Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html
-
Size
37KB
-
MD5
b11ffe3142c5aaeea9b7c2e148e7fe9d
-
SHA1
27cb6519217add76a1296d9717636764f89ed0a7
-
SHA256
383d4a464ce798a525c14aece569253f5b2b3c9674a39a04e9575160fedbd426
-
SHA512
ab1499f67713a1a865df1e6dddd69a1f2f16fbd50b9f3287f2d3d584b365d2f1ca7f97cffeb4be8999ce3985692ace2665ebc137d4cc29a252f9f975a3f70af8
-
SSDEEP
384:SIFJ892cdmsCyp4AA5+DTTip2yeHip2SXr9+isU8c:StJvDT96Ngc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06936e551f3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000044fdca155391383a64814581afa653d0ded77b4c310f7208522bb74dece077e0000000000e8000000002000020000000dd197afd27db8d82a9e9b86dc50dbb71be4f74f7c1df6df21e240ef1d0cf29d220000000764d93c203d72ef757b3252d62712df3b014d791e23b206aa0bbb10fadc044c3400000000b828d5597924b2ce400f03f6c1ed43ea1d562e34aa25be0c89ef09a89a475a8a9fc1c12275b67a10193f1eaca9e5bc157c1500872ee159d08f45e6f56785f99 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FB3D2C1-5F45-11EF-ACB8-4605CC5911A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430355437" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2808 2696 iexplore.exe 30 PID 2696 wrote to memory of 2808 2696 iexplore.exe 30 PID 2696 wrote to memory of 2808 2696 iexplore.exe 30 PID 2696 wrote to memory of 2808 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cc2f8b1f14c090e4629793aff290c688
SHA1971325cc742526106e260acf3dcf7b8fdef21700
SHA256b9d9982959a9d2f1ca1bda0d0c3478358aa3a9967102317981c1fd1c5d8e9ac5
SHA5124717b1fcb0275d4937e7d3495c12280f16ef16b49acbf604d042157a77ad66ec963c295b8259e0bdf3d71dd0382496b8f652b331c7b3a120ae701a7c54a18dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5762f6761b0d9fd856b81b908250d3638
SHA1275d1262c964004d42bcabf8532d22bdeebd2e1d
SHA256c9500a509469619b5812c7d2ed11f6ac600c095e3324d27c1f123e9351fc4ed2
SHA512ed3be12984fc0264827be40b88412ead1d9d9b4a4c9196b1a51a5ad1f35e5b977173797b2784b3377185a54c9058d34976f9c739a9f23e880ff3064e50e40bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59812c7c9789967aec886d327f5144b0f
SHA15d0d58a63eb3a51b07294b1ab44c5e72559307cb
SHA2563922971e1833f33f9e04451f55389305f4488acbbe3b953fb096e4b506773339
SHA51216ea44998227945d47f90244bd55a9b28e42b2cef12e2dd6d8d35b46c2944b4d90d7441a50b98ee0cea82e39edf7fb7efece367a50451750746bfffdd5381b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5401b30fc9d11700ad1c30714903234a9
SHA1dd80cf52de0854a3116068fc8e061302ae7e056d
SHA256ddc4dcf00bda4dba78d4dde14bd4e9ba0401db4eb964b014dfbd842885c70a00
SHA51288d18c85a16d1b49df55662690d0cc336f71c7a5dbf1fe0d847f0b99e7a9083553518e2c9d5724974f72876782ee9846076b9b3a74947af385b6e785b010f7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f33441b4d5f989be6f0db2269109630
SHA1f5cbba3d684218e417bbf436cdd3759716c72688
SHA25638eba902d30e60dce3f466c515882377942b9bd92bcfebcff93eac7348717f09
SHA512fb30b8560c70c4e76a7a42b55dda428bedb46851ef149c4c7bdf133eda77319ed66a2a470b1599e3ebea871ad6ef013332da6fdc96a0bececa34725d074c9439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f10d6d1bc90e610fdb004285d832966a
SHA1c35a0f3661ba102fdee0c26cb60472328623c6f8
SHA2568ee51a415dc28f683808073b0053ae1138190eeb9c37984a92dfeb7c4f284f28
SHA51282f3599eda08fe76bdd58cdd4fd98fa28f9aff10ce7e8473d51303a6fc0cf67703e4aaa262b4fddab177c6c58ed86b6a5dec7dabd3c55ae465e0525955a7f894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5278d2309951ff1bbaf61d1b43cd642bd
SHA15d9a6b3772de9ff4910b103078b6da3937039f2a
SHA2564db37dcf06ebbe9fb6601df55c7c69ef1a75c8a896ddcea39f7ab5e698b5d334
SHA5129529524ca39d03e21149c4c5c33d9ef104e2652f2eca0e6416aac1c505a6056a1a9ce93038e1416b8cbd4749656450aa6293007352315e546e859d280e5eb93a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548579175ff4c8bbc67b5ecdec2895eeb
SHA103f35c9046031e73ef9eebe4fb5183c6aef046c1
SHA256e3959b08576377e1eea06a91f007141c3b87168534399b032dcbad745e10b441
SHA512228d6d40889a944debe48682b380c2541827f88f8eca3ee981e8ea9acd4d1c3727573c75394b939572f76d69464d0a367b4b2570974a90d0ec5b679838fae54a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5237c844f03e14d0d40b1ac0e106c15a8
SHA1694ab5c173d776824b00b603bdba139a0c08e43d
SHA25608322ab3d829f0689244f628413d4e3cee667a01dd0b4451c2ceec4de29ca906
SHA51226c2e9b391618bc199597bacfa24b2ab4737a4305ad6ffc09544ecc29f9b223df55f584ec7e67508fb3d171d9b2f6e97253c15dac59edf30d665b81277a05986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58e57a7e716b18f03257e0a30865955c3
SHA1c314c238ece02138a47eaf8eb724ea78f54ba47d
SHA256262b208f76ebbe7fdc3eb76dcda522839b16153a28b1f27804e8121f1fd21b82
SHA512a87909768fe344236c6b6cbb39d8a451e907b52350559f7a928bc7823ffbe450683d5751a5daa4d9eb8373944a15d4096c1f890dfcef501614cc26f1951d8af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5182f71ed0d9f76d343a0bd85a0dcd5e1
SHA12c33fa1ec9a15e874d0440c9923b73c96f8dcd13
SHA25618052a4688a03944a813c641b1576013f073505a0829c424f28eebada59f4bba
SHA512ad5f0999cdb5fedcb6b744440d316d72a630ef27dd2e2385892a382b41eca56154a54136d0f5f3819cb913a1a694e29db1e1a34b6975b3d3ebcfbea411df8181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b17327a3477b4d84367b6358d1acb6ab
SHA13d0e19268e59d506deabba5b854e613159e22223
SHA2562199875a204d981865b19da873d481770dea984d7cb9ba84203f4cfa4f2a221b
SHA5128768b37549962e07df917a70c7f71d7c2b50a6987481effe08e198a49e75f98893cf3da72a41956aeed683c1b928735d1e66a6190f9db771c60a307e1e6b5794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7fb2c2356e0e9b5fd221d46fcc3b620
SHA1792b319229454e39338a6768bf77b711206a06d0
SHA2563038c25775a3743f463653dc1b32e52c6b67ab17422511aa08998c5617591c4f
SHA512ce28f801761de740247cb7b53c84e5904b702dfce3b9d239d821fe10d4ec20646cb6d94d8d4d0d3d59f406166c0c9330fef3ea1e9027fefbda8e578ecb9382b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa0f0e71a0fdd8c4f3b4928573a9887b
SHA1634086632f76e0f55a83041ee301fb2467e5377f
SHA2561b7eae33a0c17bb4eb25ab603682ebc8d610eee435224f838faf5d7cf099737e
SHA51289512278743da957e50679b73844495096c67c57c62fe908738a6b105368173b5bdd89ad69641c9271b3b158ef90532bcdf3e39a998431d88eb367a31ee20539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fde1786693a54fa61459c4bcf484b8a0
SHA12fbc619264e62ecd8bd981ac0d9180867ce25359
SHA2562d9cc912e5639ad036cb2849b1b239920611b72537ddd7ec16ae6ec4052e85c1
SHA5129e1f1d9184d708b440bccda0c82b66400c6841cd55ce83579faf20c50e88c6e26814e7406df479277175f1ae31ceb59253bdd2a36c1b7619af45b254a6d46614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e6afcf21d498f174b3f7fd561949645
SHA158c6d27999ee412ebffdea6af3438d4dae0689a6
SHA2562625deef198de210d3044ee02027b6ed7ddcfeaac7a66e16658a743a20c96b25
SHA5122d586d2bfee413e9b063d227151f9d74aa320fd8bd83aa1cd9f9eaab983a98af5a80d0f06669acdc1d93b4c81bad460f5ed2aa3d3c4db6d2061896a2fe0925ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5788648950ac2525fab1324910d53b601
SHA195d6064260b7c1c33239f560e61cbfbc57c0303d
SHA256f04b8b28e02091d65c40b73e5921c57b0c624089b41014bcf1114b6dcbd9d4d0
SHA5129eca5c83bf9945a6c2e23ecfea93c19f29424f4c74079634dc1916d46203c877e550c0c289a565be553ac87fa1d256204932c22e0bb6bd50d11c00f8970833a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b86f32c5957e016b58b820ed0f9a44df
SHA10845e56c00ad35fcfad6eec441cc509cb1b05a53
SHA256b7dd4486ef408ac47b8abad74eac772be1a9f1ee2a1f1fdbb92816d9688e4c98
SHA512b40874c91a2abd381520da88b37fad8e448882abffee1408e73813d07cb098f578d394fd4f670645f1c59e2e7e6afb10e143ed9c8907a6b4d580d5be5906323b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59eeca60f2e20ec42a3082f4393cdcda6
SHA1b89661b2e5b50178b06bf681ba3456ec8e7d7a93
SHA256ff89aab417c4fe9df1aa7aaa9fc4def6a7eee87c6404b1957e833a66c80da2bb
SHA512173b15578776e0e3b095ae817828bc929f26c463a5c8568548030e68f97a4ad864801929cb357e1b7b9ccccc34dc288beafe596953a1c024c632b767820f1889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa6cc2853c9316c374b50402587af7eb
SHA19d12b8fe01130520f3c53e05fe3b10c3a495743d
SHA2567eaf33842e00fcf9f58168f6413dd1f2879d1e1d5c668f3ebfafedd3b84ac739
SHA5125085b5430a9c294118088aae877168076fea62e00ceb4928ef05d87439ebe03e35ec0461cb928eed07b4dd863644d02061695acab2c09c281b3fed0419ae16ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b