Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 08:31
Behavioral task
behavioral1
Sample
d6253e1c76dcfaaaf5a4db139cf48356_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d6253e1c76dcfaaaf5a4db139cf48356_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d6253e1c76dcfaaaf5a4db139cf48356_JaffaCakes118.html
-
Size
5KB
-
MD5
d6253e1c76dcfaaaf5a4db139cf48356
-
SHA1
497efab934d20f91d890a867d25d5d022e2cebe8
-
SHA256
1bada4abe468cacb7106a3c57dc2e7436abbbf9c62f4387909e5f8d00fb6c45b
-
SHA512
06fa5ca9a954c68a392dc05f1138fcfff13a7e813a8e9280c5fc426fbac27b87b1ab8385c3030c5773f3dac5ef3aeacb7279b10b24a33c44b83116eafe7746dc
-
SSDEEP
96:8y+cAl5azln+DtZog0HFxMUnZziKFe8LDmQIjK:8OAl0z8DjEHgUngKYQDm2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8EF7411-B53E-11EF-AB56-7227CCB080AF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80f786ad4b49db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000004245df8872858a607e05552653df628d9ab8f25b8a786a55276f6a2e606c8d03000000000e8000000002000020000000f45fc79744a29241b07f561d18f517f5bd5a381ab2f8292dc0e92f83f3d8235520000000a3e279c901089024b80e6d8159481e27fee782f72e9379aa5d9b90a0de833e0d400000008cb085fc7da852faaec68b8bae8b3437e1913efd6b3c4080e485655b1b35ed1999900803df65b8e7cd5fa46e582ed1669eeae7c70275eb01275ba3ed10daf1ec iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439808568" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1536 2272 iexplore.exe 31 PID 2272 wrote to memory of 1536 2272 iexplore.exe 31 PID 2272 wrote to memory of 1536 2272 iexplore.exe 31 PID 2272 wrote to memory of 1536 2272 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6253e1c76dcfaaaf5a4db139cf48356_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238480f0a00371a1af3f57324e5699cc
SHA158306c85bcd4995f1302521a0e87f632bd4cef61
SHA256010159bc17a795053228d1852e094d5b4bdaddecf34a38cb64f5b2b5e5d56ff5
SHA5125d044931f34eb2fcdb99bd46e103644861fc28ddbfc409f48353828a7ea2ea0ed045b599a9f047cb179bb03997c1e8397d9bdd3f8aad5457477856c3a6a73c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a178d884998388ba5b38b5f4809057bf
SHA19dadbe55ac1cbca751e9250af425a61c431e9f3e
SHA256833679536d07a301cdb2747bed2fc7b85df1da47f86f5a3a3cec849fe5ca61b7
SHA512468f6c2ff117c7f0d5a95a20f3c1a3f1bf24abb86a71c858bc3206c237215edfa869a325f5916c97e52d69db590445dc57a5be00f04a5cec5e727a54788982e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b335c50f4bb6829b53de754eb71a7532
SHA153fc990c54789f6f6271e13047ec265dda878988
SHA256946adebbc71588a07db7897c55ae2eb1431fc481f5bade0c022e5f5876a1a986
SHA512dcb188698060ed0d7148639adb93224481f67efbf8f153ab9b4fb9b3f8272bc29fc698975a5a5d0026c6aaf0cb8b63d8dae017935adb6dc4c08359918fa52841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cee2e570254dec36d0daed3d95c71c
SHA1777a8bad378e6f7366e00e65aba16a98ef7c40d1
SHA256956822fc36c67bd20e9face9c70c0fdcd7869ca584eca761d9b47e2a414a78b6
SHA512e40a73a106839fea76a1260898112ae82230b2b614d080b76fed9c0852e3f7dd6ae08c5e03ffe7114af69fd769e3d53240207627440976384d0f9d88cbc80a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ff22ddc492712f67d0472950e132447
SHA1c984f6364e41b9c0297f48d139cd3a18597d9ff1
SHA256ba93b3436aa2bff2388c44f2df8131ea1c6b8d6d8d7cce308f69088568ada6c2
SHA5125a134d6526878791badc2b93bb3a1534e5ef6adb60704b832c9fde04f50339b7faf3dd9bf2b0854658e17a146068f253a9a27cba6632e61daa6f287ae3b4d946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d363e5d73aaabdee5b456c983ea6b98
SHA163973855d2e8ce07248dddc68d3577bf1cc7375c
SHA25618bf59d96dadc2f15714ce4279e27f9fb347ca3b4bcff6760f6b32dfb932712d
SHA51225a3582e09044cc1023524f856228463968b2384ba1c739d124f340a02ba36aa0ab51b17a08ae505eefc4516b4e36d895d0d63fbdac2183cc2d90d25ea9c11e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6debc8c9f6a915276ff363fbbdff0e1
SHA16316bf80086e27468304de22943049fc6df6de56
SHA2566d0ae6b4d70521238f10b958156da7f300bbae07f52baa71b248f1d0612c780c
SHA51288037bf913198e25e7871fb626dbfed23b5b1fe94da896fcba5ce270ff71e827d4996b986bb521d78a9686f2f4f5b461b2602c13da6cda282ef08f824cc226f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9ec0e0797ac1e5c736a972d89d7c39
SHA182517f96da15c93a766b6d77d8c3c3efa955c577
SHA2565a4f324e505b5acec86e1eb04efec3e967a4307f9e50d7108afcf39fb2eb2c64
SHA5120222c1442a14fb948a610d7e304c0c79fbe610b62525f3950358d03d5735594fdd345f4a863448ebd8626832bd0f033b51f8d8d13b60f204bae4fc62afeb0c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f17ca053674afd52489047765e01ae2
SHA10a68ad65a2ed54d17ceed692e5dbdba0aed6b98e
SHA2564611101304b7f9558a30861c134be3aa1c0c811141b11a45c0711f4710b1b017
SHA51206264b5446ccd18792a877566db605ac5999a1f82eb2d34134d0930ce78ead97eba9ef86f36300fbfe8d89ccd9f1b7bd4fd0adf21e326200f0d52b32eeee00fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add6d90942e27c3331767742c467413b
SHA10497c1205e9888740cd290d4d59bdfb5258ab037
SHA2561537a9396df5ad88e28ed0d1da1e49e1b64723a54783ef55a6cae66e7df31a3e
SHA5126cc690d19daee415b2f6006357d7baea5c972aa9820c189735462558aad0d3649de47c93c33f74a2e1e9664efa072ab8f0009210235e2c37ed629cc481fe73ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1b992d2e99d70789ebc9871ec6fd3d
SHA128eb122cb553ac3c27cda574cb304c190451a71c
SHA2564ab0202f12fef10ff50e0f4dd7ad4fa6320c90c256629f89bdd6c0d8001930c4
SHA512073fd71c372cf73d399f0f7a24a814d3ddd8f46da044a188222cdf3fb79d2de76df7013f4b6cc9b7bb63debae64fa8f1ec32b699cc969c119b286a1b4b069d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6cd6e6f8ca8f40387000d1464a33ec
SHA1c7914ff642f86ecce08a1df8168a30bfc03ed83b
SHA25680e6c37b774357075240033d7d9807e9a5487553cff3eba93646683081a56d6d
SHA5122785ef332110999900d4536df4fa257e8ed469a3578b2c21bc3701738bb56f1ff51baf6cd82b6c1ae3ae0923894a084e87f7aef5e4320a37f6010ea765e7ee93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d6983ebe28ed021d109f094b82613f
SHA15b77dfb6b48176d82e4450e2ff27b6d0e57ea120
SHA256002cde861af652ae1b9d2c578edcf74c94cf8751b0e9a79cb26426cbf2a370d4
SHA51255049f99b864ba09e69a6ce5e7038f5577ef84955b2e45fdd622285e7c5a17d3ab844b297eefdf96189796c0de6cfe116d56c9ffec8ab77a379c9456f02f472f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f4b99fa58fec92f659476c9e2a9cbe
SHA15128d3244d02fcff6b5624c0029e6e018d36f0d0
SHA256d3b23b416351ca91813e9c318be93b5d8100849802c7e13eae601a5780c2e475
SHA51247d43284a911ef063d1df8a28df3b972345db1dc5cd11689c6904c99e6240bcf07d0d29936c1f592685e33e40ade1e45a69867186ee5345c3e21f296bece77e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e247202e9e62e095122614c67894703
SHA11a06e922283222da689ce5955d493641970445f2
SHA2566e678bba3494310b389289039f5018d8ff6b6d68243762163714c3520385b918
SHA5124d2a061d0c52d58d9e2b0c841d08f1f0408a006faba6e991b6d7c31e61c28b30f10a9dda67278427b3e9cf7157b6502327d07e45a2d021260549966bafac73f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8d5979edf6f4640db1bbfc21e132a01
SHA17a0ad212676592815d1463173ac86aa34840e411
SHA256e5110de7cc73004c746aaa66bf8edcc851054dc8148eafc5f5e553ae28d8d14b
SHA5128be0f47fdf4a4a43978b2c19f2089005e017cfb56ea5261244afa94af00b288c670f3132fca0d9b93ba73726bf6f35ca9e8f9e4a1ef20bbbf4ab1ef8829862c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be1959e4c3f8a36a3de6fbf5d541fe2
SHA1932c9333c619618766685fe109034cef5f4b3ef3
SHA2565b24aebb3255f4ccaf3edabf16ee2341a3fce6a643e4641d29c699f1176fc43e
SHA512bab0aa1df60ecceb35dbfbf2cc55b16865abfcb148030a572958fa8b2f595c92834e1935555d3d04dffe3f6ba032870dcd17ccab246483176181cc0a13f27f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec79167347ab9450f81943cb8d69719
SHA18541647d410e6d57be58b03383b0c4d93d7c0c2f
SHA256b3c92d8d49b84ea85f8050990dfbbdbba45508ee90e2662833c8218899afc29c
SHA51248cba527370a8e9a8dc215c4d5626e89ba57e88f8eb04ee37bcc3cf9cd4a015d76e67e7161f8d83ad71cb39079c72318fa8b761e1643497f70b617c2ab6d5e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc3649c39ecfb20684a14a517bc225f5
SHA16f12f3e8f48e5a138ea4984df565ac83a8371b45
SHA256729085047c43f612e95efe3264adfea628755b86fa4e34fd25fd31603639adf7
SHA512230b9eb9fef7c061ef8ffcd473975a23b649b237b85b9668cee1aebd7b4aec2e500688705890f616399d536a1dee6c8f11498780ec0fa585454822bed8ee8323
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b