Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
1072b93aaf341b93e674c7d9f9b8358a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1072b93aaf341b93e674c7d9f9b8358a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1072b93aaf341b93e674c7d9f9b8358a_JaffaCakes118.html
-
Size
10KB
-
MD5
1072b93aaf341b93e674c7d9f9b8358a
-
SHA1
3351ebf9025b5790058fa617ad2f9d0b45389771
-
SHA256
6ae4c6421fe94e792696c36985a0572c9c93f0e0ac09dec5e23c02203edd82e2
-
SHA512
b8c2bdfffeefe67746c678b5b782965810dfa16de91ee239ca62f471dc247c25f18e2c078d432e725905eaf009aa9288e76f7e5e9d14e388b6069fd74d605c13
-
SSDEEP
192:z6OeGNp/eaxYDTznhdPDVTJ32aJmwSth0qW7Oz:1Np/eG83vVTQXtxpz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{489A3251-81C8-11EF-BB31-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000dbdd063019a78725c14446a7be79e8a9c43af8e073f389c682ee0638de4f2e41000000000e8000000002000020000000f4ca39d271e0ed72b2f5e41fbe1ff97756dc248b6cde5e8f8524d38bd430091220000000377fba8616a2df3faa54b06abd47bafcabb51eedba4c557037ff7ccc23d3ae4f4000000019487301f2b244da95d5b9c237fb0c8fc2d2ea7c988428935a64c940a1fc1cbc35ec4d9e5c4744fa533575519367c9a867e9fbe76189795876193ea5d76f8ff5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434150135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c54b22d515db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1072b93aaf341b93e674c7d9f9b8358a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb1852e3187371fd69438554c23bc45
SHA18590541f5bdd322d0f042751af0e1f12b5b59731
SHA2560720367d7784256781ea0b1e7310dade7911659acc75f3a5728cc4323d4e4c3f
SHA512471bb47231c8bd8941ec5d27a028d2aaf436e71716b148fc491c66a7fd591b5060011aa79890dbaf94ab56b42611516e5ccf158d78c7e2cd8006ce9884ff2b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c090cb84c484597924824c7cf60348f9
SHA179906a09efe0f691cfa4a8a56bd29d9e323fe44b
SHA256d084850c63b384acb98e0121074972378895239c5dd7943e4c4403c72232a9c1
SHA512eacb4ca71918eaf2da9ea1677f4c54e1ded3c7d04e30c056f98f83ae180e35ae2f05ef3d015f9fbad264added412d420d859455c665bd841a0659889a3310c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abb84699aa56f5f2becfe249d40da3a
SHA120da545618a985d2cfaa01acd0fdbfde07702447
SHA256b9514e741aa17a396a1144521df4874fd421150271bfebb69c2aa3fcb735b9f6
SHA512ed3c96d2375cd373fa73103d14635c1499c65c373985537f54cffaeef95c53b629ecf4c0a2d99b2fcaefa235e17b3bf5cd1645e18c91677e6775cdce814d9274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986a87519e63ab54877a1395b48b2b08
SHA1040af86f07323a617dc4e9c989e521e4b719903b
SHA25630b509717410e81e1a227d2c3300c3b926c8524581cedcaa126482431017de5e
SHA51225fc61700573a82153ac565efef4ad8684fb9ba6d2e54872c89067b7b3ab25db748f6d503d1f8399af1fca110aec4c1fd5aab85d22cb5e0e36b234f0ab14b77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe558d5236324eb7f1521267ffc7b76
SHA17e30d0c6fb90be6696861e587a81c6ddc8ffdb6b
SHA256061fdd6bc37799c3c6f325e9f9ae10d1629f5ece97cbaea1ed92a4f31e35d64e
SHA51224fdd5d125cca22702edcaa5faac7955b84d935167f9f7b5c27c2688a6fabe48cd71ab8ce1182b03f71b09931c48815e5a3491ea112d06f020a546f86e80332a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0bb762e340467c11aa32075ff38ccd5
SHA1e2451f5854801f60661e10a623b5f93faea1c846
SHA2561fb06c41671d533b66b16046b222225ce09d39a9650e75bf6113299fb5f93336
SHA512eaa00e1a841cd7ea7acf043337f36697f17c9fc781cc21f4084e3ab38fc69158a612124028a908c1c8fe226500eb4adfdf56a5774eedf9a5989a35f7594decb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500fb7491608d5ec04cef6245409be550
SHA15c4d7c05c21853c92c5b2c1dd97156261e73e6a1
SHA2564ffb38a8769680de2e46f4dc1586f2773839beb01da9d10b8f669ce378ae065c
SHA51218b85cd4d4160623dd017af3cf93d95ffa197b9d92e88ebfbdd90203751e91d4324f7baf6c5f6881686a305c33ffc9d66e4feeb36becf3ea1c101bbee6834da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542484df00cd4c87a3c540a833301a278
SHA193c28266cf64974023872ac91023301d7114e0ae
SHA2565b18ead664cc1917365ddbc732b22cec9a94933be2eebfccc3e0f5eec26fcddb
SHA512f416c23db1dc4168f209a9c4b8a6da653509c6484b2615c4db9374a764197e850f061a5c53f516982ae40274df6cfb495b2e8c4ccf09ae00d08906b7ec206879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2e96698630ae2bf0209e601ea66df9
SHA19dde92846ad636ec33beee865f12f409f515c7be
SHA256caed9c2b93f916f8478b7ce71ed349c7834994c9d2c1fb560d70c45303ebd333
SHA5128fd9c1ef5ac343b207d4915d602d8aad423c9868e6b104543cfd6c73ee75d87072e412b4c5f687a234dfac99f50a92b94bd0d38a6eac42cb18443ef1b1623103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e0228e85acf15fdb4ccf41f14452e2
SHA19db0bbdc5c6590410b2a3bd7e66af8e250e407a4
SHA2569c7338f8fc40b9c9fc3ccc4d9c089ea8af692e8e10c1513217de891ca9fb001c
SHA512bb3e4cfdbb1a96feefeeed325b0182b03250dbf641419e04c1829c194003615985024ef9568c7d8a0c45b97477283663206d69efc3151e73d1aec6c8c38a504a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fde7fd0c1bc51c44363a1076d0e877
SHA1cc5dee7b36d3712413f902006e40032d1e4e24c0
SHA256d4c73b7e25d44f43542423839c51aaa235e15339335d77380c01adc1ddb1ee4b
SHA5122ad8512424d79419a3b14b96d2ae5e2e1e34726e4ec9f389098a0fbf05138a7c29bb8857faf16ce98ace42aa9e67e4f7b29aa576115499fe422e06ecfdcb8410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afaf9ebd25188f8014d2377570f25320
SHA10f7dca32416e9b518e636b0713134278f4f4f3b3
SHA25663a4d6259a7fd6f8bcbea290aed3b5da8c82b4cf295dde880e3fcbc2495370f5
SHA51268583049340f9891a5824bf8e120572100596cf93166c4b47c2a9e0737b506080617859409e87ac4e84f3e25b97d7c0be88abe088571afbfbf1ae93f4db952ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc26bf28b0621d520923932d9258c7e
SHA182e5316d3a92c17a9d061d585af511611ffbac83
SHA2568396fa9f0328ccf0200c95ec25540600f7e84d0ebc549abe1e1c05fb4c1676b3
SHA51232147e6d2ba54db025277c5a9d13e24d029d7dbaf9e115e888ef9bafa637e7b478c12ab70edee81017d0f10b9f7c7b2e5afa0847dca16691ed4cdc794f4d1b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508100b737b6830ac48f4c13fdcc2b557
SHA13cb4bc41ab65a72d1734c7894839c3102370bc13
SHA2566138b8dd7e89045b3573fb1b3bd616c104355f1d688eb615332819020d12033a
SHA512bc74bf370d6f184760862b341269641020df856908fb6514ebc0370add8cb624ff8665875365c4cbb11c3ed9bc2a36ac90d16ccd0f9442bbfcea88b4cb856d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a487bc83cbb5f00606817c40211cda8b
SHA1e1f552cf2cd1e3bfff05db100131c052f9236ea7
SHA2565e6d7649dfbe181557b14950361cd1de60ffee858d735b6ac34a5ad9b5069351
SHA512a66c9c0de638325c88b79ad179523d3fcb6f6376c336bff5c74cb42b31defd93e3f3f9a90844180e496edf0c413a8ac6ba398399280f3665fc68c4708cd8d91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9409a4b54177fb585d526726ecb1ff
SHA19b6f585197dc36c47169fff746e48fa12ea4b0ca
SHA2567d207bef61db9ab63b78571457792f2775852278f298c83e4b5b43c6d1323132
SHA51237e633ff4e4f7d58394eb450f2f5589bb6a200f6add1ba497c7fd89ccab132e8e7046e85ff5a07bc2161e0ffbb84e7962a8b17d6dec8461d9c1ec7f49a31f69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835d1ed0e8c75bf68debfdaceffbb3b6
SHA14dc09a52d6dc6d50cecbec6df3ff1330575189f3
SHA256beb0d17e4354586df7297a9978a1e79bae1e065d4044fee97bf8591997078946
SHA5128faf574692e45047691eb861b0faa61cbef88e76fa3f3a51fd2abab95cee1ba7705aad278f50482e2ff89f156c9a9fcbbcecfb8b6039a1227650a4d5883ac42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770d02f737a0eb2293ecebcc8ec7e9c0
SHA1116ef7a8a5681af7aabc3f6fffcae16ade7ddfe0
SHA2562a044da89146eadeaaeee27c05c92a826cee4fc64dffc73cb667bc1338f28d3b
SHA512caf23a0a60a28e83f81afcfcf4f569c3ec130ca4c5ad83d7d0f4cdd1c86a7d0fd2da6ec5d15625348aa10ed6e5535568da8d8c3d6c28a4e332403850ad7a6c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0134615e57cb357d577da74ba2f4792
SHA12553ce96eccd935c1daab24673bda3eb9e9abf33
SHA25672a8a108728991ee1c90737fa2b64556508eb0d58b590272d4ca1f39221ef8ee
SHA512f776f19773fb8c7feb4e32af17b1ac7fff4a6a068788a7dec445166173f3fc9c6558d40d845c97fd588bb1989c75d60c9aa80cf4b92f4166c5ebaf1eecb3bf9e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b