Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
28dd515ed538acb0ab5fc20c95e30c42_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
28dd515ed538acb0ab5fc20c95e30c42_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28dd515ed538acb0ab5fc20c95e30c42_JaffaCakes118.html
-
Size
53KB
-
MD5
28dd515ed538acb0ab5fc20c95e30c42
-
SHA1
8f1e453a3dd007c911101a2e7d37ba0f550815bb
-
SHA256
a925bbae95e705ae985b8577b7c0ce4b91ea9b9e86e2527067b1d1e41df6f5b7
-
SHA512
556cdbfdfdf5e4b9a1e5c117cff3a0f97681641fa8dfd0132b8bb8776f95a86a1a86a384a15b7400f342a1247239ed8316d730dd008c930c80b32d2e8478018c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUQrunlYG63Nj+q5VyvR0w2AzTICbbooH/t9M/dNwIUTDmDq:CkgUiIakTqGivi+PyUQrunlYG63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f85ba885b0b544aae0f9f19b9a9e11f00000000020000000000106600000001000020000000a3aeb883ec6918f3c5c99bb372ec2175921b30e79e39a76b733ce4b8ab32bd9e000000000e8000000002000020000000a8483211e734ce35c8a114736ef882c098a8b264b291c9daf3734766653a4690200000004a41d2fe8058bd063968e991539aa13b61c9708d6080da1ef2f240925f1fb839400000004c733bf58c2d92927945172dfdef00546bd2a0ea0d1b66ea8532358f4c5750e01f126182fd9f9833d9ce56c7330a38ac3c7b9547dac7ae1b60c4844863d41897 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434628441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED267CE1-8621-11EF-80FE-5E235017FF15} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d2d4c82e1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2800 2152 iexplore.exe 31 PID 2152 wrote to memory of 2800 2152 iexplore.exe 31 PID 2152 wrote to memory of 2800 2152 iexplore.exe 31 PID 2152 wrote to memory of 2800 2152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28dd515ed538acb0ab5fc20c95e30c42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e756f714c06e8f544737e857f117a9b1
SHA176aaf887660923eec899f73a26fd41654f477e84
SHA256cec180a230110bca4967de4404f8bccaf9f57d51e7692949677f65a5fdae35a2
SHA5125d7dd7e63c30705b4f7d908fa5328486d430b91d6c69437bdd9416b57b70f749b4aa17869a90f24e64a0cdb376b787d66da574a873b78537d6f4e7753b183cf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf54450e2d7f2426650c6b2d850a932
SHA1b4d317099cfee36b620fa6ba627eb8f1d3f1f352
SHA2568bfb0977877b8807528a277bdb69ba42ece07a0298278306db83b97f848d76f0
SHA5122e4582d6c2e7375b4c15dc146a8d0aa534c14e376538044636a21a03eb91ae69b68ac1798576122924d721494845f7153d2c99dd4a1cefa4f39a8169b0c93190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56daa129ddce07990ba61566a0772cf40
SHA143b90a876857bdd2c6177aab4c733ce857c6bd24
SHA256af5125acd28bf1efe33ea5748ca2deaf3e5bc57c3c0147e4c56e394fe41d98b2
SHA512c4ad1284c3dcf54d354aa37e37df2c3616117b5256b573a5db589da990bdd047e6fed99650d630a8f56e1724f92db5d5fa80005ae894f8e02ddb19ce4159ec53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535007c01425380dfb626d0240be81656
SHA19452562ea8b7e218344d273fd347cbf32bec8383
SHA2568d59c8f1930482c0db579f2e77f5afeef8460f311af7bdaf87b83ac2fa693bd6
SHA51260b42e5f262517667cdd0605cf13bf569291996883a83e1b6fefd64174a4cd0e84ba70d3171efe43985b2f64d81efe5897f8b8a8c9da8daa6a65bbe2b0f9800c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b10611c5c7f3ff2c1270512e87c6c5
SHA1997c472331d979625154891f6e3f70a8b083bf00
SHA256628e4966c2bd6671b415a9741ccb5c848f7f1d87d63f7883c6d4fefba1c68b56
SHA5120b6c2dcbb3fbed86e5027ee773aa1ebfa59493001a94c7fc610aa8abdd25a89fce226cfac9dd347b90941d430368bc18aec0bfee8e4c05a9f65de0180cd4ade1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51612e76594120a9b35ce2bb16853e050
SHA11e73c3a29c5e0f004906cf892196434e36b16740
SHA256381d77108091138f5e178c15d170bfad03efb73fe95d2d67f4315c796aab6131
SHA512488dd544512c92efb8d0bf523d8cf0c41eda8be395f1a9d9f29d174a26496b3f8837507b53a9e318d87691391be536e6e98029058af7b12d8bcba4980471051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8e0731f5e1947dfe10abdb2d3ab041
SHA1f3bce3719083a244d70bd31788df13b059c0caeb
SHA256946e49a7163124f861377b7b9b1166d6f8c21f5bdfdf03964c693b932a9dd790
SHA51279cef07f30426f53c9adf95bbcf026e46c3f0633948e019f6d7affdc96916b6bcebb00297cbc63284c652eba0f9dfe5eea9dc1f9a0ad0d105badfa56dff76d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a408537136416a6b6771f2a594b21df1
SHA164056a2678fd87a7be45caa06162d4d41232fd03
SHA256da5f6fa46d1f78114c2a17828c0ddfe547f1a69f86bc4555b91b58d676f74fce
SHA5122a9ae0756d656962cfd5939f2d27b47dbb859795b1678ef0122e709774a34fd20014c2472606bb715dac13b65ee55ef3b36d543e854bf85d5c941f92a1b624cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01bebd518f43c90dd9cc73826176a4a
SHA11b1c3e00eea453855c47a404b7c7531e399c6b54
SHA256ed13bcfc71f453a2b72b8a56f0132864eab1d6bf9993f67973db81cd9940f85e
SHA51210d6f58752e7480e4d4780feb8b6258f8d4b317020c7df9f19c7d45bb2a215bb98b19680875c20aaffa687a3d3835089f78b96f7d03870f95410fc77e2d5148e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6685b763a96f87806e67a14f91138a
SHA169d5b3e10d65ec805937cd141f3c008d6d296763
SHA256927fd181ba18e8a320d2181e4c666783c8092c41ad56bba27a5ec0200d3d34ae
SHA5120ee944bb931ed2eb4a5bc919d5443666ac424d7fc3602a3230be2e82b1430e73ee11eb47e35ea61a5611c3805551ca6e9ed20158c32e429aa15ba667a9419b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7014567b9aa5690fd5f2bd72b21afd5
SHA1235fff9f2478325ac8707574735e82148e95221d
SHA25677edf1fb43ff938b2140d10325c87f744c2026b12a55c179b214872f07e28ce9
SHA51229086b0227b7f2b922c1a0b38ab67c99593654905cdede0daee182d40dd47d5e4392d436e79895816a18b513976051fa04bfdc1c0d3d61d4cac379473417238d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4eddf02bfb6367cfa2f65137c80e5b
SHA1559643ec17e0cc888202b9e4ca1d29008d6f4763
SHA256c8237e9d3c12f0ec1492365157078fb2c6ff8c5fe30281c625da4b3ed481afd6
SHA51201ae3186065288d43582e6ba6175c283971e3bdf474d43b02e11cf9123cf621c5b615c273c29b61e46580fa8a63c8f966a18d53c4253971f12e0de2a718850b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51185aec8d5c200aa8af9a3db98e861a3
SHA1d9746670fd117f53c02b4164f69bf8d746bcaf78
SHA25692cf13c160b4d1cb884099619b05886d42fca6f128561d9c63114c8e0400a33b
SHA51275591e991ba019aa3b4d663461337ff719307c931795340be2c0b33719c51a3ace74e471ae358db9a229355fd36db8c4b083ce10193ef49b40cc61c6f74c14c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872b646dc525a57fb752ab471974f33a
SHA16a60c3d4864b0bd3a9fa0c2e2cdef2e790dada27
SHA2560e36429d7069555d077d2d57ee9d5e9f7e57ca77cf2d680747495b9db0b3b837
SHA512a97aeb85866051206d75816d915e74923d25c6ee3ca2dfe30711f84b5e74fd374090e819e715560ac9f58982132120b8dad9a9d52d239b4540b52c3c69ea4f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231fd813f336ce84cf25c3ee4dcf6d1d
SHA1c612972bc01cfe875d18ca3f34f50941bc2a3df7
SHA25615a9b4fe8e4b29884a01f48cb490bb82baf8b1e310d3dd01bb9662f84ef1ab63
SHA512acc49adbc6a66d4611314b380fec459954ba27412ec8e802ed12e2cd16e0a84529f08b8ae7ca2907ed3ded74691caeed469a4a842b14dedb2d9aef6e1cc0d0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898353d6cf32449f429ed957f487e5b2
SHA147f046304d90e4e0f6836aa757592fe9360124ff
SHA2564f8ec90f1d6a43fa70a58106a454f838a85eb8732c03dc8a742304b5d40977ee
SHA512f312f0a648b1f5182de3b8bbf27bc37f3e6efc65dbb24f6cad402bb51bd62b7286fa1bba2b59801ebf2d77e1669c5456085988231485e03ab7ae501a3542b585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac561ad42edc799eeb47391c6e7c5ed2
SHA105a7bdd2de41de943a6c97976a59c4ad61410645
SHA256ca873bdc7860fc3a1bd33064a91cf8f54a3ad0f51292593b987ad00cef311fd9
SHA512d23fc7a22c255804653897fb775633fd3194b79734e2dd446d999e96246bf87b335fc17fda76ffce2ef457336df8fac63dd073b144e5d9f08e0a728eb058670d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9db5d95cd8366b1866860cb4b4e867
SHA103f2b3b46628e84abf1e9fe0f69e026fa9d872fe
SHA2566d19deb1294a51ce90f42cae6bb4b0632cd81b5c154a59780000f52869ac5ee5
SHA512bee1bffe1476aa3637e52ffccea89106c6d3f0186f6a9a8e5d136010a8d507f78cd0495eaa40e415090ddf54935b9c1fd56c8730f098ed6fd71d60b8b73207b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b