Analysis
-
max time kernel
70s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
db652f24ffcb94c84d625a5fbabd0e0c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db652f24ffcb94c84d625a5fbabd0e0c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
db652f24ffcb94c84d625a5fbabd0e0c_JaffaCakes118.html
-
Size
4KB
-
MD5
db652f24ffcb94c84d625a5fbabd0e0c
-
SHA1
fb2c20251b2acecb586d4a9db6f16517ff957025
-
SHA256
bf7acca9795cba67944ab67cc02f7bc08b022826973e37fd16834ad2b67fd8d2
-
SHA512
a45898f8ea9204bcb4c35adae173e172c19415d22fa99430d41874040a71bac979ed089f60aee68206e29c49ce23f01f962e30ae3a94a6170545da7d6c5f4209
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o8DBHd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c8d59992825c14e8771ba7d31de9cf3bb7c0bd1670474151ebd26075a7b42b5c000000000e8000000002000020000000c43f05d1f66a029d52ed6068f9b842a663a1347624c363d6e6cec662244f75f1900000003eeafe5238c546ab8b0827be36945ca7ddda30e70b363192f76d1b84faaf0f7ed9f5f1c74df208911f7bccfcadf40c892ba46ad607f6dc6da9c49a23ede97dd85945cbb850686321821f99a885dc850f5dfa5d3e8022b27ac5d5726141bc18c4820f111dfdc67711758abffecef7e945060a1f222a6fda27c9c43b8ccfb7634981204ff53c5ab13894be24c4e9d206d140000000f79a1741ad895f2d519808e829cb5aa7f7d4ef5fca52329678d4a0f29e6cc3422d31fae6a0386e71e7e7c7f9f0fb7d0790e820f839dcc79d75eeb9888b35ea11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F307BD1-7093-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ea56200068a054146db4e70e760d10593aa8236cfcf70bcc9bc7bcd818c0b66c000000000e8000000002000020000000075fa19675d32ba1f4a62a81eabe2a386a8a54b9a0dc1522e1b42f9edfab4ff6200000000df6bbc602225f9226b16c44272cd6eee0b50c9fe4b65fb314b1d63a9fe19d93400000002057d49e001a8b489ad1c9e1210236e58fa8f60eccecf0d90bf323b9cc28f39b7ddc97c0565795a924c5ccae11bce5d95d19973f6045bd388b1d2811216f607e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432258297" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0101b54a004db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1088 iexplore.exe 1088 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2276 1088 iexplore.exe 29 PID 1088 wrote to memory of 2276 1088 iexplore.exe 29 PID 1088 wrote to memory of 2276 1088 iexplore.exe 29 PID 1088 wrote to memory of 2276 1088 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db652f24ffcb94c84d625a5fbabd0e0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4f39171968a46a61793e227af5704e
SHA1b2522a458771d05a1b40fb3e2525dd872f498474
SHA256d73e5d31802322abbaa02a8490ebd9b38463f9305db61baba1bcf5fa2e429409
SHA5123853135f13dd80c9b4638a507d0147f953e0b7f69b29c66c5bece06c0e195c1014acf884a887ce567e21113e47b8f7976e1e5aa9243f5f7bf16756a88939bf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c0d178003ab25e24bd1f64bcd04959
SHA17a074b7d5dd652088e7ef44e32345856f1ce0efc
SHA256d8eaf9969bdc4995c7fb68e2de946fa33166b1626f35eae07cedbdfea890209d
SHA5123a94d7ebd3cc003ca8c316106a6dcd83cd555e96e977012b64014602245ffd837585edf6d5c1fe037f0caa183750c847d0a2a86b457110c6cc43ffe362577aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f82eb742753de5b77651b70cd9d8c57
SHA1a8592db96f22a661327f95896d96a38182820e70
SHA256b3b05eaf0cdd2b4d29a9a19417caf806f5341da099d87bc7ca2be488f4ea06a3
SHA512365988dd9d1efa8c01c26c44d6e7cf1e4f4bb165c91cd785940a67c4593528f4bb68bba34c100c7333c1e8f3a806793ff9573c6d126882df1dff58d91f36c4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db2c399dcc30692eb2f903a2d7dc4152
SHA1c174ce943dbd195d171829fe373567f4d94eaf23
SHA2569d94b0ce739467a2eb0bc7f3162e13c52c38df70974b3f4ed292e5e043cc29e7
SHA512e1d6c0759af54230fe1180a4002f93efdb568f485dbc57639e053316ffbf47f74d8f32adb3879217733dc5f5382ae31e4b2529f7e1cb20bf710ed4cb75c8c95e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8e84b8d252491c21c25b83e1897b8d
SHA1a06d16727c27fe0601129502564754721466b917
SHA256a8e3997307d08d75df8b1ef3a95f98f02f2b52329b575b82045470c72f80b4b5
SHA512dada9edd11977e40dd0e00231675ef5c3e59e9151d463f002b629e5e81c28d533129c4adceea7acaff2ad272624028c46e0c571c7265dd093dd489128ab81281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e1d5c1bb5992545b8759b37afef2ac
SHA18220752787ebb392f5be483ad2c1939fbb18398e
SHA2562e4b8cfea33232410ad0271719f40460f853076f2f9f32139a452bf57f1d2da1
SHA5124bce1f2cc6bc94da31657751784749aeff5866320438a7ac6d2c716d530eecc421c01ed587eca7942179c9f8b3319fcca79011be887625b160a12dba421f302b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a4c2301dd21010439247c501afa83d
SHA1d9803a242d6779b5e22092d4d3f2d618da87d65a
SHA256eb37a679c1731c8c6f323b99d439410fb6ec7ab81d8a7442d719b2f9fc420c51
SHA51200e3ab0500bd195bd6c0dbe7eb27f0c786c83416eaae1b053ce133ba22231e01980c704e5e0b58a8706d690686d7428fee75cd74b95ef0910c991f22a185de9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec71816a10351fa681da5ba758dbe66
SHA1d7bf679fac6a50dbb24da1aa5967234f507bc4d4
SHA256c20eece8f99dfb6d1a8fb4b1f142597821535d3fda7c9846245c90d2af56b6a2
SHA5121363d3f690390a1b0976fa9909ddd6a9929fad5c7fb259f7591f9c037d78e38077bade8cae59b4b7c097bffd056a95c57ea418ca302b20ce78618365292aba6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e991ecaaf19d55e76a12e22cbff34c
SHA1c1c1c9ec4b3897fcbb26024b2babca074fd03308
SHA256f9718f79f26aac824247dcb4792869431a041f23f245b51e3005249fa688dbc3
SHA51210dd9f605a7e44a7ad48ad3583934d90e6db024ec54d21297b544cb092aa7597ef67db2b2559e2f2d01402f56df09dccdc2db61aaeedaa99342e1410ba73eb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe43891712b7b8a4c3d95fdaf7ae2af
SHA1af29bddf84d87b4324e29238970d7f123f655abf
SHA256ff355e9ad26f0a846436180c9afa38e389ed0aaa3aebf6e9fd544283f5bc0780
SHA51206ebc89e08e2d5b4dfa439e50047be8416abcfa09ffd5f1f6b1da4e58a15561f09b26d955a4bd89d0ca7185740ea93cd153cd3bba0e0124e7e99756194e9eec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0beeb61cd5163fd5361cba94c36575
SHA13ccf8ad171bde925700972cf139d1af04b40a09d
SHA256e7e6652afd95af12c212f608688a0177c72ca8afdee6bc9022c2f9b38f8651bb
SHA512ae5044aeccde177c0aa44fa820c6600a22088f9941a9753b1a2c7eb34cc3e0ae0f76889ce752365036c25a454fdc21d0af768bd5c783f3d8508909dc6755d061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef5eb5df5e455ebee50f04276c4ac1a
SHA167bd6fc4099fc176519f1c9bfbb9594f1fbe64ff
SHA256e48822c903659acf7371535fe2ee9a527aced35ef231cab8b4a899ace0420862
SHA512ff41874706cead24fc5fc4f854afd87a63950015dedbc9b36f2caa2ea5b6db9a1fad85a5506f38dffee884e6eac59a8c4ff743cd09ce6af3b71e083a96be5a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7428d13c5a9ef3e456c8ede7d57595
SHA1d48502ac160e85d0f6be3845193761736478bbdb
SHA2565fc98d15857b40d49fa3d8a241db99d6589da54f3d565515da488cbb9436f4c6
SHA512ec4a536ed1c7c9ea1b29b811c6c9372c3a4961d19c626dec86fe3d10c1e2feee2e0a126c8feccb3e89cb492e623772cf41de27a0d9c656de044441da8b3c2b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d3bf12ae86b2940a075ecf58f0d9d6
SHA1a4ea2d4a6924e3550ad3dd331a44c171aeb32b91
SHA256edfc1dabbf40215f314e90add5618785719fa9393954497e8c5507599fae3dc9
SHA5123adce80baa5972e1a7bebadc151dc814d9f9d0e53117b195ba3b87e2569ade7295284b14f6d039fdd3c8271873bf745843e2def44c56c31e0804b5a32b486652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614de3d4326d65a0bde54cb6893650fb
SHA13bfb8d4b2dc721805e7de86e06ed05d9fe112ce8
SHA25613f9548f8b7ee090c3d45890e7a24698cd255f8680a795030fecdf01673111b6
SHA51256cd2f6c6bf7fa4e4e00c8a26b655191a44d58698b81f148f8f1660c28601347579fe97d590d97cba5391eb700c9c93943007fe0ded20750ede8792f83830726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2a420bde9874a60996d00357bfa67f8
SHA152fe1e50b3044a4f43a387a794f44e1b06dff7f1
SHA2568bbf0fa1558cf4c1aa607b69d9c39f12910bb50be49ffdaef5d7f49e7a7e68ac
SHA512de224d053d86aedc2f1d2de966ffc596d0863b706589afcd07637062827866cfeb474c95b735687d8d870ee9d6beb752514d72e3c828890de6495bf81b601f21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de9bf1257b71bbb384386c77540e4dc
SHA14fb83009c5b1e4230f61e3e16f29433ade3d98c8
SHA256eb2646afe5504112f50324ff1b6f19845be1586cf46b59077333b8ed2b90298e
SHA512d7f65e4bdc6ed2eba19764bb05c86713b34fdc39b7d30c15dd4879bd6ed40962d3cdde10fbb260f943afb110f1fc9de14b5bb42cc4e5f7be84947bc66010b12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f566225cc293167362257c6d70ce80ac
SHA1ee5f0146ad2840d12f03b49b524a3fc53b0e54e2
SHA2565a4638394cc6382e04a8469acdf39b9df5b20400c335f784cf95c62fa6ecbf3b
SHA5122c5544d89e6a99e1ea4efce43288818eee65a463cfdc258aebd9042ec052519d89d7201258679f492c349290993bb32d177c44b0ca17e9b2593d6b1eaf0827e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b