Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
d0cf8f6ca9cbd9baae5c73faa7d61d25_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0cf8f6ca9cbd9baae5c73faa7d61d25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0cf8f6ca9cbd9baae5c73faa7d61d25_JaffaCakes118.html
-
Size
6KB
-
MD5
d0cf8f6ca9cbd9baae5c73faa7d61d25
-
SHA1
524674ff7813731fc96a0cdf2954b6c1ce4d3c7f
-
SHA256
bdb7d53fc645530d79e361a65e9675a355721340604783d8dd8a540e99402a34
-
SHA512
d34345dbda74fe1c96348556497ee09152d90177fb121792705436fef0c7bd8114533d07dfef5609f2b1dacf69328ef48798c8cd6f62557102cf17fe59e0f3d7
-
SSDEEP
96:uzVs+ux7eoLLY1k9o84d12ef7CSTU3w9ecEZ7ru7f:csz7eoAYS/uxb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005fd5f8a532bedfa5c6745235b16ca353f6b6d67425b33f1931afbee3d24ed3a7000000000e8000000002000020000000792727865443973f96580436adb875dd385731f0d8b0304a3b2119f9c020942520000000d4e197140e5269b626a1af6b195804688d589e5fba1086921f2d6f02357e658640000000154fa8c51958a50255a18c2f641824297403b6f90fdd94c43ce28f8024a12aa5b0d23ac2e075167ff3581b4b64a28d3faa4a3fcbd584d8afe319a06296bbce46 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b65f5dc600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82F01B51-6CB9-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431834818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2328 3008 iexplore.exe 31 PID 3008 wrote to memory of 2328 3008 iexplore.exe 31 PID 3008 wrote to memory of 2328 3008 iexplore.exe 31 PID 3008 wrote to memory of 2328 3008 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0cf8f6ca9cbd9baae5c73faa7d61d25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4470e521c8b9113e9acd8a796bad48
SHA14cfd967a8d6825bf46e96024ac2e8430d1a72797
SHA256d3b1a3c39dedbdabc6dfc9096a6a2e4c5ece02401bc4e0af5925379b8b061489
SHA5127d4115104be074b42baf7282521cdf83c0c84902e766a4ff2876e80f14eb7bd87819a26c74444d5e00b28ce59fbf45702d8e78b55e9a892d1bacd1dfc7eb7aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56597d148a2a046eca3761c542d66fe41
SHA1824561d0932fd074c1b83a892fddff3576823c35
SHA25605a23a577391f9a057e0a1890170f56fc28f892355b5e330c0df2b6f40a4d16d
SHA51206a4dc518fbadc2dc37fe9971d80f3ededd1103b3b8129014d4c317b26344c4c3cfad5c1590e32ba0ef36421a22e77fc2e724f71f4a577b6e455549f7ccc346e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584ddfc8e4cc0a05f3bc2779515b6275
SHA11b63d03533a9b2b1327fb1c8e0c72a1ee3c6d87d
SHA256e6e0bf6c889f950655d6507ac11af7f7ec5ffbdb826252051ce427734710614f
SHA51253c23c3a16b38b374bd4f06a1a5ba072a78d1da400cf47198201b1acec7632f5115836158bbcdc37e7babb3df04ef6265c0622f6db35e862d50d5b5336c105ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58638b3e2a6c4431b88fff66e09d15507
SHA1825e20ce0e1c2048285fea9af04a0b32f1d98914
SHA2568208a0084c912e679a07eddf5caecbecb5a8460d7c2dca22d7194895798461ab
SHA512705d63f89959fb30b0b8662f56fc1b5232d2cfb22860dc27aecb1adc61c7618dd487e8704ffb6870afec5608390442f74c64ff37d9920b2c36a08b5479ef12ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a10ea803110d679777bbc29b00843b
SHA159265424725a8dc7a497f7821629ff75e48e7ac0
SHA256e54f71d36b791c46a98a044cc3f5d24c20fb70c933514186f998eaa93c54540d
SHA5127e4cd15d56739e121815b9ed79b6beda26edb4a6010568bc32083c00ae54b72330cdbebee3798a9c2383ccf705cd8d05d159b89d0ce27f9df97ec677e4ac49f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed61ec0340c970e84054a638654631d
SHA181d366bed49608cc41400e734b43bc33631dd587
SHA2561210d69a5ab06e9c406826a3c92e0b10d6f997beb37ae724a6505a811a3be651
SHA5120bcccc36d911b51c80b911092f4ef235ce48f6c71b22c97d3d5909d3eb2005a3bfbb408b66c0f91738395185ba92905659ae01d6b8eda4c6a940ab6c01e53a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124d91f5b0334f1a95f6eb0cfcf4e67b
SHA1af3f7d7851b71d549b926e9221a0f9f56830bdbf
SHA2562ae38eb9736e1b8cbe8daf6d25ef0596086ce29836841775b74d867e0351c792
SHA512942e5234dd6a7339a82c1fda81f043bb370da78ab25b868bfe1210ba2b538ebe94efeb152fa01654d376f39c265a9c345367039a5a90a7bb8c83466f97faabce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41940b0e4981d312b0977c31d775d60
SHA1b04cf0e86be33fe78b6cc21f4def435f0bd7243b
SHA2563765f4246a56336d411280ac954786a0da7bd574288590bf306bfd3d2b6f0f2e
SHA512b02e0d12bf49c2a014f2b64b2aeca3fa5838f04193fd79dcd9cb76fef421daad967d2ab3c479f75e33323e698695cccf297fac05be15941fd180881fa9c2cab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698b4f45ae0e3b29a0b914281019726e
SHA16cc4199210ebb8bb69bc7599183ed846af051b08
SHA256c5f09791363cbe36d44221f7837cba8986127d0b96c923cfbb80d848586ed669
SHA5129bae6fc9a45886d85a8faa26429319521f5bc86dea38f5b6177c08ca741fd4ee0175d0214121d51477096289de4676ca7523963a3664607e46a939efaca1dd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5a78ec133ecbde3a85f680a075930a
SHA1a1b12efa44e76616fd48e285362eccc7000c74d7
SHA25663b8bc59c8f9f196f82ebb0e78feb1c2ac880917b99f72af9446edb63acae26a
SHA512d2f8f6d5fccdf132a12900c600d17ec2e0672c5976f7cc2c815e93aa70ee71d883eb9d17a06da706fd2be545b0715c03121ba99f4f062126d9641efe157f3e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85b21c4500b43dba11aba6535d349a3
SHA1976730514d09fdcbdfa24e5529bf3209c44a714b
SHA256390695829c46db23e501a2a95ce48c024710f2383316a923038056b3d0932c84
SHA512127b61ce7be289d85601a31f682788259d8ab65a69f8c4010fef16b257870cf9e5e5f389ff0fdcc5514c9f7187dd15c0b9bffad26d262e580a1f485d1c690194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57561a93d39ec0494a4471a648d20ef43
SHA106a443b5bf748cb550dd8d4d94aa413348bbea0a
SHA256a7c79163dd2b2fd88996fd6e1f07c967d5edf39e0c94c91ac6015327b7d038d6
SHA51268d3c5efa76675c497e5e43d77b6cc3c0a9f36711032ff86d147b76c0f86563a831ff292668c4a1bd479b41851cef527b076da1a3938d7be944ee69532150e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567bee97ba840bac973473763d8ad5b7a
SHA103e1b0e96cbd0a77aa5cb333ed0d0ae01f46e76c
SHA2567645126878c39ab46a2653da8c3c783fe9e47d9cc8a97323cca6b593676afe09
SHA512763b9e3219d2d627e912ee57d107056af388fd036ab0b42bf2bda03635c155dde71afcbbca5bb2c198130636152d21e2297c5a0ee1eef4026f02c4e4e8436d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a14e2a49918e683b76ef5369583171
SHA1b587e4ec2e7fee9e46151e5f7b12a3a809977ea8
SHA25600b7e42bfc1b6ba5852127dc1b28ab54efebc7ad3d8e807608663f79a2113ca7
SHA5126063a29241e2407b63f3d03c416be886516784dbe662c8f7e415703f2b6670a845f632559c1aed35254a99ce2cf1c31fc7c8660a07276947c1d86691528cee9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451a28e394a8092d5688799cd425853d
SHA16f20c3bb3651f34fd5756c0371be262737c88401
SHA256002c1be80841a45560000be54d12b7ec2d925541670f7631996fda86f49c3557
SHA512dc561e26a70276dbf96352c934ad1570efcabf88915242dcb68f181f62ce381438142dabe09ac0f83733372e5b1bedb92a8902ddcab0416bf7edda4be3fe505f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eaf15f4c4a00f58a84ae72b1b5cfdfa
SHA10de76682362ed1353bf98355282f26489e6d0b23
SHA25615500df116167001636400723c6c5dbd31df45b5d2ab395e8ae4bea919c4aeaa
SHA512e6e425626308bacb7703a801b6b8e6df1c3e6c309e44795ef20c2ed8e6dad699b09c376d2925cd4e8fb2235a860d6968ed62a66b69173dcdf91614d5ae2dbc42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb3aff726e7c29b4d9c0e0a6ce0c6a2
SHA12477ed4822534b5aa086526f12cc22e54d0d5aa7
SHA2561b0dafffe412002aebd76b0e5e7b41f6feb6e081c6bdd8d803376263567b101d
SHA512b0061324d17313b4066f15beaedb2225c562c982421785b75c66c3ab64fbd353f29b0dfef16ff8162267e6df5818e45bda8cb79619a77c3e957cad3b69100f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f6b4855f2f1ec112dac382f94d1056
SHA1dbcf0092f868f89cb55e4b0498a285e58dcac754
SHA256876d6af99e73ba9e8c47890e9ae3e2c60e607b45f1f591829008a1899e4ba0f6
SHA512bb2fdadd2b23a13019f7e313663d45473dbc80ac87e73bc6c35813d8e3b6232301f1d98d14ddfe24a83d3a04455d07bc159dd52d129454823dc3e248d6e27123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c0830b402c16139c90e9cf30a71590
SHA13d0edd6feb42bac882f67e45c1c8d9ed4d4d9f1c
SHA256e09e18c107a0fac5181bba05579bf59ba0384065c36ae4c680aaeac129f44b54
SHA5126f3974de85908674f9f8e40f6cf2666814ea5ef62eb85aec994ffd45bbb8ef93a54bed7bacd9c6b77a516f1cd37cc11f8ce519a559548a9d14c669970458b408
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b