Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html
-
Size
6KB
-
MD5
ba2593d77ed98eb58cdd03c6c8c24613
-
SHA1
44238bdd62bb018b43aad66ef46e54cfa4c4ce1d
-
SHA256
eb1ad5538f180db8d9e522cd8521e37ca94afe4812f1f6404ecabaef88bb2c9b
-
SHA512
0d63c441e258dd1f579a56d3a057f5e200f5a076ca3f23d86d86c54482b9f69e0ab62bfc52fa971efef17f1976525c27f7055ecdf8921247401634bb4812c254
-
SSDEEP
96:uzVs+ux7vdLLY1k9o84d12ef7CSTUOZcEZ7ru7f:csz7vdAYS/xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000098f5404712c059390db4c93246229d6ccf7b1a693b187f84d89bc5a1ef41db87000000000e8000000002000020000000cd61ebb7b037e8e257c7a8a04871ec6be8e65574e42207bcae6f44609015a6b42000000038951821cf272c0ff4fa35f8c5144dc7b61686511fbcb845439bdb9fb9388d6c40000000925f690aa50b974a1b8860780410186103ff3b338cd387fa34fecf17b22cd567277cf5aac047b5b3ec4cd31e84708d2d6ab51fd4ef49fdf666d83c30357c60e9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d005c3110bf5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B3864F1-60FE-11EF-8920-7AF2B84EB3D8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430544919" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2384 3028 iexplore.exe 30 PID 3028 wrote to memory of 2384 3028 iexplore.exe 30 PID 3028 wrote to memory of 2384 3028 iexplore.exe 30 PID 3028 wrote to memory of 2384 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba2593d77ed98eb58cdd03c6c8c24613_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6bcbccf6daaced8fbe7f24e2f478e30
SHA11e329f2825cab2940119d50ffb99e6c84e9ea55d
SHA256c882b5dba5922c1d9cfb6dd25661eb6930a33f373e38d72374c2f76eb994fb08
SHA512e4d26c27a8fa4fbe106124bdbfdc56d8bbb2290aaaf18962542f7c178fd6ec1e11d8f579695e86241f7cefa43b8c99b014f5739f779569e1d84b781277f330c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788fbd3b05939b6d79ad0bfb92874e77
SHA10feff6e98e3d056782150e9d437004c9c332198e
SHA256ce053353da888d01897aec4ab7cbdc79f00c9a5841989b88d310ee6c77a67b72
SHA51200d0d63fcee272beba9199b0d4c9891ae214e965f0b7c550469444239adb018569dc045ab4dede7139445f7ccd560b0b09f435a02c403f056f2e64fff51f20b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8a5adca29c79a8b19a3a115702cec7
SHA1d54ce9c0441f0a3b5c33214b0b65933f7b4d5a7f
SHA2565cd673b3ab40094cfb48f4479a1f59e7fa2339555d1995cc3f39f068fd70bd9a
SHA512c50acc1b7000a1421c6d578dcdee660362b308aa0b629001e79e346d3243cace65079e920e2a6780c537dea4cb1d07909f70ef6ee9fd51055a10e71c866ce185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcb18c76c7364e074cc121f652e7f2f
SHA151144beaa3ccdbad70870bd07eb0750924730d03
SHA256f9681a8bfeaa508be89771741002f799286fdddab6e2869ca05235766d42cfd8
SHA512dceaa2a9925cb576be5471b21f2e7bb8d6cf148ac7b2d3a92fe1fe2348883ba8e21156e3310380f4d69e8f1a8dced0ef9e635bb645c60de39af0da232c44bd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f46df306970a29b52a560088d206dd
SHA13e63e73841451f6c858a219e8ef5ee4c6e2fde0d
SHA256e320a5d073b6653f865a782170ca43e96594e95a2f64b29b10e79d23dbad9982
SHA5120a88af513fa09ddcd73a24f759e95277fa0c3e193f771ceeb53ec60e185faf7bfdf09badca2159d410e97e8432b78624dd4d127181591a1165c3f2e915c21855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ccc7fd1071dd6f305f14fe72ed10a0
SHA15600f8991f4994f1d6153f6dd4f4a8aef9077341
SHA25631b11f3598d3e24a2f0cae622abcb4b0dd422756b983e719fc160354edd0885b
SHA512b71baf818b1b1c8492b7c0e69c648dde4ece9db4ad8c9a62415a6144c216531d131fcde30cde90d708e384b6ad1f06130a139ecbce44256e85c5bc3e14e03da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597db66992d69fe690cb0bde2540e8ca
SHA13bedd7cafaef850ed84722310b804677738cd625
SHA25654508c41cea73d90c829f532592d79babeed00fe013d3789c84e870190197da9
SHA512434fc71b83a86c4aa7b7b9f20d8b3e25947709d0fa7e6f39fc646e2d01a460e6f7359e806fdd6b0cfe3bad32583e75da850bc2af1c2793af29a3219fd1647a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe90fc34fe1160197e2a7946c13fe13
SHA138e9b4714fae0b1f00a465c2f811928f4e57698e
SHA2563a85c340abbc58c5a943af87894b1470a23c871041b44be6ecfc0e9f3d8475e9
SHA5120cd704800dc286535a6d09ba79661c4eac02781dacc8856817812c30f6aaf6cde9b84c6a445ab8e03848263c0546e94ea1dde0c377b0596479284b29b0d26c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcec52724904bd632164ca09b69fa884
SHA1bcf16991d9ff4e216f3a0e53909fe3f3ec410907
SHA2568ab091384e2194658084e4ed7f10a998e2482d5526c484430b2dab614e4c7324
SHA5129424ff5ccc22e249731e68daa4a635a72a448dee3e8b27ad1e4f27ec01d12372ff45d4b264c5c9a0989f6774690554e20f94e79b631b0004b5008d2b2a456a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510df9f991a371922367c10463a6cbe06
SHA10adcb6a20918c2cde2450a1c295666195ab39158
SHA2568d5de1dc90cbfdc1a78af7411da871e9163f7cd682c46a336b7af42eebd49253
SHA51212bc767feb20f5f46190e7e8a709af7992b7169bd5b0e69b0e4c9f604d63d26b4e2ffad87ad64e8a3599f3eacff2c323239059c60985f287937ef503157c3717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50322543120a29af702448db9d376ce81
SHA18b2931d72b4d64e7836d7107da310f9fb52ef220
SHA256543afa709329abb5737dcda23164edf5d84a8cfc36b2266a2cbdfab671308ab0
SHA512ce71cc95c789cffdc7b497be46cc976bef719769f2772d01871e93bf1be229914fb3b56530ff5564cd6b22c8953544d039c77884063f78bb83f6407f4ac740d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f483e3c1d88c5fe0cff89436f643c43
SHA10ad0f8c7b155eed673c6cdc4f72523f8916f2bc2
SHA256e648551dab070bb7244e78413300aba1c58a0c9efa2cce45482739072dc61e9c
SHA512b695845e1d855bef539631b41c54cd69b4311ff38c4ae384ac3d86d09d4b2c20318dff524ca25d9902c1328595205b1b756361299e0b6ea19f1a2c76cdc05774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82d7a715e80d5c38ff3ad0d8cc916d0
SHA1caed1f53fbecdd2020297ee1aa25831838af88fa
SHA256f68ce2c6951328238e22db49f20191bbf969f060cda9cdf1f2f08bc6c2beaa20
SHA5128ceb6797a5bc3a61cd295dd893753c05d88d9cbe20deb586d36d4213accc4371fbbc23f0491db37cf4ccdd32cd86e4b094e61c1e447372239de431235b995459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf833d2365df2d1807c73c3e78eefbb2
SHA16d07b695007b594783fa8451dd255512c27b5e2d
SHA25662d0d386178ea72f0f2a826e550e6eef2b981a169f26b409b7544cab98b5c953
SHA512a22e344f3ed104b45e54f4aaf33dfba6438e42c085ec97b8bda586a4859f35966956eb36b20f7ea6b5d6ceca0bbe4f580a9a2ffd2c537ef20d41110df175c718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0291b09633ee27382649807901d359
SHA1ccb71ccd388dd3332bad8ae3012588721d338788
SHA25604cc0734899d7fe436a47a9a09eba6be2d37085dfbdc21ab5eb6abaf471f574d
SHA512022eb0dbc717bdafea7606157d3a4db32776dcaa9b02bc6beaacfd51101a9846ebe911fd0b8f6cd00a6ddcfd297cf7d07b7eb4a0baba187c776e92e059b6b296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098beba1f289b92e72fbbddd5c130382
SHA1919acc6122408b45fc1fb93a5a6e7969959c0e47
SHA256fd3147c2003a232705e4b5435ef433a936362cec51240189def2403f363b40b4
SHA512d7b21c9d5ffb566fa814861085c0c4b58238c65fb9f95d73f73f204492e34c9b35a7bef90ff2a3d7ee53ab602e9d44cd8b11a58d937424bcaac74920a510b1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c7319af068d14b40182a50e74660ac
SHA1f26d2de0ad375b70994d7b1e5d6b3fed27d3e1f7
SHA256e504ad474eced98f5e18d1ae456773d3ef0fb2929c4e6eadc2b21b48c2179092
SHA5126aed2df6a3bdfcd72f188b1efd9dc0fda97672bc23d0b19dff1106e3af2a1fe2be9a4dbfc186b16091be2443c9ccf42cbec6b11cebe28cbaab2de73ef452b837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb495c5dd8cf1fb52022dc54a3a1b54
SHA11398fb07fd9fed8a4fec9ea796c1a412a32211c6
SHA25669fafc92ce7435775ccb1d99a42ace7f7e45d9aa9951f97ea3fc53a9543aca4a
SHA5120c58ae57ac713abf7116fcfb7d67cc1151bb11e088c523e11bc381d8efc3e5089ec6015ddcbd42109a453c09a865b832a523523993f9416c63d01e2fa4ad8983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715c8fa6a6f6e53d6f683453a6d9712a
SHA1e35ec18c651eb81eab71615269f2a8048827608a
SHA256309f86adb53cefe24e06f67927ad2cff84479b34f6a66bee3aeade4da5108179
SHA512a4242bc6c183a9aee682baa4e63a303997909f0cab96c49fce577873cb8876d824897f93b577721a269b46aff22338ccc7ecca6cb2417021878c607231ade5ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b