Analysis
-
max time kernel
120s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
537c11f865ec32bddcaf12bc71ff9de6_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
537c11f865ec32bddcaf12bc71ff9de6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
537c11f865ec32bddcaf12bc71ff9de6_JaffaCakes118.html
-
Size
11KB
-
MD5
537c11f865ec32bddcaf12bc71ff9de6
-
SHA1
017e3138b2889fa85fa3729a304f0b2087913dc0
-
SHA256
6de273311239ee567b3c672d22a9221480bc6bda38aa527505983abaa2e4deee
-
SHA512
28a6abb9ee60ad48496c3f71883d173646318a1029fc3fdf7d291f48eca90be05018efe0f8484b0256d31fc5763c0c14899e0cafe4fce33b1e6a514b654c88e7
-
SSDEEP
96:9eC3ddC8KUO0h0OvTJbulO1PxHu+hrfBKYaxea7TYcPGmPDpS2G:si4djGltylCPxHRrfBKYax7TRP1bpK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000007e2739d318325aa0c8909a3208d65c391ef902b8ccae1cbefce3934220bf0789000000000e800000000200002000000022e8e258db4805af679b5aea4b6df0849d5c2bc1fc8b9553bedfeeba48b2808020000000a0a4f7039fa38a095e37d2bb0f2af43f49a02f457b2728c4c896e56506616d1740000000becd715ffce4b0a9d19b28bfcec0e1b7e76bafb342dfd55e561804529a1b83e5eda352d4dfe581a5f929589de91b63da2ec19b19b35005e0f8c48582b47fb466 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cf811bd020db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435357444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42F68411-8CC3-11EF-A276-7E6174361434} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000000b6f5ed3ca49b75c97fe45fe9c1b866ec512c597eddbbaa08442a5b8fc9d8b5f000000000e8000000002000020000000a2749049bb9be03a8da7bb07216f883326c41c7f06ab07429e43e4eb9589b35390000000aeaef74eff65ac4d938da1e04c3488d20d826789f0fe28eb88b7d53d7793e7af17a1cbdf3ac426de0a47f5bd5b425251bfc79d0d0558c608994a4171b3dfa33e12f91c4081c61046f606745ba1f55c214493a0a467b6112bacec2403cfdfa3050955f724c75a65bebeb50110740447ce7d1681c4fde30a35c6072c2bc76a4f6ab4f32e0eec77025e893145430d1f7a3840000000566bee2ccd51ef61911d78b57042b9a6ce7c4febcefc8393121f75eed4ab3e5079b78eac8586e64b805b412038f3830b01480e311d6b230fd08116a41a72c10c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2912 2004 iexplore.exe 30 PID 2004 wrote to memory of 2912 2004 iexplore.exe 30 PID 2004 wrote to memory of 2912 2004 iexplore.exe 30 PID 2004 wrote to memory of 2912 2004 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\537c11f865ec32bddcaf12bc71ff9de6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd306a8d622d75387fcb7bde1f791640
SHA19dace8bd914cece410d0f20db9b4e8976590eca8
SHA2561cc368fb4198e695d28f80dec710e804ad43d2257d1d211e3c7491c1084d5772
SHA5123655eca5d87c423c644d6d98d08955fb3ef2c885a2da1d7f603e0b2e589edf4862de54cf447391229fff7c1dd6b725a935c4dd90237e6bcc16c623cd11368ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d6797f5012d790b32a829e00b6eba9
SHA17c4487c74a3764c0ef994392b02d547b7446f6f6
SHA256d894f117c5877278bf9692a3c3ce094c14dee5ba3fff8dd9292aeb1b58aa56cc
SHA51297a36bed640ee9796ff4f1a150889bdc760b621302fc2293c2f2561312e42fb5c521ecd866c1a4ae5b20eeca2793d105693d7ae45f01447650eb38c0e9271fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f4bab80fb460c9461954e15a940202c
SHA15e5c87ff4bc8d10709e8ed44f705d66761287d74
SHA25653f91219c2b661237fb4d8105097e8b832ded10b857407aada50a5ed92573ad9
SHA512d19be3104923033a798fc6353597acc9df0d363740f128f7218ec10ddecf04bb56f86655956f1cb24e5c0d521ecbae927f4ff3e68bb621688dcfe86da9635243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fec4bda96fd8ea93fa318f608ea48b3
SHA1d2da7b74e5ed0626241a79f321fe89b78ce1edd9
SHA25606dc24a37c4ddde79538b3866495c838a2e9b85136f44510d4a71c371b21fe66
SHA5124438ea36b2515131fd5e713a07cc43a542c90170231793e1e1d22d8e5b78fa3b500d8f57e6526df53d150f25e6a7d61df63c912fa6562622f7f81c591e0c3b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d87cd1a32ea4b0615d26ddd7fdae42d
SHA129588aac4be8f5291483f10ca88ee5ca02f35cd0
SHA25671632d10cb587c96d647e201fb5ccbe16e1f0d39961449d14546f180093597cf
SHA51296b772b4f2a3ff0e1450a6e2480c64b0e7ebb650c08e6488bc2917e39c57eb56fbbdf66c80e030774fb78e8cc4c42695c64e030ca500c72bd5aedf4ccf7a2cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cc8e010490f781c00301441d7f328f6
SHA1402fd25c5a3d45443c23b2d34fe7d212a1676d25
SHA256c9fb09a2ed02fca12225f0f526b8ea053d11697f25be6399ca2ac5bacdc89fc5
SHA512a80bd1becab6146d7259bf65399bbb931791741a948c67b259db3753c899837c89ffca2891f39bc298375a391be388149bf9335367d618ff7f3ce504664bc1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fb87a9c25b05244a2d575971a26ef2
SHA1deff2ce86d4fc264e00b8a7e378d6a33fb41449e
SHA256e738abd30790235059efa6045f1cbe7bc5dbc6dacd8e9dbb4b66be6af604bd14
SHA5129fc07a5ad03659a050f780dc5526d116593d93f8fb08e3ed4003f2764545c63d7ae2b1e9a2753580f713db649c8865e69a3994fd442174c089f720d812f50800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e814b1f9083542c35647d676b90851a
SHA1577c1c3079aca380a4ef8c7e5a57c09e393d758e
SHA256263c7053f1fd35116635cc0a6afb479be03d9b93e9ea5ded0b7150e71cb4fea6
SHA512df1d69d5a5b48dfb0f5d19b55517dda0f78935311ca1df0bcd2e2a999ef1919795d9d80f3958b56257675f3028ba61c357160d8a738c22a8919ba75c5220c094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebdbae693eba2d2528a832d27d0c40cc
SHA140db729e868b4549f5c2871eaf4bd8fa7ca6afe9
SHA25692c88c7dbb2cfd586c77ae574615163ac35088974aa7934f6382d2f4a803fcc6
SHA512e74dde4f37fbb1eec3899f3ebe3aa1720547a83ea8118dba3669b07cd88a4afc39e11839fa12c1c7832717a1cd9722e55c1b2ff81008206605a96c8a96942f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50631807e65ef54dc788cbac5e0887461
SHA1e649f4c5d27197331127a17ee7ad10bd11f858ea
SHA25690fcbdee6a3e949701106f615f47e920a381f3ab1afcdbb1af58d5b04ea8f05f
SHA51206884855b7e4637d2b7b3d575e257ad1928c290203346baf7959573d7513771d7b407d990ffe4f424dbed86e676500c0ec6c81bfde1448464863b40f73906672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574213c5d064caeb49c72dad544bcfb3c
SHA142b3abab21cedf28a509ae580b8811cf8732944f
SHA2567ea8418c5a0b65504ecd4e163ed0aa98bd42fd3184bfd4d1784b9b5e8afe1a35
SHA5129ea3aebfbae3b0dee4a00f35a468a7233ea5c5746d5c4642626d275351bc1fc38cf8afd65360689ce778c4c6ddef271b9761fb356cd17163b33d91a648906497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50023f58fb4dce56378f7a5213a4e1d57
SHA12d76c0268a860e2d07c6dde9e6b466cd4eb95cf2
SHA25630dc7fa29e9df2596c19fef7461be807bfe1ee9304fbb1d3b710d002fdcb8ca2
SHA51244065dc74b958e50a3ab3ef24037746578db57a5008581b506ee60e21cad36597983da90bb7b776b1c71553188bf9c8bd99d99bf1a40cf5dbfbb97f3414f3fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff958e0c7d7cad19be7753af419035a
SHA13ac725038a0303f5f5dca4c1b51d44df424dc359
SHA256b2cf96dfd21b36319c9d12b99348f06d03c9a235acdd2dfc5cf1e59f9918ab7d
SHA5122c1fe22d8f219d9394f6a033bb7dfa438bceaff595bed0ca37c88b6c0ec12b5f1ea96e2ffb058758f33bda8e63f88a6c470dc373ef1b213ee59b30ac32c3e024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b86b38a4e240259093d232a8ea53222
SHA122b4f1dbc43798dc179c7a10cdff4dd23e486b25
SHA256f7484b8114f82c2862b63c28e16ba5e3b1f4e9e5dc512d4ab53c38e16a0f15fd
SHA512e11546452e6121e65001f6e92164750e8f085e42612b5a77358638958431e32692a465ad1b484d45a7f71e429ea90b7518914fc31cb58fcdaf03cce6a36e61ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f4cfc512dd58fad1e1a25edfd7b2e0
SHA1a4ac6a8c3ba77b644c509055ba325a29b14cc6dd
SHA25687176cfa44856ae2a891a8e447fdf5397414edea3e135e6dbf64df153e9b2d87
SHA5122226cc9d15942befd4309cf81fcb2523c698090bb0ae08fe5182ff417934a3fede32c2679d1c3a0cccd00d62fab15fd615e77288a3031b7eb9409e73ecc465d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471c4a4af4511d91d3d5049e8c89f3a9
SHA1dc11df70c65904b38f59540c3b7053a61ddfeb24
SHA256bcf48b7f3f94d5068b063fc4e1985ff2fcc9010ef29baa6478ac7aef0c2d03c3
SHA5128a3661d82bc872d803032574c39bef0c953f1810f2bf536f372012ccac0fdc7a710b2453b09eab328a7ac85310405cb4785496b30210f4fdb6a3740c6f59ace1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b35fb3d8f4312591dd50ca84401d95
SHA1a08100810f9814f3d654fb6652ff861cf3588518
SHA25622744ffe91553aadcea79ea64b523c4d1b62f7550622ea12c0866c9a975dec67
SHA512a3bddbe50a1f02ca80cca70f46e4bb5a274a78ea0c81e75c2df87ff01542971f3dc37022fd0db2dc5f2f34d3ebc836d76555dc3064df581b1cd4adec8dc47745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f709e8a879d9787d68453e139aeb05
SHA1efb04d1b0f3f0bf54c311bfb91f6d73cc54a8e9c
SHA2567e978582c9c7e9f1e9f9f4c8fdcade07fde770da038758b6e2c8fc55558201b9
SHA5122d86bd0df18ec396228efeedf5c596a82f9bf290b079d41ee585c9f4c0df316029c8e682af1b667222573d9d9aca2d3a5372645450bb126241c5866f40aea2c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b