Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
c830eb9f85bfcaac17fb981b0e192325_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c830eb9f85bfcaac17fb981b0e192325_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c830eb9f85bfcaac17fb981b0e192325_JaffaCakes118.html
-
Size
7KB
-
MD5
c830eb9f85bfcaac17fb981b0e192325
-
SHA1
9e498bbdb008645c7ad6ef31920ba26c2f96d84d
-
SHA256
47455df40b3f234a8faa18b1fde3cf8270cc339d58de3fe91a93375418f39c41
-
SHA512
bdf3253553c6fc1ee466a73a13c971916640ce434bbca4e5611dcbe70e9673f4e8ecaaf6795852b66de2188384a0294c1edff8f44380c8e7a891a9af08d67161
-
SSDEEP
96:uzVs+ux7DtLLY1k9o84d12ef7CSTUJzfCwdxCDdCCpdACcdScEZ7ru7f:csz7DtAYS/9OQZ/jZaSb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431065709" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07333a2c7f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB68E391-65BA-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000000c317ea25f2611c25778ccaf4649ca11eb9d45af4c8a2c357f1f386bf4eff386000000000e8000000002000020000000b569d310eb2fef720c1162c721683a783fec1fddd7b04420a9ac9d1444c8305720000000fd8e8307b2ac6d2ff6a1230d6345c250b4c5605f9f9176df7c850900f2f386f3400000005fd9b0bf3469e80af0be6bf94d6d468e4bce08104095e88eaedadfaf4da662bd22754e6ca3104f3f48e3d3cb39b0e79a006f93563c6a4f49e5bacf33c1354d52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2076 2348 iexplore.exe 30 PID 2348 wrote to memory of 2076 2348 iexplore.exe 30 PID 2348 wrote to memory of 2076 2348 iexplore.exe 30 PID 2348 wrote to memory of 2076 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c830eb9f85bfcaac17fb981b0e192325_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d04901ea36dfc14332d1e33d31dda6f
SHA1c0b110eff17f323057d6cb91908138f6de9a5308
SHA2564b1d8e19edcb36e060ac7a68892469460e0e1d497b22d42d0825ec8022201c43
SHA512c23b7dfa9ff73bdffbad6d9b1ae0fcdb4311bd72afae25b2587559587b23f90552f5919a204cabef828e2aef8dcdc6f4742a60639cdbca64f88b69e26d2b81a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598119e1a581e9d95af9f4f6bcf008a9c
SHA1408536da110fb778f9512fa4d423dcb28816b124
SHA25641c07ac6f8bec51fdd8797709879614ca9f08a9b49c9bf077616e209cc003de2
SHA5127a315c2becd4769fa100c0f8465af6bbaa781a27cc3af92104564c2ce538ca6e53d09c18943057131e6c70062417c8da7274d03c36cd13890dab9100cbe9f502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ec0f622e3a73c3465498ae6bc1ba9e
SHA1474c6415669dafd3930fb1bedf6bf59acdb6f700
SHA2565512dad6c3709937710756a3486444ee4ef27935af5c26a9ba7fa4375267531b
SHA512a7f442742ed66874c7c751828e7bbbf291046d1f06dce9090007d30142338ef14f28e5c25ba7c7c79f138f01ae6ed353ddea46df45eb28f52cfc7f4ec42893ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d283fc1ce12537612ead527136bf7a
SHA1c8c05323494cc503bd5e099df5220b0c5952411a
SHA25698f6e5e72ba52b9c48d41eacfb03fc832cd251edebecdc2f4851152f7f49c0c7
SHA51226ec56a750a76c29cdd9bd8eaa3217ab6ceb368234da55c9e25b99ef2386a1dd03d90078b6de6931b992b8de82457a702e153fa4ea0618d3f20f086b40e6e2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896e591c2fb11378be98462ede0f62c1
SHA1fe9f4d1dd0c5340ff2a7f0c0c52ea4f398e89be7
SHA25691a88956a0daab939f01c6b9b72c670c474df4c3c0d7ba72bdd3979f237a8b26
SHA51298d214ca8d51e2fff8669da8170c9b7a30c54fa9b51c30fe727a365236fdcfca5512ea689ae63e8b172c9331114556e16754469d90bf08beec2b090bd8348300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57575c84230b0f3f25984b2f8afad1c48
SHA1cce1385d5433b3131fa46badd6e237a20b4c7c2a
SHA256343fadbe28be8abbb1b27f7217dd3aec66c1b7bddd8b053da22b228df0bf7792
SHA512e21ee3ea5a00830a3d7b8f31b1fe6c070e504243f0091956ad7a389fb6d54264118cac5fa44510f68e16b207d49838319464600a575b54eab892a29960892cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aede5037e75e047bfff782475171624
SHA185052c1330611dd3c40d0400c389a1e5935ef73a
SHA2563ab8f7c348d3906a0dc8d16b028ea6ca1effe6cfb49c83a283eebf22366ee33f
SHA51283de9ff7c2cee2d090a4ad9171f1ef0ef1a6189da5d1a8c126d2c0ce05968009cd1e6fdb16d302391a9debd9b3f2d9ee01db28ba12846f56cf2b9f19fd8738cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e0a1e20128f01425edd3d34eb08d19
SHA15da896c5586b5f7076f321b99d9d6c63e6781cb6
SHA2561fc9f43c1d3b5052c5e7bc5e1e62b4cbf4f2c43d2a9d0d9e12249b9555494a12
SHA51263e3362589fdd1d0c4d412de61ef0b90c3eda1af5aeaaaa40486fd9c8b567a534710899da5b1fda77a745a34779c97944771ff738f86b4fcc444e4f84dd51c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ded51f262713ce1379144ac9a2194f
SHA12b2b9b5b90666e87d38000356858b07272ac5163
SHA25616f80fc10af663c572f9d92e6d4213ddad64a28a29560ca2f5b63947e63d5c50
SHA51221c39ba2a5f42b817b349a01660b1c73e9cb3d4f964a9746a5f1921d19b6c96819b675873261dc179169abf1e445c7f4f996e1d94fdb84f1cb08285488fd70dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532aaf6b995f9acf9f94914ffea4d4ba
SHA15e8c5961b6f460fb28859d0c3b978517e85bf4fd
SHA2567d8f8a04edb1a05e859e13edd86022a69728a2f0ad9e0287a9424a0b1a38770a
SHA5123ae5552b1335bbc445a39d05e9caa7c1bc3609049dcec3682631ae22a9812e3260de1ef6f948d9b75fdbf8b7132d4ec6b9c0b2548891d7aea34f8377d5d6dc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4b4096c517744ea18fcdfd26430445
SHA172a5d431cedd82e7142aa731b16b7793c986118a
SHA256bc01a21b84bebdaeb913ae05ef08a11ddbac72916436cf4fb9a887c3d9ec1d17
SHA51205cce608b38fe78e4b128232b673e6798665d625766d4e1655e61e5906c0e82e6f8d8ecb14567d9e80a609a6e882d3cb7d1451f4e82b4024ec11d29f4eba553d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9fa0a42a2265da868209cc54d01919a
SHA1f45acaa104d6be127851ffc19838d07ce7541e91
SHA256bb999a115672f18a3af326e260eb8bff001eb47e05ed5f6bc5add79f518e6dd2
SHA512ae3653dde894a4ead532fec6cc1e6cdd03f67c22b3098a1c06213790a1f3575eccf39fa3bd3600f5bd2dfebd768dcc28701a46c0e4669238381c66bb4dc68aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdba67531985e8267fa78451343c2f89
SHA1cf64c2474efce8538dc6ec465b860afd60eb9759
SHA256942381787f2b552fdee83f3e1f3653b0b3cf590a8e8655e624a85336dd397b1a
SHA512e9bff3f03d7830a5f7b61016be175d3fed314fa181f68c71a7184b5ba77a0e66d733db498925f95ea2117498e1d0a500084da8e6745a74539c6d419e19e93788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a2634b0773f8700a3a26ac45c3281a
SHA1b4da7c947148c0331f8e87f05e828ba73c028bb1
SHA256c261d14d31ba3acc5a5714f35bc17b176e41875470ec683d35fb9328d006cc2e
SHA512e5bcb95235eb5c795fba56304910e92e55bd4dcb1ba576d56c3312117fb73f803dcf17420ad61f36974aaead937c1b65c53fdfb605489c29e8a369963aed62be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ad338f7c878797cbd4734019df6c258
SHA10b8a3f7b8063d2ba33fe490643091e75bf040c88
SHA256d7465a783a6d68c89573651d682c817b73e75c6b804d4410890d882d75e8af33
SHA512b0324fc4c70ab0b7d95ef1a98ce1c4f0d0d24d2f227a75614fc7b07608ebe782a09a67ce724007f2e4a56cc366ea85bc5de5f7207d80120355a1fa2d87fd4894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d9a10321b6fe09153baef80ce381b8
SHA1d125ffa55b95496c686d48d2992227345e37c139
SHA25687240a9fed09894e218097a687ef238bd462df292bcaf6faa425875b89818ef4
SHA51257067404b7937c17a3ba26dab1eb0959d654324d16d02f004f6f134fe6abd492b1318b8e7f104614a3247a269d60ad220bf50f2a700f8a83b144407be9a27c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e917373a507515048931b604c2aefce
SHA1a6eb70bff8250014fef0885ad0f91f16e6947eba
SHA2567805568346eb39ea6f10bfbdc424a191d2b8e0b214fb0fa43acee254f396e20a
SHA51230f431dcc44132c71a500e2ae307cb934f215e4657a3f15552c476bdd8f9ccb5a79b6345c019060f918d6f470b12318b4bba90268a14d65f99b1bf18cf3b1d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3565969398e6c789e08ad44400186b
SHA1736f5a7b5858b7df4d963ed99d13452856ea1a3d
SHA256a0f2d5cd1c152171c86150eed1447a187f555db1df1d46cd593b859982b6245d
SHA5126dc11f301124c88081c7dc89fce39e452461f20e3d17e7148821aa0578ae8edac6bca1791385c553e44b0f0b98b371bda670a4dcbafc741fe44c1421243df0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c98538b72d5ca88cce6eb2f63ae23c
SHA133f56af541bcc2812077731ea9e5f1ba42d2065d
SHA256fec6ac8ed936d9cfe199ffc2ac374431a965d6a3b8fa506ec1872756aa502d28
SHA5127a22e9b9afc8ea6808f706f28e444b54b3dc9421dd3f3489da77a458a109a5c10ecb7391d4e2c941d676b8ba9da1e46f46290bf7772d745b2d6e63572695362c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b