Analysis
-
max time kernel
143s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
fbaaf68e707536b5ca9586acc3d9edbd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbaaf68e707536b5ca9586acc3d9edbd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbaaf68e707536b5ca9586acc3d9edbd_JaffaCakes118.html
-
Size
67KB
-
MD5
fbaaf68e707536b5ca9586acc3d9edbd
-
SHA1
206c5cb15baaa4c81804d3be3259437a93412559
-
SHA256
b3704010dd5b8dd3df2ce0a724a5f452f56493fd4180514a605385320fa121e0
-
SHA512
fddef05be0ecfd1426c617c08a1f9cfb6b6617f78828e2e88f45164dd0e395281be116c3474a86c3ba053003fbe81c802178339e0beef32f869b7242845b8e6a
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6s967PoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:Jd5TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433665841" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B246CEA1-7D60-11EF-A0C3-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b847bc96912c58d3c8957df19d83a8a61fe7775e8fd659bb826690bd6549fdaa000000000e8000000002000020000000ce6c1318ecf0f9446c568dfe048d14c1f287edc677c71e5757bad3017535b48120000000b4283403e803f77855970b4ff8bb2a64160498b2feeab14f6fc85dd2ae91699b400000008293afa21a85ae4dc734114b0e6e55169ee4fc89e2de4bd58fbced8774777bb1d3c774f8883727398b1d5cb37c2028b6c5bf41dd8a6ba031da39905e08360cf9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e071ce886d11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30 PID 328 wrote to memory of 1228 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbaaf68e707536b5ca9586acc3d9edbd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3cedc384473f9426a9f17b90f5e061f
SHA100c4a27d3e1e83b7f0176769386893dbd2f0eb8d
SHA256f141b65c3978d75eeab6c38fab91b8523f22865aa4846e01282fe7149a27b203
SHA512136c24467162926069172342a1b3f1360671af871adc26b5a128d155361cca215266d83dc694dcf646d17caf71e913ff0a4ec8acfa859fb1aceaf50121832a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86176093ca20adfb97d19a75934110d
SHA1b79615187b931a174edd2bb77fb06af8f1ed960c
SHA256002d3af4a34ac8559aa783f454b51071b7eb728d0f01f807c36c2383e7d00a5b
SHA5126ba592f758b43aa879cfa6f2de99363e59d8fb67a169391e2286e7cc304b33d083edde3ca48b232ce6d37c7fa49eb661ee499cdde53469e97661f27378897286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3ef8cd6f1b459046f7b4c1bada521de
SHA1ca22286a2ef5a711b04efbb82cc5cd770010099f
SHA256c580d928640365e956c479866f2d5b9f3aad04dd12945387f83844fc77b04671
SHA5128d3f09b34f3958a2ef9709d3029591c811cb44f574524fbb8f65b3b5d58b3011879b46eedfbdcdcdf24b0de9acfb03d93ce13db553171d12a5aeea13b4b28110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59152433a9be315b077e2fef60d3d4f9b
SHA1c57edb07cbc00702a09611e40a6c8a3d773fb55d
SHA256cde765eff65b6ec11f7bd49e66c6cdf349282c3b11eaf933accf51ff1376e72c
SHA5129b99102cd740d38eb86eb06ac3d9faea866a172437e820b8606628f227f6e8e2b6ef9c0b68cddb30dc4dc80c6a901574546a37eacf6e8ab816ddd885d828b232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cab6079887ba1b1ad7e2e3a82968eae
SHA1e13d037955f895b997ff147bfcf073fb999e87c7
SHA2562d272a5b90bbcc8c3e45071ded5818d844f19636562b61145808d563cc8ab82e
SHA512191637710115713aa9dd7e17beef3109761107559da5d91ad14b6c5b431a54e46d870ccfaea4e8a33f1c9b6723aeb791a39fce6133503b2372a1c2ce48723c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57687b608f2f81b21c8100da7eade8db5
SHA104a45a910f9af696c24cb638aa1f67675078112b
SHA256fff68394e6b987295cd1eaae44617984f1d6a1f7eb7ef493718dc1b0a89bbd58
SHA5127874acaaeb60f2c8cd1a4d882905ec8dca97fc126346015e535761bf519addd40a48ebfdee4242e540906af72e0e30e31c5316495c00f716f611767b4d289f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ba6ceeeb8707059c7bfa3ca99fcd94
SHA14514894cf944b70c12566a03154c44f87ee2b25d
SHA2564407489296f12307599bca690c1408db61ac75dee5d5561cfb6f13ae6809a89d
SHA51220e1310f756fea5f84247330adc0b6047e52db253e97d137f8c48951e51a4133a757b631fc24dfb0df6f5eeba23ff61aa93b67aa8ec14afb119c7170437b5abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b54f5add9b9ce3047ad8d4920ac58a
SHA152da5a102cce7967fc3405f9d7fcbeec03ebd845
SHA25603ef6abd546bfa4a6bacd1a926f6d93fa408e341611cec7ac77c61bbc330bc79
SHA512a2609f6245629dfe0d582e62c7724406c50147a4b5da8e68f4ec3ac1d57343904a61a97d9ae7d1f9d8b694c446fb5efcb5466af7cde6fbcb81c205f0a8d38a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51568f79dd883d85669af88cce8fa79fe
SHA13f76ce11b814dce0adf97f655a35de5cc401923b
SHA256222674875140acb6f27da4ae170ac81170b9278bc1994f4b05e43f50ddc63e51
SHA5126ef11a32b0c2ecad29792d551f02696458233894179f6e69c698ccf1e6ae8f311fc07939d4b46cc46371315d81baa3ba9636887ba651af49825e093fd6444fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb80cd480fa55f3b5f8726ad1f03ff87
SHA166ef13e4704d37c2d4f4e91a7f9bb25c28450eac
SHA256472554031386614468394613253c737dc2133019555fd6c4c54529695ff45cf4
SHA512361bd0b6e06420006b22c255fab16dcecff55365eae07e5aac0a7f5bc68f9d73fba450aa349d64306f127eb6ad6c8bfb401095aa687b3f2f5fd5fed65e7159aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cabe2227037e14a3785e64d2d87939b9
SHA1bb63c913bbe15b6821b886a08f29090702f055be
SHA256b427f2c7e75c7d6ea17d7bf4eb34e3846dffb22f307bf99861b67161fa2c3a54
SHA51262f2f9dc8906828ec32f1d21286847b8abead84d2c0b88819a66ba885d9e320e5381aa7b4256d7c11326da37d31d072ce075289146947f9bdb255bc4451ae447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afa669e8834225d7370d5bd469dd215
SHA19c746489c195c0d46d10662fd61248ab28a4414a
SHA256da0aca01591c684d0f432a975fcb2c3ef1ba0602f0729bcfd93f04677e9e1c5f
SHA51217482b56aa9661c44c72c785f48836dd8d2eedc6bebc6d9ed9034e168ce3c78dd3e43a5572e669037342c867d5d94194319206220b4f0d19b15299492a5de80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2feb07f57ca3382eeb918119a80be8
SHA199ad44c781c8ef23fef024c4c19b799dc2c86df8
SHA256fab5981a6b2b67414a0a5986969beeb2ffa8b51fbbb3b1837e00013936364787
SHA512eff34f852087c79cf298787fa343f4073eab27064238b32f05bdeab235224b7f0bee0f794353dcdba7206cc950acc6548bf2a5d8c60f2be2ffdd1bf6af3fe23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e85c2b59c926942db0926734dd6b245
SHA193342c91e64325a2e14a313786ee8e503e495888
SHA25652b2fff554409d529159fb38a52b46fd462b85b16f67a733ca1ebe6c5c202c6a
SHA512eac68c4504bc673e80b8760f943e8887906995daf214c4a8a92ec6822b91a279b506489335860b7a758946162124f1da9ce4a8a5aa01d9fbc4c483c0d167d240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e40e38525f51d2edf90a54e87a3f780
SHA11864a1be20ca7a17c92a8053cd95b9e6ecbcb03f
SHA256d4a6f38c0d5f0488dd4eefdb54286a9887b0bcdfcbb6431db57462f68ff59eb4
SHA51292fef3d7a911516c491066a134b1039d9b7a7697c0e4e6d02b9966ed3a45268440c364ed7416b48b35bb26ec0d2db49acf41dcc82b0cc64d4e529891d6ba7154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59799ca2144b47c8587e74260088f81ab
SHA1a3e51484bbb618d3959c25f0825a7362738f4d13
SHA25679b931327754f9521fd1b3b29c2447bf7c3188208005b6a3d7884d37572bdb26
SHA512ce5227fcb05de05aa37d3c9dc7f6df9f6b7f38f7bab5a17a27f8ea636df2953543e2f03d57df18a6c9c3d8ac141be0a51cbafdeb1c4d9ba1bda492b3258575f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0f3762e90e339e102f2c35df36bfb7
SHA1d72305f8c00e7cc7db7788189a4de1f6ca5f20d0
SHA2565af224edff768b96b63c7ad1728805e1890503d230455dae0c3b3bb992876aec
SHA5122ffd667ec296fd4ca70d916eabfa4586e94e20f215c67cdc5440f603150fbd1e62d0aa5082ddc5ae02e7a498f694bd8e77267de2e659efb9ff47c8d869b04dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c06205dc9a9639ee94e535c8fee03ea
SHA1fff712b5f01adb6a0cb7ec57b22a2c9310fb7812
SHA25652f31c58a316386dd03ec90f5b0ff992b4ca741225d9680849263da18259377b
SHA512b40d71b1bf3e20f87e4e7c1d174a39a2deda7818375dc3b193eae6b71f838278135aeb6f881c53dfc7ebcaf5b894866fc1467b7799a8ce4a6f29ea43453b6cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291733c7eec24a6328eb63d592976b0c
SHA145c5dd9e231232c790e00596c82c6ccb805cb711
SHA2567ebca9956f8d37104d87f33f53adcc8fef0309c2c4c39a1612f63b2197a6a760
SHA5120ef936e53a4ca0eb5695250e67067c8cfe41585612faa4b21060677af8dd7d2bb6c7dd2e5e026964bf162f5f8e18488326faf187dae3f49a81b500a7257b4080
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b