Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
fee5e7fee7496c6bdaca29407e547c5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fee5e7fee7496c6bdaca29407e547c5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fee5e7fee7496c6bdaca29407e547c5d_JaffaCakes118.html
-
Size
461KB
-
MD5
fee5e7fee7496c6bdaca29407e547c5d
-
SHA1
47bf4a88cdc642e6212a08c9df69e351e4898150
-
SHA256
76c2b389c56717f226ef04352dbb07c42564b4b1a25beff37e73a4839438e719
-
SHA512
6f15d9f77c551029af1f5830ea7ec9e20b8a038f75136c78575c39284736bbdbb3c3574beb6519fd5f7ef0437893827ba04eef687c25ed6b52bd4ebaf5d6dca3
-
SSDEEP
6144:SfsMYod+X3oI+YAsMYod+X3oI+YIRsMYod+X3oI+YLsMYod+X3oI+YQ:w5d+X305d+X385d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66817551-7E7E-11EF-9917-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433788549" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000008f5f33e450cb86619409a594c979a21ed49b701fd2e404d0baddee4b26cd7f9d000000000e8000000002000020000000145dc5ebb80dd7d22c1084e20898b7ddd15fb0c829445ad20ef7f6eea07b60e720000000b043e03dbe74e4bf21dc5a762d3c2e108ad3c8d32f99fed9952b4c7b22eabf284000000043ed8fdf9b6429640794372feedd9bcb1ad7f97da5dc5db675e64322a23d3ddf023523214deb7c8e48e79b0873d4a0acdcdbcc1f090927f64d8942df352519ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c9f33e8b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2848 2400 iexplore.exe 30 PID 2400 wrote to memory of 2848 2400 iexplore.exe 30 PID 2400 wrote to memory of 2848 2400 iexplore.exe 30 PID 2400 wrote to memory of 2848 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fee5e7fee7496c6bdaca29407e547c5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b20b4cef4c7f069822b377cf5ca7c27
SHA1c0829ee172aedc1822f2a733011f572ec2cfe6f7
SHA2563dc60530d241d1780e59905f24701e5aa06ebed828ac7fd53b968f468e7dfac4
SHA51238b90f600655b3fd8baf70abcad5618575d4c7e2645e40029b7190c69239252e805eb05b74ef663594b0768c91b81ce777c873764ada3ee201972538eb41f861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c29114c1bb2144c8ae27a5e77489f18
SHA1cd587e932aea7257871ecf9cf340485c6552c06e
SHA25677a3dc8f930400870559aea2a1d2e6332c9c7d20d173cfff46487d0ffb648826
SHA512ecf1ddf0629bba5928a56e2b30aef2c732b10a1364238e0d612b0d8ef2be82e7e21603a2a3149981b3e4020eb5ceba08dc9250ce1b720db4442296512ecf67dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e7be1e37ee100efd6f998c2218a258
SHA168bd4c796efbe919f13b63d71377e85994605466
SHA256a1332e6b999405bbc34db462ef2c856b2eb0e5f54fb23db4672eef23fd76e7fa
SHA5129de3be0f4f400cb14e66120c1e8b8551a45a1ced8b5a1c1431c8e41e9596e4265954e6d305a57d10045b9b03ac37a6fe794d49bea7f86d14a2a45d40c8bcd569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424a68ee5e1b4de2e8ebd62808cdb8d1
SHA13a256a22570746194b69e9225fa614d7c4507ab0
SHA256edeb0f474e0783bbbcb6572adc5c23bd165827937fe2cf748160015cf01c41ce
SHA5128d40ae06f5f4b23fee3181c860b0e299f79b67ac47203872233470a1a28b995356d9a0b3263d28401f5297be1216cdafe9d393f92df427b8ccd3e5004f5ca877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59884bd3e6fddf489708cef2ce216eeb3
SHA1a04a0427133a1c22793e08e4302234a9a7ac76ab
SHA256fbd669c57bdd78ea376f80b4d9e52afedd78599c97d30b8975e3eb24ad9482d2
SHA5121526e91e8d7d0fa6d486acfcacdd5d629dccaff75a55c21698d51fb754cadcd6140266e1e0a1c8bec56e3b21a1193cfe3408669c53afcd65df4b52574f0ad92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc0eb05071259f70f77e3d6d7242015
SHA15890b968b999738f467b512245c1b106cf5ceee6
SHA256b82b2e1c454e2c08da8c6764f8e0f5e8456442deb116a9b05a25989d376363a1
SHA5125562270c2c4bca9ea899798021ee7a0d335280774e51556f14b5d74964c5bf6fcebf8fcd658cd7edd6ca5991b8f667e59b301ee01a77ea20c79189da728a37a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a325c0bd2c87cd7b5fe97b2ead332cb
SHA168d9075f4f94e7625d8617350f0d6ef9632e23c8
SHA2564e4ca54a4d139b75721f8c11148174a8449eb377d7f9580a4230e759888727cf
SHA51240c734afb1baefdeeed17d03ec8400717847ed67cc4600c063e09ffab51575672879782a8feccc44ee30ee68d2deab5d7b03e52a9260aae2cf32ef73af351c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b99325601572d7ca0ba5fce5f4fac51
SHA177d98663ac02a895b65d878e5cef4dd9f367ea0c
SHA256116543cacf95fd7cb7aadd3565d8f079791d7c7c06bec6be0f6bfc6b47a0f018
SHA512c5da9574ade4c331d1b540e210a1ce13e0a8aac8bab45a25dfa44aee5c4bf1903205ef530ddc36e07c5eda980615d7d11891d181f62b213ab72645237c7cda0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54666311ece430443e4fe6d00ec469cea
SHA109082b37b00163b0113611a3add6f573fdae0e6c
SHA2562be6dc197f819de233c4a9f8c058e8a71811ec2e91b61bdc3b07202ffeaadb91
SHA51251aefe00fc8de8d6c4c191092bdd31a810a574d85f14b0a9f8b706bb89a1f9110badba83a8d52a359d3788d8ac30a057f299d79378b91ea241a6f557bccf6da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4886bc60f3eed3404d778d4f4d56085
SHA105b35725b89d03c42093a012f3b95a2c95af1f85
SHA256ab4be3b49bdc17064d873d8f3d5868819c7a424747a6403e6e3e1a2259a019bc
SHA512f519fd911448df145853a50a825782b17154de8231408c521fa7d0598b1a538569f3471564e53363936337774118fb24c685a570890b96c2dcd5be077950b964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966b0c6cae187c1cb16d5f3c4542009c
SHA1824943ff6ffc0b1e38cbe066a4cd871c95e40a66
SHA2562653fbe0d95cb8b6f9075837bb1e8c6c79751a20768a3edee107a4cb7b1140ec
SHA512ddeb6e8abfa48d186234363825edd4b0291b6b1189b9a27f5c9907b894105c58dfa5b021e6b6788ef0b167febf717fd229791105b2599716bce7092560bbbcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c621ddb5ffd555dd71c7371ace369a76
SHA10416b70cd28b0c22712a61abcd109b18212fc5f2
SHA2565f74f585e87281408037da36ff477f9fd5953dd3e74942ab57a8a43df57fa0f3
SHA5120307cde4aea4b1a302a7c82a41690c1227bee7afafe233bfd69eb8d58b561d0d3db749a2112d3f73204210b2c11694026982616bb1cdb9cac6d31a06ee13535c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba526859e452f1b5db7c6bec43397321
SHA112be5412d10edf1b72f3815c14f2d370eb47d0ae
SHA256d98346c634cba50e45c0ec4dbd9e6fbb38451f400209b2c814569ed8f4752299
SHA512d87ecc0e7e25236222bbe6c2fc8b4d4d7c270f3b7b1c69fe89f02417c4cff724996b5de41646cd5c341715ceb8aa40f22a5d2495c0df357b9f4337d6ccef5cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f54e93df345e1942a7e1d1b4a1add5
SHA19b439ee7f95be335f4556796e825b47ba23ab37c
SHA2568e9de0827a72888ae74bfda4a8db4ffccbfcd9d3a6e7062ff9dd2be5510ae976
SHA512f0430c1be88402f84835eae6a63f5873b21dd870efa954bc593bc7068ed20b52dd8c05a64b7ee80d2967a763cc6564fa9f17b0dc5a06e1e436a468bb11ba15bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e1fc5acb4c45c601b69d68fa9ff8de
SHA15e0041bfe6fe70309315a3f7ac8ae375834ec8f7
SHA2563c371986f0e55a3e0e07144b3345dd736290c716715a8a034432603b7443c40c
SHA51243489c0296ae3d77fb60c7fd71c8a49b51f9afab5ae2483db373d45883bec4325c0e954c3cca480638aa3a195d8f4bece4b8cc10a3680b26d17e275dc264d544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561cc1630bcb0e9ad2e44d79ff96e59c1
SHA1d50e956d6a8d0dad0f0ec6425357b235b5f4bed3
SHA25695d812317f6670210f19f372ea2c7c869fd3b6961bb079e4936a48136e884eb7
SHA512adc6d042e09ccf58d06bcb0b71b30077fb25c031868d4d34d16bb64c4c4e576cdc852e49142b457060ff119440224bda1788dba499740914b5c3c43605aad583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ea1a2da117cf419c50a9c877b44ef7
SHA16606d09d35dbe83b06baa8b754c72cfdd657b6a4
SHA25682fac1ac9c472d62ce06d15661ccef137e21ac9665132dd9344b98041b2659b4
SHA512701556b78c08d5a47e9a411bc63b3687348bfd33b16d532ea661c821b242910c8e1db924062db4535d37f9ea9bd7c463aa712f30b003df093d3b21033b8e840b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f1e6367d96704701890d37607ab7065
SHA18b3020b517b3752c4bbc0dc1ccdca9d40d45e52e
SHA256e5847c93cc416f575512ca26986c11432a5476b9d312d3a12107d43b5ed299c7
SHA512e964a0e707c335aa24476fc80dc86ab5d71ae966975879cd00bebf02c9aea7753fe96cc39402ff2c3dbb363311c8b01f7fab5f9055daf423ad7c7b2615c6d189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66e00b57d5a5e84d4aeae1b6923c81f
SHA19c909e087a6432dcad1ac84c6951f481d0910979
SHA256894bff184211413bbe03bd8a96c03bf909e71183311bd3d2c773281a351595b2
SHA51278c30f522b18d1f157fcb7a11dd1555fbfe3be9154a7a2c00bba6049c44ecdfbebcb35efaa8bc6707022c6270ce23b4d4ddaecae213864b9ad2bda5101215255
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b