Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
38877a00bb57e33a8f88c84ab500f11a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38877a00bb57e33a8f88c84ab500f11a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38877a00bb57e33a8f88c84ab500f11a_JaffaCakes118.html
-
Size
21KB
-
MD5
38877a00bb57e33a8f88c84ab500f11a
-
SHA1
0cc4a7350f334b81aac604f79668a2b2d990e29f
-
SHA256
3c490f517b8e15cc1fac39045bdfe16d085bed18cb707b27bac2df861b4c61a9
-
SHA512
ba16c78e0066569701c6f21d7e9215f0fb316fc7421a3d85045d5371f146b1ec140f92bda568a8ba9c67030a7799493ea903f5fdca607fc6ed750c1b869429aa
-
SSDEEP
384:DYd6Ph0owxaXwzxxEiuUAQXw1nIxxEiuUntAXwLoXwsYk1Xu04xrKM0dewwBk:DYd6Ph0owx1PE+ATiE+ntjLrsYk1XuD4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d568355e6b114b77cb1f5e311677377c6b9808cc1382d65d9281e0233766e777000000000e80000000020000200000004504a8ed1d8e757f47007e3beb69a7f0804fbba628487ccd65176b7027eb937020000000e5bf1479bc0cc627ed49b5b0fa417f796d299b16940f3ae0e0c29bf8ce8abb444000000056245261cc328f79e0c30efdedf9ae6117364fbc3bfff4278a1361d215df4edf195bebd21d69356547d1be27c6396d947a776bda4f4964d321d632eced4fe609 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434871405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 208cec77641cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9EFA8831-8857-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 452 IEXPLORE.EXE 452 IEXPLORE.EXE 452 IEXPLORE.EXE 452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 452 1328 iexplore.exe 30 PID 1328 wrote to memory of 452 1328 iexplore.exe 30 PID 1328 wrote to memory of 452 1328 iexplore.exe 30 PID 1328 wrote to memory of 452 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38877a00bb57e33a8f88c84ab500f11a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb33736aca89299d0cb709ccd96fe6c
SHA12762dbea045d32746f4db802b643d023d8f5d444
SHA256feaae283db9dbc21789388558c3095d470e58885084a9ef9f0c6b06f74b9a10b
SHA5129517c86fe65193b9721ac4ec2f3819c5e343b7d5630b7d3f4c6be85f23ceaee025171c62acf77b91d93080f07ea2e693bda92643edd32e35fa0a36809bd33bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158137ccae9d25c47bbacb14a1ab275f
SHA1fb161916ff3466921c2b6851f3f4a739292a2f8f
SHA256129f6ab673f925c5b5b2950aaf21aef31bd323c906495c97476f688e82715234
SHA51248d886e99caccc581012bac90fc87f932b273399e5751e9a70aa2518ab77eb916f705fdc988ec28467d151249e48fbc2507940ecde080780d505049584d4be16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916947710b3a58ede66444a055da2301
SHA14bddbf6cf2c1b50c7201f76da2d7f3202f5413eb
SHA2567dc557763b95d41e2d8608767938d22eb7118b051af21695a83494ee35cd480e
SHA512da36890b3d2437d6260d178eabbd2f1e0fbb8b8b9617a8e203f1d9183a73690db2ebc65a4ba0d0c6abe1e34977ecfb19b8855ce164a99377bd2850ee07f4c32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ada0fe757fcae07fcda113271eb4aa1
SHA197f9e76f98d191111bb3d962f149c84fd70d8b02
SHA2566b5cfbe6ac8c9d09694963cbd91ef5bc2936abb20b11f1c061b3067bfe3b9fb2
SHA51294c0952d69a7488a71fce3e6abcf5444e6b6ff57c4eab6172074ec141852a9be78ca4fcb0e244f35db6c19a2c4497d79414c604ce9f8eeb0b5f8d6a2b7e0878e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a34f2d448a96ff97309a57335f12152
SHA12dd5b7417089c4cce0ef5108f3b7d6d735b9d2dd
SHA2565e71ad3498f0c6f26858b850267f8f22584c29cf839e7bc0168f6bf1a55c1460
SHA512852bc07f92febc274201017c591cf783ce134c3d8b3adf13d1d426017142cacb56d6c58bec18948fafa648a273895b5cda011259266835c1303ebff00e4e1c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aa88b59a4613ce9b0f1cbf0c1d2bd1
SHA1aaa64b59fc6f2ec5b69ec062c0acc677355cc704
SHA256a3d01eb09ce9dc6995c3c3bfa931f47e52f7a77928230f8b47edd955026724c4
SHA5128567f4362505ab8cb131b5048440efe52b44a722b4640e33ebbd6112bbe52b4ee011b885f836be7efc4553d2e4e7bc14d724eca01e393ac39578b27aa04a5559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b178dbfee06496a729f125f90eb18b
SHA1c37312939bc158d1885bf55cc2bee30ec205178d
SHA2563c261470c33996a4e1ff117d671399199ddfb0c9bd9ed89a9b6f2c651828545a
SHA512173eced8a6a105b1944bd284d422b8a120de79ce9e22c0f5ffbe0fb9e75d1093e5e8949eef1a58878075ddc3928b695b1e3141b330ec0ae1b1dcc366220b6a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a679c3a5c071fbac4efef183c2506f5f
SHA13aebeddb9124b4ef8be8836c16b596b4dfab92a2
SHA256d293c294ee21d4137e41614e80a694ad66cae1027a943746d385c50817e7545b
SHA51286cda1ee068e1cc21fb4fe6797182476bfaa84b05527daff23a1cb6c989383802d82e3df1d9102f5e66982981e39529a3f1b801c66c3a15ab03eca1022075fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac955e93c7066802dd051a6b05330dc
SHA1acfe4fb78d9fd62a80763723c10f807f043faac5
SHA2563d9a3167ff1705298238faf06a799bd01a8ff50390289db9b88e817f007a0feb
SHA5120e60633a7431985f53725b32eb87b6c0c7658380fe41937e1cd4a40adeea55bbe8f34f4db45a1e93c12e1b949ad4f709f2be12ae4ffec345efe1bc4e1f57d7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eaeef5c7489e78a407c6e1aa923154b
SHA18562e239e36bf6ffa9f52db63f0b500ff55df3e3
SHA256f0331d656e54b2e4606c38a1808fb394b545f18675f99c3e4d37addb52009732
SHA5125f34a83c5f89cfa90e0ae3a31b6173da9a314e972e500e6f9a6d2335f9597c51f8d5ddf4033e30f14a8f340f91e572d72468846f8f28ab20d6a131c59c61a72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2d769fbf903775c5c2fda88dc4aee6
SHA19c5d6719fed2f0c0b3edaa901351cabea77376fd
SHA256580e0a29348f31d27b6570e76218d26ced58a5f03635a604674a06e39bcd8d49
SHA5128490b118fe8c02da9212198740dd2037341501747eb032d553fca510b41d22f9e319e650dc7a432360cdd35f4684231eeadea900bf7c92790758657ce42978d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6e20aa91e9486c08a5a5a1f9b4f013f
SHA17642e2b589ba33fc9d02524250b1dacd847a8709
SHA256b878963a1db30037bbb3f1c44e45b072760ca8ef259e503e4b4a5ddc6c60d89d
SHA51262f9e22632d830b08e4e8aafda5da07af6b8b1199c822f682a4b0898ee61aefe9340d322d464cd4338e0f7d2a184b79f924d1f399e16dd9c76e82cbb49e2725e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f399afe3e335f2eea679b185e983781
SHA1a94e8d6268fbfa52a6fb5e741bf5ccdb89826f93
SHA2561afc5ea67aa98bf43bc8c0a2ba7acc69610011ad31f0433c4096eae981e8fba1
SHA5125e43c938122a9d58e318f4c04edc43533561e127d1631c6835490c7fc6113db8f2e6a483fe1ab867ee3797a233ab3b699a7dcfa803f33b5dea4e44abdadef469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0ae128b34c5cb14d7fefbd75c27c200
SHA13149483337283e1b7623c5dafc327de0857d6185
SHA256fdcd0db8b9eeb191f6d76407a72b819198f6a993ebd66c825be5ea77091fb6eb
SHA51236de012f9ab1c24b8b023d6465a7f0971ae39547db49ab5716a3105a4f341df351173933e1bbaf26403643293eaf34bb67e2ab8f2822ed28fb09a5ea5e28dddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa938d25f48c39f301429dbb5d9e868e
SHA12cc4a74516a47ddd0f0ad93ff79da33ad10a2a33
SHA2564e4b3b09e09b927283ff51990d8a10a9382b71118caa779856d1f486f438b937
SHA512475cfb718193469d041e27443ac1b9d34d244eee38fb439d8dbfc591e6a2b43ec5b485ab61c661ab692a13bddbc53d561b24bf6c1f4538bb65ae125bee1ed5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8992f33a7127c2112f0b465df449ce1
SHA1e449d8a498411ab283e7d1fb765bf21e3e0f5a71
SHA2565876d838ea4a3db1c4be4baa43a24c7f9069f3409d30a32c1fa7e6782fe3d2df
SHA512526bf4d6fb2e619eb551b97ce92765afee80bae986ad6ec5c490fe037cf3c181765bc7ed2a4fb6e0ef94fb504fa755c2d17e039af100d291f3d7cd08d3c2093c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536bcce524e99174c1e503beca920377a
SHA1dee94dcfb74b640a22d916ed7c43f020576c816e
SHA2564facc6806a7281cc65b54c4083d421d9f09fb1aecbc1dae1d00ace6cd12ba9ce
SHA5123b0055c38576f793d8e6fd492d95a0fe0ee47647dcac00fdb0c76a23def2ee2561bbd5900d9d35328e068b135957f4366f322354367e49caf9ba064ad5547ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51937a9d707feabc68f45e2cf63e5b519
SHA1a31dd0b66b2afc8fe0386cbe1b780d2581f437bd
SHA256afbc50a22040d4c2f2f261fef4ebbd9d3e705099e20e5c1dc89af6b21a8867f5
SHA512c43ddea2922099062f100484aafde8fa7886c32f6e9ebcb52a1c03ad57ab07d047d7fa25db0619dfc3912386f7586ca6e735e28fd6020e430fd7a00ff786e6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a2846567b84c9c99d3207bb34b0f7d
SHA1df0089cdb14f512da1ffd3a99ff1246be7b44f0b
SHA256e7fcb09747d3bfa47966e75c3d6a69696cee9dfd60f505b871b0b74a52cd77a3
SHA512d9a11b2bff057a81f1b550cfafd02e6bdf908649094a01a98ac2181d875783356fcc17b4a60fe9506ef680f0f29b3ca481ee4e607ab5659ef61fa94ab5ddb107
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b