Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
3685f2a6b95d49c61c75d7f3a2ee3db6_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3685f2a6b95d49c61c75d7f3a2ee3db6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3685f2a6b95d49c61c75d7f3a2ee3db6_JaffaCakes118.html
-
Size
6KB
-
MD5
3685f2a6b95d49c61c75d7f3a2ee3db6
-
SHA1
107ec6c475949c23a2a5018e443c45ba9689e668
-
SHA256
7f0c427399bc0434c27757ed5e25655b8f919f32778a6f27be254f7162704065
-
SHA512
6171ce3af2d33da0e85f629696b23e3cd98d31e35de8b3566ae167a22de4ab0f35b7987a2af304046466a7b69fd5f0842c388984250fa67a9c7abe9408a848d8
-
SSDEEP
96:uzVs+ux7wcvLLY1k9o84d12ef7CSTUKZcEZ7ru7f:csz7vvAYS/Zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434838002" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000098be44c781e277417ba24b8d6a7976ee53a043ad65ff98f3f489ea0ff418cae0000000000e8000000002000020000000a0b3816c983067e3c10a45f5e001c70a4039d3549755904261482f5b357cca8c20000000f209f4ecc228f2570ddbece295b6dd013b7df2bd18c612ec630534b413dd786c40000000200489ec5862814c312be44ac348f4654fd40c248ce9c7e30181618437e8121dd67e1345c584e85758744934123ab836c10ea84fbcab80406ff7c1daf9b6131d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6013a2ad161cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8030B01-8809-11EF-8121-F6D98E36DBEF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1668 2344 iexplore.exe 29 PID 2344 wrote to memory of 1668 2344 iexplore.exe 29 PID 2344 wrote to memory of 1668 2344 iexplore.exe 29 PID 2344 wrote to memory of 1668 2344 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3685f2a6b95d49c61c75d7f3a2ee3db6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e36e566fbecfebf051a5a79373da8c4
SHA136bb0b830b2e11a4d5034ac85d1b3f5091a33452
SHA2565075dc4d6911b0ffe471c203726f194159fad249f0c6900da4622601a82f1357
SHA512c799106e98ffb6292577675fad0db3cf54b2b31965ec6db11411396b23daa93d5bc8665bb4120bb7c572806ee32df283116a017e19ff7d7e0e5212b99eb9ad6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57a734e91d7626713bef0fcfa0cb85e
SHA1f284ac3652e04a38d25f3a5b34c5b0670b30b44a
SHA256f78ea0b06722c1c6c45717a1ed409550f8c0ec92576b4de02f29bba2856c2d7c
SHA512e77c70bfc77496ce0c98fc7f4a95bc4a556e6bd38094423b055976cc401035d1bfb946a5001624aa0271f7a3067b8adbfcbe700c623d942cab8c44c51a326dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd8ca6cd3dc45f6fdda8484c236a6ef
SHA1e60c8e2afff60fcaf3961ac8534ef1bd23057c56
SHA2565483479a56f3434a2582e61487758a1372cb1301f9035ad3b5c5a1c7cd54480f
SHA51291553de3b61c294631ecfc49e6db9f03daf1c395d1c44687ffcd8904f089287aea9314f77f6ae732e70fe86f932ab4f89c5a24ee016edd2386ba4ac8f78f023a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d2e701b5928f132018ea7bec2338a2
SHA120d1f209ce0af598f734389aaf51dc806fa32ead
SHA25673adb576dd51f0956c3746e63a5fb4b2435bb835832786e6f5ab95d8bda3d9f6
SHA512c4e7b47fe9b1fee34988cc869a12256c78d9b0e0f01ae6934427a6bd7d7b5eed434a11c766b556b619bdc7383187d5a7d43625f4ebe3b4c58c9d291ab7843fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98e310e25b6bac9049a48310388a743
SHA1775c41c2e8e9727839f04a921220a176f785f76c
SHA256d68fff4ae49f34cddb2d3d3fe2caff5ce27067912f586dc846d1f57395371f4f
SHA512b55f7662eba66af5574996f4af2c2ace965977fbee913182b7d40f1beba669f9a5ee1b559c2c56c161f1dc8db3c35241d09ede92c190c7b7000dcc050e33a573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d65ced5d07e575690f153cf48c2a98
SHA17f1482203311e0a23a833cafe5b0ad98d2e627e2
SHA256827764fedc163b14b9653fe9aaca46a68d1c88136f6b2d6eef54c094bcfbb3b6
SHA5128508c009a461a6f993d9f5f9de32fc9acc049ad7f13b0d502bf672e03b65268498b3ce3591f630bf99dc71e4379f3c9f1066d93368bc3f98b2cc2a30fdd377e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab466b76dd54724b051c0717657c5d94
SHA1f208150c9b68c38c6feb5232a2b35452ca2358e8
SHA256a611010f3dcc0afb918da19b3dd4f851e2a509e123129c39e1492d75f27e1747
SHA5124e2a6917f15fbc75cbdec416497c8220e7018645e1824b184f776fc73256d5c54731de229f46bb33e259714036bb142c938c7d915d939da3db66682b1c3b7917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d7957439e8e53970fad544e8838fd0
SHA1c2b9376b9be3ab1f4f1c4f43303304408f003603
SHA256a12777cb7ba2a4700e577fee4a91958fe6ab0929007bbb69f56e62368a4378bb
SHA5128aacdf7ac03718ab9f7bac7cf1ec47e357219da1ae175f5235a78deb7eb56a080e73e336d461a36ca5bd01cc81d4ff7bc28209f36dfb434b0e232a43bc598403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2c8e3c65f629586731ec584aeb8b98
SHA1a82c960ceadbf3494e97d4068d6ea4fb00dd6026
SHA256aebc5022a78005496c756efb4d0278f530553500343f7376b7dfd45affa6a112
SHA5121e4bf16290e696d42cc7ad8b4d9fc53c0f5116a8b24556b974e0c475dfa639ebf20669545d649066f1ef08ae2bbdf16dbaa52ac4b428a260e49fd57941b160ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52933857df8af6dc252094a03cfc6d2d9
SHA1901a86c4e6bf82b6c08fa6bdbc44f6fc0074962d
SHA2563b423e010c58b96c6986580d5c005d5991b8f65e9fa324f3f5cec1e5a93c2d0f
SHA5128878805db3ca5d18ff51110a1a9f70338c1dfe393307a8e34e079e15492fe89a75150df114669f5fba426fa3ca70d227cdd04a91268671d5e60002ac2704a32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c2fa1f3fcd93741d923e542a911340
SHA17bf8b303eabbc653a97b5538e35c73384ee4159b
SHA2568d62af824b9b17e12a1d282e20c3528897efacb1473dea19dc7427642b5261b0
SHA5126693a82d042259af0a8db554dfe1ac1203dc30e4e53d0d76f1c2b17932bf46b190ed40fa948ecbeea53039ab6d0dde30d3006a6c312a2ce6bcceaa4ce43af511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635e915b1c126d51ab0b9674012c4cfb
SHA1931c7b31819f422c6a83aa8e59af9aca7ae57847
SHA25605cafaffcb21e3ca19d31d3e7afdd7f336256ce8f5f22515dca79fb4abbabc3b
SHA51295ee3b5409824ed3830494b1aab619c3bd92976b283b41c53aab93fcbeda379ce8d1986f4143af48ab8e43d572aa3728e588f9ed98456282ef892498092f26e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62314852d49588d2bbbab72bae98b9f
SHA1b6149f6c4736c6a67647f44dda7687a3fbdaa27d
SHA2562b9d07ff99b52300aa253954b22146078e1396de02ada8e20a63477b040fdfd5
SHA512fa7b9c7d9cfe4a20ca014040636f1c9ba727a05e443500540e595ecb674c49736755714bca0cc2e31bbc203b502affce2d5fc9b24a3a2fb099bd331503d3be11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce27207f7321c7948352258dd266687
SHA1d2987fa57c083e0e42a992b69c0ce6170ec1152c
SHA256351f69d8d492c1077d6b73c4ec7b3b7e42e38caf7b2cb1926b540ff2efe5cb2d
SHA5124cb811245dcbe6f034119fe5789d699881bdb1a3f081ea1c26f584d0c44b216a01954d7ac1e2fdc2f2d22b2a47c79a02d55e4edfaa3a9f03da4f75007c3ff951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686d11d0174be58ca7aaa174232f64bf
SHA1c52a0d145cda00751b14f2dddb25fedb86eb1981
SHA256281b861f3130e46e0b586ce9bc39e56e882ce8409f5d83c2729508e847e48216
SHA512b9febe73c5fd5a5c1a8336e20d5a0bb15baa5bc425c59297222fc5755dfe013d2813cfec36e5d0bcea9feae30848b4cdbf8e59c5a008630c11912643eed382ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87c807cd02235d0ddf49dd0dc5c8f91
SHA1be9f6910ff9049fc3eda857f4eb18a9ce6dd42ed
SHA256d3b8277c61449c169fe90f58ce19d914c55440256e87840a168b77f6a4f76ea7
SHA51277cd8fe578e40cd87ad3c7b3ce3490a3bc829015e375c1cef152f1e37de1a6787bfe8d2bf93e386a13a25bc7191d0e03fde444b6105cf757fa85c8200a55a852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501225e4d2fb905ddeb7f8ed43c9b4d2c
SHA18b4a35d94ea7604fa827c9872e1003013e9c370d
SHA256d0a9af9c57733d0644cc0dd65d38da93e25c037365acc43e1c9f62042f3fb78c
SHA512f87c37fc9358c9ce57524aeafcb04cc0962123ba4a934049ec4a0800aa65432f65ac50646f9ba925f495fcda3165ab4ebc9f0029e55094270790668b82af59ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eff6019e4c53137cb02a3902b5c87a8
SHA16ad7f6cc749d98f26cb78dcd41b9dc6f51767a7d
SHA256144440b7eb1b86437f068a22caf53be7f8d4c0c9b9a76c7deca366dc3c8fd6fa
SHA512a15cfb03180d96807ae5cab8d8ee026b237bcac4a796b0bf3e84edbb85b0c088b66ce5cfeda31b5b8c65e49777985e15f268aa056e27da12e99c6deb51dfbb4d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b