Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
2d383ff82e69b49b4e12b7187dfb5d88_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d383ff82e69b49b4e12b7187dfb5d88_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2d383ff82e69b49b4e12b7187dfb5d88_JaffaCakes118.html
-
Size
22KB
-
MD5
2d383ff82e69b49b4e12b7187dfb5d88
-
SHA1
cfb84d45e0d4b89fab05b351d7addc445a6d8a04
-
SHA256
7352d8999e4e9e0a8f3fc6b4277b72e9400579f8efacfac95495cdebbbe14cec
-
SHA512
7627c0af2e363241eb1a6eaa1457ef636b5bd77cf592249c6c95fd700f8abc9bee834b2b9858f19514942f51fbd3b1a2d0f7916fc24f7ca9cb9b5852239fb0dd
-
SSDEEP
384:jcGR0A+ID1PE6U1ttUKBSukE0ShF6lRVJJ3nDql6eIF0zGWLK0:jDr+Ipc1ttUKBSukE0SD6lf3Dqlyw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000b8e6baee692b5174ac290ad1864116bf50874b6fa7f8017b6b11ebd241643b66000000000e800000000200002000000042df8610db91f1a2f9ad6f4ea66f2529e9035e0b38f131c26554f4da0af836d0200000009dba48f9857064d072412c0a43945ce323c80fbb5feb1a272a7c603879dfa4d2400000005de1c37af3c8f62294bab1c12b140048ca9cb043e430e07c67d8a3d303bb92d314871a31a5dd9048aead2efeaa2d3180d86cf3f1538638fd7bfc0ae6d5e2510f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434662667" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000012092eb11db947b546087d06751cb3c883c10d52413c7a27cfdff570935fb2f2000000000e80000000020000200000002d8530c0a329477d609d653adbffe610b9613af2613829ee97255017ebfaecd490000000b453db4193265b1e42dd7756ecf044a305b8978f8edf8a149c2e954fbcce921aa80e4b592ef0c0bb2294bc5fffe65451d3df65d7fe40312531918b8bfde0328aac31bbcce782d055d66b7f2ab37ddd857350dcc3657ef614e58858c6c75d04ceafbf9d96a547774d3fc909ccf7da4fd55dc184e701a69a3091d917c974b093c3205e7b14ef27d02ae4cb372f6eed6e9f40000000eabea429d7588786b081a99fe9a8ae8debe6288b93e92b8cc47e391e7623d43194af9502187acdf5a7d66b9f23e591ba09acfac2c39073c46e69163d83342259 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ec23727e1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CC3C791-8671-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2720 2076 iexplore.exe 30 PID 2076 wrote to memory of 2720 2076 iexplore.exe 30 PID 2076 wrote to memory of 2720 2076 iexplore.exe 30 PID 2076 wrote to memory of 2720 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d383ff82e69b49b4e12b7187dfb5d88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD512448e7c9f01ff67ca5b736e053f8e37
SHA1a74ebf1a1b40fbdc31ffb70fac35b0ee59a3c62f
SHA25688aac8a341e96a6a97126712bfab08c37649a6e78af4de44196b1fc12879ea14
SHA5126a2ced723797f8ca715458f4d28d08ae5729e944620772c757c8686f58836b000a6fc70944b93f179a38f29346be47575f86773297af02d328b13db1812d2a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572d04bd40f8628bac11724f32aefcc2
SHA1d9553b945875016bd5ad2c8f6e959543d553b83c
SHA256000e8856b18aa7e6eb6b44b6afddde853c795d5a2570371ad74adbaec0fef4e0
SHA5128ac8b626c112bab77ea19f6e089a65a3a83a355edf4a6b532d6919b3ecdfb8965caf9da67bdc2f24ba2f3a8e411375e288a62fd7357942f6631060b28813dce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576bca42ce13f991973de1c24dd2ab2ca
SHA18989e587bb22d27fb75a5d1155e0f92700429afc
SHA25662004467c3d45417c0b5eafc07dbed0ef38b36aedcd4c12a1f479039e1c12176
SHA512ab21cb8469ff69887022b9be673c66d3b29c1d1707a5065bc32cf86e4180feae19c635a65e5cd4097fde5bd2d6b7c5a623ba6541337ce5beae94d37a554faaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb53183d10a7e93628ff372b356d5e0f
SHA1b97208a6516440585a979c135e99fc0ea44e5f4d
SHA256dd7f3396b00f5d8d910cc819d80b8ba27cedfce9e06f500a77708f10455dacd1
SHA512c554dadb0643064f36f4b7dfa9f8f76e277c62f80d0d3fe8cc3bf80a2b68ce1dcef18de4742bd447c23d930a4c919f24afafc01faaec16c0b29ff36a35ef50e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5328a760354e3cf8674a7355e6f5e53
SHA12fffd652ece1926ac52f7f47c4c76823bfece224
SHA25618388081e4bd73c30dd4cac733653364085c8fad0d47e359e4d8e8f03c278ede
SHA5123253ad082435c4135b0bfc01e6de912ed6f8ef41e53f009fa54e624e5b92a69398922a20f6fe6f1669bd7fff10aaf9da451816fbb4b747515ff11bec39fdcf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aadbda469e8766d8e1b5fdb431bc56e
SHA13f6355f52b6437041a0fbec1357e4116a1d27118
SHA256aa7cfe0f1ef576fad161f286c9fb29cf54af6f1f738bcc58781a9c83b2d5bb16
SHA5123ad17fd563d4790741dbdc0880530c39641466056137741f2e7ea0f2d9367d69b3d5a2d8b0928e201eb989667ee8b6bff245921b05bf626171876b1693cefb82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ee6cd1fcf8e7a7fe44dcf346314539
SHA1de58f9f6118d2a9cea3de63ede31e832b6c9f205
SHA2562278a9527dfb4782b73c018a5fb79538aba65d67705a2605bbf90938a54e7fda
SHA51258f2b3a507f5c859e4560ac65baae1d4bb9f95cf18c217fc726e2e8c43738367e78fa644cf9cb7e66287d97b439efe5829f25139b02d61c70f7baed4fa8bb95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e052285750bfa3c6142cd48d82ccc28a
SHA147803f3ed4f97a793e60b4a536763059d1365cb5
SHA256edbd7d3c466cdfc43c327eb7c380c1066c3dc58b4ee6b71fb331ded1eea28d7f
SHA5124f4c5b15689f7219220714a9b4d9b52c70846dfce6fd79c0395a088bcdc1f8e1dcb5592a32d28b9dd91a2095125d50a6d6ce7f189381236d527667926db78862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbecee5b0122cdc9a54f5b7368bc5321
SHA137203421cf109b1fe0e4d2cc30ab459b360d36ea
SHA256f56d8eb7ffcef3bbdb02bec69f11e00ca9f52437f2ca09a01e0a5165044eecf3
SHA512bc3be6d4e742c510de864497ede36b97d2861a4f461d25b75b78dfedb6020ffd4e72a3f99b66de7e5344e058f218b1c13504a6bb80e6254f98a5c6748eb415e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba55e29ed860d5ba530b489dd8985c2
SHA197db2ef2f1a559b43729052ccf4e5e657d0591c3
SHA25652721e8d3ec310e2e593121367f6e242820c82b8a9864925ad51fd27ec6f59d1
SHA51294214d9ab266dac2a2c59cd8b7433032d1a5635a25e3365a889dfbd4dbe94461d2989f3a039e4967d329b6e8c761cc520cf22b486102af15e7b2b5ada57834ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cde6b6f424e7ed32d5bbe0f36988597
SHA13f36ccee12c3a09f167312bb9ca620a9cdefe724
SHA256797088dab86a6a30cc64b968afb9cf138fa3e1fb6fee661b9acf9c51aeea50f7
SHA512a687b60e528d352734b65415a21df5a010467752968aaf745ae53a0522295881fb953eb8c51a2f305b3b589c756a435a0771569900652870de2498994488e8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d3edb61d4f86b99db10e009114defbe
SHA172704c90154dff24e489addda8c1a2828143624c
SHA256891eeecced67b9b4c58802706124d7b03e820de979b3c301c18c6dd8b4125c3d
SHA5128395d400929a062777f2c5f0baf6710aee1bf5ac5d584b6d1790cad9959c014bcc53fd8171116582762fb2c9ed3e4ecbbacddc373d1754d4178b1526e9f4d78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845074eee249a4b0d795d8c7b412579b
SHA1582a5c742bc9037f438f1449fe21e68a7aaeed5f
SHA2567c16f9e0a952405bed77d6a48ba3d003c1e504f31f0d8cb8a5bb0e79a3304ccf
SHA5124b334a29fa2dc6afa8e5b2fd74eb0fae3c4996ac89123b562cf4c3ddeaee56d504087e1ce8959546b71444d4184c4686930642bfdb4b9f3a723e34d7b66b5289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ee0c086d6d726ddcf43456be4adb9cd7
SHA1a1fd19bbe2f05664045f1f37338e1786bb142f9c
SHA25607d3c68ea8c46f5437fb9bd67954811edf5f078673f9e7d92e5594f2545a4254
SHA512d1c7015598d37bf16e249cf4c7d7f189a82c42dab2d35a8fc837fbf55f0144c41a1bdaf830fe3038dfb36b3e8ca4dfb5c7e42ede921c94d893fb7791c03b9eb3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\ncode_imageresizer[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b