Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
d041ecf47c2b93d3fcddeaa5336c18f6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d041ecf47c2b93d3fcddeaa5336c18f6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d041ecf47c2b93d3fcddeaa5336c18f6_JaffaCakes118.html
-
Size
117KB
-
MD5
d041ecf47c2b93d3fcddeaa5336c18f6
-
SHA1
3a0e39aa1d0e39d1eb02c8a26f766e10ef336172
-
SHA256
aba3e271ea9916fb8d77816a536f94988fc9b30e8d52bb72e5be361cd83b3970
-
SHA512
22b9002e732796cad655b0a6588d9fc850c593e99d5836b190e81bef5be7c3da5d9e667f1a40383140fbc6d0b4bcb63f2d374b2557711399acaceba44738f46c
-
SSDEEP
1536:1j4nyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:14nyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30afaa908f00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431811292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000030db49484c1027ce1c05f7853a0935ddb019f421927ac06e51e5d1dc8e75c707000000000e80000000020000200000002627e851ead44d44fee01aa32db5be29215d50309854a306a897cab8c31c2deb20000000447c40f8d245812b20d5391881d4953e78b772d4223993c6475682ea6705f50440000000e8547d159d763abe9b819865ffbe70ba574a1f4110d64bd3e7f959d81108d2bacfb31fb73bffa546709734e6f6309ea017c16849f11fc7c1e30f51658701c8a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB8737A1-6C82-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2664 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2664 iexplore.exe 2664 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2812 2664 iexplore.exe 30 PID 2664 wrote to memory of 2812 2664 iexplore.exe 30 PID 2664 wrote to memory of 2812 2664 iexplore.exe 30 PID 2664 wrote to memory of 2812 2664 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d041ecf47c2b93d3fcddeaa5336c18f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556820ad2656ddc837975053230687abd
SHA1110aeea8c11d1ff74690dd86b11ffa03a27b8e52
SHA256649789974af785ecf6614029386608472779643d65fcd90f114004ce635011dc
SHA512473ab235d5753ca1df3bf71f8e492087b692ac3b1312150b972c8cbe78257de393ff3491ff434778e14ee2398f6d4cb23548f470c7730b5e6abeb6487ceecf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d272c77719563db951e386843f838f4b
SHA1fac93902a6bbbc227ba9ffcdff8eaf2f3b283c3e
SHA256b5840f22e28258d152580c1c571e0c63b71dac05149cb99d00799d25f54e02cf
SHA5123e8ea04a917dae1efbe85b025178840ae38e58a430c5bed902cc03bcb56c5636c683100203e80320720d63fb3678168e39fd47bbaaeb50e6f329b3fdc5bf5bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e992c8f0890a4688eb74e989218ff0
SHA115ed6d68e79f73c232a1487a28aaba3fceabfb9e
SHA256aec1545971d3527f9fd99fb5e09b42490a5f050f26c665c48f7f89d149773430
SHA512b784b3a4271a8dd764658c58fd40bbdc1f5bd0395fd36ae10ca4949efe6ffa7043245bddc14bfb2ae8c557f246f49a6e3486bec29a320ca2d816b8b11618357f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563b42217187d514a57579c9fff359c1
SHA145e95879f3f2edb0be2a6652f2d3bb1f59fc989a
SHA25667f98248a49227d92621dc025ca444f8c379bd41f9f75eae5f1f7eaf3ba241d5
SHA512460bc86d9d43de26fe1e1e58eb49994cc8bf3ce4fe6a26f5ddc7bb179775d09a861ceac89ceb34de5f1346d8695ef19239332d7a7f2f1f8b089774c8302a40aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084aaa42d77331be3033716f72fa938c
SHA1df71e8ed9f00aa8e7c4d9036cb0b0615769f9f24
SHA256908eca2dee57e4f7471c31f79e4977e502d9abd6e07d02fe0f9ccd98c7dc9535
SHA5121ffc936a2af8549b8a62f62a1b99c656df153499f8081fb67e4bd87d16f6a6dfcf19ed15f1e37ba5458734851c08fa4bce43b5b0d3beee543322b4fa754e2ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3ca0ec88dc8b2801b3517fad84e510a
SHA11814a3281427502421b2cb5e7e2a3e4b6c35b647
SHA25691931245abaf4c65719b91d051f3b4bf49c996a453b57e09d0eb03224a42daef
SHA512a83b24ed05e21c7752907d200c877b2a52a86b21d29ea80c8b70baea35f986db76aad26ee556c73ca277ea181149a230aa9fc9343c05e34fa57e1f6af0872ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59771625e3b1a321a0c44541ff8f7c08d
SHA13f3c09de5df3d215c0658a035996550f84691613
SHA256da0da08c6a2ac66fa0dd3c8d5f04c808c19f3d32846e82044fd74e3a3b7304ef
SHA5126ccfaeeb314377a488ca8d596d430d0d646a312291bcfc273fd31ba9ee7f568d1a544af91abff5c25c58c26b7001934ee032a1aac7931dc69bd8a084d26c8694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189f17ae7307e2c9e34da743fe90eb38
SHA1b3b0029833678ca20d0fec7f5ae08c311187c4a8
SHA2566a0cc9daba56d884e2274c44c734a14e8ed79db9085ab051d829ec7da9c59a9d
SHA512f2f8a433c161cbc4de53588f7164a1dafe57d1fa64190ca8146416506768fde24b8ba706bce703bb4752e2cd0026261e0c90ec680a85e61a547b5b2de4df091e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f776ca633f4bd72970ca8c0e5f7e3468
SHA140ed700252af5192abb3b4ac02a9ffb4370db04a
SHA2564c4150d9fd98ca89482eccc6d3a35cb6f0a4632b53163b3825917ec187e6f513
SHA5127ee641bbcde3a12bac32b92a7e687a8d5783cb04c7785fc1057ac84b5049de36c8ddba135db9f2a7b664aa25bd78f1ce848623ebd1ff4fb56c1e70405eebebaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebcefe76c811daaa932e9e7aa6a0f67
SHA1eac09075a835afcbe09c68d99e79fcbbeb95c496
SHA2561602ed607254e8fefe2df6f5fe52cfa02a3d75c7e230c17403937cf96f0aadf0
SHA5121802c1df1e0210160c8a66f53a5ef84392cc7de93c5765f192ec283d648f780e929248d825cd31d731d7781de7fcd3fa728a6b5b75c828b43b61e6e6073880a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353b00a7b0bc011717989bf6651bdea6
SHA1f967ca942c3805a00ca57e48a9a2d068d1cef9f6
SHA256c571508af68be1060a66aaf3db9aa42ba521f6b9105be1a3e8d7c3d64130a3d5
SHA512d87e6a82ec9b2453bee0a4e137d7e3b80bd9b081ebff07a79b3a9429fb0b8cf617d564eaa9bdc94f20ac36cc283c0e0e9bb32327e683bdc5f218f543ec765755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08f4ecf482419553a1d397d22a46bd6
SHA1cf05f2f54947f98213822d51f201d6d581b61589
SHA256363ea3363ba4ab94663c92d6a105db6e0159cae96aca4f70fb05437d9f5808be
SHA5126647625a018d0cfb6e7698afc5377ab683775007e66ced3e00e5a3f634bddb12237298a3fd96fdcc17c87dcf5e0a218dd99a9563ffbfc804b684a0fe2e470584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2b3933cf152f70e1b752615b7905b0
SHA1faa3752dd8b9975c1873a7a2beae92d5167252be
SHA25611daa6d41ad2ecd762ba688127874d0b495f8e48e4ec29a60f3d58ceb68e3924
SHA5129c7d855e7896467180cf1dea00e185072930e2ed51f3df6f48634786aef17a8cbbaa4b176cb08798ed83c98873102b09df84661ad22adfc778134b51e040d750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403916db8b14bfb69b2725cbe5bc35c4
SHA11fe129edef69bcce2d680c4c0e74f91fcc5ebccb
SHA256e235702479a283da7559482e0d5376d327527796f3f253986154ed672cc77420
SHA512d59360746f166d227973c6732aa12845381b8f0bcfb21bcafc7927f0918ff445e86439e0f7fe7cff4b0ff3a13eec3e8e42e1edef4d3aa3effc6ba9606c0307e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b560cd48995cd4a34b532da200e879
SHA12339c9855dc1f126a7022a32e3f487ec16a9c494
SHA25665a2f94b6d64c1bf02bbe902978456ff8bdd9dd0725e54c42e8cdc3dafff1400
SHA5123923766ad837d41a7c2cfb46c4318c67b1ad924470e0605f69ee4b2136e1f7b3c7b150eaacb2fa5135ded5f0b6d401633b74fb0359693b264e34158571dc1a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb4577c7b4b8643053f897ce10f8960
SHA145a4cb2b82a29ce0648b38c18cd1e93922fc6a7a
SHA256a4f8fea5ad160fa29c3e8ab146fc4fd5af2a4cf1431cdef889c4f6e4a9927ef4
SHA5122d3324ebc1c7c14647ae2f72ba81cce1637eddcd96229ca608b74254f325d30a2b852453a3ebf2e7e0c86f83095f8b3830419494cf09a5059c9bc170c92a8aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c29f926b0e94042920a61a668afd5f
SHA1c18b2829ea53f2a204dc3b88947bb2d2cf2dced7
SHA256a35234f779723b19386e047721f29d975773f8333ef923efb7e3a8c6a1238219
SHA512e1038aabe4f990df24849aa3b3b8f4f9620e127e62950874c94b9189b52b1ddb1ad2dd37f3037b75a0e6db3f3570fb1080b49efa86a63d8c508a5a474f1e5833
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b