Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
c88a56c95b433d8fd6da77aaf8455e6c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c88a56c95b433d8fd6da77aaf8455e6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c88a56c95b433d8fd6da77aaf8455e6c_JaffaCakes118.html
-
Size
152KB
-
MD5
c88a56c95b433d8fd6da77aaf8455e6c
-
SHA1
5a926326a9fbeb4af30cbda8e93f76c737c55ce5
-
SHA256
bde5343dd3d8a7f5d6b563dc5263fb96bda57c096041c72ec205584bd762e4d7
-
SHA512
c470c03893d58732215c9d2234fa4556d39a111e3ffb4bdf4306cc4361393ca5122ea5de1c89fb3fbb2a95e762602944aa441d568020bfd125e145d194c5b9e3
-
SSDEEP
3072:SsO1OvFFLgAPoYik/SzqgpzyfkMY+BES09JXAnyrZalI+YQ:SsQOvsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E95BAEB1-65E6-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1052fcbdf3f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000852d3b394a9019d6da88e4c8613e5c7eb3d14e84b1b343539d660db327f2d685000000000e8000000002000020000000618bd6ee3a952315d3890c3c2ffa57138b526b28232a089b3460e05b4e643c352000000048b13e688b7a182f690bc21a8dc23fa2138a6d1047dc28f25b3e26ad420fe9e8400000003055f017380a4739ca9a33bb1aba52afa42093e5dde8049f63fb5bd04f3adfb75775de90b71fc1ceaf0b632b2865dd2cfd653957439290122391edc55044bfb1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431084658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1100 1720 iexplore.exe 30 PID 1720 wrote to memory of 1100 1720 iexplore.exe 30 PID 1720 wrote to memory of 1100 1720 iexplore.exe 30 PID 1720 wrote to memory of 1100 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c88a56c95b433d8fd6da77aaf8455e6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a8cfc99969cea34fd77943d789578e
SHA1c13627d23fd89fae5e323d19bf3b2c49acc68c23
SHA256f98cf38ea15f5e4d3b9d9fdbbfe19ff4e7cafa6bb6bfeda4bb463e71f6db82ce
SHA512b724f84a155e7fdfc1a61e237e8851cbcc0a3a481b2e3eb4d082c3ff84417ff10b5df24911549597cce3941e12f2dce34e074af378ad69d6853d71d404bdb8d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d361228906e81300ddd6ee3df3e99d
SHA1d9f94bc10b682ed995ee787362843fe5234878a9
SHA256e3771a47ead157de2109bafca9c121b39d69f1eede9da1b15d7a2c4ee6245a11
SHA51209ba9807b161b67d0dff31a3bfd2df16ee8ae9218b279d98082967957aff3288427a013166e62432916b44b54d6d18b06f34419a0d6c53fc575f1062621be916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540856333f93805ae34d6a574e45453b1
SHA1e654356e2f6b453fa704bfa6068dd39aeabd2d0d
SHA256adbd7a78e72176f876c03b7f3a83f113cae5cd030464bdd739aeb7bdecb7c199
SHA512e2c3fbf8a03b8df0edafb33734d26fca6b64b97cb1f8cd2a98dbb1b2d0035515a507a412b2b0cd48a89a1bef4aa29fe7c0cc1218bb46bd0a8132c39b7d4aa21b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af319719dde5e78ab3e8b64884201d1
SHA13e88d7b7552d32a106d5ee6b079290bcc4106675
SHA256eb1f0e4c7d1171195d15b1a91d2306f28dfd7a929dadac0fb59ea5a5135ea281
SHA512d5f880e59acbea41992e4323a42edcb66e13e6d9e6831f9bcf5325584877bd2194206bc0d4f8c1b19b7b72ba58bbc1d5344cb32be9ba46e6e367877e2cffe216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5c4cac34a0aa649cd4bfb88762868f
SHA19cb9b03d1603d7bc4c160c9006eadb60ad7ff53e
SHA256f9f5cbdf9a1e3d3be1bef3d2b28b00eddc3492915195d72977cfb3ea84cb8018
SHA512c7bc840e276030cdc0af215b1755d46ac4b4724d91b78e5422d5bcdbab1390d33592216ea25f0ba4515f7fb2e57910b82b58b05d8ea1976a654dec0bf0d2a1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52073a1157e11af7bcbcec18dcfdc45e2
SHA1d7c493ae7383669ceba5d2b96a35a5d6219cb84c
SHA25620ab243823eaad24bdad2b26bcd7b48b800f8f9e2aac79458692bc9c9284bb9a
SHA5122061e7940448db308967eacbd106df93be7a52127bf2959449a7d0d3ea776e9bf4c44b659984adf50c2322b441db8897eefe10eaf0595f0ffb845978c00854a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea79ca0bb1bf9067544c6101fb2555ab
SHA1f7706833d75a065e292af3c1e1ff747a482e5582
SHA2563f7b9dbd97e0778966d916d46cbf21e43daa2aa5036b6402111362eafa646169
SHA5128d008e40e72a9f584560ea5fc944299e0d7c391098aa8b289c3f9f384b92d5f1d3d3139ef438cbd92fc9864911afb07cd43947fab10dbff1dc849b637dd479be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95e533e91178d4b6e7cb8061b91bd1e
SHA10a9020fcc877856612c975b9fe1e4c985d6ea91d
SHA256d4642f3d5188d500aa8c944fa426a2999def4052720321d4cd2e639153e1b0b0
SHA512f147e38e5894f67f70e7f90a411c50e185fb96368a754f9db6fda150632c2eb392f999f22da789b30a4917e67c05321fb162ecc0ea308b9f76f29c917848e3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9c95bbe79e137c139b44230e7b588e
SHA1829304023a5fc9c4f64c66ae453b51c8d4ad54d2
SHA256e64a492d6bd9e9b48ea642063f87d7f7f75145b1d24275517323c2c6b42b14ae
SHA51265013672e6823d81e76b6496283ab85696d90d8ad9942d8b24d9987d9e1ab52987f05894803c8c8d51efd0fc1ff9b667a8b1f24ee817fd7f3442ba2eb1685b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e272dec4e33489a7bb154fe68ed34055
SHA1d7b579f6209d2280ca0d0015f823a043916a8ab4
SHA256e8989281080d45ffda04ef7d3d3b22d0316d761fcc235bc72d1b72a046fb6269
SHA512835d573644849cc1374fba6e88e38be40cae565667085f7624a0cb818525057df5b832063f2ea8b525fb8d23e6414014b87b08bae3781a46dfa80dc338d609f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6225113174cd5cbbd8e5990133c226d
SHA1ecc8662cd897602b86ad4ca8e04fee243e0419b2
SHA25663903ac862cc14940d85dbc0c7da37cedcc7680b32d4ffa326b092d33b8fe7a1
SHA5127b3f4217ecaf7ef6ac4839244ab40cd73c92a00bd7778feefb427f87b00eeab4cf5d025ae1bbc6e0ae95292e648f21f590f78e015ba746625479f55fc087b160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c562789c95bc8f479378055c9015309
SHA13ab950bc94c2962cdf9b9fbad77845c4cc310f9c
SHA256b9e3118e9aa64996afc72c903659c5b46aba8dd6757c47d781ac12ddcaf9ac16
SHA51234c28ed50bd9b532ae77a45a7e95c3e34a463293611195fee4e8157cb889b586ef6fc9e553ff8635f538fef78c140a9f9c13a1d45d65146c7b08b0bf1658cbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a363b7e368f5af4e5f36fe30abba4e49
SHA121be0f764fa1857e02a9f8200f52f122de60e32a
SHA2565ad26ac7b47ff886cfe0dbf53f11d8459e0268d18aea00a670309a671362fe8d
SHA512057e719136eceec375fe181959b0eac140c9941f0bdf963e2257e07424bd0bcfa582d33648cae5ccccc6280b654430e44b98bfc9d9238e44bc9f4b863938a782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd20db2cf9eeabd7c318b993c581c15
SHA1aadf7ac9ee4f5d8976a2c53631d89fe035d04b46
SHA25697fe818a6dfa3d8697be4b215ee38babfe453be29fb1b57f1f5653a743a26e2e
SHA51222add31b28ad7d3f43fbc4a2d2190a799a3cbe6b4b52db271a45c7cd914365d2c77829d395c300560df82b46d85a77b7b6c14b1535f72d771fdd3f69c6b87cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fc5255b5b6bb165bd30eef0dd62dd3
SHA106536c36188a97f105773da10a10c1a12276d553
SHA2563f59a338ad9a9bdd73cbca837a24f30bf9441bab8d3f716e9e9aaf3f5f5d28e1
SHA512851692258cdf2d824877c07630a5d8fd6c20ddb1e1c95b991bbd79abd58f95dc6274bf4fce4b85ee63a27f6b544224b46a39e74768a1f0b91aa0c85adcab547a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc80ad193cfb24eee37b11573a62441
SHA1ef4a0c3fc1c274eaa5c3b93170c55fc8a1a01eff
SHA256a83b8427e9565527a5bc1f4984d22c4dd475fa417a3d496009c43be08ec894d7
SHA512e527fb9b0b74459a300dcfafc4654d490d63c7f858407a03a489aa48908d77c857b679ecb825e4be6802c5f708854ee8c5a64a825b3069d7a173746c22c01de2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b