Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
0cbdbc0f3cabe89d2aabb98b3c1c5e38_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cbdbc0f3cabe89d2aabb98b3c1c5e38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0cbdbc0f3cabe89d2aabb98b3c1c5e38_JaffaCakes118.html
-
Size
70KB
-
MD5
0cbdbc0f3cabe89d2aabb98b3c1c5e38
-
SHA1
89ab24f28dd05b911640eecb3fd888058846097c
-
SHA256
0c1b2806e8614c52252dd06b76c6eaf8e8cf8adbe5bde896ac7990c1d7795997
-
SHA512
8f7721df5fadfef1c102bec3c94498f1b351ecf490d196e5b934e47fd873ebe557a1c890de5cdbd4dbd2ecaa99222d426f1b74da213825f323b0eee8fbcf7887
-
SSDEEP
768:JiwgcMWR3sI2PDDnd0g6VWdFqmIboT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFt:JGvFq/UTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E15B241-810F-11EF-B6DF-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007719b6428658a55eeb21f784ac07798e57fba089943d815a2aff22011a695194000000000e8000000002000020000000fb4580a1d78da6db07c3fed2cbb238ff856ebc6fa996c5227ee63087449573db20000000186e7be8cec399a0c762a22f799fb67d25981fa20b754d2bf6f08aea7de318bc4000000011f8952692d907b2a18ceb5a397da9280b62ecdb09d6d80991609879cf434a549dbf6d241c2d84c496faf571f3ccdbcf98e8dae5772442c59401923ab0134fbc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03c59231c15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434070689" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 iexplore.exe 2992 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30 PID 2992 wrote to memory of 2612 2992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cbdbc0f3cabe89d2aabb98b3c1c5e38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f1ec1e7cabf889484617658b95d293
SHA19fe923d3e15592f7fa4b481eac63eaa20fa77f55
SHA256eeb81ff899a483b609517cc460a7abebb4797aacf5f9ba2cda6d72f6c5b3faf4
SHA512dbd252872a918be97ebb205b17c67fd7ee246a33d343de8414cf0d8a4c816eaddb4ff03fbea2699b893fcddd75fa3852699b074a2de951fdb81f0c95e7e7aa7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed0f957f2d6b1c2d76147b1a897273f
SHA1bfef097b4f4275a820c464dd58d8138e0ca9d4c6
SHA2563acf281ed85c081c4782999677899da327415d08f40586a40a55a6844366c51d
SHA5124fbc5b00292e2f4b7628ce1c460600088bbfbb23c15d84c84610af48cdc5e717225f919b9409827b109747f08dbed11daac00492d8b2fe1a2058d304341cc871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e6460d290632bcd562d5a1da615f68
SHA1ae166329935d6d6412ecb1ae2156b720dee5cee7
SHA2566ca9bdacda4231757cc3856775ae2c42d2f023a350cc322d2160baf06615407c
SHA512fc1a3238b8e517f3767856569ec23ddf714d9eb2377e31b25a3ea7c776c52222181a495e43030b6ec55e79a93efdd504417c5b69a89ddb4aed1ec22c18545b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005fe6ba9b8508b1f918898e57cbf02b
SHA1fb818e6d0ca887b382bb743a9b113a3eec649b6f
SHA256f42e5b316521be4e0e564065b406639854b0dcbc23402879ebff2bec66375258
SHA5126feae73374dc5c2c855d211ac47cb1d12e41c1caf97c66eec882baf161fe4ad76540896ef00c5faf75d68838f2a30a942c1d49228e7c5c2880294909fcdfefa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9914dd793782338c474d29c4f89772
SHA1c3086af3fa8bc8ebd3abe4700cabb5f1cb7ecfb3
SHA2566907be159c2b96fb5765e7d43abd0b6a999c2e40372caa884bc3537ffcb9fe06
SHA512660ca0941732a1dde6fe04d328d376bbb823213eae62ca8242bbafbc29accfb69c2b83373c3fb98ae5a7f98c14dd85645571ce92bf2701005f3e79c85601678b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef97e1cafcad7b4fd04fe594478e0ccf
SHA19b3879be6b1814367f5fa8621410daad916975c5
SHA2561372b440b8b9701a793aed765f7798ac951ad4baf667c96e0c95b89056c3deeb
SHA5124a88528c1ce472783d9e0685890974f32fc9571f51870b9e6168e829b4ab1499c5c29a0ecd8e7ee9f9fa460c00289d06941daea6fd5b79643f8802ddcd69e004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c02f3f399a02e47b302ea2b4a539fc9
SHA10ee322584aa07204f20f738cde4a4e4cf477d3ff
SHA2563ed3e3cf8900cca68dd538051826159997092802c1a51569ebc5f81c35f6ae3d
SHA512dbfa45d90349838443fe27080fdebe60990ffcc3a72fc634be34b6ac610bc4fa350ae76bbe4d9d9abcee3d79c37d75511ecaa46630727dd0039d34ff97f57e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533cad5190be30ed473de6678bc634840
SHA1a7b7741ffc3335de16176411a14b9a382ba40919
SHA256a324c6caa6ae753252d2be295ad7f8ace6ec2a55d40126ae4f2ad28ec729dbeb
SHA512b60f5130d7720bd51e71e7b01cc2a7c45eb249859512819b4c502bbb958a01a60ec33a8ac961fcbe3ced7eadca729c40b17366853f765bbf054a3cdeded77cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cdd2b05db6fc5141648d65aba948a49
SHA19a1e70e4db2fd9e7d7c5fe9e586585dc2f78f338
SHA256c2562d391003fcd3176e1cd09e719f8d2602438d0e27606793bbbaa48aa68645
SHA5123d7487ba4af68e026491510a8b6a918cf444a82592eb1dd5859b3f549fb2637deb87aee6073774f3795294be196080f91a352a039cb2f7b97184443cd088f3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7305bc53db81762de130deb9d90e96
SHA144e4d71db8effe0970b965f4005e3120d1460a24
SHA2564ad6736b325ef33c0e1272e14001f67a141f97e60261b484da0ad7439b768233
SHA512e66f65d26d0e65f73de3bd95d26e1082ea3541115d83f70d72d0b674805703813bb5e910162228dc2b488380e6762ea26b8ed1b079eb9b9b8b2bf4e9eac444b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57448ae85b1a00846b17355704eb9ee28
SHA14e0e468d24b3d7abe7172bb01cc6bd39fed96a38
SHA2565f50a84635589e967a52f0f60ee38944b630e6d8c3fc83f92bfeaebe0c3c48b0
SHA5124d6dd4a0159585d070afd1e0291d14003fb47811e5ae87171446a17a080102a35c21e52aedcf277b866d802e1a72fd19eae80a8ee605bbbc52937a253f8ad7f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e1fd2f65ab2e55b4e4b0df47f9a515
SHA180ac324194117d908eff9d55f9232c3af6ba5f92
SHA2562eee26086f3a594415c274f3c5602f9e8dca28c8af1bcff8cca698d00a0d929f
SHA512c6bb9610fe57bd82a4f8ee7ec58a8489d69fc6b7abfa88a328d0c8fd4acf8ebe044881747af739205ceea473097afb35345356e3546ee150fe3b4f3065a33945
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6d02317e731fce47e8da83149861f2
SHA10cff0271e1024baca56ac0c8a05f187c1045a53b
SHA256d7d9498b4e567f3568c6e00b865380b2853438c2b373a08e4c98e05fd4f0dae4
SHA51244dfb98fbaa2c149ad3a46c5af1d6cb8d4342af7bc54c59993a0e50d4d5655de7834224078ae0a4abd729717ca99e24d5dff547c685c6cedc76eee4af16e651d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5434bb6d084a2449ec0a75ac9f6e4fce4
SHA1d7ce9bafa426fa4a6a482b389653abdb19891726
SHA256e803719e1ed0548f02183b368549db61bb35a8c8fc1645e24bfe7a68b4a770b3
SHA5126717013b773bccff9ae54cd8f56374565556aad202246c3790137a7d28ef9c5a0b9d8681701a998674fff13a2bc3eaf740323836d75694bc49c0f4b120f58092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536753265da8050d22561d8114a2b6d3f
SHA14786fce0b50678d627dacc2c60a816845580cb7c
SHA25637d7537590166aa4ec246cc768ba9acab2d531c000b29fb11442bfccaf2088e0
SHA512697da7716a31164599ed61c989fa424174a0bb2144106a52f9caca7d6085e547e0e502f24b52b8a91135b61b5ec1c403f02a561bc9c5230a0381b0e0b47255e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b288c96ed1ed0076b68c8b7122d6cba
SHA1afbe3d5a46940573d81c5c904b44b188807242f6
SHA2566c74718eddf4b0686650159bc03b0cf8c14e544d66a39fc19ba53f04a8b6bce7
SHA512f07c9a1caf55f041e6a2d78d023e0bfb055bec93325b4e9dcf7191df9265acc701dee6fbd792cf2fe3ff3d9bb148b4879d60e82891622ad59d7789267e23247c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ed057e7ca20a455613380e093787c30
SHA129c57a4b7a0cbceda543a97ca3873baa0b68df33
SHA256d297687751381ae3041bf7a4e52579ddd64bd6bd15a6963da3bb89b3b108a326
SHA512e44f27f0fdc7b76a586508f26f10025acc7eb256f85d099c5b8a8f747eadac2e8709022faad1e260b204b076446431df144209c2e8e8865a0ab850131223bbff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c0ab16d5476d03212a7ae135e3d942
SHA18420d1b437965a442ac3e9610dd5d1a373d25cf5
SHA25694e6659ecbd8153b675490993cd4357031f0ddd34fe92addeda65f8b3feb677b
SHA512cf2d9b8844bfcb171ef8db814c7fb81b83bb7fafc68b6b1c952b09e6926b4d23dcbf575cf2bf81ce5dfd59029542c8d6e05f7bf0fafb50d4f19b8b9f35734b07
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b