Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
d025a23e0f3f6584ff9d229e2c9e0c9c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d025a23e0f3f6584ff9d229e2c9e0c9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d025a23e0f3f6584ff9d229e2c9e0c9c_JaffaCakes118.html
-
Size
27KB
-
MD5
d025a23e0f3f6584ff9d229e2c9e0c9c
-
SHA1
640f756ffb6528744ad1d38e4b4da93451f30254
-
SHA256
0e1572113e208347899e46920fdaf1837d7c7ffd7223c4d4d5a4e74a152900b6
-
SHA512
efa81b1e1cf8bb1c63a8d6b4e08e4f39bbac04bcb88695b4ccef01853291d4c085aee1ce2247829454cb216276b6d485c59df564af5af145f0c79529e1655df8
-
SSDEEP
768:nYeVF8NDOR8mcoz+b/whVuzrQs17oURjq0qhBy4HhH14mQhoFiL13xhCMZVvVMdC:nYeVF8NDOR8mcoz+b/whVuzrQs17oURx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431807758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80BBC531-6C7A-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5032c8558700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000000c1f14da378c04d45c17f47da7f3919c2067795ad7afa0f10e3d2e0926821dd3000000000e8000000002000020000000b8ec08b88bbc3ae6f58c73f832d6d97dbe15d4400b03aba7d95e7df9436371b390000000fc88962732405365fd90f041a798ec46d179d0a070910775f97416a3a83c3c37c8300c82503c718d215e4c41f8e8a6d7a047d26021edecedc950e342a543a60548e436e3200a0920296c9bbfec3522ea78056f41162d33f1f73d3f60dcf7b3aaf3285ecf0f0f37432bf8c6876b3f89b141c76797ed9c4193f58415bf420a7fe5eb64de4738d7c6c943cf14b9e136d24840000000ed4e73e1ae141b63624df2a8bad299f0b45bc0ff4867549fdc157561eeb70e3ebc45516907a19cc864a58f81b2f23fe297db12efd3344ff72e571cb14ebabd65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d1fb59cbeba0f4e021a21bef0d4573ad556a28c5c6bb413bc192c417bb7fb437000000000e8000000002000020000000eb24c4ed924695c3f975b063180b1b2bd758ebd77e062db1e2c15564ac3e5aa92000000019484d7fda0ab93f5cd24541802e50dd8c7f1f983b563859ff9689ecc812e1f240000000f1a41244830bda187926573cfadc3c3002faef34ec78952ffcaa28bb7cf75a85f99d4dd01432ebde45a25dd83267c8fcc5f2f35ef396754670f535365750312f iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2724 2520 iexplore.exe 30 PID 2520 wrote to memory of 2724 2520 iexplore.exe 30 PID 2520 wrote to memory of 2724 2520 iexplore.exe 30 PID 2520 wrote to memory of 2724 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d025a23e0f3f6584ff9d229e2c9e0c9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7f4614d1de470d72f519584f765322
SHA18688ec87ea61202587e594477b3b07718260662e
SHA256da5676d32dbde70fed0b87a21044ebacbcdfc2b5735d46f9a3b6be05c372cd3e
SHA51205ee20dc5735e8cb7cdeb3ca0ae896d928d44574af12d4c5d9801a1dcac6a039803be127d77df688e96d1d324f45e88b9381fdc06490749331168c0bef5ddcec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fcff4ceff04c132162c401bff50cf42
SHA1b86389dbf3d11530678f48fdc4e8bb74b732fc0e
SHA2566159cb18d21418024ba25add24be9dfc327feb2de19d4969693e047069b2f99a
SHA512542d2b5c2a40321474c73c69fc625a4bcaca1c32eeb7674bd5578e8cea4ef06387f20722a40dd2a7d3fc9526678d09fd1e9297ee6264f9e639bee28dfad2891c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d0d3ad90723b9f1600f76cc588694f1
SHA11d73cd80d137e15667698f6387aaccc264f17b6a
SHA256a95bb89ddbe3f2bb94af8062d9ef0c848fd3ad2ea7efaa5be6f8bb636c33d0c9
SHA5124b22efebcb13668cb49e49269a173f63dcc9caedbcba6deef1fa7d01ff5361d47cac4561f449973c94f4be6713e9c90ff2c97722df58e2bbebe6761c64b4775d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f868ba69307ffa7b5d7fa463c5315f20
SHA1ee42b395a60df823716cde0309e6cf520b6f2e84
SHA256475dfb056f0e86791b276908354e1339c52691f399687159dbaf6f5c4cbb4a31
SHA512bc3b7c4a422cfdf16a78e1bb3d6d5ff5d972b470ceefdc028d1621ce80ef8b3790cb95a69932c473a730fb86e1d495b248b849baa6bd1d0bc2ac75cc5236d3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd7512caa6552416db5057efae4337d6
SHA1ccefda4e25e5bcf5a0ce5b6e66c8e0e5a2ce1040
SHA256354c43d033b930b5f2e059a0e2cb4da0d79d62e7cf15b44b7f0461c811f7f6d1
SHA5129908e5fb1382e74770f67ceffe7e282511c2cbf59722548a50a89d351994cba24559aab7b59c8eee3cdf40dda665933a44419539989291b83c4807f0ad27ee33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc710637b66cebc0ec23e46cc4b779e
SHA1a035276e5517c246cc67ffb9aa3c05f6bb1b81f3
SHA2565961d794765e60fcf81cc6ecaed70a98435ef3abc1ee351a85092e07fec0af8a
SHA512a6902781c6f8f3ef579b726561862d8e4c95be9795f5f248ecaf11ba94e48b543032fce5bcbc4413b462b24a61a5485fe333635fc582418116f0a4289f2e43aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0a33bf0aa9988964731975908ed340
SHA19c1c6aa4f374fd33fbbb7206ed231b6aea59ea9a
SHA25634de30de784aca0c3bc8eb38c2235821dc7bbfa4955d1ba3e1a445b2dfb45536
SHA512408ceeddd0d59b5c7e2b47bd34bb4be914244ead852f191c3dd2a0f564fcb8029b974c076521048669f13723e3330cf233340f8e8fbd484123fa47932a937383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc2eb9ad27ff8189aa82352bee95d13
SHA106ddd02900ca80d09e5001a75f23b93dd56fad23
SHA256b4cf65e4947e1ed5b9d4191507115e96097ccb449c7c00cc7ae4130a43679e54
SHA512ef5c1ba436a97a434be7659f208738317ab281d4e93e07e1a12229a59d89fa5164a6cba18c062e292cd67d16135a29df2878077abc174fed40f7a8ff9d8076f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517644729cccf4295870fc1e423bfd39d
SHA13fb8ded85adc08d0fc91171c159be1ddb01382cc
SHA25683a44768bbfbc0e3e67d1e98e5062acc9e6c953ce08c56dde160899d0cac5232
SHA512cbfb528e1cbf5960a87c6b395fe3d0483a589410dcc9d6ab382f6f5cf8b3bdd83cf005fb7a1757bf004c92474942159da78989bea0461413b374ba1b377eb87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08cfabe143432de070d973cb2a79229
SHA17cf2ffa912eed61ed7668272f051544eff96b0b8
SHA2561f6c0b553faf89a8d41389246d09425fcbdc07d6b40396d5b59c535a88eb52bc
SHA512aa4be986eccd72fc3169f9c9aed4ad5c4503f10e3bb495f34344a4f55f3a37dff0708c048d4990b91f68427a686edcc09f86339029263ed94ba3e843ccd96ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b24536c56e67845de97c3ccb22fdd07
SHA1e5ef27a38824ca8d449b82687a945fe2b72e3d7f
SHA256e217673d309a17d88a9e220952e3e7bbccf2268cc377a8dca99fa59078aed351
SHA5128ca01b5433cf9308a8c843e94aa4e306cdd1eb93e38a2f41c928ec2d1d4b740c8aa43a20bc8a7b9bbba8f04aafcea1785f9f95e49c8b72af9e9fe4a5dd1e575c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595bdd4f8495ed2e98363c0c393129e88
SHA1ef98b09e94022d92a6f58bf7c77dd5ac400d0100
SHA256b21a6768d7a50c221106c16b267ad00921d65db76169fcc5a941702c81f70a2e
SHA5128e1b71a8dc0af77646c8512013e7d10ca0ee2ae39810c74b3939f3ef26d8d5d9fad9b3b49f00f112812afd990065a75b7fa126d8b877e24e7be5a14d7d7d01d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4649efe331b91cc3ddc2adef8e4831
SHA18e6ebb5b97edd1d715f3544d84a02fb8fb34dfbb
SHA25631f9126b836e87acadcb14b471470e8152ddb06c6b85efc57cd1df2a0b8038f5
SHA512e168f9fbf546063563774ce82770d4670d726afd9f8cf7e7f2bae211c1a88e50659d9364d1dc5f7179b30b914ad43082a67e58afc605351f81aae3bf6344bc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba9b37eeaa32bff13381a7618ae94727
SHA1d57c19b4f2e74c8ad29ce9299cef69bb29184e7c
SHA25636974134cb58197b9b45070d05814c4c133df5a7ffe32ea914e82b97679c3a3c
SHA5122fc54bb54907d913fa52aff941bf28a7de688cc203095fdf43553419315aad79094047c476570a985b9459cd4fc6872fdffba0da3d9e3543a5d17ea9a309e795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8313e42f651f3ed6313ed0d63cb62d9
SHA12e26634acdd4c8050388424ce0c1740d696ab799
SHA256a219a063fe94a7f271fa9157aa23e0823c19c75cc1c9d188d890b8f6d84d6c90
SHA512fffbf35bbd31c5393c1c18dd5796663096887f4d551e22d28b0fdfa124b5750e8f9bf8b8485ef17369ce14632c1d8e7e82d78ae9404e19fb8ea2370320e76e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0aaf76b7241df2d092a919647000731
SHA15f08b8e6e7d0d8770f3ad022a7d54862fb68030c
SHA25664ac071f48403d98da782e9998bbf73f97a2745faff5b2d6c56bc9feca5ba832
SHA5129274fee4d31343b1ea0f3fa84285da4daf19c6877f78557b258cb45e20202a2ab8b3b5a3fd148f11cdead1f891b6f0e43644e16bed9d0b0a0c3bc66f892db449
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b