Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
bc7cdbaf5d4e179d9fd0165c067a6366_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc7cdbaf5d4e179d9fd0165c067a6366_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc7cdbaf5d4e179d9fd0165c067a6366_JaffaCakes118.html
-
Size
53KB
-
MD5
bc7cdbaf5d4e179d9fd0165c067a6366
-
SHA1
4d3058e7697052e5af00c0b1dc45d55208a6489b
-
SHA256
1b34f46846d9ede7ded20afe477ad524d69a8b064ad833557286168981d56d31
-
SHA512
cd2ca67d55253ff548c08a8fd2a873dfc6027d4722b748c5ccda768e2a983d3d9750360b073a48ad3aafa8a4301ea137b635964f1aa4d738f1ce8d2ca7dc055c
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYk63Nj+q5VyvR0w2AzTICbbvoh/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyU9runlYk63Nj+q8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{47A45BD1-616D-11EF-913A-D61F2295B977} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000a9dabfd40f7d030e41bed2ee489363bf033e21512c1480c52b10b305f122c545000000000e8000000002000020000000139a23ae50cedbfb61e0865f6cdceaf4d27a66728cfcda086acf27ce8a0c469f200000001243291d076c5b37a7e77f0e79eff9e94351bc2551f0b7eb487c71daa825dabb40000000cacfc8d368f3b5aca495b6592f4ad901409c8341ba024843b69768addc59bb80895366cd1cbc7650fab101a4422a8c0a4243a310b4256031199571dad91e5f2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6065801d7af5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430592614" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2948 2812 iexplore.exe 30 PID 2812 wrote to memory of 2948 2812 iexplore.exe 30 PID 2812 wrote to memory of 2948 2812 iexplore.exe 30 PID 2812 wrote to memory of 2948 2812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc7cdbaf5d4e179d9fd0165c067a6366_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec727804f357febeea5f711c43e8258c
SHA16a9f6c75c5772711b4a61dbf58430cf432f5c7fa
SHA2567826fe89fffdc7519c4eb4a138197e95ca1477dca320a44390b4408fec11bc9e
SHA51224d6fa7442ff64d2aad157d586b914ccecda5ff042dbba94c762d888edeb55027ed8ee89ac51fdff75c7ba699fbd86728061baebd0cf50b2d29035ea0325b426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb2f969fafe1c66977e9fd76827b9e1
SHA147a6b4396057f6ef0f2d10213ee2cdb584ec17b7
SHA25616bb554ebc6c4dea407222339ff936d1ff664b3ef210ed7b6c73d6ba3a51b4c4
SHA512cdbeaf7317de38e05360fc4e88dc413be735200788ef3d776185d264dabd66a71fa5d0111cd3df66dfcd6c41eb36a212bb939bae75148c10542060c19ce10fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68e623176a9596ae0370b215f367f3a
SHA1aed21b0f8aeffa9a105221c970577bf25918beb9
SHA256c36e87113f8d52a80b4b554044fa223d59994f01da6e22e84ce5869c253f24ef
SHA512b8ac84d5736ec1223cbc980bb135bd1729adf17b0702495224cffa1fe6afc672d66d50e56d1e7056e426348c650db5bfa76c8597ce87ef37ea2665eb69e5178b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a67418c39ee8cd8af514244b8b0d45
SHA13617462bb98535d5bc31601f0b54f15dd303f33e
SHA25655f9690e0f40c46eebdde3263529f391daa57d6e2fd5b25e64ec584526d946ed
SHA512b41fc5a0652027934a919f0a3e4df3de8708de306b88b778e0407cd327928af5ee8ac576ae0ecf17986864c9f84f55300f3bb324c691f4c38d3982bc799feedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b372c8b13bdc5d5be1572749a23524
SHA17238a3256cbd09dc435dc3202f4ebe95f6be7702
SHA25607654df1cbd93ef5807d460659397b9a9672c971d18eb9331ac7e62e35324682
SHA5129ca1c73f19c511ce1c68d2211e12bcc75d4d3f2992448d9f07b5b096e844c59e9f26ea6fb9870e013564887c22ab08da8609a9deb9ae817842772b86f5b94889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b836a47d55e0dda29d08dfee844d2f70
SHA1c2e08accbbb14dbd32c420aacd7f186ea4e5ed2c
SHA256efc64d573cb6136fb49a4ada9b02cf52f8fa8aabd815a05c2409a52dc514ef57
SHA512fbdc2287b61618e89243ec9bdcd63fe231eab6ec2c7315c74dacbe372b023e8716602b1b0fafbc7ce4ff4c6c5b434087dda958e39781bd0ade8f72454da86bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee03eba8b3426f1753f3dfa8e3c47a8a
SHA145b12ce3ef765c48950052b1a357139cb78440dc
SHA256231e66059751f6b39352dc1d71d2d411b26cdb6466f13ac05099a2c98a8ed943
SHA5129ba6f543673e3acd2e44abe5ed409eaee9475e7531fa610db1f6145006a81fe0274b053c82385408982465e83fc3d6abb4894e98c7646f6175376bcccd5d7539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d797ccd2f9ed1b86f01d3be25872512b
SHA1412d5304c472af92e62525404d6bff9f85057e6c
SHA256cf47aea2760a1db532be0f837b28f25a24850c18be33e7750962e4b55a3cda6f
SHA51208c3e54574cd43d3f325056df6de8fc3582be64de4ee75449507335d70588f64a136c3224511d624dc154ebfd986d1b2422ff48bc9701a72f6d95336b973e9ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50585ae5a97a165d050ace9e652eb6479
SHA1edfc4d2540f9a4d0d291d9aadeffcc9b5b1215f7
SHA2562054a78abd57d312f112604b0a012686863a5cefc60fab5b203c5c10d7bde7c6
SHA5126c8cb13a4a33d5a6275beff75cc916b4c94f267f625817ae04683c27a53bb729eaeb2a8c5c50b748972bce49bc18e9246acc84f3191c627f3ba58c8d4cd91ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517badbc9d626816b6ae306134b043e50
SHA198c7e2bacea440cf6b530c5fa96d881a59b257a0
SHA2562fc1a4a96e075803060ee4a4e9ccc29a94b7736e752ac3dd99ea4b65305f0559
SHA5123763abd4a66252d9334cf0e2ac8cdfdfe6a1ce1b6af2abf5f68655ebbaf91be8fd4a6ef008bae228aae68bf00a9631ac752707874133766e38f3acf7698dbef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4359dd08e807bd099b9726622e5ae46
SHA1254dfac23d6a64b9a56e0693f02465063e90b2a2
SHA256ab90b0119a0211d2e1f7db3f3d151da258ea380ed05f331b34f4f326c4d382b8
SHA51211b6344591fa6c85f7b6258cbc916352a9231743ed2b1166185514484050e7a22f489616b5b8e6b47db0e3f4cbead3a78d9f31a3988030850bd47402f835be43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b1764f5301ae936df703d2bf3f2c68
SHA1dfb2197841c58bccfa9c1158da17c71503f53ce0
SHA256b18c911a27e40204d2e43d13f3fe06006c00af5016e20e2f48cbc5aa6f131de5
SHA51233e6931973c233b7c4eb82838693a4c451c298f89e4e5f338c8af0317472ca335a8d7cceca7fa40ca1e6203b66be1dc2745ca0dd8cc004511dc3bba70b5fa4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451d3ae0ea60749bf34fc1416381f7fa
SHA1ab4a7cafb25f22de5aa5a8c5f5203b0774e4758c
SHA25639ad02910aaf5179cf022977d6dd3a8a436580340635d57df1ef9ab05f0d3173
SHA512c9ffd180e2bc58669c66a1400f4250456f99f593d10ad294cbc38b651b5867c5e099d2159e999f69f04f09adfe426b94c2cecfc5160fd8742c9f7c4fe1ce3f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea1cb04aeee286e46d3b3c73e1685da
SHA1a84fa6eecb2d4f85e3b3ed0fa826238fcb633991
SHA256deae2525b09f2e98f8f25e9ad9ea2d4805254dac7fb8841778ebe4dc6787232b
SHA5124d290d378f5528ca552332f21224bfdc88bdee33a7f6885cdba9141d9c1990e41acfa2e141f450a8013ae894f49312b83c9784a48c0c8c7bcbe0a9f20c956d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61d3f5ab48b5c3959451237df000f74
SHA18027790bac6e187d03d7570f7e4471836f0c381c
SHA256d92dbe6e5e19353ec7537e01e4e82b2fa06e95009beaeffcc0bfd1f52c411fb9
SHA512bb37c11e39d0b5d43cf00e689d64c7d67fba570884020ce3e851dbee317ca8b5164cf9f6bfed7d49d9a47bf0ff6e7cb979a6873cb5083f81e5168aa3f809f0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd8599141c73f30cde5b96f92ced4ac
SHA1cf87f6f11d9ec93d8903ba4ec9479e8e54e821ad
SHA256a4ce61f95bc11d33c6708bfc86dd17bf83bf770ba8ad3253b029bf02f749620a
SHA512a4d0c6355d80bf5bb470860ccf98fa45dd716a56e29b298acf524ada0d9d131dc22fa6ad9aac41ff8dd1dade03a0dad50cd6ea8a5a31492afee4631c02083780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed9d78130b20660af13040ed77a983e
SHA15e3498f4c06e04e93c04fe64dcd99e1eb4bf1c08
SHA256bf75f9dba273723be80964faea3244295bb567b845e715d0a399f50979c75dfd
SHA5123151a920b5b5d09bdd0dc64883bdc48486521eefc96ce137eb69c36a0b8ef38ee58c203fbd9e2f517bd8f24fbbb2cae82ef0696ff9a128aed4d27afeb156b71b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be9a06e873cb6e9fb5f2545010c1759
SHA1ce1f5681ed86e97e568a1da7566d32f5bab6b033
SHA256de2f4012432b1f55b0053db9cad3491bf1b4363fcd6e3607f6ad4147797074b3
SHA5125253b2266510943912ac6daefc84154a6477e198cd3ec419ba7fc3c255d5ffaa1635aea253ae1fd01cea17d89aaa63d63cbfa5495c3d8e2899949fd0a8180b0f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b