Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
3c9c3cd1dd382b1eda201ad95bf3cdb3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c9c3cd1dd382b1eda201ad95bf3cdb3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c9c3cd1dd382b1eda201ad95bf3cdb3_JaffaCakes118.html
-
Size
20KB
-
MD5
3c9c3cd1dd382b1eda201ad95bf3cdb3
-
SHA1
805dc76844c240cb71094b676c6401fb548e9256
-
SHA256
bb8456753f93acae82dcc5e9c16ba057fe89a0a8fdaad04c9fabccca2f3905e0
-
SHA512
938533b43522a57b05c43b4062eee7eab7011470b38802ab4ba578650f681db76afe2c172a05cbe02bcfe49e463e7dc329857ab1463502fccc562e564fd6cc69
-
SSDEEP
384:4+QfPFd9QZBC7mOdMg8uKfpC5IgSnbmFe7AcVI6YeHrPd:Zcd9QZBC7mOdMgqpC5I9nC4ZrPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434937818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a313b95ff86be8d86f9631d66cce75d496ca1dc38f84c2394735038c38a8f443000000000e80000000020000200000003348134e7146e4617ffb04472fcb587f07b3cec5685fb0568ee28ad44ca177be200000008155ccc73076c819165569b7ac783deaca0fdd1338af9ead6fffd74969b714b9400000003e31610ce131d3742c022af08d8847c1ceb41229f473a11200fbeebfb4f169322f35f3b74a9e443aca29a57c0f60cfa27a1706f32ffe685c433402614b459cd7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{403C0081-88F2-11EF-A0FF-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05d9e15ff1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2808 2648 iexplore.exe 30 PID 2648 wrote to memory of 2808 2648 iexplore.exe 30 PID 2648 wrote to memory of 2808 2648 iexplore.exe 30 PID 2648 wrote to memory of 2808 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c9c3cd1dd382b1eda201ad95bf3cdb3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba11603f1a54bfa5db0f271795f0203
SHA170e6333f5aa056fccb6e6a75408569c44a1ebbff
SHA25651e1c0c96519ddcd7e576a107084662a0205e95d4957a5087cbe198d6be68d79
SHA5126efe5a944b9dd1469527de487f08e2e39bc51b77c8c9ce06f62a9887e72acdbd34c9b08bc37f2d4ba444a84cd968d4ebc3b758f0cccc6b123ee55afa377dfecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b83091bb6eaf8be526920951f8e17e
SHA105247d9e350f680cf4082ff4fbf1938c2a7089cf
SHA256061e6b625cca763a0f4ac0f5624f9042e97d21e59efa97e79de27fbcc96fc6dc
SHA51284a93e2d6926b77ddb899820861b8036958cd6e3c583369cc85fce0efdcb6047e5658bd9723c2eec3467ea270848fe540a665783b4e88cfef3c2be85c5cddd67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467fa4ca3e94425478bd7b26d08a74ea
SHA17e94e5c1cef0dba73e1031f3d4ea885c0b18df1c
SHA25684757af742be66ab1b1bdee69174f83fad54928bd23d2ffb457f95d3188a1d2b
SHA5129ec32d90ff23945d78f2b5c2b65f1a22a8ae696bf93a35862729326afe6679373aa4d3f3e878b7bca2f6ce01dc0dcb6c4684f2b9ee941eec10158ccee9780810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54035ec3028a792a03a723820884168c1
SHA1c6c9de3c477f4c7c3574ff51b55c114378acee97
SHA256f8950fa29d92a2b99dc4849c6bce2499d1c23908f1c35885d42392de0ce35a45
SHA512f31b01a3a340b629a3e03effbab4698b7a58fc70ea770be171193e1783c353b056db26f43342b4f02a309214499cb58597b0387564ede7c0c7a41f56ba4f2f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e96e0000bb7cb17ea83d6b0f5dc2ef
SHA17c9d1733f3c981e5490231a405389b08bc512ae5
SHA2563d64abf2b848bc934aa655c6dba2e8dfe02652a236ea247b71dcf0221bfaf789
SHA5125442aaec85a2f161df34634dd4a94160a741f323472c7ce07775a661632f717a7c6c19cc84c7f8f5077d4290999902a5a6de0da47cd9396f43f704dc93fd3ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e325c6293302c9514623d087ee82ce
SHA1114490053d0eef7933377ba098ef0214f20897de
SHA2562c6f95229bb6d577a6f46314b53cce2fb8a97949b000f2299e5a46bfa6e055ed
SHA512a796d88326a47bae0ed1beb1cac84c15099982f9c5403dc7fd36f6745a1e1610ce59989bbfb2559b62940cf1f5268f449b26cd0b3d4adaf5ac7f56a23ea95df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54396cd8cbe47a1ea22c268b052bdfe10
SHA15a1d543f798c3a2955722020449450211d2f6b43
SHA256bb819766800b6bd18ffadd3298371492d26c931f174326e682452f9b9296e94c
SHA5120433065b4cdfc378a5b91a24885ce6ea28ccf614b6d33ff8555a5154e391c5446792c2f5f5732d825473ce0389ad2c7450d902c6258b2a1fee6e5faef1630783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c796f4a4cae2bc2febdaba464a0bae
SHA12685356c219dbcf0e94193c938b21f21000b2528
SHA256ea363b95a2abce35e44755fa743438712289e45931d72b51f0374f0ed8b4d6c2
SHA51234df438e7d99c9fe40e7f741c8fff05e2b893dc401ca7d501a5f6f2a4a4215917fd13fd1d7fadec2df6b2988676ebd3f463a60af937c1ba05fd5997a44d305f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fc78bbefd688b08c67415a9c23cf8a
SHA187798d15a56f0843299ad76870072f2527b57128
SHA256725bfc7a16572206534fe0384047ab69f75859003c6acd6995a7a65e7db7d9f8
SHA512c543fad5f5ee769f53e2d53001ffa9ecabdbffc6f4a43108862b9a59ca88281d4a20002c993da420ad627ef804823a6c218b72263d6d805a5949efec09066d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db10683bc79e56085666484589693bd3
SHA1b0370c73f59b3912bf664b3462b5e503a39c8116
SHA256f304ff6358414bb4825a36d1ee79fd0dcf5fea808795d40960045d3357cb8dbc
SHA512a18e02d4819e89c0edd08064afb947578c0cffe616bd156ccb684c29f72a8d1eaf3c9fa4b6d11620ec5e01896c288bc84ed8ce6fd1c4dd5af4285aa0d4881042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcb5b7f4caf5f552792290e9635cc59
SHA16c1bb16843276e4f179663a3515e7fb8e6cb42fc
SHA2562cfb5abe4fba768b821989a960750faf6426ebc510da8e8fb24bf757c6ee9674
SHA512ea076ee6e213f8c51a1d76790eb7c7209ab6447a935bc81813ab4b05b2dc35af71c62441276255441a9a1158f8bd4d2bf8e48e3bed1414f256754e86526aa2b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb5a312b108744ef85c7002b182cad2
SHA1cc76653353fe2c8b5dc7ac3b2c54fc18a3016a29
SHA25676d93b1abae71e116170f1a26ec6ec515302c53db8a2d77c0a803846a0252187
SHA512de70877d33139d52958ac5f08da5ec7e19f6ca368dee0f20c957a66e521b963de4f748f78c5a53f7fcfae5599c095eba8445cdacc3b85346088d8c2ef21efbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fac8fd55f49f7cd2515fbfa782fc7d9
SHA1e4d5008af45afff4e2fcf4a7097f51f1ccad665a
SHA25694988d5fb3659428eadfdbff5e41383ea3b06e6ed1c48ed4e18ccacd9cb9f2b1
SHA512b521c3e86e568dfb2d44a5625497cf9203a5c33ab834b6832c17f48c44924a89349dff192cf345e1ffa6b94ae2bdf645c8a952ed97e51a58150d8db141d2790f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3928245bc00e9231ba0af1242383604
SHA190bf43ff6accb34e21d171693f476ad725f16f95
SHA2569833039f77754860da4a6842b1115fcc75bcfb03165bec407c66345e89bceeea
SHA51233c403c8a118ee8735e0739a5175ce81db9d8f677ea5fd530baaebcc8a15d96e8fc93c9aaedbf51e721f19f1662469f637af4ba573041fff67f638b68e8a1640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2ffe3e1cb4532e246327c14a200ae5
SHA1249845f5f719ed520e666b73bfe6496d684d1d5e
SHA256a361076f00e41ab8095996dc5cbf49e2e4a6ef820e49636d54528b1ece83a24b
SHA512b1902601b64bfed4e51516c1c64392a54ca3a805232cce94dac62a6e0ff156c73745177f52a5c5805e8a2bd82146436d26dc5bb1c795343d5ac862ddf587cc6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528ed6e30a19865153b18801cf29d3afe
SHA1f5bbe7d10fa690fdf267255fdad99aa6dc4c58a4
SHA2565e3ce5f6363eb26b54b5df529efd30aec92c9e93667fe5d0c8434a5223429711
SHA5127c4f4da6fc2dd8182f101066907e7ef3968eed8f9b78ba32385b6cfd47cab465c7826f4eabcfb4b24f0b40cf75d7cdaf4082dc7de17dbcdf3bc58d8917e54e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c205d846da25516c89ea4e5803b44097
SHA12dc687d054cd1a3e9b50c400021517a32409df7d
SHA2568ff50545a4f3d8731dcb271ab4eb072a10be6b79a3ffa6870ea02d019de34345
SHA5121c0952f047709f25c4570fc35aa016d96de393ab5a33b6926eca656b5f56afec2353a297a77ec439486abc4020dbe4658aeb8ccb2223c4e3c47d165718dea6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d0741a4cfe6e2452b3e1accdde50e3
SHA1f1725054b46a8c980f6d46468d5f29f0dd223e11
SHA256abdbff51a3f4e6c5cdda84a1f5c89f5d075a2099292f8e7f0c0f84bc009b7bc5
SHA5121269de04f40dface90caa73ea004d451883fe83fefb1ce9c08651549f1b816e8e69b0950963033440201f3bb812da10f45338f502eace89e12303d8347fafa72
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b