Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html
-
Size
27KB
-
MD5
de6ae8b89fb345d1a8dcc3b1b84d3d1c
-
SHA1
bc7ae8056b2e8a0237ec435d0c050b0b992537e5
-
SHA256
ca157b3ce069dcec9aeadaec11371a75a1dae843088964bffd8b341605d67a8b
-
SHA512
daf6cbf628ba96f8f558eacd8920e43894c114284989f0d5de54d68bed3c24b84d23b83e5fa357a81b6c80e0b23d20a91974369ff9da07c8ab315ac781d26ef2
-
SSDEEP
384:SEQTziZX0B2LHsRQWp3lselGlfCnqGrAyuVTcUBSW1eITj0N73XgUzRJKzOKoBA0:SNTzz5cSrAnBY0QLGe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432402056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000027cd80360ff503ba5613c7784218af6803c4f77d7e932f96a8656ba7bc648972000000000e800000000200002000000063f42a0c652f561331904a0a90fa597a5a01adf8bceb7dad13f4a3cb733a9dae20000000ed00490948146f9864cb96a2b4cec60ce9c75fc4aecc82bc38dc0ba9e2e5de8740000000ed2d35575b555895512c3250b70a6b4a938a289f0d7e42d201417cd301a235ac90785bdf21367da4865d59e72fd6e5427303c2c37cff4be22e922f208636307d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3854E4D1-71E2-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 806ba227ef05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1976 2540 iexplore.exe 30 PID 2540 wrote to memory of 1976 2540 iexplore.exe 30 PID 2540 wrote to memory of 1976 2540 iexplore.exe 30 PID 2540 wrote to memory of 1976 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de6ae8b89fb345d1a8dcc3b1b84d3d1c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513878272ef89bdc8390541ab510ee806
SHA1099247c95c603b3039a71649f6abe5f25169f9e6
SHA256494bd40a15437d1c8de957a89e378ec09d2878637cae8942ff54ead2fdf58f41
SHA512ff0314ab5dc0ce1a6f9592d1cef0ded5ae267165499e9cb523e1134fbd6e5d429fa9c77c9b0821583f23569dc2e36477165c82bffc32606944aedd7fdfc10cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94d0710393e363771acd9b131055dba
SHA1875aee532ce44bee845edbf64061b094f9246ec7
SHA256c1d71a7555975587c5d60509e4c32a81054cda3a50e2671956a5d6f278508748
SHA5126e1ff5b6d1c3cea361d4d121395f08fa9d647a6fbd563cbd0be30fef0741e3fd802823438883304fcc22dc6c2860c10a1c6c8a3d91f175d1f39eee13c977c043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5055c1a6bc4479cd1a0b1ac68e6e054fa
SHA175198279eebecf3878c7587930cd66bd2d0e5891
SHA25670c07392b4099453645e985cabcca43bafd71fdc0f3183090dca234dd5603029
SHA5121ca2ee475a643373bfc3e1375fa47c6673ce5cafc9648f64249dafc41e418841bc5b0f1d76cee996122b039b8dee2fb8961dd682b12eec399e0dc338d046f2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1103e3cbac0cb037bbb00efc2db0a5
SHA1757679aaf25d3151989120cb5c7ed2e1c11b05ea
SHA256261bef40550e3baa7a18b7000e2dbbb1933ba83c75e2426ed5e614d25afd2256
SHA5129e22852251e2e412dc7e9edea980fe2c2e285e1684def6476a2f935c929c22863e0da09e9c8a49d5d98cf42a9a994209ba89750e97e8966df03174b46d8a476a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ebb5b6494530cc890ce4f669579d03a
SHA1625f73052facf488b644f9996539126af519b77e
SHA25621aa915940ab07d5518738146ae30a84bfbc701ebdbc85f4181ba322a08dab81
SHA512640cad1b585984d5a656f028acf092ac621bb53b696b3e67c1fa6664187f00abdae41144c14cd99e9f29aa92ca253a040c780cea3a7ba02a03bca6dc5e8e99d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e34de7a7b18f32208d178ab5512da6
SHA198a8775971f041ac5e9c8dc9a512f312f008b2c9
SHA256b659201bc992412ff2724a743aaa669b021aeb90e1fe7bf55ce6b193383bf878
SHA51287f011e20c97a925b30e55fd34991861e87c8fcb2c66f6f3c5d37a1873489dfc6295621da5d92eb557ae5bdb8b840d48c63acc39d63b7f5c8bcac7c025872764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6d451008d048dc83088727ec15b406
SHA14f1850d7b5c3f2696f6f8d2f661236f332369af0
SHA2564ca4ba08ebb2ec2d0b13a22c919c4f8cfcfee7525774e9e10d60d22516a887b0
SHA512be83cdd88149772d97810651742c16f188af7494957a0ea054d6bef2589b91c27bbcb802bc2815d3ed71f3cdcf7ed3b6a4756fb8c7e542b0a55d2ddaf881c985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4a104dc217d216a47b9a4028e46176
SHA17cee4bf222b8eea49d2f4adb91f8f8443a1ad431
SHA256044befdcb04c305cd78c3d5888c2bcc9ad99ccbc954110a812cd75bb710f93c6
SHA51267c8b2c68e165ebed42b0574ff39b28623673f5cb95ac1fc667cf975b80c4610789297a699fd29827d130a2fb5c9d5b625a23839c0792cff25647a8ecbbb8755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8440ed98c8431ea57101b9ce71fb0d8
SHA117621bc1072773b801d15dc42c3d1f40a7ce689c
SHA2562047098e1196c52f3e32e5541b99b7fa30fe3cf9aa09df9cb5ccb66ce4ec6bd9
SHA512b7d1d01d7ea3d2e225948edcd229ccf90720d90228ad3a20ca98052eb4e52f0ce3d682250fded4a3254382879a6a7a5d569d404d97f91ab471ef33e8cd2e07a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcbf9c4f190c022ea7f3d4d560087f64
SHA11836e779d7b9730ede48c64ce24587f27ec100c3
SHA2560b54a1e2f87a5557fa3585bcd2af22fe3e28446c46feaec1877c94e4e18ad073
SHA512ce93809800fa20ff7749d22ed56bee27287b790443c0b2a0a6d7a2f8addabb355234a36705431bf57170501866ac7900b4025bfb6b79eb452426ce5cbbf7aa9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f279cc0416cc8aac07527731253aaf
SHA18bb394f6607685efaebee5d9c6c7b444ee69eaac
SHA256fb047a6707abd75bb7b8da8d3d59ff6894fdd8dd812d76de6cf1e2b2d79138e4
SHA51250ebb9924e4bfa1fc78acba455282dad435e4c42f28d11c4c07a2694b7bb0a661ccb4b263a36b94b99a309dcc0d9a0847ee3704557756d96610764cf85d9cce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb17923cad4223a464678f14f82963ad
SHA13e250299f3c227970d26c672f55d29c334271a0f
SHA256e62b9123bdf85b97008fffa80180762f52ffd5b66226ddfe734cd384ec633e78
SHA512c3eb495339b42a04516209e0c8ed13ebd33207f6e9b97af097108005f9b04f1a2512b82490e79dda6478eaeddfcf1e018a09046b9419dd7569cb53a10beed8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095e6e99150d6d252e30ce8dc6cc046b
SHA1b0904fe9a82fe9a9385f58b0156eb9b3bc125750
SHA2568267d3a091a670f8a87709696fc9f796b70a9d940f79d8c1bbe8c8a9b366ac7e
SHA512d2841f8fc89a6b95bf6f4a9e4bc68a6159ed0674c143a9b2551d95186dec737b9e79e29c403ea25150e7a246b85795b4269148ae64a3b4d3244921d0650f402f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144eea33b56b8cc2443af7bc6cbe7c68
SHA1db7ed3cdb0982177781f7f99dc34986f05abab95
SHA2568d45cf0adf036e51bdecdfd66ba9683bbb26a1e744f74fa6c904e25f70bd9efd
SHA512839939c0b2bb6952d61d5daae0d42ea766c35ad88e8108bc63b067b41cb3d6828b5a2138b14a41654c26b9ee9468cb88df13a534877f5b832f2f81955941d4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5302ba82089729a27b6a5bd0411a4f867
SHA1eee19fb162373ca2a09a646ab727a5e632b4cfa4
SHA256b0dc94955cdf115d07f917fed3c5bffd366b27ce1bff579e9a07951d9fb3699d
SHA512b41a2ebb97564d7e3479e940fb23c2231b4e54fb7653d4eb253cacc6bbbf831b6dd4c387d607bb8124a02cbd14028044775f98301a544d5362f43c97471b808f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621f3b98452f00e19685b53b0f74c529
SHA1dd005ec3b7a657beae29bfe35c19274979d7165b
SHA256a298916c94b15d2639bde8634537f9dc3c722c224d9ca385ce416b141f6ea3e4
SHA512cdcd0b4e491f2ba82758b41c2dccb96f2116b6f3fd0c8fbeaa6cb4b98092a06aa3db9e08da7540c779d59304412f9882a05cb9ab454fef90eca121156903c190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583468c53d7856fee9d23cb25e80e8344
SHA18435df615132ac92d89ba0d37eede504f2d9281b
SHA256162c848428319792dd9c7487b8e2be669362197eee3c5f99b76510db2d316d3d
SHA512698c872d452085bcfc6b380a9d84ca3842fdde106e7538cfb9aa85e1f59082aead7faef18c1e9f6f16d218170b732c677c51135121d851213003bc0405069de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cbcb0dff475d052ff9f4b78a28bd1f
SHA12ce8daf076ed14ccbdc21656994aee4351d8dd9e
SHA2563c37cc1eab689ea77add22f6343b8c04bd22336483fa65398d7f52622683416c
SHA512ceeaf80015fb6d5ba33abef3b5a06da7bf143379e639972dbd480709d13e21c609a9b8f7e542b35105f2ffccad92b965dc74b7d7537a200d2ef9b4d2b2bc2fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a843172132188e7fd902bd3de035c55
SHA1dc123866c811beeb1c555e7e88d58695e9fdc66f
SHA2569ce0520d84f64a7b1532326c0473093e52fc799c67fa5ace2ec0ed871cdf855c
SHA5126f3f8798a03ead3ef0f6d9542a17df0335c0a85511a14980cc3c9e73c9b91de2ddcaf2d780aab33f48ef874cb0d9f4c1a6de54ff27e74696ec0937a019fc95c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b