Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
37dd2301ce025934ae9d30190fbf8044_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37dd2301ce025934ae9d30190fbf8044_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37dd2301ce025934ae9d30190fbf8044_JaffaCakes118.html
-
Size
121KB
-
MD5
37dd2301ce025934ae9d30190fbf8044
-
SHA1
4c2d2807bd87aac186be60e805431b1b06057535
-
SHA256
16840d6cca6ad4984cf989903068fae96f8766204016e03c1107328a87d141d6
-
SHA512
3a6754773319513c263eb2fec662a2520c78f813fa695f350b15cd5ac63554a918fc6b5d19d6c65edba57398c3e3ff8dd5f6b9174d91501a3f1b9e496d675f4e
-
SSDEEP
1536:S/x3rTTb2bfy+y57FhqZbAOsqLXUelr1Akc6jImV7me2ruq2tmh:S/tKDy+YXqTLXUelr1Akcoae2mtmh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434859586" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000cb353cd68bd91303fa5a018e5383da7e3cea85dc7c4bdfcde4aa0e1b1ee52391000000000e8000000002000020000000a24d51adf5de97e7d245f18eed31a2789a64ea3e4d07a551c44599ddab303273200000002e619e2d052c38363856245788ea77d5984a3578f0d011a0d12865e44813eeec400000002e9c9666354239f77ff690457f2eab9c8e14f182a4f69258a444144441803e611b50f25f1f3f518547d053d94a8af2e357b6b4d17411d35b16a573c959ffe2fb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004834f1481cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19C69251-883C-11EF-8B74-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30 PID 2792 wrote to memory of 2836 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37dd2301ce025934ae9d30190fbf8044_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54a7b5ac5b603f30b5e262cc500c9629f
SHA1361f2bf035a782fd385c48301f5ebcce3dbd98a9
SHA256365cb9484f369ed1d4edee2f308505461c760da1f323a36245812df9014e26d6
SHA5127818fd312c1fb02aa9154bcba59df03033fc800e25ddfe1fb67c9452e61ea67aef0029d9a17725fd4aa9ca3e6df48e27b81ed3ec8931710904d360e8f2ef6b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f50992e8a0ac1469ad95e3ee504495
SHA1b987ea7601ed961fdcf39ba804cc7d83d8a7892f
SHA25663e4e3f53e9bebfeccaf0aa81ad7d1d4deb5d101ff9ca3ff678906a353274366
SHA51248f33d8b99a5c9b19d536174d6c174b88116b50c4da8cf367bfd30e723ab85367426cd5ae666e7d9b0c256f31d633f5054dbe57787d989d09c32be33a9ab7550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd35a77b68a27c085bbdef794ade44a5
SHA1597d2b36079d9241af09d6c1726d90d32634375d
SHA256740228a0619ad703c10b4f2217c75d41efde85de23599a0677d785a26681dfd1
SHA512929d6080465b133bb5046d93e33cd663167158f1f21eb157ac5116b97a8323af696a0045ca80b60923a25423d7b5756fa5c4462a2743985d5a25ee75a9b92874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6d76ca53861f36b01c37eb9924d8d3f
SHA113d09c020a83cc06a1b47ec07f1b12dd86ff3fa1
SHA256df2469f1bafec8e93a26f84ebcbf5254c9bcc1cac938e1a9a09bc447bbef9c16
SHA512502b692da7bb5c618ca3a320f706bc543b58083aa84a5b4b33af542ad2dace28931f2f37dedcf0230903bf35482a6f98846509d0fdf75f5bfb871ff763f6b082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50773663a94515b6a99c6eb00dde63f85
SHA13c4cdc8c883f03f30e9fa84a93eddef4b5edc4f8
SHA256fe43c344bb2de99db5c1287aa7bc9ad82274086d725c5a86a0837021f1ae30f1
SHA512fa0d7e0162af604e82b4be891f0a9c1a22124f9552f14f811f5093ebae3c5a041874bcf2aa6bbab6c5aa64baa80e610e68a7305f924bd954337548a367ecd430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09604e7a91f7caaa738722e9d982523
SHA15f15ec7dfc6d6a9a5beba984e779c7b41a848327
SHA256e762a4f70eb70f69d70ce842dee7f89ee7c99795f1830b0039447b30d04b2b66
SHA512539d1cd0c63f3cbcc05e3957093d73886e50ff7ef6b2599e4c797b57c5edee42f1ea7cdb2e3ba607ffcdbf101c123a2e6c861bce72ea008e65ac93179b85e896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd6766946446e68e2bc81dedc64aeec
SHA1a93c4d9afd5d4dbfa3328ac610e3cd5c696b281e
SHA2567933b355c2977f0592904514d1eca8deddadf1e4037ffbd7700852b50e6bfe92
SHA51230d1d4a8996e67779ec9d52d1d088b44692e68c4cf7604067d7e3dcf21c011edd22d7c20d9212b09c7c5f4192553fab54e07fac520d1c2808b38f41f6880a0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5daf797a6d864927046a27aff5c4aec
SHA16b670cd373f1d4f902e1dd6f0adf17548ab2f25b
SHA25693c4d55930d70b5d2119f59c8e88bfb36fb64122b600c896a37961bcda010e4f
SHA512a161f1007e145ee1b90d393282253e5149bed8240286176c988f7b62c8db11c1f76a605db3e607474d3af2fe4319d14438532624709270b35dd26d2e55abc507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e63a8ae68321407209e354a5e9857ee
SHA13d0e263834dcb1df4dcbce8f8ca11e96edecc71a
SHA2565ea7ea4731832bc202ee319304277da1aa3348d685e5477b2de6893f51e2d0a7
SHA512eb16f51ef57363e05a58e32c7e89da3c1a45fcc82c7dd10771a5391f89a63b90b725ab8c50861b7eaf14daf3465065cf31a4d0d8c56783eb2eb565b8113304d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca4f8ca319d7ac5762b4d82e53ecb30
SHA1cc36ce055c948be44654c3eb7f080a32c07fd35d
SHA256ac2b4f67679d27fcda51ad24bae554a2c2274ecb6ce70005e46e8b321669784b
SHA51200ece4550ea544b6790f51fb235f1e559ac6a1a13a7840c9681014019a4c84a2f60f18d37080642772ec72733e7c24c2f731bc3f85dc449d712135a2935915c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561706a61d9e77c795098a3c2040ce4a5
SHA1f63a62075b6f724468014c4a5d24f63906d03346
SHA2566e4873a11cef909d9afc7b0ec3d66cd526970feaf1dea30ae2d592af5e328609
SHA5126d5c52d796641dc200ee1a7cc4c1a2dfe43fc23c7dd4e5dfadc35755e742ca62328f1ad2d254943f019e01e11271100699ba22c20663e9f59fffc96d61bdc427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544c08d93a4ed366ecd64598a58947435
SHA1cde48c72ec5538abaeb7ae272b89b872331d7bb3
SHA256192fb4bb842ff05855f0d3cfef80651a5d2f1e7d035760599f0231f44bec9315
SHA512285e83674d78df5c55d945b07e3f2394b4c2c6369e162cdceabcb513736f9c2805c951d58facb0650da46c4d9aab574f180744990a909b1732b92129a5b84972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56e42e4eabe412324ac3a6d5e62c9a793
SHA1272c9379a135598f16fba496ee5e13274356e84a
SHA2564f49ca868f5e508ddace02880535add820211b458ee7a232d872c2a00b820f89
SHA51292b9e305a3b24e4401a86be35ccd91a2526bbaed8f73072a144831c74b751ce0112e6bb849456a820cb37c570bc76c35e89ccf019ce6826b58b43a23ed496c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ac48bf061b58aadacd57847b578f3ca2
SHA17ff2eb6200c829f9a5e0d050a77c521959277d3f
SHA256c572b1f415583b09fc0e4e3ee28a836efae692513a7dae976c149901acf7a192
SHA512b25207760dcc2b06ba02f71e24e5cbc6faeda5e8303c298b86c57d08f7d8eb22ea7986fe6301b5b2055c5f3cdb5c11589554b20f582a2e0eaf3d57f42cc53c08
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BQQODH7V\f[1].txt
Filesize40KB
MD5db5716065dde8ba1647bedc407ccaf86
SHA15834ae306db8801cf9d0f0adaaec45d1c4987846
SHA256176516f5f50a49dd0a1e22eea5613f936fe0aebe7f9b2e5671487f1548ce5734
SHA5129f380f554cb11082b69c35529f628f529768fe1619b754260e38577ce3cdd2a007f6de8c8e9258ab1eb3b524d17a2ae17220968d16c5c931cbce5962a490985b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ROLMKJ86\plusone[1].js
Filesize62KB
MD59ad3205f5f0f66cb45c2f100a08ae92d
SHA1f1508ec579134f528c8edac4bbca7dcf71e3a393
SHA25656bb0f796579a6692add8776a44c2c57a321e78b0fcf7f005fa629bfdb8cce9d
SHA51225bfcd410e493ea6bc72bdf11d309c24f738353d6d8d2e83abbe69cdb56eff744eb2e4410d35ea930d1b8df026daed1ef0555d518e972afe6e41f198dc8225da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b