Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
d6ac5fbeb7d1f7f07a1940427aca6f9c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6ac5fbeb7d1f7f07a1940427aca6f9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6ac5fbeb7d1f7f07a1940427aca6f9c_JaffaCakes118.html
-
Size
8KB
-
MD5
d6ac5fbeb7d1f7f07a1940427aca6f9c
-
SHA1
67839f477bef659a82316d767aa17337af7009ca
-
SHA256
20dde71c28b7c7f9c20c88c49008add187cc76e24cbb7e6b266993a2a393fa6d
-
SHA512
dd9c6298809f3366849c39188690ed78671cc2f6b037c5938aeceb650f9e12cbd88d4882f5c3e353069ec6480db76f997b5a4a991156f03f6ce393b8aa4bfcdc
-
SSDEEP
192:SIHpCsOGABXO1lR1sgSnyRsXwUZ6cEyM99bJ:SIHCGA5KlzLbeB6cEyM7l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0914d73d302db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000052315136edfe3c985cfa17c9f60b1964a6156a3efdeddd03da36563a8bcdc0d2000000000e8000000002000020000000698ade43d5565376ea0b29e57e2caa60e7bae62da5681a8becd72bed0366bf9a20000000e2ac46b4462ce75a1873194c847c53cbfc546c02805b957febe1f731b627507d4000000014256154ea5ab8511c90cc27a7e15d503c61df8c73b2ef0266bae70cef416d92677b89784830b2a9ab6c012705349c8d2fd0f70a3c7ced2d1e8c48d791dc7bab iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432060346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B7D8041-6EC6-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2808 2124 iexplore.exe 30 PID 2124 wrote to memory of 2808 2124 iexplore.exe 30 PID 2124 wrote to memory of 2808 2124 iexplore.exe 30 PID 2124 wrote to memory of 2808 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6ac5fbeb7d1f7f07a1940427aca6f9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6931275d442f00cd4143a61c293073
SHA1847fea4ddb00a5e736fcd925fdcfe0941fcf6d81
SHA2568d84c943a1b366d4a24dbb958a8d78cdcbb5cb6ea12f9d3ef05a82100b270249
SHA512cdb8fb5caaf5a7256036e887c218b0bd7ea4faf5163f644137f95f014c9df37434ae01734c06dd06d934c49593ac91cd34d81a7c9c1ce771943ea3971f0cbac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26285dff8d32678c2f9545244864a2b
SHA1fef41988eb7cadc8a386effc24a650137729a61d
SHA2561591471795ce77c2ecdd45ffe4780776cf17e91c068acd0708aabfae29d1ab27
SHA512cde69d954ea6c66933f80eab7d3cac0ef32da88d24d37aa0d13e5fdaaeddc53fd9b854c717558ad9232682ed8f71aac3e4ffd8e753833c3d2472c2a58b0d809e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5454eb2af7cd8ab097dd70efa84ebae6e
SHA19d30fbc3b016f3f88b38ddb8c8ea3954b3c56be4
SHA256f26dbc0a08421af12549bdc262b2a42c293f3184467bc78faf78172a3bdab36f
SHA512ec9817d6df2f2be4d42c3571117977bacb2cbfb933c1f024d77e4914e2a751ca83c62d939d48b641f6085b43ea60fe43b882c0c3488682182d6bebb2384119bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f138a69256426bd615463d216b4477
SHA1fa565296357d470edc9bd98e091600c8b6d8167f
SHA256268d764eef08acbafc3a0f0b3163b010fb80e814f246ae52059bb66771725a05
SHA51297a6743b02882d54a60f745c353a58c89276afa58442bc11dc9db0276ea98e9f0dfe5c34d16a8d03237861a23feaa4bc40328cc0ed7c1725f85f6576ef6c853e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559624bba91023d4a915d57a6a498f7d9
SHA168ddc5f3e5a162a26096ae5be125ca39545b3d54
SHA25603217bf879b50e4afbd4e4b0fd865326e1ff092abecd1a26eb749070da7ad321
SHA5129fd1c1f59bf31d74a740514e95852d593fcf52d2a5c9ed0d9867bbe57dde106eb5253e0b8dc9c79dbcd5d8924149f84e48c412f963130192da5fd1cc1ea5cf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685e9867441dce4904eda2fa17f5885f
SHA1edc06561ae86b3d45c2b3012c45353e6e9c46f1c
SHA256582e1eb27dea3e121a281854201daf21061bf618a09dd8cbb69348fdc5048fa3
SHA512decb02011465a5ac49c4b88d5577489b49824f2849eca24e46b8da3d4798e029942b19a8a77bb6b9fbec72459e2a0a1b0d36225954fd330449d04f170ad026c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12cb50b23f4376e780c64ecae1dadde
SHA14c0d589830616da0d00ea82ecebc64a857b0131d
SHA256a019249778df9a4a19562534d9f2273995f77cf6194ee30fc1b4a64ef97676cd
SHA512ff2d79c0914ea4667559138527b984f6e64fe121fa051284e1f135f246af9a9555c9b63d7d2f43cecdcf3c451ebc27b2c940b86283adef08637d9e99c3503c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9dbc950dcacd5c6e72a349f63f9ac5
SHA10e17e15213280ef7d2f4a80d9f51dff71c5fd495
SHA256cef4aeb7479579dda3fc5a27bc2908fa752a6a991de3851fceccf7718cc36c13
SHA5120072751b51ed6d633cf1c4172014368fffa244e42b1490b879524b5fb1a20ec065f4706384cfce6c3d35ad52d592512d9871e348f0ddc4535afdae972489a47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b7c36e8fa64d3bffb2a2c31905a97f
SHA116d4db10e48d74eeb7c260eb300cef53cfb2db1e
SHA2562e98944759cc77b8ac95a2896abafd93550ce31f083d37cddcd5a73c2ba24b8f
SHA5125dd5c56d1538267424f3b76fa173321cdf58bff89c222fa767d29bdcba3933f2adbfec92e109ee6b5421502aa840170a9cdce0a6acf4e68380fc5ac83ab060f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547226d3662880474adcea0ab1dcd5a85
SHA1e62db97496bc0da716604701d701ec79a0078121
SHA2568bf0744e7f09541fd6fc3647d9c51361df3dd635dedbb6587b0d9798dcf7edb5
SHA51247c9a502ffef7f662049d1aa969faad5e5369392ce55fa85d22e4b52ef2532489382a937709f28dcaad399126d508dd71c56264c4c94617d5d2d7139e4c6a28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56beefc67a114fb349ddde9b3f378cf73
SHA17c64fc05a8e848b5ecf801602e931e03d6773e21
SHA25695420a298484fef0ce7018a48360f21028dc8d263f5b587602bf2239788ca5db
SHA51200fa63ffce9476c493097c406dfd29e31307da1f427a2270baf3ab83729593d94370199c0a41674c54cab64c961b04df7b051f73b1528e68c4e6e8db30a876f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f75d87b3722b42a6002e6a561a3268
SHA1f74d5a0a772e5533d8462c2cf0e9d8ab57a747b8
SHA256b78a709cbe17603793fa468d88401566dabe71fc2f39cc4303edae1c3cb30a58
SHA512a1c12cf157c1eefc273316cbfdff119b0c3d08a26ede99f5c9c98ca22d278ceb13a18557653df373a0ec126deb0263eb9a755bb939bd5f5aab5a3d97bd591814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512e21a552a491077668c26668463ff4
SHA1d70bdcd715ec8c65c957f6fccc7647605cd57193
SHA25646aae11eec92ec2508643c879379f39ac446b3cd458f55dbf74c5517425945bf
SHA5124c38170d112de6f03e59977d896bfdf472adc9318c25e7464106c03fd90509a6ed45e2cb68731732e0574b81e4ccb9098ca988534570b2cbb22e89d80afc192b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8eba3cd6d5aebb5c9b0bb1ad19cecb1
SHA156193ccce8492365bf46c3dee5aefa06d6a2f778
SHA256a354ad8d408e79fd719a4f447f31e4b51869472f4941b4f0ad19c825f5ccf00e
SHA512da8991f20f1a2e51e5f3559103af8f5da9c1965a1fc58f8572f611bfdb37063c6e64166f97538bed791bf5a45e0fd329a6b06d28b44e3dd26222306d5d03d1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d750066fc8830a4ce81023f5a5cd8a58
SHA1496daa45d858241f35dd63659dc4e0c57d0d17f8
SHA2565f1e29ece30c0495d52ed2aa8d3418063d0046d9ce9a2b894f3f792a5ae91260
SHA5125df308e41a0bd4fed96fca4f72ecccd237f84fbf983c234af8373a76284c02ea5dcf66e8f386c491ef0c36fd0531cb021bc4ca08729663dd5514ef60ac367ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f42d2dfa35909c88ec57d366dd636685
SHA1d016a00dc704c3cf47b7a2b067c76987bbcc50f3
SHA2567ac34080c82185613ed76b84eda64e4b31ecd245130c8be4ed037da07af0a8b1
SHA5123854c327aa5f8d964e832c894c4b3e188472523cbece388fd047bf2aa2ded08fc1502739ff9aa6f27f921fbc7d6a3aacf827d1195dfbb353680be6e8a3f14e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694f9829289106142da6dbf5d4c6ac10
SHA1e32054d98b681b3fbce653abfa8c56289ae8e6e8
SHA256feb045125cddf9bdf945544cbb3d713d6a153f9360c9470789d7f41b969accb7
SHA5126b3ff507272862d295c18f259fc5a80e26625ed73f6710aac34b1345300a6776ad8245a9c3e4af0635a7d62b93b93e6c69e440f1cbb1c0e2559f2cc56ee1e38c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53158713b3fca86f4e1f6cc682c0bf156
SHA1b72138aa21f1b75f2bc1be9a2f1a92d5d2a08fdc
SHA256856634e2af587d79cdab29dc63e31d0e566315685491a2eadc577f45dbd80e19
SHA5123edd8386dd6f10f84d3d52b02b6de085ba987b8d99e3d2b16523d16ae3209bd8ba9fcd68883de0097b8019397f88f71514941f693e9c6c2a41ad1d372f9060df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b