Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html
-
Size
100KB
-
MD5
d105cc3f896f321afaa57c10b23f5c31
-
SHA1
c5aa648aec122b617fb2fc3cd8b27468bb3056d2
-
SHA256
444cc4898dbe1accf05e84f49d3cf64ad552c81887483ecbbce656068681cb57
-
SHA512
ddee1a076aa711e0a2cde90ec5b65a80f93134de4a3c4b097e16ec4e8ea80507032a3ef0c40364c1c9e19e1abda2acbc6d48eb614a1027fbac3973bb9ac836ca
-
SSDEEP
3072:vnOjBAtVWrCWkHWRSWJ5WX3WYFWUUWrVWvTWBNWDWW1OFCe4HtOPxGNFYaT:v9hJZaGfWcUO77FW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{416786F1-6CCD-11EF-A17D-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431843297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c07a18da00db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000009d153506abb307876c076ea270d38642313fcde02ec4760bb1987b6bbf400944000000000e8000000002000020000000ebdf97e887200c6762fc843ecdbbe2db9a957023fac43a778ccc2afbeb51479a2000000088cff00a6728aeb943df6910a03b379f1f63f9ead8f6b57b31fdf3e926c45a35400000002dc705f14e65dc02831c84e6716bf425fd3178f0a5fd85e54156564c38fa572daadd1878ffe60bd49edc699b88d942f33c8416cfe54bd3fd55a5ac0b1fb48f5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2808 2260 iexplore.exe 30 PID 2260 wrote to memory of 2808 2260 iexplore.exe 30 PID 2260 wrote to memory of 2808 2260 iexplore.exe 30 PID 2260 wrote to memory of 2808 2260 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf257d1e593e6d7b37393f2d7e02fee5
SHA114de6736baed0ab619583e9a046f990b20bd2835
SHA25602e12363cfd249c051a1d05420984ee6b16b30fb83bdc14d5fb46ca9fd0cb5ae
SHA5123e66e5cf779960e51b7fec2d66a5af6c0ea2fbda4a010460036e6dd06b1c80fa007f19cb2d5a72b496b4b4758c6869bf2660bba1de2ef43d7607c6801b7148b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e138bcaf1e53ab62db5317904a4087
SHA1ff90b051545e591fabe497b4da946e38d9fc4f77
SHA2566b2ddd95f05d0eb168557c20482a9d4dbb0b8c57f49317c7bc672212ca551eac
SHA51257211341f29392aacc22c51865ff5c6c1dae2fbfad50a698b3773e330aff30188be3d95b9f98836c6aedadb2f432a32f8e9d7549f87114e8cf1b78c6cdfb21ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cad79d29ff0d00ecacf8c7d47d6c4d2
SHA1505b8f60ca04ca15a1532f725bb2ab660956c892
SHA256ad1a74c821bda2116cd55495f71956689a16c8e966e80e01a5dd183076c7bcc0
SHA51261bed91c7bc722798201dbe9fcf8dc0b94497ca02ddc9ddba7bb97d25a985663e4e356a5e7877ff21e911c0d99d7685c08bb103084ef8877c66d37c62571c62c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da401331f15b22fd664118809a5d0a6e
SHA185280b799c1495765f369b3001c18dba648f8f18
SHA256923a8745007a41ae8d8f128c80763e70401f05dfd4a5c70a9bfc3574f1d904dc
SHA51247750790bb5d9d9eae6fc628210b0e990e08a1f5cc1cbee88e78412b027b337e2fe279b6b79e5127e2d7a10b5671e9080956e0112de9905412a9de07f42fe064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842ec791e9886c79355c344c62ad8a17
SHA1643a778a8d9f61e894010a5a56b4a1a4a2c61529
SHA256af1bafc5b7ee054e5b7bcea4f543fbac0c493e138194974315def5af2cdc4536
SHA5128c8026a8b11cf2c9322ed0ede67091b35023280bd67bbc4248425f327b3dcd15ef877e7dadaf9d32db8c2fd149ab407e602bee0ab184ee8e09054eb828144f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9e60cd2e4bdc9708a5bf2e1d8e0cb3
SHA1a7d847f8fc6959989efe41d3502101e3a67521c0
SHA256e08f7724d3aa0a1c3157c13ad1ece9dc22c72f779fdcd02fa2330626f3e555ba
SHA512e77bcd93f20aca7c5b1ad1690a53663d8af9ccfd64e7da3ca2661c27039a464954f974da3359f02bcd747e565796561c78b18243be6be9f5ae4e5b523bf0852a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1b97d5723e62b52952306a4fe8db25
SHA158f175322b1c9156e1b3a0794e83a7761951b1d0
SHA2560fb9d985de24960fc8e12e69d7ff809eaffb5079e467b8a1c4ec44bbea411c43
SHA5125018ab06e64e8f682115b021a8c506a1d1d43643a129ccb0e6c026b51ed9850d232c0a69418de2bd6e152914e119ab5bb06fdcdff82c649a1eb3f1888eb3240b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c88d76bfa88854e8fa0ea0ec26a992ea
SHA1a97012d06f990cd34532328fc0f5f027776a94e8
SHA25669707adbc65903a04e9f2934c89ed841c7d8e5de3328ff00226fbfc7db361d04
SHA512e4c03826c6c531fc08f817ec8dd6786ae1858fa53acf5c3ef1eb195aefc5cf127c9a6cf8ae2a1f69d6198092348b0ccfe349a06eadfad8c4d3545eec6d74ee14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5194cffd68ac420083e660e73b47aa687
SHA19e59e6570d3d16036a0f850d5393b75f610494a7
SHA256150d8901b98e77629dac7def02113e5633ad0292bf1cd2b3542c8bb0be2d6823
SHA5121dedeadff0e1ceed5a87c544317c2288fe19adbd6877227eb57853d5fc97c8c4be5e5bf045e1bc954342be72a1846a958ae8b6e050097ce1a96a993de406a7a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e16f8459d61f77a3bb205546e51cc6a
SHA104922b921f664ab5a0f8d54d6d4ee3bbd1747b40
SHA2565a83647f192cf039062d1e268507d7ad00ef279a1e82408a255d3fc0b6182ab6
SHA512e701dc57b96bc699414fadf8e3e1e1a1978850987fb50b0edb573459c8f50928008e4541d0986892e1b4f330f231e41d3acfb6ba692560a1a7ead199c0deddf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e9fe7e91aca97ba68c297c278fcd303
SHA13207a74846218fe33fd48f0757552a74dd4cb5dc
SHA256e39199689a99a2ad3d2bcac404b11d63b6b357bb1d251886d41dfccd5334214a
SHA5128a154b0f316d9e67840287eedeaaeaa792698d8b423984e56c4f615bfccb7772bd83643d8559c4a5190d5622d16b591c4857b6a8103b80b8ce2429943bda8ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc9fbd617b3bb7eacc3b6806b436297f
SHA1767e736bcb38aa5591ca6141a5dda2684e54350a
SHA256c33d2e1b23acdb3478bf46856ac07975122f9aa5866dcc6926d7b92ffe43acb8
SHA512dbd89bcee7a776e9bd316f3630aaa759cc17757d5c4cbdcecea884e5bb73e3c31f4d83268ef9a3d88ee2848f05bdef1bc3ce6c628e9b18834bbaff49d5f8e6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e0971b99f2fefb2ad990445dcebeb0
SHA107fa4c6de17407814abcaffe401be7b004fe58b0
SHA256c38150371292a9b8ab6a7c7a01aa26afa675fbb55fbc312b07a4a23de26ffe2d
SHA512c2031c1b4424ec149949e965f3229e91671e5cde5242361ad721d46aa5511838a669ba58907ea200c18f2d9600e5a03935eb22cb2f1a3ebeec862507faafcc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f173fb5724c71868d066c6488da08b
SHA1556ef219a888b31223ae8471e592e827890cce05
SHA256106f24749093868f9b306ce51d9c2655263e1341dc22a7f7db7889555d234cd3
SHA51299a01f41eef2c4b777f486b124a0b07a7c22490eb2287243099b7f5d2a4793db813e21ce9ebbe1571416c20043686d538aebd5e2ca33322b62b2c855a04d84ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698d4e90aa4c5ba9e4bdda973864ff32
SHA16ea78f5b040bcfbe9c01035b74973483ee62f5a3
SHA2566cbd61a2631c9f9b0b996ca984ba56d34cd9ac387dd79ce37e0738bad84737b7
SHA51254d77b1be60b5ea575cc22796d5a0bed0bde1d828585c957a0360c1799f09f320d86409b34e6569e9f5b69fbce0c43a218a47d8a9d70068431c7cfce764e56e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8798a31e38f3f4081e05814b2dfad8a
SHA12cd50f28d2081a4b095eb14c0deb76a6b46327c0
SHA2564404d861dba4fb1ad091dfeb57531b2f85aba06000d0df8527d2ba63d6f5e5d5
SHA5129c997c129a1d9c3efb2cb4013670c38748447e013b68ed66c6617ff83e1944887d67cba42fe389ab9502000d2585ff09d09dc14a478eec7a641c93311b102903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e8b54f70e82fadf062fc7986f0426d
SHA113c2a7abc6732e1e984bbd9ba7de3e3c6f9023cd
SHA25647f818d5b9505801173f878ca9b3bcf5f6cd9b8684a021a987385cff7c8d58d3
SHA5121e12eb948fa7503117f16c58c67cd991086c01e2041f4c574e30b4bb6abb02523f62e5b97fef9947028dcd7566573ae997af26100c652b32daba3ac21d7bc6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55868bc0f0355e8a51fe914bbbf39089a
SHA1787029ed95ee43c61be540fc34e9a96f515b642b
SHA2562592b8566113e7abf5ff7859340e6d78b51d9156fc6319c9e2d9e59036dfaaaa
SHA512cbdbdcca6420ab79a19231bf63fd56bb622117539e8914e4a4b113f197048bab3fb9117d18d1c5e9ae2a19c82e6a314922094a6846c96a1da00d4b07b0228c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bef6adac516386c82f4c91291e0ce57
SHA1eb43260ce65398dde431384274358e0981cee87b
SHA25678918cba86cb692fd26c04f5a3dcd860da02f63f253af4f88690b01070ed3c3a
SHA5123275b7eb40c15aeb4c1e5f723caca122b7daafb0b4a80ea6ca18f480220dec4a9eabcc61dae408e0f012c15ee6838513487843edb43e80f0c16d36e647860739
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b