Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
ea98f945fcc8a4cffdcd6bda8f4d5680_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea98f945fcc8a4cffdcd6bda8f4d5680_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea98f945fcc8a4cffdcd6bda8f4d5680_JaffaCakes118.html
-
Size
3KB
-
MD5
ea98f945fcc8a4cffdcd6bda8f4d5680
-
SHA1
61b87b34001ecdf34552f675dbf0f5052d27bd00
-
SHA256
fff023bb65b97cedb779ac98645529320e093d6e10accd9ee20f6c873a26eea6
-
SHA512
f720123df56b6df52e22dd0c655187eba648a6ad40760ce60fa5e32a48f76c88d80f3412fd9617708558778655d4576fcf8ac48b6d771b6b48de41a79ed1b8cc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000465015e52f0f1be96a051bbedd9bfa4407d212340214cb403721b18512f44bc7000000000e8000000002000020000000e2dd91d3db484dc5b8412d4b7ee81279317912cb5d3c62e7c9478cb0bfd8341720000000925c1fac3f717624845b7bdcf1b92da0a7c58451961a6456727a232d912d4b024000000041ab67b1a13985f66106e4462586fd7a91ec8f6e766882df1ba63b6576257eec6c9f253f6f10500fe5d5c753be478705e191d9943d183f2b45dd24c92f268b43 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882472" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d405984d0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000b1e37951a94a081a93c237a3436d87d46b6ca1d1eed0a43e3fdbb04014eed36e000000000e8000000002000020000000de5022b324ec2e1e13601b7e2e6b83eca63f717bb744d183d76907af42526d5990000000e724f53c85878ef153f254cc403501bba110d0162b4977b1c95c1cce911e43740c2941da41ad6392eebb1e51c39646355bb8d97655ad3ed9a103c288f359b0cb66a11eb4bd4baa73443b6fac9435b2a997f7d289453b7fc39022f74ac2bca9b14783fb022e55d285178fbf1f6db5e702e50eaac6c09cf404d9ebca611d95fad5241f524d43615797a4bef09c4bd0d1644000000089cd61ecf18456a4febfdea1223b2ed542fa833bc1fe4781a98047390d259c2d8fbca2cec51de11561dfd48be8ddb7e1b10891cebb2f366b0b1f4c81ac6e585d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C394DC01-7640-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE 1236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1236 2120 iexplore.exe 30 PID 2120 wrote to memory of 1236 2120 iexplore.exe 30 PID 2120 wrote to memory of 1236 2120 iexplore.exe 30 PID 2120 wrote to memory of 1236 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea98f945fcc8a4cffdcd6bda8f4d5680_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36a793c4513ed8600332926674eb0f4
SHA16ec36f87cbe053cdb4d59b5831410cbdc460739a
SHA256a85f60d61e7f6f79a7f276f4ffccf5f4c42c8a6ff293b042af00df774041c2e9
SHA5122db6f1c27d11fdbb6ce39556a69ac14fbb627526fc0d1e934704bc961eaf7f3f8e7bc3233487312cb5cd43b8d7bee2a933738a0086abf2fd89c79881edd5e49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153d674838966712222ac7716bdddfb9
SHA1713142af37cc7b353fde868082717fafedd37f01
SHA256ac0747e9f03370a00653ef9ae699d16e47806a6028f7bf1e1e0fd444a294cb3f
SHA512f4226b9b1c006571bc914a95f90b83a483bd0b8d98076a4637b4fa9f5f4e760b4e9179e75f2e0b026d76537a41c38a6a05dd64e8f6801d88283860f5a88df85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185f7475ad971301a1cd35376e879fe9
SHA1533ba9e4cc9c4ab78dee0a3b8955f9732042f827
SHA256fdc66c30c5c0ea13dba0f7fa05c5e354a7ee41543e8f37d28c54368f859479b3
SHA512e3eba6853e29197e4bdb8100ce42be659cfd0da222b8c5206ce67726bb6d701cf77afb15a2258b440b4d2e2287970bda19d2ef5348feeeb30cc266c8beae34c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554688a3955daa2e902f660d7bd271954
SHA1a0a90837472da5cb6c3157cb5b5532a645d0dce5
SHA256d5893bc9f5d8b5fcad8f0f9625220bbf7f39a8371a2c4e2d35595d8d4df39d08
SHA51262e13f80d901ed7b72c76c763a98e75605ac19d0281ad72e673e80a323d92d3383fe93e5cb8c4991b928a74d13c96458d5158dbfae57ca914251afcddbb7b8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd6b4d6608aa74af85118ab2637ec80
SHA13881671fc8d1095e1a86cff826b987c7b6c48066
SHA25605f865c178d5b7e43898b51f14cd51bba576d1ca3108615659f8fe8b83887034
SHA51273d263bd7ae8ddf9cf6c7d9330277c7e88b2fa193f17315280e0f9562422e51e3587c32ca3fdc88f8b5a7d5d7a8cc70243ee5bd1d2daf97f6f34c7b1d88aeec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e916d90424124bbb179db3e5964d5e
SHA1b90914f77d66b045775599d69005a92a231f2ded
SHA25665681e49cb3437d83da562f5cee3e240d37fea0a847007bda7344a69dd448dbe
SHA5129cbea0a1eea7333b5e34fba40144315e3314a0942661e99bbf37d053ef08756909269492a42026345cff6a3f7ab2147ee073d87cf292c3d50de0dfe252cfe207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5134caaa4fa43a9c2e740bff4a3b3b128
SHA1aff7d668f6a7d6d1fd2fb0ba41c6e94f468e9aab
SHA256319880fbdfa8062cedc672273804bbd087c113bc0df8be24487b7b4a6d8adeeb
SHA512bb86dd01061e4506eea36755d8c9df7da1d0cf8348c87a2d5017ba166686be19ecf0b0879d1d205438a950b90ea4bc9ad004fa19eadec4a80d56d48cb659d2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d2c37bcd924ffa8ba3dc506976da44
SHA1a87ba74ee6410c7e08b0ded03648725b54e6d58e
SHA256d31b494301cf3ee5e70d2792718eb2c4d71766a44e526d41020d980f53aa40a7
SHA5129988e4107d24ea8e0bade01f5efd0996c19c55a129081a17228e4674d1cc2a001a5f3f8b80e31c722c52511771af88a3b79789477bc9229d7b0ba2e2c2edeb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e052a3dc9cb5de57f93619cfa38874d6
SHA1b9c7fe75991baf3b07650488d49341f0b8de3311
SHA2563dd9f38154c72b071ad2cc0d549b05e26caed123173a63bc53b0088472e1a71c
SHA5126df6f2f54d10916317634cd6d18b17761d30efe22e30b45d6aaf55793396ff35c76d58c635e7ba271cfa7f40abbc36896a2c914a204c638bf77a7fb1867ac7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492cd683a717a9b0df4bfcb756ef7205
SHA1bb0f0cfe79f727ae5004f621cc6bf4954f95ba49
SHA256d3d5cbf3e9535a694e363e60f49017784a00fab4fe2d66225ad6891b13338f9d
SHA51258fa4fe37a9217c4676e03f02537540e48c87f7ab99e4ffa01a2106c708a80cce39eef6879aebf12aeeb676b2d0bddac76166969085842420ebe96a0d6c47612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4056ef53fea75a9066d9267eebe2e21
SHA15c1ec03ef23fce17c48505fc11b03d7cbb49b8ca
SHA2560778e7f1a714e417bb059c9c5477cbd962382181e3a287e63f39b91daa927ecd
SHA51223948f5fdd3db7403c0c5da25986abca376eba8725e265a2a6760c33ced6f3268b66bf777e85410cb4a983ceb0f901cd78fa71e996109607f135edce5d2d95c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8bbf2f2d54b7f9cb59880eff8f3c28f
SHA11be4f9cf05a4a10eccfd12ca47b16eb70f4512f4
SHA256645069a0e78b367d5d858b970edb014b6ffa09b7769722de4ae82ca85a0c17c3
SHA51260ad5354b8a57b632b027cb18a7996bc3ec636720ff3b325d77cc74af44b806edaff901e70a6cc764c281abb61a1a1c128054dce7eb8476594bc56896e567ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81a2f461bf36b7c41857fb3cf62f655
SHA17ae8a22d2f9d4ab019d0f39f333252aadcad6ebb
SHA2564aaee311555f2fe2446e61cf6569258291fc05d387070ca9ef99f2ca8a1a9289
SHA5122c1363c617b6b95128eafe29f39954086cb00d818da5e07df7c3a36b667f8163d08e0e1b2604087c32605d377cd122d373090fbbf8adf8f743c66ffcecc1d87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee7d2f930fbc22e791cdc94952f3616
SHA169270ea82340668fef5c83bf57701f3c855590a2
SHA2561e03e8b69cb623a8107bfe9b41cf009c204e2c3c05e0b27f08c37822d1b62599
SHA5121a5049b05ee687b4f471cfd1521b0a8f5d30e36365b72cb5678cda98491a0bef34d583b037ad6283efee2be48812db327bf168b6e3f02a7234771ff74f357182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca3fdad77404051634f42fa08b506f3f
SHA19c1f90911c1068fb46b90236ce01624983acb051
SHA2562dc467239f40adde24bb2ce6b22a62c7ee1e0c8ccba46026eb8960db2f98b5de
SHA5124ca629e455728f715be5444ad2b716e226214aa257855074bfeb22c32d4a991f0fd05e96eb5baf1969d0499dd78c43bcc9202f775ad179b0b07164bbabf75805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cc3c7621e88d54c6537e454b173eb6
SHA110a3e57992d77cb5861f40282588c64c480efe17
SHA25602c8a825f14c201a0bd115fb7282bc874d2c088c4963d90bdf83066afc5b8565
SHA5127c7a61249598ca56563e913d3a59793fa6a155baf930a33a22bd09b65aedbf6fbb048814c23e4d7f5fad4a0e11442f48b6ce5fc5d72d83439c08659ba3602fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521457565b33b577999a8c88d0c30ddda
SHA1326a7ab0cd7e321c5dc640fff9a1292e0e5f3351
SHA256772fc2ffd88c4745f465946f5e9c4afc003d97322472bf34a6e6475a950a02ec
SHA512974fefc8d407d26808fe5f4b43c89668b394d3db7f530d4f832516abcbd9317f92d568ed42f4b996b74e6f899ea62270019e51723e0c26f3ae4965f6ca836bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510522759d03c41fd0e753f99a62249e3
SHA1c9d090ab25954054ed729c795fbdcad1ed47c461
SHA256e174354ae963832cfa7d2c90b30f7d7342ba3b6803b9f39cfc8dbcd0f4c97e61
SHA5122e4dd8dd7a721f9e4cc87794abeb922e3f648f68b84d037bc7df2a25e19bcddc7d946318bac1ec8c89ac076a80da28054d1dc5cc89e6d90e0f7f0685e188f693
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b