a
SHA174bf37f951fbc19800113cfb94f02eef41b7eed9
SHA2560b1c844e156958668c6a706401fc5fa37f9fd98e8ca5f60753ffd5cf0c80090b
SHA5120e1fce570628fda609062fd8024adefe9d195c0a71d37fa113831c1b233198fdbd44aa3fcf07dc003062d8b82f07bb7e4a83cb96f78603d64183117054a7c44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c555a2c3e41cae40a7279c5348903f
SHA1079eef6af4dcf14375e74a9c5c7c6f30687363c6
SHA2560736dd7c19c71022893692b999b5933803fea074263bdccf940347517c07e2a1
SHA512fc0cf11278f794c6b02b2986e9c960432480c4a79e11ab7216c45f33386e5848729abec920132bef9163718e14975ce32520eb1db323ab7424676e41156be97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5248f5fc9aeff75619614a98ae0b220
SHA10a4bbd378d7e3275df0ab28b9cbfb6950601c99b
SHA25644c4fa534037dfa055272e42f2b5d64e6d261ddea7239a6abb80cab35fc46fc6
SHA512e282b8994f7c7436f6dc35f1cbaf3fa5f29952f7f6b51864a452ab7950417e2db8988acec7f4aac3f7c141de44b2b7ac4c18d0425ed2664d0efad7a80e79fdaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9a633365ed14d26c276f9bd10ed691
SHA17c33542592d5a4ed311a11ffdf2f4a01ef6564cb
SHA256d4a773a437cf222cad58312e66798995446f9f554ceb889f510eb1029f66c7e2
SHA512806f4d5b83deeb1ec9544b98e5c6edc288193c6c643f114b3168ab75fadf86476cb21d944c9b911a33e1e8a8dc6c36a1a53559630bf0ff4a8fe254895b623eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf5a9b0d51299bc7dfa0da9656bac1a
SHA134f52fa7c0ac333ceb6fb7d0405b62ad8801a370
SHA256e02cd3c5000868165bd184b7af86b34fce6fff6282287ff0b8c1e01f15a7c9e3
SHA512b82bf9563a3478ee167f4320f772caf90744309fd72ddae28b271efc5a72953dbdaef5dfffc33fb8ed9601a3c96996f90e6ace301c738e8f1fc555b51be20c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7106b09e6d82a9cc14df2af2291d82
SHA144fcd0cf8dd5c7b9198e1d0764b7c94223dc147c
SHA2566b4593dd40eb6c341ccf378ca0719a1b3bfba1a989c60d278e3048a6cfd68202
SHA512d28e96d0335768aedbce099419a379ad7290da946088a72254ef2c90438f0be6e9dc6d404bf1d7d9b06bad90c2d54737be6d7fd06a315d028dc52c3c656e71ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cce86041f5aae87e475739947acc073
SHA14ec6450164b6b03d8d2e3e589eb187dd0eb1cf06
SHA2564c01f91d5bb2983799740892165b30d0b97baa6ccedc8d2e70c99b1e00d3cb61
SHA51246115480958e54b2956f459b7fdb905ed6cac708c3de56b1caf0936044b675206c7a55296392b449e52dbbf94796b3a739f7a330a46ee662edf93e56a1f92c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a9294523371766cc0b225cced0d893
SHA1f175c21ad3826c4b4a96cd3e3e55288ab7dea6e6
SHA2564d77191efa3fe146b8e72b315675b4a9d20918ef779d6fc7833c1c0a01b23f6f
SHA512a1b9c4f9e7732a72c96fdbd126e7b6625d799a64fad3982e9f335e08ba7d662b782453b617d8b2ed9c0ad08253fec1f5351275f385cd5938746a717d96ebe2d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b