Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
3088f2fa038f1fbb01140a091ba9c386_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3088f2fa038f1fbb01140a091ba9c386_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3088f2fa038f1fbb01140a091ba9c386_JaffaCakes118.html
-
Size
88KB
-
MD5
3088f2fa038f1fbb01140a091ba9c386
-
SHA1
49db51cb26902dfdab03469e99db7c13c2856e83
-
SHA256
a8ad17e2506ed36ebbc8239a7669832dda031d3c6fa2d2886604d18b5a4b70d9
-
SHA512
39470b8bdc1d32717d6d83a0d4008e9fcc30c3420c798fa5439b0ea1df8fb2469394821931677a79d118b7a0b4ac1a164b7b1ab86fcbe232b2ff3a032c6821f7
-
SSDEEP
1536:gQZBCCOdD0IxCEI9H8VLwYAGYX78iMYrXW601etcwyxJt+IGfl8/b7K/5qQl9e1v:gk2V0IxLPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603f9d3a271bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63AC7A11-871A-11EF-BB31-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434735155" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b2056bdfd21910bb4a9e5f433b607a878627511f72b4e006ab842b2889cb1ad1000000000e80000000020000200000006d1e100b0e002adbee68621f5209d115582d221a92d2041ac764aacbf0761f8420000000898060715c1a994e6c51775e11c805ad6a24ca918d11cb3433255653b935871f40000000054fb895b60780f27c1118219bdc9372140009284bea9857c7215fd35ddf8508458540f5e73ea71e96544a648b1a394c6925b9ab087bebdc30f5644a51ce6b26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE 1544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31 PID 2512 wrote to memory of 1544 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3088f2fa038f1fbb01140a091ba9c386_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527ce97c829d5e82bb6c282fd90a5071
SHA1a55503ba099621b4af9f377a2a9a61b4819136a8
SHA25611a08097efbcdb8aa6b23f79a1dc1b760c2476fb75d92d57c3505713dde21b26
SHA512da556fa8d90ceb29a33fa774519eccffb0d53afe9c34c07be6bdf396dea7bc7a526bb57c9f9c6cafe16541d26517f9f13aab2db5977b893283757abec3ce7ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48971abcec1018b61cb58f28c24bbe7
SHA1fcc9671c5199c6ba9edc1dc97690507bf6834926
SHA256581a918798fdfeef5220c33ff582e755ec4ec35f26dd5ab0848b793a7f58191a
SHA51295b808a3c6f17e0199597a6062e2409bb72cc30d64ca70268dd4effe6c830a75bf54c19eb3686f515748f09dc80e3144ce150e5dca2cf4b9c48a69dd10c91447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c060f8ef66eaa17fed6a94b0d6e62e0
SHA12ccbdac9e482380ed7519a416c83ba44a744000f
SHA25619efa4144e2e5e59c48f357245b9fed874f6b77a2c3a46908c8f6b02c3b28663
SHA5123d7fcfda848be72490c6c90e6ed809570f948f2828f34787e2e3efbab8b49f2650da750469cb0483339051263530ba511c97b666d6f4d8aaeb943c05f336b8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cdcf02ef559d6c3df3acd0b4d6a3fa
SHA14ed448091f8c58777f887444819ce5b19b25875f
SHA256161ace6e4b8eafa73418aab1ce076679c55d8dfccb9e864ce2f7090c8b05fc9b
SHA51285ec1bbbf3717abd344b23da744f8d2b1cb99bb6ace9e8b4d67e53cb7bbb19e50dbc017c284f7f8b573f1c778f8fc33e75e643fa88e09e374f1044d45eec217d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557364d65b089bb1e647ecaf667c732ad
SHA188110c3f3dc88d5a2a66f3cdf21346ebc8d9f6ef
SHA256f443288b7d7e767aa620726de281a06667a0fec86ea9897bdd1fba5046c6599b
SHA512bf9e91588eaa394a200e4faeca662969f994279df8620859b73c67c03c270ae18faec3c927bfe5359d00231e10a25f707fe554107f5abf837ba53c0f42d92f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d392bd06140809645fdef5b9e23151cd
SHA1ee3eb66691876bf6398c1a2109c9e4d386368fd9
SHA256049ddccb9c45af49a5635c52ae98e2c07850044db3f7d778b20e8734e4c5b0eb
SHA512efc0f71d2c9b8b72b20800a43811d2f6a4d6a2c9ab7abf39063ee9a68253dcb05fc70401d482dfd26668d9eacd9da720f8f80c19a98a1ac5f5db8e8b79b1d994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e98d83f38fe5173f3988d41c36cdc95
SHA16bf89b74bfc0798e45130580093735160e25358d
SHA25672aaf84457ff87fc48ab67cceca4113cb3d4c89692878e206b946b9c8d3c8363
SHA5125daf00f8c59148e9ca7e45110932e4afd08eb93dbb84a2b37558b49ad134b35e0812a95e2ba52f110a8f5fbba0e8764e6bff74ed43d28563e4eaf6041e85f6fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f72bb5b38a54531f64bb6e7ce17029
SHA1679e3e6e95843945e47aae3e385989423382aa08
SHA256fa630c3be527f05410a70fdc889d5c5ae8d4dca6028f1f08885ee627dfeb7c42
SHA512c78c2e712560fbb42117089b4cf78c972a17f5d8b5696e60e4d581715c8b9d4d846c04c28a0cbd28145bcc6f48e33c1a7417bcffed0dd88fa1816b491111d322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea86d5e79eafcc878df789825ab0e9c
SHA15a164ff97489de60bbbe7dc14581d84647bfb8a7
SHA2561749c9bbcc1d4c3124d24249b408472eec150959024aaf878b74fb70b0a0d25f
SHA51244f0f34b425201417cd02dd57d8933e3ddd38150327b87d5e3e158460af83e5699484bb497adcc12d4176a79631a1f673eb58b298ae73ecf39804e17cec30a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53688e516eaee4203fc39c2968eb2dfe5
SHA1cf3176419401329225bbdeec0dc658a070a0ea37
SHA2564c404c62467b8cdf35e904f23323aaa200139221c7dbfb2d5c0b82147d85c1c8
SHA5126b25e0deba3dccff19741976b33c39b88a2a634ffb299aa61732671a27d5aaefe419718c43eace72a25facfba56b36d5418a059509148e4d70300b492c8630e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efbd7412cda77045219352a150d06f6
SHA12078959b22c06a8912bbe82640c02c60f80b3f5b
SHA2562cf8c003e5aa9eb8aee8fd2691cf5713b46f68b081f5df59daa54124f9910705
SHA5125695db31711b53f6c9da96ddb115bebfbfe1b6fc034865c0f4ff57eb44e8d44feb775ccd56c07cffd9998420c915065f07ae3dfd10da97cefb96917bbc08395c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab49f3d4fa8f229324a746c92ce96c15
SHA1b7f3c2208d160de53182e43396152a7f01b778b0
SHA25635c653660fc5f3c1f786f71c646247b5d8e856285b03bce506bfd201d3992304
SHA512605a73e3fd65780113c959c818d858196538cb96f59d5d2fb2caed807adfdd38296eb4c0944e5a5d952efb5b52de4a385a161931f290c92e3de26a8519824f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966f9e6d04b33b5a8e3a51e95d9e037e
SHA15879894c10019024404740272b271d237b90ec66
SHA256d30d931a1930f93df86375b4f5c8f7cb9a6c2ca2e9f7ce3db8d746f63fa1a495
SHA5129739b7b15dce55c4a3327a5ab3c75813007f3c1ed8c98d07be963dc2a515bc388384b5c3eb18b1e89b4dc7d216c7102af83b88f986e4324ac366c7ed6012f9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b05b664bd28a5f8fc564e72a5cc92cd6
SHA1fa2d9d4877140674e53e05a3432fb90989133998
SHA2568b678d2ce822665c470ada49afc696ed317ae85a2e55e1c286c3242f12f11e94
SHA512bc9c90fcb6b9d82f469108c682227d0d9a29b3d71779754963a2f590a93fe5528e9c128fef56531090a56a8721f77ab9ced48626ef95349d96138fc60e1e2044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61841343db78840b9a98d92bacc88a5
SHA13f156f1a0ad538ddca66a1caa46aee04cd751f7f
SHA256306fa4a2b176063a1b75dd57b206cab484e43c2dd3cb3e713bc66dd69ead6c02
SHA5121addcc7e975cba25160cfbb72638f6c3d22d9a0c81ab625e1080924b7c7bb6d1c0c4aa8dee5d89a7ebe6eaa98e938d10becd190a8117da3a3df2b24d76dd392b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02742d97fd8450dd078178109ac471f
SHA1909b345eb217cbf09683dfd336df1be772faf6a4
SHA2560f2beacd6aeadb5e20450d7c606bfea0b79bb9ff1a79835988558bee1050e33c
SHA512943fb0a4d965fed0778cd20ecca91da9164cdb9b629d75f84bc87765feae306a727cee14e5f76d56f3a159cae9d3134d516e7d8e02d4d74e62406ac1522f9c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fab9fd4f494ac4234edb974467a89c2
SHA1b1943fade28fdcec7b39bd876437bc67c62a49d3
SHA25676504f287a9334ab077623531f4e367e2b6aea180808238067444a6623e5ea97
SHA512cc47554590ec529f67038befd71f9cfc2763e67b83df4d00016df0cd93efc9d92158e831ed1f6eb49f8790f9c76ef930457c0f9714c09110160c6171c1c3091a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cad5270364a2520dada9826d4153070
SHA1496dce14af03e5b780aa35f731eb2f2786ffb0ca
SHA256b6f8f6fe6d712ceb5f103f81b2b239b722369332a362b11a9aa86b5e302980ef
SHA5125814b86c4ca670685199debec40fdfd7b10a1897ef3783afdf2e6d0f1faced2136d4fac7d0b65796c9e1d19d206c57bcafe8a419c7af4323d76704a3517473ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248bbb7a734db183c8e28eecfe0a7e28
SHA16287f43dd1d3402abe5af5ade3f980b732ade015
SHA256f9469f7fcb530b4efe556d32387b745f559a45349af8341fb9542fbe5b0f1b33
SHA512e03acc135d44566421fb4467dd799d370c5eb096cecf69e2424a993e670f4ef61fff3d7718dd9c98557ccac728821ffb1322c0e5d7e71f576a6e88f74acbd6ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b