Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
38592d3f516aa60a89d84411fa8830f5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38592d3f516aa60a89d84411fa8830f5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38592d3f516aa60a89d84411fa8830f5_JaffaCakes118.html
-
Size
85KB
-
MD5
38592d3f516aa60a89d84411fa8830f5
-
SHA1
fb12f3c51ae0a6424eea37f97def742081566a8f
-
SHA256
69b7195a1e726b8bcef887f88f6692ab3458bf4d7ad2821f1c0f0078b48f2221
-
SHA512
fe0cbbb2cbc831b30750b7151b99ba15f758ae82f098110ecc451eca9a0c010887b3ffc49e8d3ef9135d5eca34ff358b482259cc7c71d8fe1c5e80acf7fb5beb
-
SSDEEP
1536:8XkQj3vB1zJzCHM5BoC8DSvhCwhJiTCmKWLu+mCjP1uJCYibziClM0+boC1j6wsb:8foaFw19
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000087a205c30c18594d9ffc20e8a8dd5139000000000200000000001066000000010000200000004e0365c00c9cf734053b01eac058da8bce9bc6bbee2e6f99a275822a7b2bd8ac000000000e8000000002000020000000cb16c628a0413315d55797d1584d2dddb2f2d724fce40a98285c20627c9f2912200000004fcf833f1950d9fb5c54b117728aefaaafb13d42c660f50f212029015f77bee3400000003a593fd4e600a32aff7826d8fa247056d68f681d6a1658cbd5f14d4d995db91387a48e57964138c53660fdd0fde01364236bab9e9122d7d0b14b832936f2cf4a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2034e3aa5b1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434867640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D61E18D1-884E-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2772 2432 iexplore.exe 30 PID 2432 wrote to memory of 2772 2432 iexplore.exe 30 PID 2432 wrote to memory of 2772 2432 iexplore.exe 30 PID 2432 wrote to memory of 2772 2432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38592d3f516aa60a89d84411fa8830f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df46c6f0972c6b70fb7b411766ae0af
SHA1b49dbc87171cb0d38229332f58ab4bbc66d2a985
SHA2562c86b07a2dc6a87fcc44315ec395937b64b20c9ddcb64413500627b0d7d4d250
SHA512af290c12903211b9fc94f8dbb02af96ffd01bb3e5126eecaf1817c8f69eec365ec927dac2f8cfd3f60c90571c73688bbd56a6015e6251210596f6e82f98b9d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8da479ac66e81eb33d480b8c6ad48d7
SHA1910a9eb37479e4fa6f1c0b864991fa51a79e2616
SHA2569eb1301eeb79f8175a2779d7dab0e75200d4b89015f829236959a9e7302df583
SHA51298c5a7ec32568074360b18b3b0f10cad0b278ba87c075fdb8363955c15bb5e32989381131fe3b58c03617a887329aa743dd01db46bc545f199665cbaf8832d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568673c8cb63c4c2cfebae6de6f8b85ef
SHA1343a4ec7380f98a35c1a7a431fa192abe1399cf8
SHA2565bd43ad27a44fb0231a0bd803c729eeb44c63c00febc5fb637c16d50c8d61a7f
SHA5126c7bde7848689a39ded700ff6381b8d83e8dca36c4d4ab179b4a1e69508e92672fab7580f92765e0a5a63b91e6d740444154434ad99fefb1c20f58b5c41bea6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7ab14ba4d0914ebf283520e368138c
SHA1849baac2e1ed733433d40467aaf60ebd203cd493
SHA2561872dbfb42986dabd217ab34ee073bb0299911a3800186980d9df22021001da7
SHA5126ff806f75f07a8f76a04484844d0ba36c01460b77f25c825d32467ebd858078f8667f281039194abe318cff366776dbf4c4d22332a2cc7f08ad1f4e459ec4a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59848ebb0d3ee8f5d03110ec4f4fea6ca
SHA1c741ed43efef773ba3c3a6cb611b2ff08fd2e89a
SHA256fe262126667b4a787c0edbcf9cf0f87f5f51d5b531f076c21bfee1978a5f0670
SHA51293a091d8189514e8be1b9f3d89141953075b201f9cff6ed8d18278c5c5da3606be2411d87817c52a02f8539d89d144363db602e1224828f2ad71b1f74ae83e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f50b4b86f5b57c695390830ceec5130
SHA1fbd12ce3e927ee4eb64d84c4bb4fe8038e9606a3
SHA256d9deca407b0fdbd22e6af472b5c0cd1eec6707212fd326cf4f81e939adfab708
SHA5127d00f20f082bb65d299cb641ed4c89a36f9bb56a937f14e43ead61a1c6db2a4da7fb6952d3a89ed082c8a344bb7ffb959e917e0387ed5db88d2e87cba9c77f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c33cc69c63628f7aab2540d161b011
SHA1a7712f88877ae4a6e1bbb9d3139e57fad507d93f
SHA256ef447d0410ef18fcca7610f8fff6cb934b78860d6b56e05f96ff8cc6fd4b0c20
SHA5123d5bccb07ed65a31137bbd74243b1cb1853d7167628e822586a53158869cfc52fa4135db0d8e3d0f601b0882e0f019ad95e71fc963a5f23bdeb8d4dcfec6aab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e15530d5c3b56092c5e27a83cca5679
SHA17cc51ce62d9c538a88f6975cc89a429afe9e63ba
SHA25600062542850c316df83ba89b96ed4b506db30f93381fd0a100a03b33e9423c5a
SHA512f669b5de43ec7523afac7c829263e163db33aa6ebbd7b92f61736ce719ba1310b28f8a3ab2bdd3725de5b9af52802c7eafe6504de0445646733b15513c07223f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e91724af8e8e4438c6d89b2d17d660
SHA1cd969ed5d4a9b3f3dfe71185886370c03f168c2e
SHA256a9f54849cc8858a2a62d5395d799354a851223aac70621b31bcdcecb6039f1c5
SHA512486aa3eed34649e1a0cbe090bb45a335102766b4930d803b4c5f6406946d97b5bf43ef95ce64dd940c9f7d619ec43f763062d52c6770cfe33396d1f35daf24e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e820c6042b930fa9ee843dc00215f34
SHA1aab69b05848f7660270977c8ab2c852a0f6b0063
SHA25677044eaed8121fd7ebc94e34e772d6e1f15028c3ca77f8e8c518a17de2cc23e5
SHA51268fa658fac4829d5072612b346dbae09a001f597c519ae20af608fe6afc574f9f2779f203ada771e7f6cc13f03f1a4366c57f6890f4942a827737e6d45369722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3841b4047143736938c2160abfe170
SHA191e0db970645c1cef3efe6f0e2f3b63b156e4923
SHA256e80629f67abbdf811eefb904e1f64e3db4f872b218c9ce0550fab75df29f443a
SHA512d151d224f0dd3ecbd8ff27f991108c6d94b8327ec5eb43ccb66d698af539865ce8507cc8c08a2302d28c9306dc658b2be2c47435b44463a25749642e4e273535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56637a7ee3cbf8ad91b56fb7216258487
SHA18d5850b7f359f1557ada39cd175414f96db87d2c
SHA256e2594fa1952a4afefceb46b8b41a7e0927708a2cac1ac20cf339fe8c8c2c98bf
SHA512fc914679b35d995fddbe3f0fd50357d13e775d5b6cafa50337618b619ada4b853b4b4422c8552a7b1500c27456e03270e0d119544cc4e3b8898133da2173d9e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582742ee2272e8df6e91614a63b37f6ee
SHA17ba6cd595300b408347ad6521d23105ae83658f2
SHA2566417aed448f7cbe992dfbf75893d1ba9e5ead543c122046db5c3d2185bcda717
SHA512700515cf30b5a15eb1f1da80051a38d2913d6ce814c5af2e0fcdebc310251881cda6b077b8a81b3f08227319aae3401cd3e248b70be161a99ad8e0d91c771a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036c38dc8f21f2fcd969091644dc8913
SHA11f4429eca1a66c0878c8688490a780c20dbbc8ea
SHA2561bbe17fd851416042af0c1b92286a5b1dc520a61f33de5f205d1a309dc1e776c
SHA51260a354dbcdb9ac2d12b29fb69af083212c2ece5ce95e5f836b1cf6ab8214f279a7dc5dcab952ebcaa3af4181dd8e90e6054359042759807fe51b943a16d76781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55399c7fa782a93b6461fdcde5652abaf
SHA19c2a0a3814fcd0f1e84ee8f69304ad035f5aa4af
SHA256f201bb7d705b3829dc863736dfee662b88841a9be21a3668fb11fb218d8c3ea3
SHA51286c67f977d1624e06fce96f8c8ec612c7fbf72ac5330c67584330f929636b52c1e989303ebf7a0480738d933e28ea099b0dddf2b3d78603fed16d0eff6929fec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276c1dfa566af8c89b94fee11fe0e62e
SHA1150b1d2cafa8cd1ad71526ed45298b8107866181
SHA256c99845778c48d3a75b3faab99e8a6c095f208f7382615af89ae01eb187d3273e
SHA51276d8a54bdd39520ef7c51a87a26a1bb8aec584c19099b2a4c8bc7f48dcf7e81b13ed4be7cf6686287b81f069b9a6a68c7d52b8140aa7d8a03e960472077e9ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517814df9995340491048c13d0d66f1a9
SHA181b01990c32d44c4946531847ff2ad52b1b48bd6
SHA25624132871616251863f855abf199bc7a28f02e414ade10dd20e0e13f4d5731825
SHA512ee3b6caefece4378df97e11ea42fe01ccb8308be5403a8d18b41db3eb83c9fa863d4e60c264358c300a33ba01c8e3cdcf2d195346a1a4c22da541e4b88d2f872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6855e99cee00553ce7c3ac69f4497ad
SHA114f8c346581577251ac50596e831879712db0662
SHA25690fc9f6ae6a8a457ea8c1cfbbeb1a0c7e628c22bd2cca316e49521087b7416bd
SHA512447f974743c0668aef5a49c6096cf8086f490c6e34937b4c4d39baaafb6a9b6000e8e02b72a7627907818e377698d30dc9fdd72706fb542eb4d8ac3a48792336
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b