Analysis
-
max time kernel
136s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
e9cb464a9c3b807ab19aaf67a1c22fb9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e9cb464a9c3b807ab19aaf67a1c22fb9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9cb464a9c3b807ab19aaf67a1c22fb9_JaffaCakes118.html
-
Size
214KB
-
MD5
e9cb464a9c3b807ab19aaf67a1c22fb9
-
SHA1
16e3a3ef23db5bd2dcbf4ef0eaa948e240ae7918
-
SHA256
5bef0576963a5919723ae7b8bfef535ba721070af3e213059b669a7a67ef0abe
-
SHA512
ad719a16018b5c1806b05dcd1bc01825943750328bc5549367d3ba1ecc7d8bdebbca098a0dcc8219601083000f839bc9067996700cee1d156e7c0feadea21b17
-
SSDEEP
3072:qrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJA:iz9VxLY7iAVLTBQJlA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63BAF661-75F1-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b49677fe09db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432848377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000617f58443ab99eb815716468b693a788259bd1f953840262f67e154f3908c3c3000000000e80000000020000200000009d475b94f2ee096511110911df5c5e2e8c7eaf138f1af075bad7660c402b584e200000004454526f88a37100d78aa3fdabef2111d28e38daa04179fd3438c05be12b766c40000000fda3be7ec9b34af8cec53bdb5de77ed3dfd538779be3f989979dfef1b1ffcb0a573a48b20d0509740a36322d5b432c6f660acc2561a1eadab270b5cf6ce51fa2 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE 588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30 PID 1328 wrote to memory of 588 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9cb464a9c3b807ab19aaf67a1c22fb9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b8b721cb3c9833568478118b602482
SHA1496cb2e3243244b4e7ecf26f7c5368e34719b245
SHA2560550fa038b7f560930c963d1defb3a16cbdf0527d8a5de094ed1999dc54c1226
SHA5127f73f8821c1f9bce721a286d19d34e7517e1318ace3db5faa0e5ebd1b82a3ce922b0722a51ddd0c9605eab510f5fdbc3f525a7512d8755bc03161893d692ba83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dc7c4ff5bbdbce05d0a45102b9b166
SHA131d4e6f61555debdaac22cbea8a8edd4dad301e7
SHA2564535ac44433b891d2a0e9b004e2212299c0c6d64513d1eb46bf8d8d5b3fa00a4
SHA512ee8c629aeca050dcb46d627febf729760b9f11e0208835410907d875f2fbc3cb28d9f0185697d14f3e3ca2a1000a925df1cb7d11d0286b0da9e3a5f23be44e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5400acef7b6ced9e601bbf59bf58222
SHA1caf542cc3f3c84f60ad9db4e98985c01ed3710d4
SHA256ce59c9757a8bab0038ca2f8cbc0b61ab39782bffcd4e95bda62cf89f4a98ead6
SHA512638b07169cf7f760f31eb9791cb97503eafb360b6e1a5fd121b65072d1204b9b8cad3e5f3ce0d59ca890b21fed55feb4e1ae539fba6562e877559a27ce17595a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6c3deab922e6d9f87e3d8451404c7fb
SHA1b72e930d2272e16b1977e24d70c0c6bbd53e23c4
SHA256a8825f3956d13732dd4467b2ffbda981efef28057a49143d05f786744405de3b
SHA51255563b3f7cf5c1aca269d0fe3a0867567e47830441c0112d47346b579aee2d66eaf56166cba3177ca6be3b24e1c07407f437365192ce953ffa4de271ede2426c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1177bd35d860719e418580a24dd079
SHA1d85e51db249c9a27e9530bdf49694514bd4b6901
SHA256b987a9753d9302ac5894ecbfc6915b01ebffe4753cfbdbe504a26f9b3eb14cf6
SHA5123eda5703e4a04213dfce472f3a91e852486854f302723c63a378b50a34317e762c1ac63ef4c3ae703bde064e93465c8ba267fd9d33caa95422e72d1ca8b5ef08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e177bf888e2f80999266920e713c6326
SHA10b1a0d00883565794b1af1fcb975b23870710543
SHA2567d05d4a2bf19e301a0e44fdcf43f81fc3627c53e77083b49de3b896430cf8685
SHA5122152206d6793e0ee4629baae028e2f2958fa2cbd874b0ce823926734156ad32b5ea77a97829d7aed5d30a43c297c4aa99f480cc84c9be8c25915c5371b841ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547e365e44814a7f8ee7e7e92b213b3e
SHA1866f00cba233f3d2b4e1bb7e1643195f00710126
SHA256b4198fe988170e0f52d7c64c25c50805f4729f8acb7fd9277702062be11b7ade
SHA512a6ab61fc7c4df1a3b92196594c7475be44149969f3f3fb32ed4ab225ab78a5643283e6fff9fe0284adc03aebf82ae2aeccaf3bf32b26d59681a439048ac4722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa15606e5bc2cf7cb204eb218583158
SHA1d60e7adb19eb442bb20adf8aa2b111881c79c6df
SHA2562bb0f7f69b1c55b8313530611ce1699ae153578775e7e9528c8ef9e7eb7e99de
SHA512d901d8f0edb9fa40e22a0e87e38d4e95e19e72dce946324a1b5edcf3190df879b65230d792ab5f7aed7a528e72bf2820a10dbcc12e5ff121349fab69dbfbfbd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f91632bceb95077c30569335e62340
SHA101754d5d474acf50be4889fa84f35eb4d21cdd66
SHA2568dc1cf95c74d14e238791dbbdf481241f2ecfd89aa2aca331fe4f0b91ddfc365
SHA5123f473f74450b783dc97b6b16f8f22d449283c37d1c4c908e9c22c0427f71c41402ca5ae0c9ea86db1da39ef605dabf8c4f5423c8027c8ee360f0b18fdebd9797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fcd7685f2f764dd8ca9c591dc43fb9
SHA16a4db9faabaf2eaf809709a215211cc8a1485895
SHA256e927b04bfbf109872cf2335c84166fb42c7809abeb3dd12ddfda20631d94cfc0
SHA5126ac9622ae45a5001cbca0966aee7b9c141e7430f8b5d0955129279793f5c3cc2279a8b5b6b78a76dbe174fdcf02187eed3b4a0988bc4fe8c9a61bc01da429840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5848577ea3c11ee1be9c83e0310f274fb
SHA1e7994716421a7d7889f050f0ae341ce439487d8b
SHA256ff7aa479dca249281f296e5d7ae484090ec41da7ead3d53c898a791a4d7964df
SHA512b7633d7c53b95e01d88cf95d594a32668022cc581d9b1d78d749535d0843b7545e687563a686e59cec21277802d8c97906fa50d80434eaa55527c799bf0ca8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2abd0a6b3958217073a0a7d955da57
SHA15de3b400ef838d953435b39f551901aaa6f7c06b
SHA2569b47b4043ee10abc1270e75460dbc4c1cfc75bd22c2402a9ee286f8b36c3d3fc
SHA512352ae8d40793b629e23bd996140474513663fe9ee78fd03c2d29494b97794682fe990303f1c253d0f03864d647b50577e9594c3ae2e2a6f372f63f9d7d725280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1920424b845ab6eab9621ee08274d8
SHA1c605af9dfd09192b8744ab0dc60533fcc89411fa
SHA2561e3ae9dcce1f899661411dea4ed8a029be1267e19e5219114c29fe966b2e70bc
SHA5122dbdf2dc4bb78c29d713e0e42930763e1ea1d6e2800cac90f77fde4a5bb35878c4dc2862fe4fcc73fc369462fdfc8616ee0cde77eab3ec7add5489772a047184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f21a6df6f8f5392fa0927d24a082328
SHA1bde33591365562061db4c8aea9b8b770014209c0
SHA256f96ee1321c5fcf5a639c806e6bcdfc4fb336fa0c479483f6796e0a41cb33bfab
SHA512d1c19373f847331353b70b9fc6a336835bda8509858e6f07d207147bf600ce8e28b847d91d3efd08987ccf88aa1f7bedb48f3a197f5577498abcf065c931872f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5404339e6bb65f0490d7c3ad01a29a347
SHA1afd896cc2f6b0807034f268b8b8fa4ef56a845ca
SHA256e19b1808518173f2bef8904311275f86eace41b135b3db131788546834ecd121
SHA512ac157ca15d354a3ea9cc89578876a08127074cae77ae0d51db4024e9626f3c03d50b6099f5abc7e4563ef9c873b5e32b5c9f36d629701410d6c10fc4f15c6598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee630cf9fb3baeac647bde13e8016ed8
SHA1fed0715c409e3e17a151a4ad5564bc9c5fe6247b
SHA256babc6d5e15e575bd3a2c0a5f74afdf459d312461aac0d4419517e7464b5b94ff
SHA5125168fd25683d7844cae106b55d09e578c1999671a77e2466a4ff3827409ee1526655b9e0ddc7e59818f2defded6ba1b2be1b2b0f0696e246da38ae9d7eca5421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56249bdc94e5dd3b5ba5ef45e6bd9a5a6
SHA156ecf132ec165bedb2f409aaf95199b38390523b
SHA2560983d783b307cf8d8af41f2e04a8638218d1361d561c2f6672384a7eccd0a0b1
SHA5129e9ae2583ab9e94e2d3f65272a4a8c3fa6d874ff3d78285c44f95996401ba24098fa7184a32cd5a6c85a24f785f47655dd1b91ee916d0250cb53747c22c0fd01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b