Analysis
-
max time kernel
69s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
0aeffc9f58ad5b9dd0fd2de3846299d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0aeffc9f58ad5b9dd0fd2de3846299d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0aeffc9f58ad5b9dd0fd2de3846299d6_JaffaCakes118.html
-
Size
690KB
-
MD5
0aeffc9f58ad5b9dd0fd2de3846299d6
-
SHA1
58fc5c29289748972011b40a895234ed55be379b
-
SHA256
48a164d6268b320eb2b0a30efb0a8d4383d96bf66d72524572e5167ddfdd13a2
-
SHA512
c2c45d45cc142fa90dbaf9fd84b4b2790258ab2c1d0554f7dc1e50f6b41d8908534e5a3df96d21b5a137851921335ba7e091588100fb31df0de7ab0d09890da0
-
SSDEEP
6144:JkvjVkFkANktWkJk1ktSkJkkkYktRkUkEkEkEkYk6kEkyk7kEkDkskEk4kikEkrp:z8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434038377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1209CC01-80C4-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02504f3d014db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000030e8f1748ca2b94510e3084f6c986fc0120dadd2c146d30622817b2cce66a4ae000000000e80000000020000200000004d4d1b44fd0edd90ca565dd669524354ca77cf21bf16f645655adb1a5f0239f520000000c17665c9da9b805710c4030351a5aa96d002fd33a1009a112a2461b80c71b84b40000000a6117c94d8cc4f60520d26ded1d42fe81d0ebc006391e5a943a3959b5d45e3cc32703ec817a2d840bc427790da581319ad8f2bc2d3d173516097adb496f58b96 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2704 3020 iexplore.exe 30 PID 3020 wrote to memory of 2704 3020 iexplore.exe 30 PID 3020 wrote to memory of 2704 3020 iexplore.exe 30 PID 3020 wrote to memory of 2704 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0aeffc9f58ad5b9dd0fd2de3846299d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c854b953ce319678ce40760a9849781a
SHA14261da98c87f6dbe7af92deb42b39d670b91287e
SHA256afffac8ad5b18eddc907e380d4f239c3f03d6a6624da6f0eb3d11a1d2cc992c3
SHA512c7597c98fc5ca114c5f388b60a3b4bc3f2a056c0039993c09d29b528d6b06778d5bdb4be625f51b6767c4a074cbce9eb2a14ad139c9169764caa940ff5c9ce81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65e78818020ba6a19a7e1b16a7aaf0e
SHA1b5e7aaf6830e8b74d141344028a62a0d3a9d0d2b
SHA256bafbd06f6b850e9b95fc2f9c29de1c36043385181d4648db3451a3277b4b7474
SHA5129d3c7ca6e34bf5f82502a6cc98bc3dd87f769cb0231895e86c0ba45848fbcb4af46503b4e5143c373fd841cbc2f8e64d87f79ac2be3cca9bdc4285c377cb28ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce3defc046bbda57836d7fba964a11b
SHA1679754d2c556cbc6ffd777a2983a45440871d4ab
SHA256c82ef80d991e97389ece6052b988963adde8595cb1238c539dddd7433c026a92
SHA512870b3642910cce2bd169882e0b835ecb024f5b85977fa728911d3d6e5ef320cca273be42b60b5b7aaf8c78c2294d3431824ae7435559f0d72f16b644b831e464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834a04bd8c6d0caff07fd49eac6e10f5
SHA19f25f2dedcc805b4fc6f9cf479afeeda6dc781cd
SHA25661d34c24c5699870c82fc0da8b74a286cee570839789a1aa20e3a7a426166fc9
SHA512d32d16ad8361d80b91e0c031a9605ffd767e122dbefdd8cd41eb9ccbac2d50eade5951b381efad4df123f8eb3291da4cec262eaed44f067ee1989f23f2c43a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598b5cd850029f38b2bfd18f5f165cdc2
SHA174ca2617a05770f9fac72ddc796236e5984b7f47
SHA256e92bca7f1e5ea5dca99bc0a6c5b600b5beca266fe6b7bf7f54e48e32bed2edee
SHA5128f3cf3911f93a05c70ebd31814b03c12bb346f8e700c5ecf7aafb5c2c2e5d968139d825561d24a0b7300db2aa9fe94c041fef5d2965360f2c23132937fad9eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a9b26738de0ab52d9bd477f87ac1ad
SHA140b3000f099e3735a8b82f3b10afeb2da4ca28e1
SHA25620ceca045d417f4d76d4ebd0451c7df59666e99b8c0b1390649b5ee5fb815aee
SHA512beb726ffa401fa210605c88e3ecd40b68a863bb986490547480a8fc30137b93c167a6772220f67bd8b6eeba20d3838c4ef1f6dc91541f5e64ea02d8a7c523a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bfdca5e63520b6c7b6e7c5332e7aed
SHA1423acab920a7e58d90eb5df8fea5a68e817773ba
SHA2565c5141aa6b3be4954e4bf1cc84978f632e6e284a14815d95d0910771abb4e739
SHA512ba2e34a480439fd340387adc2e093e6c968765f0f67e375907a71c8a4b3d09b1675c6fdb5b14952662080917c8251cfec073bf3ae5d5de56dfba692b14556608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e040437dcdbf78db8b67c9b8552d9bd
SHA16be879b80a0da9791c90a04e2cffdc41e1fb5200
SHA256e8e49503f0669fdb92c6b3277b81af6a4111b712fccf6ea8d8bdf645a84de068
SHA5125f8aed61b69a4db3496cc6d1e9a45d395ceebc5438ac176aa6fd8c2ba273d64f0e6d22e09ebb4fb47542e026e33979916c8ab3e8f52281ac4115e855d2bb90a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a8e86e23dc1d16dc942e47d2f0be62
SHA16a03fccc51d1783cf6c596718ce266026c6d1ca9
SHA25662339e853a7358823a8bdb023a355f9d82025b7ad377ef5ff4c0ca0f5b5a17a5
SHA512f00fad19e2c1ee8c939524b9ef5e2564095f87f8b539325ee395799372b4f289a7ace152fcbed10a3fa5acef2591a25233fc9eb5b6df46e1c345040f036899d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce87741e100ba15851aa52a6aadd2163
SHA1f5c0b45ab22961e90e5e454dcc43f3a834f271a6
SHA25606aecbbdfdf60bf71fc7bded54d95936211929eba1b8ac837c9d1c6628e091c3
SHA51208fa8cab21fe54673fc733d3b9cc510fdc9507a4f256085a46ae2ffd39324ba21a8c596066659add0d1d55e314ee485984e31ee86265aa4d605153d831775ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933e0723a3bdc5f12a1b22db0120b072
SHA176d5dc0008ce6f05b79d9aa39dc66ac7ff377ddc
SHA256f007c22fa405a0d14c7ea9f4adb956beffe0ef7ecb4602580b3f554142522627
SHA512094e3d3f8d760d7492af4bebcc0b1ff08097a21bc8cd5f775d12ea3c6fa480d9daad20b0a2087981dd00b7481c59ff1a4625925a116774b2a2448735664ba324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3e40cb9d477ed98442747fd9408371
SHA1fabcabba454c03c985fc8e699d966f79300de42f
SHA2566a9717e5441b6b5f55918ca01ef83afa0693802bf923a38286957b7fbc9b6f0b
SHA512d7e06e0623e7af5e3d72294392c07e8b19757b3ea7d45caa1fa77e6c02dbea1aa64cd067bceb37769ec0cafecb195455c1c6cf219264e61d1f195255904b6c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c50f6653685996555e0b753f717365c
SHA193e8452d3edccaf4b8e4ceee08bcd94e245883c1
SHA256b3f43290e85380865ad4c2a455d1eb9948d18b8b4ebbddf1ff32c57cfafc7fe3
SHA512cdd378be7b6416eca45b4e5dd14d4c792ad85ae29ab75b0fbaa7417c4a26d58ee2d129a986c6be7d53e82e86278578ebec1b9307560ffaff0e52dc54ce674ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72e468c05fb3a4057d2cce8de702020
SHA1a06ecebe485d74722bfcd23500f14bdaba9b19b7
SHA256189c55e68c4c78cc80f519b5904d36db73a758ba1e3bd7e843025c7fa7c4a99b
SHA512764b2053ae7b36fafcbddddbe66b8e663f74d6e425f85631bdb6dd2c20ff4fdba6154d14e7a814e9ef0342111a5f98c3cc55a51db1b58dc012c5cd84462cff05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5893ad830de8fe0055eded1bbd16f5a
SHA14655885f0ce5a8a4be009c211d95a5c8e0985273
SHA256a5ef706e7ffb694552c72b160875741a68ec036230085fe73cae0e04e73c714e
SHA51243b9e3695e7042a786801ca84e1b66413bb00e8609e8d4400bd6b699839a371ccade1e11d4271b717a126a9d9b0ea6ca0a3276770b6df09600e411f49eca4022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b27407b07619510f1363faa8ca1491
SHA16b4331a5adcfb953852c46bbba0aa384ebf06ec2
SHA256ee82bf4400bbba9459e120e109c671ca878970bc2cbc13459ad19b1ce912678d
SHA5126cac4b08e446015fe7d6530c3768984116538862189008e417c6ad458d82e8d003ad9d9675660cd0101e192ec7adf6be181149c4b46e3a6db30c93c0eab0161d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51676828a932cc53bf69cc39542fdaeb4
SHA12b9a41937a77bc2c10f01a4ed4a10c49557a24c1
SHA256ded9583b328768dce59c0651ef2623cb7de55032af5dbd7f4c95541414edc6e3
SHA512dbd98b62c6506d85f60492bc18a7a54ca077bd636def941b88f0384a15f40a7893d4e5cbb89e19e212164e8c0cd22b955d8f71a87e9cbfc4a3a9cf24f2636c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5595b7480fdca05c95bb2f5236f7d45fb
SHA196411a997df78ec2bbfc8e7159419296b946e9e4
SHA2565f86ee2e74901fd1f3c12629e7915616cba36bac397d5fba901dad9387279c14
SHA51272ca2aa5a1002db6c4c3bfe8bd557baecd2bf50e07a497cf68cf5ef2d7d5b4621c6712e2293ce8f3be7df7769d9b8fcb8ce7707186337f9d876e8fc480e10917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2e0d16867e28f89a74c041213e9a5d
SHA1c726f71c242c6a756dec7c43e18242d230524afc
SHA256b49c067d0c93ed01bffd31aadea37b88a15d2308a63c41548fda5f6a6edae46e
SHA5128db98dbf68f3e719ec5d898fa5818ce84e850a5ba3219d45059b8fdfa8527fd89ea4f66d582341ca14121e0d2dc67c984d668b756d072eeed39b86b080cde683
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b