Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
d6015ba0240088c431ec364ddaa94c8c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6015ba0240088c431ec364ddaa94c8c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6015ba0240088c431ec364ddaa94c8c_JaffaCakes118.html
-
Size
345KB
-
MD5
d6015ba0240088c431ec364ddaa94c8c
-
SHA1
c90021b599928b31e4f5d5f31cacb0764e966c51
-
SHA256
d39e36bc2071bc5512fe99a0e614acad67da34298a91d24868ec1cb3ce20844b
-
SHA512
150d2fe93a87cd46aa7440c1e6f9b21e9b6d39c61c0384e180b6435e901726a34f30448fe6ffc0e928883fc4b5518d61ef0e9d6f71491f34c15ca49112a6dfde
-
SSDEEP
6144:SfsMYod+X3oI+Yyol5sMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3Es5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70055bc79702db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432034615" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3CD09E1-6E8A-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000e5d8609da0c1e1aa99a91f199ecd4933ddd77b48db32c868c0e0ab5f3c570462000000000e8000000002000020000000072c361e8eb485745713e6a07475b48551cb34292a3e51f369cea1e11ff2740a20000000901c4e75a932aad1abc6f73164b523ade3829e5e9fb7174f0d7471d29878dd1a40000000dcf96e8190a4ca1800fa7b1707dd06188a1993c392049eac2a26f6cc6c1cd208b6ff418d55237c72061d2fa79a1e84f0be805d87211c8f6ca5071808151d1b7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2804 2172 iexplore.exe 31 PID 2172 wrote to memory of 2804 2172 iexplore.exe 31 PID 2172 wrote to memory of 2804 2172 iexplore.exe 31 PID 2172 wrote to memory of 2804 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6015ba0240088c431ec364ddaa94c8c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b912f2d48c9c64508dbd09227c6cd238
SHA13a251ac204ab50a0b49efc97a669b1034885e880
SHA2561d605203df3fd78a49e98e11e1322aee390a651de96746b57ef36a90698dd594
SHA512dab9e83704726c578be1fe20f8666a1045592bc2021498cc23cedc3ebfb4cadff148f1e4c9b951673b1c267bcdf47e19c362be7a7113cbd7ed8de9be64796dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56972102cae04d062dfe9311eeeba37f4
SHA12883620df2422c598ff7d7ad3826c7d904893860
SHA2569ad959fb1f100a671dc33f63899a7295eb5157529629e66006e15cf0059723ef
SHA512b972967aa6662634d8404d9b0229c5af4dc62156153eaf6b2fb3c8103252535d8ca626aa88719efe581e7a7becbccbcfc9b41fb74aed0d66a5c912c04755fb92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c70ae5fbbd62b5bca36a3658aec5f5
SHA139776b1bbde5204d19d3ab63a80df17f875416dc
SHA2564b8697356ccad1c3eca3530a321e3c07e0de5e8e29a13061fd977549dc8ab68d
SHA512fb57a4fedc0c26ea05eb0231fdf4fbf8ba7c7d4bc4ee67b6edee0b5494dbc480d4509c3335264f3aed614134c8e75bd46a5c057fd1b727b6a7e65e3c17b3c900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff9beb1159f7ac7c78df333405433c9d
SHA139d2a91e5ac6657b0e50f2b36d508159f358c2a3
SHA25667d29c47c9820b4e70dfd0488edb03da9a3359dab4ccdc9df552a6d5612eac6b
SHA512381f7ee58c784a9f27ca7655ec9faafe573b98580f04a0a3c66416da22d2b66ddd9a982369638c5ddb0ca9b97892826e0704976f88a68c8bc751492664d7fc5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcaf3e61cdbc9bca2bd5c402d5b16c8
SHA1bed4a53743c5d958c9de3c1cc46fd6110b3a9156
SHA2562c579b250c926537842bfc88a15c19bdd6689b31938a47bfc06667412f3ec872
SHA512f44723934d432da63ff26979a904041d73aad2752ceff8b581968c1c25d5c5940256fdb056a9471e9ed9cf762bb5a77d568bfece89c20e8373723974912552ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c778d913afc01f0f9714f81f32a24c
SHA1f88d994168e2a037b70622d84b6b2fe2c20ad0e8
SHA256cbc905759a5956118a1492369038b302d2823812945db5c75bde37dc23aa8352
SHA5120cd24809f90066c014d341b5a561260fece094bfc798667d12dfcd022c61385399f550995bd2f0f9e4231589c1b5671d9d20c03120337b078409cc0a6ef53a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551817b5937df6e7d622e0c85e1af25e8
SHA1f8b822bd19e48e2a40baeb376d7ad92a7bdf9367
SHA256c6c2046bcc0454523cae33e14a81f2cb6fd9ee4348e19aa89c683e93683b52d3
SHA512b8473675109cf356e56c0e2210d69381170c3107fd5a3e12288dd1145eff98f10170f678b6a6776f0b86fb055692c617543970bb386dd6cbc2663a9730aeeac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bfac4ccf271dc940c8f84c77c725f5
SHA1e4808ab302ecfd3f90026130a69b23a502d2caf7
SHA256aeb4153df434493218839601ba8c81818684bfa8bfc4a7f884426b892c2d6bc5
SHA5122af0c516a437d0b3ebd156e22ae63c41bf50746a38cb8f4b4d8e92274a1ea7af80a599c853500de948aa0cc00f7e42640a91c0fd9357f41068b2a29f11552c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9539d38950ee5323d8e31e29f73789
SHA12e75b74c1fb1da8f1c47e53c37884d23b63a52a8
SHA25622aa162a68b956a56d37163c139a453a8b9e65707b645b9137f4a94f4c540b0a
SHA512451c05b2a6adfe47a8e7864a2f5f0039e161c76ad450e7fbff6c25ba300be5c277bc363b5dac45b89090af8fbcd5b6f9c6fff624ba97645afe9244ab2b4ffedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f78565b87689f5a352417af04bc798
SHA159e9b4f9494116c956c719a175376620416a2c9d
SHA256e42860881ca4a458d8c15fb479b277a266e5fe08afabd9dd285503bf90faaaef
SHA512be2735983660c7a6243d427a024a043c188506632f83fb6cdc2736a52c4c60749088fcc872cfbdfd8f671966a922e938e7d1e81413f78e22ca475296251c28ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd81ee77eecca0d593d0b636e8600f3
SHA1fd962293cda3aeafb3e2649902833fe25c11106c
SHA2568a78ab09142ec7de4ec0a9c33f563ad2459482218436bf733f221d837b851ff9
SHA5129c5af9a32b9da32f92b5c790ae3afc855be481781a4262ca9f9052b73a8a4be98adb46131f646247b902a5a3304d3abf1ff23c460eb3b1f59dc6fcbe07a3a79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fddf463a445fce530057b95809060f43
SHA1e20f436892a7f2ecbc744cfbace32b34d7e33915
SHA2565b9a0313815f6f14186818677d115adc5eddc7b9414787a7dfe55f9f5225a491
SHA512fbfd2b27df4e9c46255da88d307abbd352955ac738076a631db42394593007120218563a2d6666f8b7c9db9dbed43a66e1242a334a3ad56cca2b7b4ba7637aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da819d56132d924bede8cbe1e08a9f36
SHA1c4363037dc6ce571ceaf969390e507326985f32f
SHA256641f9e436dc0399998c2d3c9c99584b0764a5b162512b87f2f11f58e337aba06
SHA51263d83c0f4fde82ced6ceab23e96fad1e00e93bad2fdb1982d007490b55397a84ca8da678906b2d1a8127865955c474ed5530ccd3e5a761b8a91c6524ab5aa786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19449cfc9235fe343cdd24d837b2668
SHA19ed211e04ddd30ac1de6dbb81e1cba74013ddd3c
SHA256b54b2a71c050ab421d6db5d44832460f7f6c75bed973472b87a45213a0544d6c
SHA5126230fa76a2792a1c382e7f93b819a4eac3d8408b6de75c93d03306309c34c98f93168c7611b8977322924a657c59290b00d50dc2110409af7e209cea7744f898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943f1e3aa5a8808a43fef169206fe27b
SHA1dfe1d4b3e61c24569d5807a03b26cff1dac124cc
SHA256e355432fb67593108360a2d4b5e47225c453848897ba3df1624d8838925bdf88
SHA512f7ca773f6a20882e37a504caa085c290d285532bdd242155027bb8f4191300c8bd7bc3f5d1f67a1fdbb0e937b79cb1e3e6747288862c2ace0d938b30f67b191a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665f1618c54a4b70d1aed3e5718dfcfb
SHA1f5541cb12b1f490b180ddc6763725016f034bf33
SHA256588272d1aeaa556629c427d787528892de6ddc606968b90bea596143d5f00044
SHA51266242d7ffdd5216b4af78dc997a9da0223b38eeb9b948184c5b0366d3a40ff9148e0f14def0ca6ac6761471e1679d04b7d6dd6e1929118189f0c37ac0301aee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55073af5ad28a43790beb71cd491fbed6
SHA15c63a89424e687e13ad1c59636d5dc9241956087
SHA256bc92a2a4898c7204430eed965a520b91abdcb6e2f552d0d8a4aafd979514e569
SHA5125be811b8951e1b7accbf7bf6d8eb069349e47c8a33c87abf261841f2700d46389c074ee7c1fca5ac6336ad3d86fdbaa3a406ffc69af7232f2a1c25b84d64123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54960773e0a2c81cc4454f27e0797413c
SHA1a1e84c0f1da2025d56f4f54b183ca92ddbb0ce93
SHA256a6e5394dd34054fa60b65a06c309d63e8003b4f1c5814b29929c4fa8b041b201
SHA512401830940bdbec89719f3ce3ccd1c20ab4e30792e59cbd87fd4816a5b9f73e6ca644d5368cb13662768885ac148c312655c70e58f516fa687283d21f47354640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9ce17fb4be09949d1262c3dfbac11b
SHA1b0cba370559b35068a8616993cb6c6d7ab688713
SHA25603b88f419473697b4d608936397326ea86e59a711b6e53b7d867055cefdd10a9
SHA51280b61274ed5af2dbf356d719ef43edf9a80a286b4d9a97cd73e5615c59204cafb5c4eb1e0ff34b7c14043ec93e47ce1c3b9795664122e91c2be9c186c2059af8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b