Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
c045c780535bedffcffaf59241c2fb67_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c045c780535bedffcffaf59241c2fb67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c045c780535bedffcffaf59241c2fb67_JaffaCakes118.html
-
Size
70KB
-
MD5
c045c780535bedffcffaf59241c2fb67
-
SHA1
43ed4afb6fc77091804e8fbeb928cd4a7cffabf2
-
SHA256
eb35c3a1c2a5094fc1afae1438728bb077b4500717ca00e545db4295f01c4829
-
SHA512
739c54f024ea3c532f6d5706d79daef15ad0081bbcfdb36f3f3b2a9d0a52f63c3870eba97c860edc44e25415a645e0b3a3b109252243bad31d8d2e1fd7f16627
-
SSDEEP
768:JiHgcMWR3sI2PDDnd0g6kT1AbBoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVGQ:J/jabWTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000050fac1c1254cf690e49c5d57a5560c75b2229f38c487c5d958dc51cf03975abf000000000e80000000020000200000003daa64af93981b9825a85a865aa1d076d70658cfd0d2398808be2898c3d4d30f2000000099306e88689502ce7a60be2e2bf46770d4398f11d58dababa254878be0d1ba2d400000004997767651aa149b0bac365ef35e3176d05cd8db5b73b3793e8c2ae55a287aaebbdb1906cac6f9336d4eb3640c213ecaf45a93189e678a5f75f808650a0f04b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8071fe0fc3f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430733897" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B6C1661-62B6-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 808 iexplore.exe 808 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2428 808 iexplore.exe 30 PID 808 wrote to memory of 2428 808 iexplore.exe 30 PID 808 wrote to memory of 2428 808 iexplore.exe 30 PID 808 wrote to memory of 2428 808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c045c780535bedffcffaf59241c2fb67_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c558d0de9f98548bbebd11168b0e98da
SHA162565af1652a3fd363b461bebacbc21c0f4a2cc2
SHA256369cb31414697e6aff715123edf3c563a6e7fd5dd2f9cf7374bed055e6465451
SHA512e845152dd3dbf4d1a1fc47a332c753dd439f6bf2448583bf373e36e130e9d30e74e29426c3792d24df994098509c5e47d7c67ed4981b2205f78b7bf4b63fb57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cd195dc0918a5d0b2dcb1178f3c4d40
SHA15526d979d227d316fb07145ea6a59c361bb3b876
SHA2569717288b46e508fe5396c8c9f8517d830f72f10c0f5ab2be75b30ceffaed408c
SHA5127febfae3ac95506a5f381ffd71e0f6060605a8584fef275105631e141e5eb73aed9eae24274eb645e79359b7e152c3d67f3076330e2c0f8972ff086ce07fc948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec26f86734d8f951f51a4f9b8902fcd1
SHA1f71075ceaccd979b0d743a9bbedb8781f39e94a1
SHA25658055415f2899ff986572d0e4db7a777a187cceec0a84e617af71a00021948de
SHA51268ad7d014e50add4b56913a9e8fa6606e0cdac512396595672a388c53b6c20154ff2873eedd0cc1aac2bdc17f7806129111997af06383af63e2d626628459334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5876058d33907c3e5ce530ac1dfbd50d4
SHA1d38c42bb35d7fe2fc66c6dcb711bd54b8ac38b40
SHA256ed58be1c5581080c2f162e73fa477afc1dbbd96dfd6bdbe0c40ab0d8bed49979
SHA5125af52e26c61421997bdae508bfb5e355de27f868372b814caa3572a863e07ddf1eba3972d2f5f808ec7e00a15dd35cc99753b901531aa50e272f3978b9564c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18df3a95252b6bd63e1a4a8c93869b1
SHA1d037f0b14a59a0734f4dc012629b2c206b90a2f4
SHA25642f9a8c265112d27c32d5561d5b13398ccf45e91658f1cc586da6c53a1b2c669
SHA512bd2c9a7e7715b010a694938ea59142c4f5ffd4a289a52ffe4d252f78c4fa3f1e9d945379154640d3bda57beed0d85c1b07dd7c0ac1e1699b796941739d7b6541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58753abd25ed59112688dbb1bb1f8f68b
SHA1813dcf6920a4c0ce156c25595399a192ea8e2136
SHA256a8a820e7d2930521c716441223cece63a36e425f0787fcefa15334ef92a83d56
SHA5125b16542be2e6ace73ea801ce9280180502d808cc0838748472487d4de061e028115706090ecefb85527d8dde7c8af628322a6c82fea796a2527341f0cc2ab72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571434b97609ea89aa07ed822f274b385
SHA113a86f1605aa6688c57c9ba2d120688328102cc6
SHA256bdd45a9d74ac629d7f7fa2983069b7d70d762338dbe3f2b898282eaa75c40046
SHA512727de7f20e0d144a6c95e8ba687893d4d4a431b3a4f4aea5ce3afd1f48e9d15787eef6354a7f2f199b7f8b90a440b03462219a735872b81fbadaffe8dd640004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea80a1790333c0c6addaf5eb62432f1e
SHA18416daaf1652e0347c9f8a9c8d848fa2d6d4b9a2
SHA256111cf99ee0b1e21de0a49f6f85bb682dacb816c17f34487c68ef022fa9018f45
SHA5124af4c7a665905bdd7ec89aa80815753ac427245af6a6ef1e9792db6f1bff0a52ba5457b705436cb25c3eeafa23496ddd3dd1e47e77a147144a84c24af43012a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b157670f6d2c267a38b658aeeb408207
SHA17a6a4d9c9696da61b0ff24ab437703bd66ec3450
SHA25668d3cf94a6299f18295ea4c52b36db0a759cd4833de83225f429f2d7f1f6d2b2
SHA512d445b91550f2f39602e14cd860b013677351a03de86c3b62db37834c7a1effbd845b6fbc82eba194f561d6f3c13717778d70f71c125ea6d322b3f743d2a84a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862255ebe86c7ab5bcb97c0f30d9c03e
SHA1677f49f537d99cecb765df72a3d9030e1547982c
SHA25649b3ceb1499c0635bcbeb882e305bc69d85c4d3f028b213f970f980f336b05d9
SHA51263f6910995034cb5f9a7b49000cd99a730df9b1b1941e22516cfc83baad59a6659d3ad0b375f54ea4e4ac145556744f6261e86349e5ba247b83acba40d58399e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027cd92b95fcc43487d89a8302c9bc21
SHA142a3fb7543375b8f67fa7ed22e4ee655f7753985
SHA2568b6ee1d063db74ca5da4e38e3e1080ce70f9fe20977fdfd1623f463c48dd3d97
SHA5129fa44dc18da520bd80fe0466cbdcd2a20cc741e6578bd628501e98e6486cba448f578d5d4e0d2a4735eab5fe74b41e4fba1e6ac565b4a3a97c31815bb997fd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bae40577ddf050e8b3d572969b817fc
SHA163442d701e8372a0464840bc79d402208701980f
SHA256704882ca91c263d2eb094ef5fcc1607a139879d7144d5fb6c25ffcc59c0f9406
SHA5121dd2a88d987af5728877baf92a8969ceeacebcb99dc029798844f1ed8da919ca2c062d4f2721095b598fd59b25b641e864c2dd3d4c79a4b9b65bfa46320daba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda4af794ec8a0cb659bc7052aa44a1f
SHA18be8aaf9ba0010fadc8ed936330ac04f68f46a78
SHA256a21f21c57c440938f32c0c422bd21a41e910ac1ce059ca2b2a661566242e6b6f
SHA5124547da1420ff73b9b9f2da819a3ac3ee7e968fa6476447980355f760319240e3b3bf91600b2b43cc16e6fa00be45574d3199ae6c290649513b13033c824ed94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9343436736de07fac1c7af96da5eaf
SHA191e282f4a597397ee0de43b641a033b4de9c343e
SHA256a5e4804134f7e6a4b046c34f7abeaf5fa06da7f340783f937f4a96a0c9361b3b
SHA512050d4f2bb789b368bc094b439b3d12926ec57cf5c69798dc88f43db526876e860e26391d134b332e2d9e3b598f285ca06d29d2caa13b7f6a65e290b85de53c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4d7e82299b04004e2f3a4dae4dc4ca
SHA134c34b0694cd10af5a596df3c16513e3a80f7cf4
SHA2569f70b91f64ca5772b077d3aa0d4f8edc69d1fde9a2db3dbd978ded624287e593
SHA51228cf649beed247300b2f9f1fe2fa24ba49008153f6130f5c4e33db0cddef14498cdc8cd6e5c5e53271a533db606676bb96d8fc65f151bc72a4c32148321eae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f3a6b40c5066562949371a64b585ec
SHA1eeacc3a5ba469c9fc04fca121cecab50b16fc359
SHA256ec6ed3437d6de123264b9804ede0f5a5ada145b89b83284b53f0db4575b2b3a2
SHA5125cd11204b0519636c3cb87c97ba46db8e5a1ef94920839419275ed48526e12919b8385c524874102627b6c751b2bdedc2a6b203e46c46e4a5a9a548868530cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a05e59eadbbdbeaa314e049e898a481
SHA18cb427326da15c94d13b2a0b86ff991424ed73b6
SHA25672479aa59362a1545f81560f6f6ddb783a41acb4fa87d9a98bfe4602c845992f
SHA512c8ecb2716221cd49ee57d73d5a7a9aeddc2f542593cbd4730f2f13549c065df75e8c7e8d834fa02a6a3fffe15ffd4dee2c4a3e360ce3615618ef2ce62f59b0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81955174a49f8a7513bff1704c075b5
SHA146b91d3e3870b5b493b6b0405eba387d853b790a
SHA256be27505293f7294735c1eb8148671fa4f43f2a7e47ac3c262fba0a00fc817cc6
SHA5121eccabc908c6f3d987bfa77b65c3e50b9650974689b4c6e8411610bd07f23e6e4fd2c12825f9717c6271cf5a604cea36402b711f50500189e1e986fc1edeeb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f5f6fb945b5a78471013eaeaa71f83
SHA116959be39d664ac229a27c9eaed7f11aac73059d
SHA256a08fc516fe1a0206bcc493731afd427f991cf0405d10c2512b67e22a1b2381e1
SHA512846b2e1ab265286a7fc58ff8f6bda9914580902190dc92c9d65b5d6f630335c713ee9ec036f54830456f70c05460b44596e95afcafdf58a717fd0a6bde37bf54
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b