Analysis
-
max time kernel
70s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
c09163840d9ddcb20dbaf27c3391f3d6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c09163840d9ddcb20dbaf27c3391f3d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c09163840d9ddcb20dbaf27c3391f3d6_JaffaCakes118.html
-
Size
358KB
-
MD5
c09163840d9ddcb20dbaf27c3391f3d6
-
SHA1
04499c51c27821a2fb96e45261feba4c2a573a81
-
SHA256
475dde0a984d0ff8ae549fb6352c542f2daaafdff726c1fc77a0539ab9562193
-
SHA512
3c9bd78e2d2041d8a4e667646d8488b408cd2eb0185b309ecbf8d618fc2adc87ba0f5ee71bc3fa13c3ecb22f48e019ecfc3e90d4be65d6684995774b15c8edd3
-
SSDEEP
3072:VBwA72tcUvqEvDYCXnPuZwle6lAyQy5cBvmZBVSf3sa:YA72tcUv5P3lhlAyQy6j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a8471bdcf6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{455AD621-62CF-11EF-9730-E6B33176B75A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430744654" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c79371c45130ac367309d699dfb36942c74cc46ee283c1d07436a01a68fdde9f000000000e800000000200002000000022ec8eff82ffdb74e076dc3e3214048371c77ace149b24f0c9ef6e32c0c30f1220000000b7a188f81fa9d88b03cc9caf3e71fcc85b59801709824a9968d7dedba4b7934c40000000ca36d9990c93727c90c43dee1e80a75f23c6cbf516d217d7592c29aab5a4d59a34a0b274b2be310f58a09296e9bbe8acad4a1bcbc906593d3f0c87d1cfb97afc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2696 1720 iexplore.exe 30 PID 1720 wrote to memory of 2696 1720 iexplore.exe 30 PID 1720 wrote to memory of 2696 1720 iexplore.exe 30 PID 1720 wrote to memory of 2696 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c09163840d9ddcb20dbaf27c3391f3d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5db147188f26796a8b15db8a8532f56cf
SHA1baa237677fb02b866bdd766b97c1ff087ecae44f
SHA2564304cba98b6907d9c42b56829af8b2d1c6cde8672dd457a0ff835b82ff4888df
SHA5120a6a50ef460fc66f39486ec5e668a079710bd1d846240cc2f407dd5bc3d1a112bd4c4fb11439687d2e219b95374fbdcf55529017541058666ffc550e5de220e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad5698dcefc123c64bdbada7f85fcd7
SHA15b393b00217f5aa15f8d2fdaef491d07057bca77
SHA256e4f5a68364bc6ec34ab102314dc8ac8f598d6bb32e1a4dbc6b7890858546476c
SHA5126a3227cac6e10a17eeb2a8128838ab3d720d655332f240ba6e4af0615124eae17f892f7f94bef8f19e87099a8c4d154c78e42d671c034969adb02badc9d7deb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc7d21aabc53de168cbc7d699534e4f9
SHA129692fa02c5204296bcbf4a70057567c1a9a77ec
SHA2560b42e89ae00148df0156ad85d405e3e29147eacc1009c55282eb71b46c1f765e
SHA51289771ba378458f375cbd9e820706ea9321ad3c16b0cb0ca407a9a742de49277e92ea0590656ef26dae10924393f9ad4e756f96786416d7c2775320dd7b4535b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffeb325497de3c7cabfd2ce1483514d
SHA1105d78fb140aac67e862c20abc4f7f77f85b9326
SHA256d5a494bb5267c0733c34ef2710cb651d9da07db1a315083a71760fcbf988fbea
SHA512a75f28bbe58969125e65ca2095e7b553daf94325223cb707d1006e51ac3b49360fb594737d43998b1e56b7c643a60427185511864e77f1f7213631120380a931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f7d6b8ff7ad9801e72e5b503014800
SHA1bfc9adf219a78e31925dfe094a196ec5eacb5ce8
SHA25674cc2fb67cbb0b173604392468c3a19909e1d2aeed93cf1b764a46119c9cf38a
SHA512390439df3741556c033d8b0f961fe828a0b3d0d225b0d4c3bcab4894a179c743695d62e358cc33d0691832cb274e8a7f192c88151c71924aad0b31fc49be9bcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca6ae58e63d9564651fdd118f91de78
SHA1dba16580ca73e233ed321f0612c404cc8dbce416
SHA2561ceacd54b79b6b94fbc24cf33bafb4a56013487e5d28e960a6b855156f653b65
SHA512fab3f1e9f4346e87d76fd775c9ead96e68923b7da9914288f4e08dc5ab7df5c572c32691eefd34aeb385bf8a7275b51a59ceabbbac587515929322007085ca6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569cac34dcc5c8e8cf818868c7eae2d49
SHA195a717846aaf5a67e2ac2da3d7175683ddc16a8c
SHA256613c244296a2207db81b030c9b993e4b8be53a74f397d9fff5246b4e6412478f
SHA51291394b79ea07a57c095b018d17e7e5826b6213d512763eeb39ee6854d5eba5e443b25a71f387e141db3af909e2b363249f1f1dfebc590952fa581d83ee4798a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ade860c78065a690f7e979ceede352
SHA1279b123ccaa16c021ec3f093e5bc82dc1adfeea2
SHA256ba0bcf47009a4809fd7569f33c368f9e812e20240c53cd524899b45ef8e04fd0
SHA5129730bf7eb36c03f979f7f21c246abccf90776e8fd8b3e47273aa3d1e55346242588b23a287c5e1dd5ede7da0fde0d4f29ca66bc73d810a0d8b9ca8877d675bc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7933d7e67a451fbb1d3653fd3a63e5
SHA11afd9c53512a195f70d12b6f6e5b768a76acfa8f
SHA25616a0ba9b47fb6e9efa0aadeddc78caec1d34471526bd978eb1c373161dd33344
SHA512e470dfb6f9355d434ae3e01a105d46bad2c45524fe062ef1f6b4ae6b275eaf49237dce26d9aea20502f6da8aa3c38c0917494640af2aefaab87045de2b5722a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e68a32e62a50ccb0da6baebd16a3cd4
SHA17fc281ec33926f3245833f9403f4b7b4d573329b
SHA256d83de404546d5fc2b9ead3d540955208f79fd326a857d16303fc193494d65a73
SHA5126029da9d1892eeb482d8776c2944f091cef0dfd43fcabcd1215aa5dc66f33bb8f58921d21c0a868b0c377e18cd6f9eb5db386de9ed4f63f482c259e5992ca7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517ac47cc54b52a730b5c120a43f7aa6
SHA16a633d94feec9fe47495dcd286cee081ffb5d0ee
SHA256ee9a118dc6f8750d08bd58c8292344ca73540379b93e5d1ccf43e59c1d3d3077
SHA5125599e42f5ffc5d0c8f64747cde20aef5128b216e28f60ccbbbbca88d7420c522a54ea0bf4165c49adeb66bbbe68c1f7bc2c462b68226ededc5c4546d4f87efba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571bf8821ebbd49c9bac512d18e3b2d21
SHA108a7bfb04d4cb6ffa3477635a712dc3efddeaeae
SHA25690248a2a663f11b9fd735c9715b611e84d54e1bb762c40d074cd41476c6e5c90
SHA5124295f3676b8619ddab41e611fad13175148a0b814a03d6336c9dc304ae8ca1c54cbd42acaccc0890151e8da6020ad57188b0ffbe75248d263322a2120021a48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7f0c4ad6decfef5ece921467f2159c
SHA1921bbe047cea8e1e57544be23c38b8a8387b7396
SHA25639e4a18e347de6a2d42a9bb5d7258e647b08ade19f96b23d77969fc175dc0567
SHA51242454dc989064084775ae140129094e39e6e4342f4c3f9a05964aaf6494887e8f54269e306540d54049d1fd7789fe8035aa47a8f3f524b28cce2ef0bf24338e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cea9fd48c907112c414dd7be2222d34d
SHA1db3e374fe8b6db5ec7e8f8099c62099893ea605e
SHA256c0fea1dce1d80239c57ff4324318bd8132090f40534152906f77b711f601cd55
SHA5124e744340a8549faefaedb5ec2b9ec3458af771bf4c9b2365dbbf2ac15dc728eb8b7138ba31028f69a09329d0c901c2ba1427f069b70bdd528729d673554206e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6f244f248f4d7d35d88527abf6a6a3
SHA1233d9239f17dee12bc0a331fe3ea7dfeadcf3069
SHA2560d6c7acaf36d25e808e60bb9c4f529d69a53377768a57d862cec10984913b27b
SHA512acc6390d9c64d909ff2a2262cce61a37bc79de13e3da4dc254002a518cd1576e3223e8494e6d1df4b516c04ff0a875117f66368c048291921e5d72a638116570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2473129b827565177b70788c89349a
SHA1e575bc81dcd681be907122e1fa27e74f9c16f402
SHA2569b496aa8087d26f7332039f48902c2ab69377b89021f33ecdd4c6651844f3ebf
SHA5121cb9e082a89581b6151e21ecf2e6d6036a7a194dfefd1bb7c9995cf9450efdc3eaab10b1d9d8969c6b0049255693f36ce81b66f589735bd6e4fd3540dc21eba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546562df7752fc26de501c961a44d29c6
SHA1ae877582ec985b7476ca70f19c1d342c4fe90c22
SHA256b1b080c1e172757bbe378759246881035e810042d0403c34cbdb67d72fd0a353
SHA51245400a2e4d20c035c0507ff3d4a5ece6d8c67a4edd50346c68cf6cb608752378edff5edcbd19ed0e3b399b081b9f309390080f0abbccf14c6aaf19c25c001f8b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q98GZSGI\3416767676-css_bundle_v2[1].css
Filesize36KB
MD50bef7c3d549ca15e5fe23315fc211990
SHA128e3a4693a8f0212850a38303a037a6ddbc14d2e
SHA256c91afadbe63dd834aac00b49bc715795da58970e7d500c4bd8f50ed713c77880
SHA5126a255013a987fffae23b8af3a19471cbc4e51f747f41e1341596829fb3316b74882b43f281a9f0741faec345f92c6a784ee6c9beb28d23f211d099d32c597961
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b