Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
a58fcf247191c2c8c11ddaaf3ffb0380_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a58fcf247191c2c8c11ddaaf3ffb0380_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a58fcf247191c2c8c11ddaaf3ffb0380_JaffaCakes118.html
-
Size
20KB
-
MD5
a58fcf247191c2c8c11ddaaf3ffb0380
-
SHA1
fea428a674dfec97d413f37cf79a65ecd3394c1a
-
SHA256
e4c628d5c2d2be41dde07a65e1f52b8b280e82232de4003a1fddac41d83511f1
-
SHA512
28488a03e0fb4ade6c0780a9ca345ac8d317a73c5b60c590a6bec4dfb13b381db6071d8da9dca9100f39fc6a1aad3db89fd64113ee9b2c327ffce933b304247f
-
SSDEEP
384:f7QH/uWd6Hm1Dt8e7Wd1ZeYm3QJ3ZWApdOhQKrT/TKr2OSuDgKrq7s2KrFuvKr2e:f77ZFm3QJ3sApkpLrdpC7IYoET
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80189ab62ff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000008b20d0291a387c3081fc4a91c9acc2a0753f50c75f08b52f12ff893333ed77ee000000000e80000000020000200000005746408806675a5523ad065224ea8dbdb77a438d570358e897578612f204965e2000000085adb6eb28b9d9301671b0a3020c962f51925eb77ba13226995a65e04e052049400000009b022eab1ebacd8d28d42cbe3dc797db83778bed136dac859bf79aff95f8dda9363d6871c935718ea1e5efe4bd53ecfef3b8c0d22882bf86bf52560bb988e528 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDCB1D51-5D22-11EF-BBBD-C67E5DF5E49D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430120847" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1760 2876 iexplore.exe 29 PID 2876 wrote to memory of 1760 2876 iexplore.exe 29 PID 2876 wrote to memory of 1760 2876 iexplore.exe 29 PID 2876 wrote to memory of 1760 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a58fcf247191c2c8c11ddaaf3ffb0380_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f665a7f7fb8deb35c163ec420c43d3
SHA11b5f868ba434ab12b6298d667383a5cf94a8ec68
SHA256d98016e8f9b3e356b4960f6e898cdbac52805f3f36a959a7e37461e741f24c54
SHA5126135860c34b4e9b3b9e7ea832c8d8af56390bc8b8241710f9a9348dbd49e8f24307ef32e5baf3d720709ae71eb88239072772efde1a04aa4dd1219b116c8df35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a868b65f4218b8a053dc6cc0b0332410
SHA10ebeab5ae749fbe0b7bb377b31b03f229739e6aa
SHA256793bde833079e223405a06b130f70604a8907ea13bc03c5f125e2aa02c53829e
SHA5128d6863290071c9add0bd44fc088878afd334d124370fece6ab81a14e7cdb7b538347719482a38dcc82a32f975139982e28d4a8e266f6029d69a6cc7e8b1ca74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512575b805ba3ef5be6cafbb1007808e0
SHA1bd9c059e3359648c4866d07b825f52ba4d84e2db
SHA2562e82bcf6424f1e38fb49c82b37a356805c0b0490861592cc1f79779620a130b9
SHA51254f283bb8f19cc0c0f2de959ed093d54a289759dead9ec3a15eb8d62c4cfe8034ad50a6da82f20160ef2e162ed18038a412fdf213d3635c81d87f7c773c77404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572408e40391f9d1aa49834dd9c1ce9f2
SHA1822098192d03e344f33c1321e850c2c9594716d9
SHA256e4fa462e9e06964222fee13a522b1d46775527d06b02730bab4fe25827a8ceca
SHA5123528d412545eb20addaca7411f8cd996f0377301cb21efeb81b147753c9de35aa07d7a11b16bbbffbbe0e497f55affb7cebbeaedf9c7d00d7a1e78865dbdf3ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51358b87013e475f846cea47b1a5db709
SHA13431a6fb2e359fb7a036548a553d413b340f46ce
SHA2566a4ac2b21211ae62217cd9348e2bc318ed1953038350fc65006c1e0925e7925a
SHA512f71249214b5821e117326346f1e82979743e7907d29b3024dd51d52250c375b1f4b3c2bd0cf29e436d04fcb9803e0fc22486a50ecf8230c77339f15633392043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a660e5f2e39440a6a69763e13299210
SHA14704fbcae1ef2830a7dcc6fab165c28c9716d7b0
SHA256c58e826251f33c6fecaae209d133fe25414cfbdd04fd4bff6d86df9e2a0a8dc1
SHA512560ba9c3fcbfe136ae352fe61565a96c17859e3395acb62fd16f7c495723f90a96098dad21b614c697088d762c11d8efe3abfd362c2e3ec4843ac1be101784a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36de9f86f6c1c851533075e7219e03c
SHA18d88eb4ac94e555aca486c89b16a13afb7a6e679
SHA256d90b8dfabda99bf312a558e7849cbcc71190293f1b1bbb7545be64c94249f959
SHA512f84b9873c5c4adfbccc94ede9134b5d8fecf16d5130b6975ed877bcffebb1dd0f2bc9111fcb5c91aa76684573b09b37dab28cce7b547f680b3005993de9d70ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd5605bdae568b758e3159dabb5096a
SHA15279d7a8f97f6505efac67300ed205663ab36b60
SHA256cc1af3959643c5ef709f7c0b7027e064793c18354db09a274eecea7bbd58af3a
SHA512e480cba15331e06a14d9502128871df36c2c5355893ed1f0f1ef114bb96c25a3e94b4772f0752f91042901089c0293251f7c325bbce1a03f0732728523fc658e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f938a38838a3c92e7a407d13eab9cd7
SHA1fe32da8017a70df184e04241f227007c97f8b14d
SHA2569fe192244b70a8c7f09814aeeb306dbb8df382535fb0a00cdbcd00303cd2989c
SHA512dc7d5bc96a6f157d4c3c9a3eb942a379fad202bb4926f6cf3876c51f9b666152bda93beff5888b0ebd1502a87892e3a30b6f8f14476d3d645ba52158b3a72977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10aa70eb30c0de901ceb49b264428aa
SHA14fc88ade3a6f23e57e262c485e17f3746baba81a
SHA256106160c8e9867c928802f976e95f3aa00394786488a428bebbf578a3c69a1296
SHA5126fbb2f901061e63f5440e0ba5957b9e333abd9014812e2af60b5e7e97322a2a64a27de40cd4efa776cd1fdf6dde396b834acf4c9f14af210edbbab7c62ece505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025c71263fbc7a509d3076a62a9f5349
SHA1ef9ae13c11c25e4a8b13104fa011a652ccd920b8
SHA2565adc27455b5876e4165a264e0135f6b84d37a33d58467d59e5f9549e7ba6ce8d
SHA512162954cbeb26ea19117e50246ee5e9c99d4967e0e57c55b6dbac8cd9f313474e4462de51d54d92df138c48b7e98e75b7d1faaafdb8d13859a4c2e84e8129cb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429a026d5438d14e54f231a07ec291a3
SHA15f36955420204e396427961e90c6cb12fb707c09
SHA2568aed84e5ca65b5ebcb4c32c9c1bb5a77fc06a866bc4e1ee6aa48bce92e7dee93
SHA5124a446db9e4587ce136580f1482c02301d349123de2f72c5106992b4a4c08a8416c71b0094a959dabf970b485fec6db9f7bddabb09942bd756835b247b9e9a0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dbffd6f2481eeebd7378296d0a70fc3
SHA1b060d87144197d10bc623b398b7622e540cf30f6
SHA256f987c8893c6fec46b1a0851ed1a4c8c5674674b03c3b2c67590fa491d16c1a16
SHA5122a530e80e0ccdc052e97eeafcf9b0a80451331310d3a76daf3597018f809cb5f3bb74cba7b7a24f4d853238091e541ab47650be720d750316f7a91bb9f9b48ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b442d8db0c221178d500cbf729f7294
SHA11e306d80e285b2ad61d32e37425fec633eb7af63
SHA256924555a3faf57223bde7b0eb33ce1bfc10564286c818ace2e939e6df9ef52915
SHA512d5a4a9334401586e179185f57f6aca7d336239718583ffc9d287d26ec6989bac38ab812c259d951ed0da1a3ca7e19717724fb1ec5c43180a1dcf50f314a33aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5164b8814c0da674c4da6799314317339
SHA1f31b0d6b8a508edf7d198240c446c0def26014bb
SHA2560ed43feb90a6b30ad4afad47bc0fc5cf5976dfaf5ecab4ff636298827e2455e6
SHA51269870ede5414e4dd537809add5111e3ef5d27449e63498262beabfd0619c5692afd5f3788d87175f624e93a75d21c4bf7177978b6e9c75f20325766bd5183e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0af704e2903f1727fff5641908708a
SHA1cb190d438a07fc6b6d726dc46ab443c2ef06ed81
SHA256078f8f5f224a78c7ecae497ead37fcc908d30a02b9dc36e366fa0a4731de6587
SHA512c1ccb7ff8e234c00884c698609bdf0ead377eaadd98e6369a6ba7352908d00ec4009bd49c70e3c1eca03117aba287757c8b7a183a212a72454459f6c18b85428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54620e846e14f44e91cc7a9df5a781682
SHA1eafbd4ae9bd5f6c9ca10d3d7ff49da9ceba6466d
SHA256b35e9eeecefaa7116fa07c9104142546102cd3d245560240e5c33e978d0d12fe
SHA512584d5e0bf10d58404a47921077834d212d8085a5af5f29e541aa564e8d05ace15c28640cca660213898ded8f0ca44c11b89c09467bf00ac441ef4886ed3e8bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1783b2dd3e22ae7dd53034c473f804
SHA14da8b1bef292f732ed3087d0d13e2c9dc351eeee
SHA2564b0387e8abfd1d1794afcd865ed4c90f0f1eb4855e54acf513780788d11c475a
SHA51284ec1ede44548b2353776bab196d7001b195c94e7dc5bd29e92c68214e456e4deab525563672d05458d4f61a43beba5aac947f82a19ecad6371067e313652d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57429800cd51958c28b0168cb48421841
SHA14a6c307cafd3ff21f3afaf34ee8217cdf233626e
SHA256e8619b56c975a48f41335cef96e7e4b4f473ed03ece8e64bd264e428a6039421
SHA512358631c88fb72c9311b3036393a103a6c344d847cc48975ce044484a72150b3bbb5170a8683500703ac394a29ba449354db7234eefc935371b3d101e9bb6b404
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b