Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
3daeaf1f7fd285e31dc43f3448db3130_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3daeaf1f7fd285e31dc43f3448db3130_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3daeaf1f7fd285e31dc43f3448db3130_JaffaCakes118.html
-
Size
6KB
-
MD5
3daeaf1f7fd285e31dc43f3448db3130
-
SHA1
94f1957bab109f4da87442d2d67abf6ff0aeec87
-
SHA256
ae77bac4df86cf0a4e027164041435b04a4de31e028380c5847a472adef6c948
-
SHA512
94d8c66fde62a7a6a4b0e176b6d88e5f0b633934b2d29d3192fd5981cfb45670558b1e7261591db917b98ea552bd9411aee70883f565ee83e72c5713502be0df
-
SSDEEP
96:uzVs+ux7UjLLY1k9o84d12ef7CSTUsb/6/NcEZ7ru7f:csz7UjAYS/B4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000de37ffd66a77655e058fb9117dab28822390335c592c351ca757bc9a693d242c000000000e800000000200002000000018809dd50684b51d362e7857175cd9eada012f3805eeee9fff655104374212162000000063dd9b337d99accf687a1f1dfde6137d5bcaf17aea187ad064ce5447510f17ec400000000156e4c5b9d1abfe8704c9bf7ce6527546d5fde4453a88d53f17e16bfa3935f54ab382ac75133d504589571279ac3adec19c461d25501458b68fa1fe48cf673d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434954161" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409f0c3b251ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D818911-8918-11EF-972C-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30 PID 2648 wrote to memory of 2800 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3daeaf1f7fd285e31dc43f3448db3130_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d906e4d3348b76f2e6fe0c21235b16
SHA1e53fd6e3bfc8b821b20528c79cd67ee2eebdbd59
SHA256470cd5b59bfb0eedbfb6c0d0b45d498fee6fa8666915d6288424f58abdf722c9
SHA512f88c852ca5176e26602da5f0da8df014cbe8fbf9e37683b1a80d3e7e7bfedeca9a8c9bca68a2fcbc7212cf1d451a389146be46608638144dc9a2cef8a73dd194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d04c58d0321fadc4961655bc4c130b
SHA15875a791405e4dd36537769d854211592c295c1f
SHA256fa1bd7b865e640a27546af6a1914eebac103528a24ad1cc7c71271340e30f7cc
SHA51241fdf1d2033c14f9af95dab7ddb205baa943f9aa67f92b2143af0e8c96b841a62c0096228290947824914c33caf623a187bfcfcfa1b6a110a70a104a28969202
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5e1f208c26e27b99785fd6f2daf818
SHA18b473336def65960c962346df780717ad06217ef
SHA2561ff93b392a6709eb91b4ed231edba2599f42f8d468c4ad9fe1878d15a79dac27
SHA512957566953c97eb90ce2c208ef0d9a10d00c87130c91af5694a5571672e624b9df32ce82b9095ac5c6ea9d630d2a31f66d0cad75a8634527ee21f9162750bda9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a0bea64f3e3f31f2dc801d1c687b713
SHA1cd67763c5fa9e574731ed34606ceb7883fa5fe5d
SHA25682e42d5663bc3b0564c0453bf31a895fe88e9b80f65212e1f6b19ca0afe8e164
SHA5125912a311bf3c5f37008d1f24d37fb2da745df2e83ddb545558818e070345a28c9548335489180ab2837ade9828a2d0663291f20bd1d8685c4da522404e9af5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e53c11cd7a9b6d99aa8641a17f82a9
SHA17c70f9b66765ae0ee1c9fef686280aafe429ccc4
SHA2560201340a9451f4ebdcebbdc923ccf28e59560caa62c8991b61ceebf2060856ea
SHA512ef22ce75e490ad72fd120156e4f0fe83b3d0bb9275a709ecaa1b81c474d0c3b9fb6d04bce8226310bb9d1ee7e6a1376e0c2e145eb3306a699d82297bcf222551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4b29e28186d405dced7058ab59675a
SHA18947d9c11b8a77f53dc2a0c78ca8a5b2a328607a
SHA256d07dfdec3c6e47c2d65752ec8eee33173c317b5182632d29529cf11d73bf1eb6
SHA5126c1069f0636658548f8672a11cdc1ce4fcd359095611013d091f4e8501ba2a2c4e92be0656224d7dfba0c54b59348e3e6f03f59fcf371286de55056845015f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0d3b28ac3aac7436a55d547951973c
SHA1151514ae1e47b65f040834930edb2bc0202d54cc
SHA256d202e4f08fd746348c1963e84f8c69cd229c25a1055eaf2ccd4b622481294072
SHA5129e7292a4408d42db569e9cb412888b7ac73016e7f56c055350a3aef48e42b41f7ea078b3cbf93d277baabf194d23d744803cd16e098ce727449d16b55020a59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4375a6622b75c12f951e5b0eb9d6c6
SHA1531818ec8fc574db6d8ac82e37cf7c27f98cde9a
SHA2564f0455a6bf8e6dde5347d09ff3925583a0a3216d30d05e6f38eeac6a9cb250a2
SHA512c7da9c629ee515a56c62c94d5206d40dc031a0bf432bca263d950b31fff5aec29a8f00a5375b37d78a874b0b3f8b78babe99b57b97dd65d25de8f00239a1c11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586e99b795d7a767996bc7931c67a9ee4
SHA1b4f46ac67c5798430edd170bec59ad2896dabb72
SHA256ee6d89ce81b6e4f4d02320f7ea9365f63a007d8cf355feeb01a2bba21bb8c6bb
SHA5125251ef2ada047649156828c750f1467a302156a8fca7cb12df182d152b4464c7713af5fd1cbd9620bbf632493e97254d41ee42c4d2fc5b73f011a2ac6d321bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6c13ee23c4ec31cdc5a742c1f397bb
SHA1790635749bafb0f18f40be5d85b6c2edeaa372cf
SHA256caefdffb292699ed73fba29c08f06e405e202ba195d957df9d4c941dff93f4a6
SHA512d202eef1eb7f72e4f0df01c12b69069cbfbf6ce1c076030973c1ba13c18effb40c7786d6dc28e6ba52ee40d5feaf632d4487876cf3c6899a7975ef295c068e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d4b7e108893432d59ad472023acdba4
SHA18b360c1cead81c0a672627da83b1e582eda88d79
SHA256ce84c4b4d8ff2e0b31d26544b32dfd70d39070274133e298d396d6cab31a8c9b
SHA51293dcf652ef87cf537d6c1bee51abf85dc3152367be0d71ed37142fa8f95b06b83c869d919ff7b93b8dcefd2fd2734b25d13643ce80bdc111cb909f48c8dbb746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce68692eaa99b9a8a4238ca427a8b63
SHA10d18705ff03ca7d01c8d573e42bbdf5ab4d2a559
SHA25665d5018b409a4261bf24d30da2de03fe45e61bedea0b71706daf50d10e0b58cf
SHA5128f39e5be534b4965515250732bf41639c5de45cbb39dd802fe60a2b8f9b7f1ca427853a93270f48ecb288c8bf74eed4b66e3c72e5d149dfe0d2293a6106da8c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc80c8e89a9830134c1d0667bb69c8f
SHA151244434a573774d52c61de599c560596c059ef5
SHA256aa81dd2378ad4d40d00ed1fbdefdc6f0bdca1857d96e4d5624efd263e142bf7f
SHA512fe04955cc723f78391a19bbfebde07b7897add42f12e05d75a5f8b74031c5f8a53f51c504208a51200c81ae7346295220e923bff5000dbcb04b721c15157a8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286cf379adec931b40d846790b486fa3
SHA189cca035a4713f9719d782ee11102ec89a153144
SHA2567cc1d4f9e74c6974ef3d24891972a78faa0a3be721adb7a9804cd58ed5fd0376
SHA512d892fe7a137ca19fbbdb491e3657b3df416794d1150a48899ee1fcddbf9c7094fd97d77eda8b8c1719ea0748caa945b9c6b00cd3624a4cd4e0fa5c69245b0c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbb629483089e040f5a5c9b069048d3
SHA1efa4ee06d3881dda982195b0e97a99ce47a490fc
SHA25637af7a63af58fe41026128b0a48bb7512308e808ac7bfe1e3c2ccb557e43cfad
SHA512e0c6e85759523e7b328d18fbf601955db9a6ef955a8f67463db9599d21243bc3dd8138f652e2d032c50542672841849eb4556dd6ea97d31eea6929fb1b3aaa1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c0fb247a557abc89c0d0f02146b0d8
SHA119a21ad19ce8778dd182f0c55fb854ec9d0f1234
SHA256eac44fadd086ccea0d21c77516f8f3d02cc362e80495441d60d2a4cc3460debf
SHA5123bb76bf604bedcc503792632dcb55cb3bfd3a309ad7523f99768b6c13e5dc48a5ebf758db5f8872f39e1cacc54536b70de37fa4491a66bc44d3c580e8e210553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b074d4f4aa04183248f7a32ff10cdb
SHA10db0285c3ab8365b83bf15ee973c4a68a1246b5d
SHA256f911765c81bc7bcc6cd0f42ae49e7365b23f2a107634a3c724366d6ea85c68f0
SHA51299b69ae44028c0047d488216dd37306b2669cd308e06b1dea6c59cf4a33d77e5f0273361d33f9239dcde72712ecca3065cdbf44e249f1459fd410a7a61418b94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8a9ac7d97f4d1a0dba78ba2454cfbf
SHA10722fe848800a3763359b15c511b3a8a0fc35f55
SHA256869be9147679e60679cd4fdcf1f6b0f4db31b524268ce4c7ab3bf590d400c4b0
SHA5127fa3e909b248714c768a1dee14c8747c174c147c5788279baf073da7a0f733ca91551b266cb364337dcdc53715438f32da7fb9c656286c12e5519a5f95eda90b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b