Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
d5bf055fcdb9ec8646fc7aadaa5b5331_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5bf055fcdb9ec8646fc7aadaa5b5331_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5bf055fcdb9ec8646fc7aadaa5b5331_JaffaCakes118.html
-
Size
10KB
-
MD5
d5bf055fcdb9ec8646fc7aadaa5b5331
-
SHA1
66272dd390d0df53514d59ddb1060dd6d802d2e7
-
SHA256
5605f8d444b2d113ce244e17e21a115ec62d148a9b1f522b07a234006e72f739
-
SHA512
636610a954fb0e8fba5c4ebffc560ace32ca57d2c4523057f7a17d7f67e13fa74157b100163d9fb112a3c6bb756966500f74535d907d562ad74f9531a0783c28
-
SSDEEP
192:eLJ+zS9hAVo8Hdcs/ThRenc+6oJjYQYQne6EF38Pro0g:qQCA7Hdp6D6oNYQbEgg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432022963" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93475EC1-6E6F-11EF-AD39-C6DA928D33CD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000007b2768d6ed29946c4d255b5e8d751a0ba7cb857a9c0d01aab8d56aa22a0c86000000000e80000000020000200000008627830a45e7e8978c932c80adb9aa8d843edb4eda0a8f31a2c99ed203c5b9cb200000007471351df5014d2631000498bb954e1bbc0ae3a8881287f17eba914f6f7aab9140000000863076bb1391735592a3dd64c043481fa811116d17af0ccc11dd1aaa42eb34a0dc5c1712e1d744f467b699d9f38e2e1834730cca5827010d5e148f5e1dd30241 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5006e6677c02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2816 1668 iexplore.exe 31 PID 1668 wrote to memory of 2816 1668 iexplore.exe 31 PID 1668 wrote to memory of 2816 1668 iexplore.exe 31 PID 1668 wrote to memory of 2816 1668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5bf055fcdb9ec8646fc7aadaa5b5331_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56eca2bffb8e7b97ae1b007c7b0d87d
SHA1c50ac96d9e86e5bb2abe238e02044c602287bc0f
SHA25679d8f8e46a0c9359acd4efce155ffc2584043d29c58699c0a4e68f955a4b67db
SHA5121ad4517347ae5fbec599444a19589268d0b0a44f18f1f3cbbb302dd5be0fb9206d933992b8a217f37bdb92434255308c66607a9ed8c2241c9b98f888f04709f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb403e6ad6547426f9aee6729f7f9b9
SHA1a6c107263e4cb66cbc77720ca48ad62617635779
SHA256115b2b93106b5401fcf675478565d24a0637ea16b16d9ab2001382214f587421
SHA512fa6c639a9c4c8c62e903b1599fe221918fa969b95187a3c6589ef2f0e3a89165c6db9f00e2ebc659ec0598a7ef78645359748354753a2e754ebad5678307c146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e6bddb393b2db55eaf2f9c806202be
SHA13e778ae27d60275090af621640e76916fabc9f61
SHA25633dfb69dc914f5f276e4e6945f1f4ce4c508be1fe77f3b4c969e8d147d3bd77b
SHA512c51eb1fc28e4611b4b015bcaaa2e1ac52c20387c5ce2cd1b37ae63474251cdfdf9170a6d4025e857ed33f26eed03d06ece4b4875d75d33c2f84c03a762bf4616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61583cf8d689005eb72dae8ad754842
SHA189c7ca2883ae7bf27403dc13792ac81e0fb4fd4a
SHA256314be2b4387212ee9921ec8a29c138ef3a1ae23424f38ce7f978876cff919ce9
SHA512a4f03cd7d6a11eb131f6fbfc42f6e7e4306ec15f26a030944d2240e0c4eae222dde224938f4e31297071baa70d1dbb64f12cf44be1ab8652d859c29de72b6cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc1279fc0789571a8b74df567ddbb11a
SHA1e8b33ab2ecfa76ae1ded7c8e5651399ede6d54c8
SHA25674635f9737d92575c816faf6b105f8dfe8279dcd3e38d909828873ab2e37dd08
SHA512f7d5caaf7a11823f5baac482bf404ac01f0ba21db6475534a2a0e6d57d2bc0a767844288b56d53d92744904966c1f5dc8d1d5290f1524d83cb49e9af86bbe863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a59d744f523ad9e59a65890fcef60b7
SHA19121eb85f87c06b0768d400c9f79ab3fb68d4db5
SHA256f6fa5262c170eb8c0c6d87ca21db7de00d5559ad19c080a87dc53edfe445c02a
SHA512f7951978469996ddafb203eac22b6cdd470cba86593841646673a81f2d1540cd78fd585731f1758242c86553eed961305086c345aba0912132a2caf8e6246669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c190ee91092defaab4832952ec74364e
SHA19ade72e0623a7a1fcda170e59d3c7edc6b318d71
SHA25625fdf220c0ced283b404919dbbd4ffb07e962d28f6a321f38037a23c2ecaa84c
SHA5124463c6b43c81fa4f71687118ddca4eab8cad9e07e7a2c2682b57eebaedb74ad3697ad96a2b320313d90803f73a2461979e59a924edeae45519be9f4b124dd435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556fc049804a31b9f13f920647d13fdb0
SHA15470fd9a9af4a720a54174d0050f3a555730652a
SHA256f5b6aca412696759bb923e789cb0b30375fc739244bc04bc003f381c5eca8878
SHA5129a653d8410031468f3b1732182d771fba1cb6a199522343ceee3be774063fc4db76879b4c6331b5430389c9a9d6828309315c0f3e26305d5b09c061132404419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112de1ead06dff46498bc6d5f7b1a6a4
SHA13e4c9b30437674160256bc6ddfe9a3f3d4c6129a
SHA256af0f7bb694b322ab7fddc8f7badb9db89c23056874dbc8c6790e644254d5386e
SHA512af3e89c4fe817f636bb6438ee1188b39c17bd73503008b9cc49d5ca67a46cab6e297aa98853865e4749141ebcc5a6646b2a97d86c09c79918b65bb1aea523034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad96aab79e3ef3fe3b8d9cbb29bfd2a
SHA188751c935698450853b34a4dd01bb50b7ffab5ef
SHA2567c66efe2cfc946cc8efcc675c16d3e30e74572cea747bbb5f49f3591024f7ef8
SHA51276d9c02ed892eb09ba3b5888c4134a39101229711db73e803152f9f53002e969ae1ad9ebb0d2f8ff9438f4880650fbbdbfb53d9e36837e20cadb4561c7f01164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97c582117969be8f4598b119286c013
SHA1768417ec0ba08bd2395ca8bc6d3879260677f6de
SHA2566322bd998f26b063a4f7910ab609cf5e5570b06ca60e7efa849420f6113004d1
SHA512b226d9fb10996bf0f6ef721e81a6c8c6598ddc2ec97025939d87b0232d1b6c6c25b934cf46243e9243a35a5cca1660deec8a9ce4f5fb5203b585fb60fa546eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f2d37c35b6f7a63de9b9a4941af44b
SHA1684f31745d52a38f91d7d21ddf7e1c96f9c7909a
SHA2562d3c6fa40df29d7ccf18bf1bb3ae914513b333af3c55a96e378d745945f0157b
SHA51239050369f171930785903a1390cafb9d982db57e09b48a2a44d870aef41532f3a5c3b8ced1580bb988d2cbcf456ae516402e2368d9370d82820b5f15b5b0330a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5435ae252400fd99e472ae859d6a0a61b
SHA181a99ffda1e0efbd545f2d0bfae183bff0a79205
SHA256bc370a40ddb8fed2b817a6f5a9a3395ac83044a6b76c7d824f3ecb7a9b280559
SHA5125b5c3ebb4ea66a3554b7c26e193e083a8f9077da71a30170d196699109d1bf26946a44319a26fee8f182bde5eb6314b15420cf4c87d4a8116a94e9cdb85c3bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebce0a82c1d1863c73214318ea0cf506
SHA1806737158bd5abee8f3e4271d7a1ce18f7479e2e
SHA2560ebaef56c48a7978c86687ec8e57d8771f6f7df4acd63e03cbc5c9687ad3f320
SHA5124ff3401ee599f47d4c657f2d71568c1b5aa52e0487ea0b7c915e5c9805348b0b48121c9cb340bb55b20c970fb75d5e5e51b9efaf79d95a733b8b8cb4138a5d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578db1988f00550dea5a93b2eb972ed68
SHA1952de1210828e2864d15d4d10ea1ffef5bdff941
SHA256f8a72d517b07fa9a731efac21b4ed33725617baad8c584962677b5cf52f3bc9b
SHA512487caf1ecf9e69e5fbbe5e8924abfb453313badd98ede7543a43c6060d3a362d1bdbfe949cf5f0acbc7eb5185618351e06ed6f26e24d4620e47bb5453d1958ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5779dbf3d3a0d5f041d5d351db5bff4bc
SHA1cad548dd2a988ec5b2377227b0b272e4fa085bbf
SHA256b48360e566bcaa32f0d0b6a0102baac57d7ca8621cc56e5082c7e2d948849146
SHA512dc193799434d15583bfd69b7c26146bc3fd6c7664ee0577f2fd6a9d975688cb5c5aa23d48d7a267e611e64e6700449379b6233751d916b1a1e18935343971474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6207fb8e67cfe3b2a79634909140195
SHA1c7ffed9416ce309ad006c3a2d2918dc51828e9a9
SHA256ce8a11f0d8abbec82e26cae579f7d8ddd3027d6a0391df78a90961a165a35ee8
SHA5121d5403ddb21fc055842bc86c1a172edb284b5347ace2f15716700628160575849a79bf6309d67c59afd190adcddce9cc2199a9b1a5197c10a97edbdfca63216e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ed669313c19651728eaa284542ed2e
SHA1f842fac35267c9ae19f38da098d244096c086b15
SHA2562c203c68dce324cafa1f2788dccc1ba8518a6aaa99059b8eb9461c993961c206
SHA5120b536992b893a66ae44b48f0f56bf7f3a0bde5f7ec6f37e886e5fc8aefbf4f30be93ffcd94449ad21119a1ef2468cb02d4ab15cda4d2a4ab25c6b5ab58be5868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f1f058dc4288f6dca3027e0eec6263
SHA1bef46898b6a0fdb1c9861f3ebb7646cf58b4949e
SHA256c62070fe53c00ed7dd785d5f89bbff36c28c542484cdd4b76abc490ed5e53ffc
SHA512535da6904c4463953b5b17286374beddd55cfe4ec5b8119be2dbb26be4963fd48c7515728b759b0fc606081a16cc928b6e5e0537e36211051187823b209fdf68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b