Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
d1c9b7ac24e8ceaadb18a4da406622d2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1c9b7ac24e8ceaadb18a4da406622d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1c9b7ac24e8ceaadb18a4da406622d2_JaffaCakes118.html
-
Size
786B
-
MD5
d1c9b7ac24e8ceaadb18a4da406622d2
-
SHA1
584ad4d0db24ff0e2a97ee152b6111986f276daa
-
SHA256
0821f259267f94267fb2f87ad37b25d06f0f53c953e5566e5e94afe645ba25e6
-
SHA512
b672624840238de9ec10ae1198f4719767809e0134e43b40a97195bb0930fc6340e92d17d1caadb9cf08083221dbbe5f3b5463a12a5c86b541d5ded4aa1bf1d5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e5bcf51501db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431869041" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000090611db80688b3ea9efe1fee20e1967245a3b70508c5082eeedf8836e11b92a1000000000e8000000002000020000000b032b0855ed04833e72dacb8377e472d286d1e0f5dc3e4cdc48c9d5314708b2820000000de89d7ffa7f5845d2a188e0d54c1f45c2a72b15fcdb52e312361a3f12ed6358f40000000868a3af360c5d8097a34fdf1d8113ce95bd9220652108c7aed4637d1d58a57713b24af3074d374c83588f7f715e4a43430d8f02303a21694394d998f6a0875b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{320B4F71-6D09-11EF-90A9-D60C98DC526F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1320 iexplore.exe 1320 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2812 1320 iexplore.exe 30 PID 1320 wrote to memory of 2812 1320 iexplore.exe 30 PID 1320 wrote to memory of 2812 1320 iexplore.exe 30 PID 1320 wrote to memory of 2812 1320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1c9b7ac24e8ceaadb18a4da406622d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519efcd0553997a51900099b3c70074aa
SHA108522b6f3bca9dc0801f1789cfba53f1c55a3646
SHA25601aa2abf1e916e59cfd5842d7c3c3c7d0860dbdc8f87732270e7eff0cddf8c24
SHA51254ccc428d948f1618a3f2e7799bf5b405736428255c83f68ae9c569cffe1a2407a78c517e2e8eab953f09b3381435342f3a2931096747c5cf38dc7b14f8855ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3e25bf563189f4056ba8c28c97539b
SHA1c45c6f1466c94fb32bf1cf90c205b4d12ded5040
SHA2562355c0d6f139fdc9e1bdf48e9e00135bc8fdfb17157e03a36aa313e4c3e9d9fc
SHA51293b09b736113e4ab977f5495dd59aea0703879456a18b8ea87e0772f57a3aa90538eec0e2e405a7d7d61fdef35f44fe282a732f4cefcfe292bbc375fa24dc98f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61098c9efe50377a7bb7fcc1dc5ed05
SHA13aee6cb67ffaac687e66289f22c7107a8e98ce3e
SHA25643996d5c722f02270a90419c7668a40baeca195046273e1bd59b623f7670ca92
SHA51254dd88963dcc327bb481adc4a37fb3677adc03ec5e46b6af8753131d7b2b46aee7ca9ea384563031ed4a4140c6d998a45168977d7b1dc72edd4ca3cc400e1a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ca7a600b1b453442e86cebaa8531ce
SHA1bc7e636eac9b20547fc593165931b5d89809f8c6
SHA2560c87ea274969c590620b86b30bc16c1092ca4466df7b7a9074142a00891ae93b
SHA5129b498b0a808f9f1460623fef915e799612dc534a6689ce53751c392ad4dc0a5f589d5c6fd915aafa1fc108a76bd86206581bd2ca34e2a4bf92f35c0daa47fc90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ee603ed68bd4b4f7ee8f87043d1294
SHA16164e81146a23b6d350a557ae937f06fbbd56b0a
SHA25659a10842ec7a36af1f560120656a3a7edebcef6655618406f945d977f25ec0fc
SHA51218b1439712446462db093742b66bc4988e0eb8d7903340b39b95ad0fef8a9a37d0f9cb9bd5bf2a133fe59eacd74c0f602cbf99b70e80fcb49a9336b2264fbb15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f033034a1903cbab57bba1dd5d6ca38
SHA1814d37829c408d184175d50f7c16c3b507af50fb
SHA256f9218523700437d1e6ccb0a109c3e9a92dbdd8e551aab3e20198b0e10f662e38
SHA51209e7a69931d2a6f0f9d142110b8843b2ea6e8dd02fa705e27548ae8faab76fb9204ef0ab1214802c212192a748a0a7f1570746d52a02928d25eac1fde0fc5b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1d0e4162e613c5a1bf717bae9f53f7
SHA1188ced2af2d22237bc92bff30877d01d4952b671
SHA256e7beeb506a6a00ca5ff869a884f11fbb001d80c28011ef923dda1aed10c16192
SHA51265e9237ef01807952579b855fb4354f9bbdb5756837a87c614610b0506e9982db04b21f373193648e1df2739874d0bf7b0abeb72b7e58fad54e4245706817d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e2635d5a659f10b6340474b6d9ec23
SHA164f462c261caeacccb0b0c993b961f7c3054e23e
SHA25607ba2a7377fa60eae3f654b1d936a24223dea2c0983eb3dea7538b6dc1ce9372
SHA5120c0f58f2e8580c95aa705e67fe27dd09b10da99f6d2cb30c0cde63c4be2d3140be43863044c26649b7ee089fab52f8f05cc8f8ee5a195a098013ea5a9171ff56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9da1302ba878645be9a9dad8d3dd210
SHA16b022331860f7220b2dd85537df0a060b7983979
SHA25699c2c7fca859923a52d1d66ab3540ff48207eb9ce8de8400b5b6da6f8e475286
SHA512c7d7410197be35a7b3e16561de389da83af66af88e0abddd72f6d32a36dd2ef91f5ec27e4241dfe22c399761e2e12cb77e3a95daa70bcee0dd8ea201ba3ced5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b3e746a28ae054fb92ecc88b080354
SHA1ba15e45abd7f13c50fb268e9348c2b714a29eeef
SHA2562d447378afbb9c3ad9817bfea89391beebcb7f4df3a9b04b4dc07f7845452ded
SHA512649d7dc862e18902d20804a0f42bfef46223bac3ef52255ebc4eebea7c1a176e35375052326e67c2e3aecdcd066af5bc5e0d620fae3dc4b0fc310aa57e92b2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57090671df6df12abbf95b4cd0236cc71
SHA12ddde8038ab4958beb4e9fdfdc1c9952fb1f5206
SHA256e32df8dcf271fb9408dc71335c685b883cf594c04ffb945151ef2f0af22f9d44
SHA51203271060b7167cdbfe8d0aa76b50ac3d1649067867823230edfbbdfb64d642b97bcc66768e634ec5f740dc38bb9e66f6eaf9c6973a688f27966715dbc1c80e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c06c4a41d0f87f343ab3c3b100c23a
SHA1dfa5ef62b096de3b9165e30d0d0f0037c3cd5ea2
SHA2564635fbaf4af32c75ce475969ee7791c5228c3fcb213ac7000f2d99f605959012
SHA512c996187c5ce63d1ee30ab2fbc082a8c1b8c41a9d4f3adaab9065a72988e463622afb170f2c21d455091c7d591d23f43d1cf6552878d772bd146dfdf8ecb2bd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8a1db81649dbe44b9ec15fb3ad73f4
SHA1f70704d3b2310c06f8f02713e73f87c6b0df8598
SHA256bb0709789bac6972e508f2344b3cd3eef51a5a5242330d9fdd2345b21a0d870a
SHA51280d9e035ab9f4a3c269ebfc158c4d3a4e54c3b5c88359b24e9f4f7bb773f8fae4698d4993a985324ee620772dbf76cf7db3e3a387960e313ffb30f0627c3dc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438070f583bd9de3626dcefe4c944a93
SHA121b1573d449a43ca92629b0165b40e88ef07d28a
SHA25601c868b571a4c756af82ef679c56ab36c5c68abe136560cf27ed6a1484db6c0a
SHA51226df2c232fd266d8fb429219dca96a2e692a3b9df17cd5f5518d7c898696aecfe9419d0d477580fd8623f9d7623edc1ccca24b362cfc44357b5b3eec57138d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ff80a60c06af4fca47a4f0fb01fbd4
SHA192b0c34d75157c07eb12d19c939f88cc6e728dae
SHA256b137c552abbc7083204902ffe238d1376e8613391ef33a5d1490bc60d1772774
SHA512b1742dc31beb5b8c9faa43cc93d2f06fd6c5ed47e038ec2daa4fcc8edbd40143b5daa5540212941614cadb6c8b0ab3c2cf2684560a9da3fbf9b58c06a6f29361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c91baa4205b5d7e195fd45b80da5670
SHA172e6e476d91ee1974baf9e9b7f9d186dba052625
SHA256b87f33bce5bb66b1ead5c06e241f39ebdc8e86e31de223397f3522044c496f21
SHA5120239ec3029955e84755ff0b068b0076d8bfca6a3c2ecbc15b3fa2cd1a605b5af701444130cb1671b7b38cffadcd59372faa450b9f9b981a42cef6ee6e7ae31f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3381b49c3ae66409a4dbad8783dc18
SHA16c152dec1241efc457534cdd5e1ee5872031a26b
SHA2566dd1baa97db1b5e90f34bdae534e5846b79dbfbba44b9e4a3db40aee07f5d463
SHA512c0fde17790013b04a1a1fd54ead6e7a0beee83c27c473b692c968fc9cc554e8c0baa1c6175de01f4b8aa74c198391ff7b5d6d9e0f3664425178cd7ccfbabdf9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5ab7b0e2447c571fbcb6e206b7d8f1d
SHA118ba9c3cd852bf87e3b765886e82736fd35677cb
SHA25657af102afdd49df5e4c2ba24057895b99d2aff07e92d23acd566109893ed499c
SHA5123d3f9997ba2bd609359c1d60f9ecc899943133a408e78928c268721539f82ac4b8aa0afe86e63ba4d6bc2769817ea62245fdf8b6f061710a234f004ffd68fc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b0ea2c6c1f64206b7314d9ac810fd9f
SHA16d41f315dfe9fb6e947dd2bedbba62d69637bcb7
SHA256a2bcbe66ee6dab962255cb2ab7aa1a615fc8ba088be14db938489682209e9278
SHA51290c6dae44efb654c19d297c5b5eca42e6502c9ec4f74d3aacb5707b80d520edfd2d16e0487fa32d3d633cac1b35340638096c69c80ef90acd441f1af1b31c5cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b