Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
f4ea2ba8843080729bf9d7bfaf06d90d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4ea2ba8843080729bf9d7bfaf06d90d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4ea2ba8843080729bf9d7bfaf06d90d_JaffaCakes118.html
-
Size
27KB
-
MD5
f4ea2ba8843080729bf9d7bfaf06d90d
-
SHA1
7be25e0262038ef91487d17409c41380b31df1d9
-
SHA256
11883581a215869c365a3216ab977b1d68dd3b80fe06fb700f8278f9faad7a06
-
SHA512
b1e767c1f9f379b6cfb17064e6a80636ae323b5abed60ffda42b20c93dd1598f8b037b24ec1226da71a4dbb7fe980dca21201922ce55879e2460acf8c5235cfc
-
SSDEEP
768:YAUONA0evPqkvqsAHNtgXeSXRXsc6NtsDiwDFF3hXUQ20bnlD6vHiqxSjU6GSNom:PjNA0evPqkvqsAHNQeSXRXsc6nsDiwDh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b1f68bed0edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433390997" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C71AD471-7AE0-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005992c5b87056e6603e7cd7affcedce3f73ef77923796166999e19c840152330f000000000e8000000002000020000000a4dfac4dec91b55fa33bf38b7de3c71ed89fe860ccb4122cd72022ef4994080b20000000f96dd67c4038771abc89e487a9d230ee14710e6856cdd4c787d6b08d45d8abc740000000b85cb6a769b890f956fdb398b65e930ea62cf06cd817378ae588786263ada3378b0a8aac03ed00d33570a521cffe5687e7873f86060f0ab5d9af4281b1c8fbea iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2396 2588 iexplore.exe 30 PID 2588 wrote to memory of 2396 2588 iexplore.exe 30 PID 2588 wrote to memory of 2396 2588 iexplore.exe 30 PID 2588 wrote to memory of 2396 2588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f4ea2ba8843080729bf9d7bfaf06d90d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55905c2994cedffe527570adfd1a1a36a
SHA1cad3d75e1d15e3f43217ccc2f6aa54d53b6f5714
SHA25670e137e3afffa13c97a73a7dabd41eb23fe8541b68c9f89901aac876dbb1f8a1
SHA5127df2d15855bdb4d9a3fb81ad2cdbeb287d29f6b20bfae95c82a26e714b21ef86b07db219f0f4010f94301012a0d9a44208ad8511aea4c1de9d3d7ee5fd744545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3b032a47b9808d0821f04b8d282024
SHA172b0e343f974b812f776e14b661336f762d900a0
SHA256bb138358af349c0a58686c8b526736b86e21641a12f8a9841a870720e550d6da
SHA512591f5a3c7be189ad261942754fee25bb10f580bb8ac86ac2d62aba9c4aa3934dca1b8b6f127370fe7cf6b626e9f1d4f287f14b32ba08130c0e51364c38bacb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e2e123f33864186cc9d28ccea8b05a
SHA160ca0ef2eef9f50a9efd4f7d4fa692713e01ad98
SHA256a41ee03b8555136d1487062af6e54c64f263fa7dcfc0e4db0ff5967a3f16b2ec
SHA512392c28b6f17a12c86d988e67fdd4917691f1dd4f8211968c27f70cf5de5e5650d4e174acc204693207a3f7c0b4b04d45527493731a7c320cd5aca400b8098b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8677d0f903405825ab44d8259a3359
SHA1fcd18cb6aea87fbac31fed5b329bab040ffa31d1
SHA256d1c7f76169f0e2d75e7c574e215cf9cabe264fc7722e2ee327f0eeba098b4660
SHA5123d85e8b77f14cd45ae57ed93ab034f9b5cc55be25a547c4c068cac737d30e256eaabe997c8852b16b897c23af83f3d1084005280a352bb8193d412ac3ebe6237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5e9147830d78d901a5d8f93dfc1b0f
SHA19f7059c1b83f13cafe0767102afbd0cf154daa05
SHA25669cc6b213d6af3ca5e49ac742e3f45a320ca21b9ed28fafd59bc085793d2b438
SHA51234cc7147d99b4f122d646aa072706fc93bb7e44ef2215f2cb196fe5f53c2653f8f55f42e8fb4f17f361b6bfbf3291aecbb85d6808cff9148f144277c553a3f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e2cf0c16ca5f962a22fb8e57f388b7
SHA197bd71c7234fc8fc0923fcbbfa801637b32eb2cb
SHA256cd16629ff9403f048bacab4179ee50d2470205f0fa2498bc957c168dbbd23799
SHA51237277dde42d1d37196b3053a713cecf3abe9db500573ac35fef3ac9378bd67aa8efea7cc78a2006a98ea00a65e3cac5c74e804c9703e11b203dea9298558973a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d651a5d4bc3e1e760b742f89e90038
SHA192505ddc63719e2a0f2bf2d5b2f7c42aad0e2eaa
SHA2563cbea0526eb25fa1525a2d95982345a022b690488a14b50287f7e867b286896f
SHA5126f21cfb7f39a7e241c1a57486e6935adc12f76e3ccf9affa7be93ecc1b2ed8367d7196a0186e7090fa6782929a84929ef8f9449facd81bb720c9549c8e2a1bac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46f3bae5c9bc9be5ed3c77e37dfca44
SHA1f0dce5d41cf7cce044c5f2f9597c94bad2822de0
SHA2565a9a50bea046cb1fed272798294fa7162a9467e65ec473e41b91a3cba759e492
SHA512b8a8337f50ae244a2734c53f97ceac1f9e573abfcc9489f9731231b936d51fd59d20a155ab5b9eb3d1a4c2b851a7d07b998f53e10b0ae6e02940f8b5f19aa01a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536bf2975a0e3dda582758b35f9f98601
SHA18ba9bba40c4a0d5688d3151f614334ee48f81ad4
SHA256961a2420c63c66dc53dda4390f405f42120207c7262c8bdc8f089d270733fecc
SHA51229611124325b9b08678fafd5f9b7d6d0d89254e3f96657b7fd60386b1222596306133aa3f185d03b6a536962d52be8ce98efeac10f00483b71ede872f380beb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157857ce9bd48c5a65f829c30a2b53c7
SHA1dd5b336214185bf49957ec22656c26596b092680
SHA256e43be2b27147fd825bc0dc577d3786a6a36ab66abe5ab8d2af7f786e9576c54c
SHA512e877fc56997c7f39d6b81eb5a9df5b923b4d0e92038a01523bbc40b253b0230f3471c36fed91dd8d65646d7b2df9b97df15cca66725f2e84a4465cc7fe762280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2c9e9a8227de4381a43a1e359cad9f5
SHA1881ee3b9ea3e097dc20cd5bb01ad55a8e711a744
SHA2566eca6714ecd389eaa4da392f5ee1cbd2d6ce4c4ee35cb510f9cc14bcfdef5087
SHA512366c491164b44b0e1cbc9a37fc4bec0e9578bc5d08a12b9770350a8138b7889d39c2924ce8412be76c5d2bcda932cd8eb6ae1e207f11c8266b833d05a3d98642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591418b67b738f1c0cc93e3f30cf1d247
SHA1f53b6f88219e601b8eeea3a1880d098675b2beab
SHA256f1590babf59e501a84832c41e2f1801cf0b96877c6997a01389b5205981a9c9a
SHA512040177a635dfd12064bafcc52f5e993d36f749b44d6e5f4956d1a283c599049664ca65673d0899e4126d4ee1bd7e1b6e3cbb23d24bdab77261082b969266dfc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311043ce53e6a75dce43f6bc9fc81859
SHA1a3edbf0f537a9a9cc981ade789609d6d528a4070
SHA25673bd3ef939fac26c00f6a1e374ec8c8287968c95a1569bb5e60b173bc3b189f1
SHA5120df08d5a18af3b3c7eea8c74c5d205ad0fa7979705b2d5da6d1516dfa6d20cbd2d9790a45b458325150daa47a9ecbe72f79681079717782f7f34eca0b2f3d1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb912e5abde009a72f9acd26a3b8354
SHA1949003fa5a209f0b4df58b1a625c30bebad770c4
SHA25671cfd2abc6f9c0933cc02275269e0924e493892f45effb6ba89cd57a3efd5037
SHA5124aaf622d8c5f617fae9bb63dbb09aab47065dfbe27c7a4fad04d560d51a4d77c288f0421401a6883e86ee096cc716aacaa25564368cc8a5dc463aa0ad0187cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e9d8d4209a4320d042d92dc8205470
SHA129530da4d7b25a406030c7e34c716d7377cd926b
SHA256047dd83fb03578504fb3a5abf78352ef9978d64fc83a3e81d273a669f0f33cd6
SHA5129cfc30d1b4788b1147ce1acb592ef66c72fdb12136ecc2bb33084bcfe86e6b644d0af1f9e7716c0bc1d8a2de868f615666a8c94eecb8d8b734697a3750d47720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4adc33ebd6f89a0b65da428c353ce76
SHA131a23a42a4b20d843e2bbc3c4bf321d462490c92
SHA256b1fa87d60202d5d28bb7cd91e9cccc2e735f775517a345b33bced95bc2fbc6da
SHA512f3b74b5e45e29f0b5f0974d848d0de02e90de5f5949718fd8be0662c6586b9cf1418292ef6ac676065a7e17c47cf4eded96f6ca144e9955d6f1d0eb2fc4ac30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c886634078b0b9bbe9ffc312bccb6683
SHA16733a54d54d5ec0096a4cda3aff5b21b82f1aedc
SHA256c83b0a66ea89a48b9c3a32b3f240093b1a64a1f356ba4b3c61e023d872cd42df
SHA512982b3463b35984559d5703da19222dcdfb9756281a94f835c38f8a37c8f3ec41439b752f17f545f6b4b1c83f1ec155b58d2b55ba21831ba7e4daf703aaed38bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adde04ae088f7cac7c903be918d7cd87
SHA1ba9c66c203ee3fba26d8af9d71a50087b54b9a82
SHA256781f945f9a2e16cda285e5c84e6f12188f62f8259120a56efc9b686f904a8886
SHA512821f9e91fd4dfccb8890cc15a1ae7cce67087ca41ae81bd8ff6755cc86cb0c9b0bfd93fde6a36695cae51a3b0f1b60c985d16132f6463e31e499bce695953af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c116e50fae71fdce425f96232b5150
SHA1b3989324ce1b8456185bcea197e5483e26dade72
SHA256b4f17b1d609fbc2dd00267170fa60ad607fdcd753159f3b8d6c6835707701f04
SHA5122172744e5db96cada42ba8ffce210c3d2c2be8f5b4da2899b1b506b9c2ee92a283f6977b109b6f8dcbe5338d0c2a80c8fc1bac12a9c88dc16b832a38b35167cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b