Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html
-
Size
52KB
-
MD5
bf9f3f83cfaba7d1d2305d0fcc8f8370
-
SHA1
e2251544d9c95c03b98a29a3d23f946fb5fe305a
-
SHA256
2206a21b90b426f59fa4988543ed13616c0a4ff07c7f690f5acd454e80075b40
-
SHA512
6dcdece57fcf431992b41821137c0093a5626078860c2bef265d6240c2cc60e3b8004877613ccc1258a25798de00c0ff6540006d6e60749988523bdc964b4e3c
-
SSDEEP
1536:Ab3zZ+Oe5n0ghNxgefN3MU39DMglNJfXwJ0:6IOe50geefR9Dt+J0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000002d8bf37c921dcce32ee7b615058d99d73f342cd8f3335675af0642727379c673000000000e8000000002000020000000484c55d48d2bd2348f92e334c4409932f472345e420376c849c38d57363ffb142000000028dbf2aec56e306812ed24c173cf0c6c884a412f9feb0f25c5f3d4fc63072c034000000068913e583f1e4ed9867fbeecf58072fd978cda49843e4ce65ab9a34cef735240bad7c5aaf7c4951ddd9021b5c20d98bb4243b32e75c9c1a3c7683eb48534ee12 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a5a3fb7af6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430702918" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{166393E1-626E-11EF-8FF0-DAEE53C76889} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000dba6317d180488110326b4c8596ceed3fd7ec4dfef5c689a429cd36ad0e7cf9e000000000e8000000002000020000000a454d45d4daba69d515fb2433a920114b1e447dfde2922c69ec36a523aad2e409000000088bfda41f5b7c0735c83220e20ac075f907344c57159daf2202f09cfa978fb3b5c85220ae7db7ee73e63900de1e328ecb44ee57f8b0f763f5d2a0607240934d4f0ca831bf9711c4fffca38ffe0dc11dd66130b8dc49586ad3d5ddd8700a0ad073e1eb5926a5e51ccf36686440225b2a8e04d52b30650bea66ad7cd042f59ab161b7b20160513e5f5643e3330a721d2ef4000000012a707b789a78658549dffe59cc76d60522c42cd6cf1cb782cb1bd4ed32f8dbc530fa67b48258d1953687ed5cebf8ce4618a63aa1c3fa4d472d709472532624c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1564 iexplore.exe 1564 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2376 1564 iexplore.exe 30 PID 1564 wrote to memory of 2376 1564 iexplore.exe 30 PID 1564 wrote to memory of 2376 1564 iexplore.exe 30 PID 1564 wrote to memory of 2376 1564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf9f3f83cfaba7d1d2305d0fcc8f8370_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5ac3722bd17e3b1c70f70acc50d207f20
SHA100191c7b29886a86e20523d6dc5191be399d88d6
SHA2560766bcf3c8e61f4fee6da7347da16c131c223ecc480281afd51b568017a0fc0c
SHA5121b85354807a7c5ceb4d0571cd17781ffb3a52963e613e1bbbef80db05ea0d984c6da1c8c2fd551f95545e51920c4e07f680923d01be54421d0738ed6e604df3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53b402da4cf11498a48d67babef9b3e70
SHA1b59b8460c344af2b183708259789e763e6882c2a
SHA25690c5b5569be16b74952b59f179f7f3256cc6c4c21ea4df8f680744adc083f812
SHA51215ba4b055cb8e5dc8ab7bee0de90c347d9e5f7412d14631a97faa000f0b11a01a498b57b00ef29703b5da802e81440128118e91c3f443e2663288545d1f0dab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593472f5af20a27cb449b9c4ee5cdf30f
SHA1436661b99ff2eb5e51ecca34e9785fd4d8268cb9
SHA256143a0e852579421120e6769f62dac2cbd4d21b273c2aebb698779ebb595a9fd0
SHA5127a5ef623826a8944e68330b9e8614a60f406cbb0a988c38d89d070f91e9cb832988ebdf7ef3d7ba0dd6fcf4a7ef6a01d51d54ce1a461fd3f3e3087ca0593f4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a4f310b9324a9ae09d734fcb036482f
SHA13b5629f42f71418ff4738ac4671bacfcee99df0a
SHA256de27a3e278e1fe23f2b587ae36bb870815ea2400d089667292439189768f8215
SHA5128213c51e8529e6c5180392088c9e73372fbd5e7112be22a8cfbded5d25653e5eca4d2a65f9ed3d6a896538b9eff9c6251840d30fe5ee66418ed66cd3a5e144fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fccda5dc6cac7f13a7703d99d68887c4
SHA13d44fe46bba4d570f540d7f3c26a4ef2515c8020
SHA2561187e78f2cd2bd603bd2385cb14f8a6c25cf3eb10615a657be197d78fa94ea00
SHA512542ee1a5b39edd1030c4073ad8f724762ebe22d05c1b9fd1657a0fede0335863d859a398cc458ad71a87356d0176a159dbdab733e5aff6a69635faf00ed87113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b5b49b4dc07128d9214ed954b494ad
SHA1f1a3fd0fc8cad1ca5f4a2f84410cfe519cf32729
SHA25621dc63a617cfe5bcb7d944e927a50de616c77c103621c660291b7a98070a944c
SHA5126a5c72373017d7174a7efcd77226e93579aed9cb2d8f959db6fa240e0dce10858febaddb9ca496eac2bcb7df8287ebc83c7d595963e2c0d944df0e55bcf2bf80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b1629b1f9e36110759b73ad8de5701
SHA1cc94f02f270ddd20b53fb15982da4f9b6aac54c2
SHA25694265b599801f8e47135a7312fb7edb6709ea6b686feda72d905687e672e3a0a
SHA5129e82f342c267c11e065019bca522bf984f63d878212e30d309be492207c13f465eb8defbaa25ef53ed08223182bb6be54cf4b07a69099fedcb71bc6dfec41e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0aceca6de5f3187d0b938c9b8e2a43
SHA1769a8cce8cb712d3884df2fa5d5018373d024eac
SHA2565aa931fb0aed95ef12072c15929d3819b895d48a46ca86523811fa3e9167f951
SHA512b670adb3cf245a484621a65d92ae6182c86117c8852762bac0c4be4bd340d737b45de9b80f722e45d5d641827497cb277d8bb904c27877516035b72dd2ef277f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041ca158b6ae62d3c232e0748703e94f
SHA1a81e401c8c795bac3e9771bd81921d24ef6c2cda
SHA256c4735593050855d7a97679fd96b4e1b29e2b5198d487155ca3d5a1b4afb135c6
SHA512ae8e6150cc479b2f29b86f61a8b1e2a7aa87e007efcb7634c3590ae2fbac5b0ca0f67fd7db40d93ca1dde0f6eabb7da6e2a2cfd7bbaff57126daad761706b2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57f46b598f2b82b32f55df5df0d6c16
SHA15e02870562b2d4008f9d39185a884a3597441603
SHA256546469dcaba8fbb2bba7bfde5fad841f8e46345655f819f3131e01f965362718
SHA512d55cd601d9dc7e46672673ad59b8ddc4569f5ca38b74fc72d87b1197d486e670d1e5a278613a54e7a7d7a1796cb4d9c71b8cf83e2c8e9c73a44f4d368ca19773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4889ff420bf86462187988d3d0d257d
SHA1761ded64d77d46f8034935d2c43464d493f1fe9c
SHA256baaaf971613762575c09363d13fa98cfa8b4c5e5fb076e6cf83bee5fff32d020
SHA512614977bc1a93e51fec2e7c7176c4ca04abab132d003fbc7cf6f73d26c810c8a496e0a28419c40cb95d16071d6f78f89aadb5e6c06ce9b1e06a05208b2004f676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52009771443066426a3d2d2ebb601f2eb
SHA159ee3973fb5ae5616bd91e4f2c23d0a7b4402771
SHA256274f232d4527a4b9db071cf8bd0017a97cfe3daad06cbb28ef568451228e72c0
SHA512b7b613e6275337ef73366bcc551becb401034d3db1b1d69a00c4d3df465cd3fbc429a08d93dac74b86d8b098ca36e8a741ca358be1a9cea0452715ce750a53a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5372f903ee681383505bcf97f9a7e82a9
SHA1a6d08c9841c247a470f266a9305891f2740870b1
SHA25636d25bdf2b8137865416fff4f348a78e2078da479bbf5803a964b9c271dc7d48
SHA5125367939b42e1259f190429fce1d90e4ea2448bdac7e9ccf06ea729dd7389fba6dde81a9501d34df7266002922e7a1861de5975f612e47c14c88252be104009e6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\jquery.scrollTo[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b