Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
36c2d2dd4d92bfb125d6f8a3950c69ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36c2d2dd4d92bfb125d6f8a3950c69ee_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
36c2d2dd4d92bfb125d6f8a3950c69ee_JaffaCakes118.html
-
Size
20KB
-
MD5
36c2d2dd4d92bfb125d6f8a3950c69ee
-
SHA1
016865c35975b679f4fa7bbd80455ff37ae6c1da
-
SHA256
97a63496000f97c37b4bff168805e9a6a184f1a648e5838206fd8747e16af5ec
-
SHA512
92a885252061d9e1603debb3b209a87dd53788809599f9a314d3662c372ed03f5ed7142dc65d28b8cdcd1f09b0963c27a857079f2e47d1d5936ce953ce97a377
-
SSDEEP
384:rXKlkk8uhPtn6o/etkuQjlJ0/dUaIL5pMB80VjGYLztrzKcrbX+Yu:ykk8u1etkzpM+2GXOX+7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005af38914ec87eab30917fc6cc7b218064cfe8a58067f8b1dda1bd10296c5f070000000000e80000000020000200000001404f6a390837cc5526ecfd697e83de9ca1937828c1ccac17b4795bb8edf958420000000a0eea34ef458e33705bb4c6d18fcf089a2a2a9ec99ff357df23f852a26ae030a4000000091091a34e990c7eb951a6576e1287ebaf1c1b7a498e0972f93e8318b0fdae0fc44431064f8d10282f0d7260ba011be20aa6beca4b37bc4561b2326eaa5d5e3ac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434841982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D868CC1-8813-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901da5f31f1cdb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2044 2548 iexplore.exe 30 PID 2548 wrote to memory of 2044 2548 iexplore.exe 30 PID 2548 wrote to memory of 2044 2548 iexplore.exe 30 PID 2548 wrote to memory of 2044 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36c2d2dd4d92bfb125d6f8a3950c69ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937f8ec6ffa1a607ebea2901741d5e7d
SHA1debf14af67e8b768164d1156790f74b4f4e57f6a
SHA256c2c5637a8a5e3555fc3e0cc12ee1c0f40a1ddf189abf5630e6d724e8cfc539d2
SHA5121f75a845d4771dd2a0afb90e66ff4ebc0e1ab667d41c6cfacac4dbc63477fc217a673580e2bde65f36e035644b8514b9c05d74645c40ffb26f62b3c1bb9ffa2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38a7716f040608c4205a6e04ec64089
SHA1b0453eceb7e52d76369ec71d8b8fc0a1e982352a
SHA2564f248481dbb2731465b97b377db19aeacec845eea0eeb322c961109a21d5594d
SHA512212d16a575a880fbd1c8910607a150c9497f1cce38baaf8b634d5b22f660cc7229b3e12e9c077c9cb3f8daeeadcd4a90f4d36eaaf3037669f3c0ea2445838b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ae119eaff0446abf880503b28e6d10
SHA161e6fe3b519af4a58f69c0a6d392d957c9197abe
SHA256d906d9eead9ece7e0ba427de196716d003a83c8145292e6d219152b7247f4352
SHA5123ce14bb38a9df049aea33f1a637d84c7620ea3851309d1b06cc7fe7f26de66448b798f071a1c15f52f112570a35686dbe2a9224c26783d344cdccfdbe5412d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f05b45c83525b719662bd908f3113f7
SHA1bfad93c0f0c1c135dfd96d8cb7b058b500da4daa
SHA25624f8194a7176590c46948b26f5288f8bde1a5e4725fa5698c301bdc727b98670
SHA512c7e14e5faa95790f968b0e6cd0465fe9c48b07ecee7d3bf966aeae645356281bdcfdfa953292c8a4b2b002567881f90c8588bda43aaeef7b6f7c244e9a85ed43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5510f29133ef8c248354ec28ce2749a42
SHA176201fd73ef6eab9b1fe8e38e6749d40841abab7
SHA256b83de7e25df595f741f23d56ebf2ee99cee8ad7a55aa567520cfabb521f00235
SHA512cf8f61d5147a15eb3bd699638c08366c2daa19f2ba4ff4bbcc664b36b8ce6fab7e79feb6f074372ba68b48d5405f23d7aee9695200373f3d7133149718d3b53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de109121af5310f3b87396f01423459
SHA1f27bbc4cdbfbeb13275c2fba6c3b98e997fd526c
SHA256a1aee16abdbf9c64a5d4ac265534fd1f1594ed7a52fcbbf5d68c5b6b4eaa601f
SHA512d83a4d11e039f7925062035a5491b2ac163820bdb9281873e5871e5e13baaecfb06383cc90a5a5026c9bd75df1007ae0ca1f23f39451e74b8df67cdfd9574be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529058b290c8c2da98663331527f50239
SHA1e257323df9ffe9a8df58981b2d546e1c42f34dcd
SHA2560b0bbc78e4c74d300b4144f1b704a32fbdead5ec04d3988b8e860947049b15af
SHA51245c37393b204321dd67f06acf1065e8adf0925fdc5da8cecfcae7c5ca76fb4b20ffa773ee9c7bdac6e3ba21bb4f92c36ebedfb62a4fd38cad2ea9b855ab67033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b2f9e7f748805c8397efe622fcd3a4
SHA17348f936829357caa2715939d4470acf0955ef52
SHA25636a10d61fe0a3f2296306cea97a556d293f4e00f5e96b019579058a7948d6771
SHA512fc3c459fd3e6802b3461f054cbb438f1dcb40c1765c2d32904fd1afde5b91f990bfbe09ad4ccbb1827a022963f89ff1a7d28bb6164e2dfb090e554baa49dae7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f980eae65e0d1416b0285ae9e7055f
SHA14ecd5e464b8ea7e6f3af934d8285a910fe5a9d63
SHA2562d2bab0474fbe294fc915e5567513aca02ff364e5e11495cf861076097db7997
SHA5126940e46dfd12dc093ebbf275a17980bd03b1b24843e49d4081ec32905fe331a632f59f409a578f5998290e404d202460f8689cdae7843cc4697d8d766aed1b85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb56c0260cb297ddfd54bfb83b247f53
SHA1de53c7817b5ab18dc49b96bd0c50c09ce6e2dfb0
SHA25677bc3045173f122e840e18ddc58465dd6011572dd0390fcd9e949ff9a7d95500
SHA51280fd96e5805996fc9ca9cfa255db7cc444590ab1ac163c33af086fca8f280fe5952546e1a3db78aa93af7c74b5265b91a1bceb90baf8e012b8431717f8eecef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414d91727677e8dc2e0bd5611c1b92d1
SHA108ef5edcd299cba5f392cfad261462da2cef1285
SHA2565bbd238e446e78667edc485fd4bf1cf5f4875609ee33b446ecfe180a9657d1ec
SHA5120a4746ab847792293d97e887ccb262f62c622b578ddd37f13c7eeae25f3e9afb74a0580f193fbb434882a2c5b59a24c69ef0d8be2773479d3e120c564b0b1034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252b5008b2979ec9d7efaedc2dba3635
SHA1920444f890e850e6235c9eaac89fedac84219903
SHA256851de8d48533ffecf02b291eebd616da8f22d488a8920f6cc76ac1e051e860b6
SHA51242fee07bc77a70ad0d868a3a1c2d35f69ab2f3172cfc1fdeddabaa7b3f7f1223fcc03696fa0423c083d8cff936dba6521b2e0bb7629257048b1c53e444a3fc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aceb78057c58676e40215fd2aaec6e7
SHA1aebb9199a6d3a6c8e17ac3473bba72380e280164
SHA256c0ec58b6c90b8db5dc4b1dfc40e065bc099f5acd94221cac8ec829434e20c698
SHA5120c7f72c166688584b110b9a95a3632bc07083747158f390fae4b3f8f41f45f526ade1c5c1c88f333bef23358178639381ce317636fd126771f32a07753d8b50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d3822ba3227a74bd0bede88d43430f
SHA1f5ef16933ecb3df3af43f41d68158218cfe368d2
SHA256032f163c40b03237677b27c876b5738c47df82bf4f46cfd4f830f15f37aa751b
SHA512ec599c77318fe96776f394887559cd4be44b042436a768fc835d5225801bb76ed9b56c8bfcf32eca826e6a4019850d3824b0c311bb93d2914936a18598e9f960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f0b279130280a1908de4898329f792
SHA13e7648fed81493ec8200e85369225e17772c25dc
SHA25671afc00e178407989c0db2976f78835ead587fe71ea4532b396f28028c3a55f2
SHA512d69f3ab80d4834641e9a6e95c9d996840066912957c28c6e424e19d6d2079dd09eeb07fecc67cb1131a1c0815a087c7b510ff4ffacdce3e130713c0dfc8d8f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526281776f966fca05223fde65354c15f
SHA1a18b51dfd0336ad31666a185c19768bcb302d3ee
SHA2567285144ac1a685e15b41ae81d145999ba726cbef5dd96416607f38e1ec7471f0
SHA51259922ffe1883250c78584dc2995cb24e7f6ef0ed2d4ecec99c64e4be3a20a719b4057760e554c1b5b534611854b909189f0720d1237805c6af22028d34656267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543c932fdf8c91062b26565643c55277
SHA1383c62d5c3a6aebddac761d736f7216370783f3a
SHA2563813fb7ec559c5f4a719dc86773c9cf86ddba9373facf9fa522373828529e1b6
SHA51233a91837a1d00de4db4fcf6d954d28f21e21fecdfa30f18a8658a7748addf522225a9fb329e45c89af6fc279b63f8550750cff40d9e4fd0bb8993d9a97917829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634c1d44f1bedad608a25fab3ea4547d
SHA16d3a1829bf5d8bf3f8b9a552ffbd267a3a8a4924
SHA25630934dd92c0e2f42d89b6b57704d0d041d34171223da079e222e53766812ffd2
SHA5127364ed2b7634fa1f687d6eb16ca3664d3c2c31fe303f11f3e947e34a40198655e209322f9a4062ef94be898d7f96c58d96a54cd591e6efc51b28f35b25ccc58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722fe414a40e69b6024ce5eb502b10f8
SHA1679dc4657ced7b3a789b6313d9dcf70efd655c36
SHA256367b64befc8e937fe3c4329c2af63462638d3a867a53e6a884898cdfee3c995a
SHA5121bb6346ba6d8f38615fd3a43a008635ce9aa0d70bb3d074b74577b4358dd814a94ae3d696c1a5c0131cf0aabc001315e1535a47d017b5bb7c020d7848242ec18
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b