Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
d38893002c6042762392dcaa175b1800_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d38893002c6042762392dcaa175b1800_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d38893002c6042762392dcaa175b1800_JaffaCakes118.html
-
Size
67KB
-
MD5
d38893002c6042762392dcaa175b1800
-
SHA1
8d88001e88bf61ecec56437c1b75a8e299e2fae9
-
SHA256
2f245b3d8623347806cd8295d27ed678163de0fec20b4c2792d014ade4524e08
-
SHA512
435ff0b46dbb5de31a99e6f6e078c1591c5e6626e4a20e963cea1d3e4a360883f214f6782d14bbfca5fec2602787d2a38ee78734066b63bc800335ae27216fc3
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6s86TroTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdqTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5115B131-6D9A-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30736927a701db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000000b649b3dd7204969889585f66f3f7e52b5ced30f3426d436da5915fa7191bdaa000000000e80000000020000200000001b2184632c1d1c1eac88c48ea799db9a39270eaac37c46bada4c1de0f72ead2920000000cfb7337b854186f663c9a76f6be7709aef5fdb5e16ca8fdeacb5d8249c9aae6140000000f5a469f2280acda428613bb590b8745d73dbb5ced9c8ab2b279ed40a8e623928f15d35a487ce7e21b6831a450042bb05b2ccb79cbfd7728e632781d33d15fdfe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431931370" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2104 2360 iexplore.exe 31 PID 2360 wrote to memory of 2104 2360 iexplore.exe 31 PID 2360 wrote to memory of 2104 2360 iexplore.exe 31 PID 2360 wrote to memory of 2104 2360 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d38893002c6042762392dcaa175b1800_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f3ee74676b3c24f073ecfd19f9b1ea
SHA1dd7a64f400c7501b9ad9c104bfd75ccc95ed08c2
SHA256f5ea9bfc17b18a5030e247e5a45cf614eb04fc11bca6b826975ad5df55894746
SHA512fe2adb17c90214229d63e6c1604960d6e6ddedd34ced81ac6b4c9931ef3653aa531b3bdef01fc623bc6e826f46faef20c8ac1535d520bdd4323944202c50652c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008bb83401c002de43e25642e4fd4300
SHA1a0ba9e5615d7d8d491680af7ce63d12d6d5fe23c
SHA25624c0a91e27fba3e0acf7be311e5738b387a18d30d5b97f5ba47441c5941a0f76
SHA512e751c7b8e695e4a42fa5f66de97c4b537b922669f864e9b031f030ac0cce28946712d8cd155145ce8d959c1f5ec8f4d04162a4f29709116c7c60470e409a71c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a13776d569b858caf797756dcfea698
SHA1d27ac665aa0738eb667cb4ac1b49479e1972fb97
SHA2564d408abf7c4d50684483101c0b9019497edf8e33905ba554c89853a2aa65700f
SHA512440a4755ba2cdc8bea3f87e88bd844fcd7f3c5a97eb587ff39f1b1c3247d0b898c412454236098c7b5ab4955d7107bf67e16c24a083145ef38b30b939f6bccce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791a9ad842e6926d00cc6002e15ae21d
SHA184b232bcc55a3575b99686eedd5903fda225b9b4
SHA2564b6032129293c28bf934b62f45c3227fc9d2e1be47ae71b6ef7c6958458fcfee
SHA512ac56b96ca6b574ba9cfa0292a10e3718c49a93203480768463ff936318025d421001001c7d76c8a0711f0546bffbdabed1cae08975dcdee43c05e70dd2b2eda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9857892fe3ec6ef74cc392eaf5c939
SHA1e461367a2281d0fd32cb2971b91bf3c2d4912985
SHA256ebd80358ae4064cd9cfb647c1ea9005e08f694125fd074c0639c9c2f2b209ffb
SHA512449698a4b3d1cc6c85fabde62430da34b0960b074e8521c7407b8c3a4158d227811d03e4f156a23b462baa286d48f597a7e194eaa1559f0f340c3fe2c20d60ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c20417cf13ecb1347d967af3faa295a
SHA19eafbda54087ecf962d170176eca8b5b1433f618
SHA256def3b438e4fe6b5740145579cdc88a2163b49eb41bb9808a43a477d0f740aafb
SHA51237597c9c6cd4f0db49cb8ea7325de84187b9913147620a6975db1bb1a302023cdc1ba4e7ac2e795e51b511e7a9116f7fd71312eb16ae2d03382824d6d009eac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc9e1ddf260ca6c1dff2ca9f2db5efa
SHA157ad02e004271a1536101222ec1bcbdd3776e685
SHA256428343c80b9318de411120d75afe79c96278c6df7a07571fe050eca132c1367d
SHA51298b0e91059740f28c3d09d71ca5ec1b7a6873e1bf1f27bb773bae6e771c119f01452c3199b9b5f61561cd638a684a2dc76014309f2b8478572ff0381665a2d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9ffd862239f30a9bb806ce28940fc6
SHA1a57585fd0610072771961976800a575253b07f30
SHA256b68733fe445156cf33d4794a0da1d3725b98235d715f63d4fff2a840fb5915d0
SHA512966462311207608aebf8b0cdf4b370a1fa98417a22d0f0cf3d7f50f9d79da1e5f02cac7248172a903506869ba391acdff1577b6dbd2a8a3b8b111c82bc9fc780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057a34954b4f47bb0d723aad802dba93
SHA1391c111cc4829cc04b0391c3684a268c214f7306
SHA2561d441bf7d3c611f1d112019c58467504e08bdbc4f23e55e614769ed1dc9e3605
SHA512e3bd6f5634e2dd6729159ea3503e56b73d1d7a3704dd31064e4833eb08ede1b79df82d10ecc53ee29ebbf443093535a3f4dd826dcc9944ae915ddf485bf58ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5910ed025946b7a989acf76bbb95f9
SHA12ccbf2ef0dac40d9c84a57e8286436a973dd154d
SHA256c1b655338a19154928ee2faa9ca19da4804f48ca1202d176960bc201a33a4445
SHA51201db78f5fdf9da10e985b581c944519f9a2843f8878172c29ec9349fb4f9af24333509bf8b589d6b318ee1b7cb14d76cee7d6ae64720e65ab82e891196b9fcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fc205323a1ea3a6c8d307048738329
SHA116024bb2b1dd404c321731ef9dc8be14140e8306
SHA25682d1cdb6bbc6f95336016d481f9495454509a8b03702e5a122ad159628358baf
SHA512061ac054fce3b0e52447365ea1b7f5221bdef5e977e70cd9eb58e1121c7875c19d3303043558ec1ab937f3bb45fd82dc75b364ec6b433e60214528ce97dab83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504989b75f83c0dd80a2237d2527b7131
SHA1aedef9e26b0de25f3d906bd71e3971dd2ca05d99
SHA256c5a0706cfd3f2a564f5fa6c40140530a36fa94600af637a0f87298aa03b161e6
SHA512e4cc23dd0055bc2c7d4a52e99e2b72f81768a997f10d43638e9fdc79afb24f4e2e457b519d09bf00ae6f8bb2701c3032051d5a4c140d633679d0611370115000
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cdb6a6620937f5ca325c30c37084247
SHA1096e78dabe67e20076bf6ebb197fdd4dc5a7fcf6
SHA256ae2ad63749861153f3af34d0a2776d8a607df8c8f7293fd816e84e566fa767ca
SHA5123e15cebdcb070cb8e15b9ea601c20153dc1cfe8a007e2e45c067dd3052ebe4fe4a40a2af46c779ec9fd78d286747872fcf65f0035a5283a8d11b27c92c84823b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f6aa8647425d596b382022fecb4f9f
SHA1f1532a57a7995464946d4211c52e5db7948bfb88
SHA256efcb62018b288caf2594cd7a57cc5173282f78cdcda2efa7e1300bfa7d803258
SHA51260abd95845f808daee76aa6dc9104313f97a9c5e8b83a54ab857257964cc387a75959e9aa9166b645af7f3d80ff6e13fb1b6041e882d0ede53442bc86a37677f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6591da3cf51e68c093e7f093191bed1
SHA164c2b2641873dc5e970d02d734efaaeadb405015
SHA256ddf4bfaef21228189a3a95511d1cdb2099e6e9d25f00a8120b875dfe7b8d2420
SHA512110a0f34cfe9a661338bfe033e851c3b4d3f6e61d9d252dd1e42608d283f90ab70c235d3dd306658f8de21c3e3cc1ac5cbca8979affc1cbb30352b96221f329b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d6aa0c5a2582744c8e962479b40ea19
SHA110241b4e1979050882e529b06e0a52739d5f7b60
SHA2567fd41f2ac56e2bd33c5df6c7ac96d509f129abef8f1825db5604b61559b6e6bc
SHA5120fa5dcafea0c0ad3501b3b0da72089550affbadfa5f813241056bd0255d7c085fe84ca88aa83b4cce36994eef1c9963fa793d4e532d3be6917970071caa1303d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823e94c49f29e6005fa3a4f313c2716e
SHA1c192915e218527f28acb7d2906622ee0514a4768
SHA2562cbf893333856af5b1c665d44560fc93b8683f442717d4146e161d98338786ce
SHA51294610da054a84aa8b52f6420af35fd980652760a27ddffd6ba3b6a3ed007f9c148f2c615f186b0e9c1130412dc81a84e4faba5e8530e379ee78b9d610a345a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ee9a8610576d1ddb98cc5d9f49984d
SHA1d0a00bcf82c74d4c8d9dac173cdaefaee4ceb1cd
SHA25638b557471abb996e835dfd371779b637c8f70ebe4541ed8477560467714e4820
SHA5122af6b837fb102942ae7a63578206149aa17d769e11bf10a48d0499625745a2dc094de2cade809c692c0137aaeacb5c2c42f511c63d92913977db6addb7ad53b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d38cbd9446461610df2231c67bee3b52
SHA17640c2a5743086c6fae210708ca636ac6131200b
SHA25663cef51d942a50b08e94d85e5ac08daceb35c3fd6cce585c320f961b0dad310d
SHA512933ed8769b46fbb60df648bf8add90c93ffb89c29c6c32edbc6629d424888be5712ec55a12b084331c331585b6a8917f028c16ad81d6420de102422e6014db89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b