Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
9fd7bc10e8ed617fdb58807d5a994c16_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9fd7bc10e8ed617fdb58807d5a994c16_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9fd7bc10e8ed617fdb58807d5a994c16_JaffaCakes118.html
-
Size
254B
-
MD5
9fd7bc10e8ed617fdb58807d5a994c16
-
SHA1
86f66e717d7eac0988dfa7ebe76585092805c3b2
-
SHA256
96dc86e44edeba539d7bd89aa9a2ca7a1fd540034c08ab8c07fe621e283eb294
-
SHA512
8af88d7b304cbf617139eb122f5b5e8e68d71e0ee38ac136656c5f0f4e6721d4a1e09bf25d330c07775733c60503f726b15e066a7fde21acd21b10f532b3ae1b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000c99cd864a31ee94bc0c6d4c7488599ae8535e6e9b9d6dcb172447eef1a3f92f7000000000e8000000002000020000000d9b23a0765ed2a93d36082b19e3d1522ac963a4152e0e710a294f881a798232a200000000a1f804805e41e9442f94e18ddc55263c1328bfe6c363507795c63985210986e400000004b307d0d9fe99c1fa41ab40ccdb6fa2e302ff8a4de7b26aa1244551025fb6ff0047fe97584de9a1d510771ffe15c9b6cd8ccfc0017e5dbd385474289d214e996 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0dcd44c1cf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{784AD651-5C0F-11EF-B6F1-C644C3EA32BD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430002565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 480 2092 iexplore.exe 30 PID 2092 wrote to memory of 480 2092 iexplore.exe 30 PID 2092 wrote to memory of 480 2092 iexplore.exe 30 PID 2092 wrote to memory of 480 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9fd7bc10e8ed617fdb58807d5a994c16_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507781505f6a2ff453a7a7e984cfa5aff
SHA10d116036c99e692d45bdf9960fc186574c0b8a0b
SHA256f3ae4da7625a7b689d64df602e66296ec65d3806e5eb63e578853a9f3e7ca785
SHA5128489c26790b3a784b013da946e00e9d53946f5432530c3afee561b8dabb73dad280b244fbd6d08087141ec56831cca93694718fbac4cb3b31a01e79454fc27ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911c36c053a30b5d75ceeb565bfc5ea6
SHA1c30b8be60258bde2519633f21647852f060bd048
SHA2569b67edb7837c7d1a1338bf9c0e95502c5e95e517de8cba693f673a2dfb83e06b
SHA5120e6f52125964dd817ead8f14fd1ed8b190bbbfdff9b126d6b43f48dee71c0404c7e3c052d956e1f3e7de91ba0132397d0068d32b138b2d89ee276f9485e4d9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7cede5fa52cdd25d6c020b0f345dca
SHA12e3425c9e025b21f2d96c0bffd4797ee47c949c6
SHA25644236a42f03a0f25ffb57bd5929d3bdf036381daa23036ca86a52889c32d998f
SHA5128e8af6957cb56dadcdd19278c41aa42320981482818d640fb90f2ae0d52e734734ef18c9299cb287c59b0f7a9357a664ecb8fab03dac7aef810ae0340913cebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5531f2761cf8100ea6de83771645ce42f
SHA17dcfff0cbdcef7cc0a56811435d943f12aba48e4
SHA2566b748f67b11fa0c0acee277fb347c793cd662cde472599b32fa31230464c2dd2
SHA512750ec8cd6653e9f1ae983d31f1ed72c412a28f47f353120d3451dcaa5fba091d1921dc6a3e0d86d4ec81c56ecffd2f5ccf9765322c03402474ab393fb119232e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044a6a58a8c5d80f88abe57b1a4ce04b
SHA14994c4af7e174a1e6b13b6c1cf59da2a2422e33d
SHA256dc3080671d088b873a40f5d7df77f61ad93d1898894b45c0e99995a4ec2231bc
SHA5123a6aea6dd98c008e76f9f040bf15944d592c2a9f4d10d5711c7aafca1815515fbd0ee29b32a6fa4705bec554cbf472ed3f53e833629800e3f8d6eb357e808bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9747d50bcc5b870b76aed7fc3a8030
SHA13746d164932caa1df79108b9e9905c4c3b7d02f8
SHA256518592a75d6e0bded77950d587a1b52aae1328177ba1df4abe8a236d5166bbf3
SHA512846326b40ba368a2d23cd2403f3dedc61cc1bf99388a4266e216543349e0a7eb7876114ac2baa3514fe5b44140f400533ac5438d74076f079db3c62964494b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c92d6a78f3a1bbf9c746a76bbfdc27
SHA111d4410d897cf12925fcd16b4d79844cb04040d2
SHA256a5f36e54bfc84d7ccaab75ac86d7fcd02aefc8b1c2dd13f827bea46270851802
SHA5120b6c8e8ccbac470eeef6303da91f740b584c1c0b3b938e37211a3ddd8a761c1520fd48556cc61af463b77c22f150d633ffb283cb9eb258a250f5689e4b168a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55462c35e51695029eb268427853e1c
SHA1544fa2aa162610ae4c3fcce3fbeec3c87c10c8d9
SHA256db7e36af21fd90e5b817c686755602125a8e478552bba6290eeabc16bf3aa77a
SHA512d264a5a7fdc40b0807364d8f27b218d8c2ae50c443cb5b48b63c1fa58b2445b3a2922570fb318b5d7e56c99827506cd8146647a8fa0fbee775f4b9c29f02e1bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a378b1c9dcaf35c75f2e4c7fec4fc01
SHA16cc1c66355b7f11cf9f4f32f646a5bc73113dde6
SHA2565c09885aa1e3d07353ff8aea1f2c11a02b3489adffed8115a38006c352807b75
SHA512b7b5b83467803b77bde798c93cb8e71479c256f66788a8896151f96140d7f9315dbeda596629b20ed47aaaea51deff4fa0683ff7b15cac4faa70963c47606ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c053257071fb7046beb28f6ce9f8e56
SHA14ec9c96590eb29011c4ae23a90d1c113a47ce47a
SHA256747eb0da778daf5d7d2c1a2b65b986489f2c6c9eca686b6cbb05deeefbaefdb8
SHA5126c13ba67260bed5036d456c65be613998922a8a4b6c703cfa0f64be0276fc6bde46b9f5e1ae3dff7e87e0b054a5a8bd085b44a387a80eb4d9bf8ee65c994979d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508371da276184d710d90a083e1894897
SHA1820591b34aaa72043936ced1e40dbee3855e133e
SHA25612aeab9f8397d6ac527f7d7c562a0acc89ea1aacffa6c7418c27ca4e9a3a1f09
SHA512eca18dcc09a362ae157666cc3d236ab61da3352cabe34cad1371723d4f613bade778db6b6887dbdf12c4d2450b868d95800abe31b6f45c8aab812e7e3134df23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031777474a5d4b597f4ccd4941724a83
SHA1fc24a2bed56bf384e6946bb18d4b0519da50e0d1
SHA25651501f2d2721b602f043d9168c198a9f4453d0abb94abbec0ceb061b489a1ae8
SHA512774d9630591a27cc7ad881ea97dcf743c55d1afaf5f2de8bac4cbdc2dfd86cdbb8b42b7920f5c5c5e4c79e45520d28ea773ffcb45fce874f78780d81534d70c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5977b5790c3398aef96dfde64b0dad
SHA1d5972ae7af1fc19e1b66c0ced6156bb41004b353
SHA2569d16fd8f7e7ac8be4efb30802f70a7d346567c00bb152c678256483531e5d9f2
SHA5122e77987547e75f70c3d530bfeb902e6743d398bc55b4b1c088d4a41d90062f6e388759b7b567d2f6b54be33821101d0367dd879cf5d204c6f51fbc6a96666f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad969433bbb7c2b747b9c2c74852001
SHA14ee0b2393f4942147f342027469a15b544300bf3
SHA256914159e80835ff8cf1a568e26a7443ba59be34ad62ecdc8fe36b69a6589c38e5
SHA5128d41b431658524a752235c370a2b14bfdb412deacf7d345c67766a202cbb453874059e0c52c348e2f4bf93d5ca92e624e00478d46d2c357820c5d239382190e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83fc2010f665d613376466da35e57a4
SHA169a011984b0601de74d90ab067f8a6fbc4b9a6dd
SHA2563154bc1ea162ddd43c0bdca78f750c9ae2d50efc90a0e635e9e16a741430aae5
SHA512634879c97f39eeb740cebbde69748402d5f3ca9df6bf12695aa2673b7914e79c6b76d4c54f3ad10d4359b10b7f466e5483637e5d4c79f7e3c2b4382d9683e8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd1c23777c2d87a12907610d194317f
SHA19915261ed09c0929a54c48978fdaa7d44a81bc1e
SHA2562b75ea61eabe9ca23de25b18c113fa69bc9f84e411d09f28387144a5f1d6d887
SHA512a3560264bc6a708bb34f1ab9fe684458cd04d238b7daf9e060f9a4b70ad573c8bb6f52d75b9cb59af8f1c48dda3f4caba21560c1916d937375b8d91ec59ec6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8ea278dc93575b59f1c2b782b74dc4
SHA1649eb26bc35d9f53c3a60f8ae5731663ee9e3a75
SHA2569fb4bce9b45171f53b89f39e21c2e0ffe7df0250235a57fef6e509c10693a339
SHA51251c16380af0d2bcc288c1c8cdf4d1b72f3bc4c57f579dea1b73cba73d94a0076380e956e9e286826e6e539f04aceda139c406ac74ec5b7105bfa88ba92cd22f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bce23b6fe36340ce61d43dc5afa85c58
SHA1b6eca2c3c1988e382807f7b8e982b5bfdc8df59c
SHA256fcf4692a321e275622a7c66a28397d2d22ebdca8833a9977f72ac7baa5fd88ca
SHA5126140407ca83218efe121d8c95c98ebd6e4c6ea46ac3ca98c8090152ab3f4dd12e4beee8edd8b78ecb74bf03240790386a1426f1cc99fb60bf0ad6aa682e2a6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677373f02e6de57471314c35b5b09125
SHA145e13f4d619a11e796b3d3cfa462eeec03d6bd37
SHA25632e6fd4dc2df972e3678ad2a811bcb2ab070f81b674b3e7324cef3b5e3ed2259
SHA512b65b6a1b4424558fc32e17488424c3021a914b86969199a37b5e1224238cd3483595a2610c68cfaf8806371ce22dad398d3405b7f486d88579c5c01f3ba28d81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b