Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
ea77f107483b44b29dcd6aaf7faf5259_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea77f107483b44b29dcd6aaf7faf5259_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea77f107483b44b29dcd6aaf7faf5259_JaffaCakes118.html
-
Size
460KB
-
MD5
ea77f107483b44b29dcd6aaf7faf5259
-
SHA1
548c69673bf3e61dd0f967689a268ca4c9efc5ec
-
SHA256
64bf237b4fc51c6ef4dcec16bafdf447736f8f518d9254ab16e80e6defe3506f
-
SHA512
6198d41f22f9dbc2e348e0090f328ceb16388130453569179614059b71b1a8a511ec931a46c0257bc9e0e177dd4e7778dcc22295e55799af4cb4a4bdbd097f49
-
SSDEEP
6144:SFsMYod+X3oI+YDQMsMYod+X3oI+Y3sMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3B5d+X3J5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ce1edd400adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03089DC1-7634-11EF-BA28-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000dc04d370600bc3ab483b33c232c79f4d9061339e5fdb75d8b91833a96b0674d000000000e80000000020000200000003158a6d0e0dce544366134871c03f1222f0bd4307000df5f741c6d5e6db9656e2000000027dc73deb703b3dd1525db8f68bcb9b46ea4c34cca2dfbb3a94203759330ace5400000002d287f2c2eb139dbd278d7a2bded1072728c6a0fc06178b6ef681b84959da38c3219360be34660cac2fbc50104d565500b8e0d81ca72fdf56c8fefe1f473b44d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432876991" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1920 iexplore.exe 1920 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2324 1920 iexplore.exe 30 PID 1920 wrote to memory of 2324 1920 iexplore.exe 30 PID 1920 wrote to memory of 2324 1920 iexplore.exe 30 PID 1920 wrote to memory of 2324 1920 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea77f107483b44b29dcd6aaf7faf5259_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de628aa40207b2083731857c09e118da
SHA1027c8f2f59882b28871c82040cdb459cf21c779a
SHA2565bd764ed55789fd8cfd1c0bf221c0b52c3e7fc11f2dda88cb3c87dabd7fb62dd
SHA512fd99660dd8fa9dd1d3ac246334e249189d67561daa7feb63eb1f54f9a9ef9c5e76f8049d92ddea20845ccdfbf3ce117a8510dc805a10725fc91c3c960c3f064a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52267b7cb746bbc19c3c4a8dcff4d9171
SHA169a5552aa33a2320dd2e6df034c69efc5a7be418
SHA256a56dcdeff7c3f59fc6c92c84d5fdd761b0769305b1ea719b48ca6ddf247b40b7
SHA51288b2d0f9ee8a4bb5e10515f87cde4364c8ec9007e1f1653713521e9bd56e0c93abcbea3ec2a3240d5b59ad6a071cb856b6cbf1c811bb2c9a8120e2a826a58980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501cbb350a4e51c14186e7ae1fb08421a
SHA1af937f9a2900fc85abfadd4c5dca430e52e956dd
SHA25674799fc7cb4dedd3f8355c90aae0ee50fc33848cc4848241759259a600066567
SHA5122a9b7c009d1b359d77968d5b5104366a5946c13e8b2ebb7fdd4c7ab69023053062510c3eb7ed197ea3a0e8a91939f27cd7ade72e486937958b9803de8609ea7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f3c9037341cdafb28ae2ec8d297d5b8
SHA1fcbb53a889f0b89a4d50473cbb872077952c7ea2
SHA2560c4e8d16cbc2b4901aaf836fc510227ae9a5af3ff3fef71d38cb7cb185343fc8
SHA51266b36aa3a02aa4f03896fa162c621f3e6f1f36c3f9ab743ae263dcb359150afa6182535b841037da6b1f0e1f8fb9381d92733748f2d995f3e1c54bfd23fc9cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16916bb835ab8244a912f712ec6b3a7
SHA1bb6ce3365fe905ca696b1a3e9ef2b79f694997fa
SHA256f99edab71e79c37ac4f684604c573bf75eedf5b014e16279eaae3f765db1c381
SHA5127cec595c3a7f91c3b89e8cf3cbdb5f02d69636876dad0a2c378ad0673cf00d88ececb336adbe50a348c2e8593f90f1f3295fcea6944f3324907f30a9d704f0eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1d2fdd82700a58586bb58313745135
SHA1ed93bc541a7e6247a6dd488c1ffe0b2bfd03c401
SHA25628b0b8eff193bcce88c0c4e1a5720749f9f86619a1d3e0b08d6b2631049e60dd
SHA512a724b3d44b196e703aa1ea3b161623c9d80c8732bf0bdd78da998e393fa4b86a32b1afdba77d66d4ee010f5784e8db8c3d3929bce07af8612e887bed47bfb11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c897cf47c088b285a13530ca4c4dd990
SHA1ed7d5622f49197ab1ddbf8757457039167c2eeba
SHA25608ec655c649dc19a5773fa59dbf554d74c2088d593fdb3696e69bf995c766a42
SHA5127f4522a26088828f0622ff63ab8279d77581d6c914c90341ef20edc9b1565ca13e33af5a78703e6d57a76c5085e079228063a9036720d9f5be9707ebc9f6da4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fc18bfcccce9d9bbdf29dea4ddaa0b
SHA1213a6cce4cec7ac3a61428f6f7fb76380ebb11dd
SHA256cc494692f2650fe0c1ac8cc90394e300badf76ac3158e7a6b99a939fe504ffc8
SHA512fa82642539b1ca8df9a8376d56eafac1eaec4683fcad84789b105d6c0dd9f7bf84c4c03270575606c59bd130566939d75f405be0ae52330f960cb1126909144c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f1f403767c0cfadd3a5c2b1f338787
SHA1a8d23ba49f86145d5bb2444c828e455684505703
SHA256efd18690ef056db4d57a411012572cd4a15b0a67c15da6621b92cb74788a63b5
SHA512b584d902315754991a503457a52de397919dc9b2994f31c67fa8f76ae5430d96874372c4baa93aba3842536b6938d63da38fd96de8d53c73af884a739c1ac1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6347d4ba4b93bea3cb82c8cc1297e98
SHA1777ca4dcc78748eb536e3045e8bfaad38ee3a4ea
SHA2561da780a9c66d514d8e30c8374b33e2b2d414c4eb0cb9c2dd520fd4d5ad8b0c36
SHA512c5bdcf1e3d4aaa380c3dbc48490eda25cbf445964ef9d6ae0edbb9002fbb2650d12e5c306622a958813200e3c4efc78db15ef0bf711e1f68d604d1de5d4ddb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b99358fdd84506b8fd3c494bf1fab30
SHA13515b973f22c64074795c8e5c2975b227be3ba91
SHA25605881cff2dfab1b8fffa71bd79de0a556a57494e3bb0d28ee669620e4dcc7d3d
SHA512267ef61cd437ebe2c8727f5ca1f1d38ef0f780d8c2946b05b244dc220a9281c90b0c807673edd0a2549ba594e7e9deeb5e522507b8ab0ffd3a727f716b45e8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc25fec02a4876542c05374e893b4b0
SHA1bdd8d2fede10fdb5f0d682999ef182caca3b1abb
SHA256f4f7eed853ce3c78de74c90059f68e56a7d144cf9bc1fee5af1fe06e1eb0ece5
SHA512d548cfee4db8519a0fc80f4f33f4ed07d2bade1ba376989c9cc0e06fc328177dd1aa7d6e8c5a7ec5e703ba39d6622c565a14eb0846c3c4beabd1adb3cf09716e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280207124e23ca35c1320a707b6f4c8e
SHA153929590ac1e6a3b3149f8ad413698748cfa4043
SHA2566caca1b490d1400461977d0b49e230441a1907dbcb184def04ccdcf61dde41a8
SHA512ef5de8a7760b30287e246d73aa2f7528f28cc7080e50cf7d2402de3b0c47c8f4d46583266e6b341572f00500c59d7adb7e75b0724756dbca4578052bd4b2b37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d57d90a6b7c66aa0154bf917dfc323a
SHA15c06991d80b89f1cfc4a323af9fb1b7a4b5f9385
SHA2562c88ea56a86f115cf178b216639e7516a36c4a2505265ef72e33c85ff9009f15
SHA512252a0b5d48059c763f5ab5c4c4576e5b1bb8c0335d043dc2bad7df12970614eb3689b391bbbd08459b8e774944497057db3be648a498fbb37f1b9c6f47159048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1d56b344932ef171ef98de08a07192
SHA10169c7e7d230f7e6f7fe34fe319661ae7f17e82b
SHA2568f4899d0a62b28f3bdbe9bb9852f8c062a2302c8418d58a2d582eec173e1f066
SHA5128f9b2358cfbae428171eac5cb3d5011d4d1475a553aca0a327e05668da4de1618831128bb89db007bb5442b49a095923ebab41b27614387560e8f2b6eba98a36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c7f4f16e82e64b97337908d65d142c
SHA10cc304093ee2329b77c3a241b1469eb33dfbf004
SHA256a6754516a09135fbd61a50b899cff3b74dfcc515761ab6a3b71c80cfec2007af
SHA512db9b1e4dfbaed7edd6511bd8053768d954849115f4019633fb2d0704a32a4263ca2c8e0edd2b2e27fe03688bcf707aeef163e1c9fe5b91cd8f7f494d01e37377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c03378c245f4337254c3e410e41b60
SHA1ac2c2c1fafe6ae8d4b2c62910e1473dff2954bf4
SHA256471df26719c93efb2d03897675b44c0c1e2f99be72731a050a1fc9b6e1438ef6
SHA51277a91d4c96997316388cf8c64a6f11797fc599ea5ec6e6ab0ac8b1cd427dc34d5bd5fdf546a501abdcdb3ae22e712e02501b2e1216affa82510b44c8ffa1db19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594161579e0602798772995605c536556
SHA1addf9324684f30f9077f10b1ef039a6e12961534
SHA256c882abab7cefd1b561841cd75219183674ce94760554fd79304418821eb95d7c
SHA512125ba1b012ba579050b7276cb5d319f0548bf266adb99761455e6c6dc87766502119d8f5410516cd4d3611d3e122899f9c140e4ef206cdfeb7ea760664bf284b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534395b4797447a408f3125e7d0da637
SHA1a83de600e4ca16493ca65270b7fc449062fbd41f
SHA2564ba5831430d6d71be1ede1bd9976bfdf7b5503bd45f8506d4912e24ed502d1e3
SHA512b76715098efcdbf90245f3a76a38da529c483f3cb4cbf2fd08a39c7b81545bcd21b41a352247b0121647545a8c0fa736172a34740f68dabe877863d394be7287
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b