Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
38cdf206db86c4533cef62a7aa619ce4_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38cdf206db86c4533cef62a7aa619ce4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38cdf206db86c4533cef62a7aa619ce4_JaffaCakes118.html
-
Size
6KB
-
MD5
38cdf206db86c4533cef62a7aa619ce4
-
SHA1
74d10f344bb74499436bc7d88e3565ac38daf6ae
-
SHA256
9b1e6f64a8ce962cb0e02355807f85be8866ae4cfdc37fb97d9c5a1fce924ccf
-
SHA512
07ab25926ec6448556413e72086539ee4b647324a25194ea681e6b1b82033bdfaf4276b3556eac7ec9ac4312960a580916f34ae5330503f28c9ed870586992ec
-
SSDEEP
96:uzVs+ux7cmLLY1k9o84d12ef7CSTUER/6/NcEZ7ru7f:csz7cmAYS/P4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{278E4331-8862-11EF-962F-CA3CF52169FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000006e0a4f65fc737111a6a5f9795f209489558e6b433a93ce37f93536355675c798000000000e80000000020000200000008fb4a003c8e5be5714152239e514dba30bf68ae3523842fd03dac23cbfdffa3520000000fa0adcab280152ab8eaf9fe2b4e77319fe46b4ed999cb0eabd1d8363b9e84a9a400000009868012a16a480b2bed7fb382025d9ea92b925e951186fa660173f72bb7466993e612af5d87ef54cce3c925e161d3bc0c8e71b023ecede86b8c2e34fa601b348 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d015b4166f1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434875930" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1992 2328 iexplore.exe 31 PID 2328 wrote to memory of 1992 2328 iexplore.exe 31 PID 2328 wrote to memory of 1992 2328 iexplore.exe 31 PID 2328 wrote to memory of 1992 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38cdf206db86c4533cef62a7aa619ce4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d387026c94a6dc349f1e7e2ca67954b1
SHA1e4e8d6b1fceb51c6c66a9ce429c424dd31df151e
SHA256605df9fb08f846acf32d5d69dbc0c728e2609d46e8bc0a6ff74940a34e019267
SHA512ff80a2fe40ab25271f8bf98c27835d4a00ad589b19585856374b928ab51d1b505fa0c5026bbfd3c4c148af6616230b71196a3ac3a74605f60930dd6320f374a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fee035e91d930c6f095c5eec4778d94
SHA1d0ed36caf94599a234d2b2a12daedb0c0ec21406
SHA2561cd204e2d3c185b9eb137f1fad31e7d846110789c5e006cd4298cc97dd3b8bfb
SHA512b85fa7f0e6b3e8e866af7b370ea6c5a079f9b1a2436b904b0a0ff0ecd9a2ff66111aaf65d4fa17a349859114e59371bd8f532acd1ec32d8c999d534f44633a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c50e4e177575b9248b50ba63c1cff27
SHA1db2876ac897591c13b8a943845564a1cce036c00
SHA256a29009c14e80c971c15b512578d14b857bfc2c49f4543bdc45094694bea99a12
SHA5123b8dbe9ce200cfbb4410e9b749a88bc9f0f9e10db1be7f86835bf806edbb47cf89bc20793990184e761dfd2e2d476b5fe68b0695143b13dbcfcaf57aead8e8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eea68e966d245afa987c26491a4d72c
SHA192e19b5e090a4c916578dbce09a1a802008bb3b2
SHA256aced1415e5723d63983799b5238907965f89a5e5bd9d7ad89e21240c99255309
SHA51272b09dfc473c3389ee734693674e25df10d184aa580ad569bac58bb0b2b652b20596ef6485ff49d2d21acfc0051bff2c10ffa6fd66107abaa14c6ce2e35c9691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2cb960a4e47d6696004adb98c48e957
SHA14f474379f0fb5c5352baf8ef31c1a37921b2ab8e
SHA256cd4844add2c419be1c00cb277a2539627ce1aea24c79b9e821dc0b5d7364aeed
SHA512a484f4cf41c9d17be281579c8c0b14b5c3a988752ecc7c139b19df1a720dc644acea0e420025d48dff90d21f34737780ede216c1eed410495a46b69ff06e40e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0c499bb264ee6e8c9caa16d728fdbd
SHA1f597ed36468af26dc176f3b5987c5b3347d43ccc
SHA256fe420bd8b38275175a0b62b9b650fb59187b7bce2afea5e54e4a320a9d43bcd3
SHA5123f97c7424d71bdbf235d22e590703108dba94fe0fa3c2f72eeb441e8bc85584a95aaf62533f597d651634621224dc3f9ff1e24369add80b9dcba7db33fe4a261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618a8a00c70bb20bac2b12d4f595ff96
SHA1d22a06bdd4131333ea512f1917fea31904dd7d4e
SHA256838739269c1f6400d583c1570a0d3285268c559b14ba70139700e3446a7692b7
SHA5129e86192458a7df0771278905554b623fddb902598d73dc496e38563143a57f62eb02cbcef67188c4e25c2f899ecc2edc86d35ce36cf8e07009d4561ada7893fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c89e5223455e1a0cc0e9807a5c6970
SHA1854dcf58edc99bb98f737bcd88548396d94779ea
SHA256c23f54030ef93f89172bb897a39b4f27632f2caef6419cda14a099846c325bff
SHA51291d73e30e5584475409d7ac26ad61b2d2fb595548d7e3d3f29dc1362ae2feea72b05b32c8819c181604e009819937bcdb62ad5bb542e4b7b69674998c9205b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2f3644d360029c9fd7ad9f07c15b90
SHA17782cd2d6530fbb52933bfe3f8a4fd98fb0e02f9
SHA256986a4f66725486c2b96081222f463276c1da8f18344dff00612163cc19bb1968
SHA512534329e33ac40e5924bf22c4b59c1be74de274d4b397acf72f625f589e8655a50c0af7317e9d4d1edf61ce3fb54fedc4afc50ab734aac25fabb4e1f58adf2acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b195f4a7bddfedd0ebf0bd24aadcd1e0
SHA1d49fddf705b4df7673eba0f667ff02a444719d68
SHA256ff8a11fdc1484f235c607b21165a8b0b84e00e5f1f3b686993658cf6006c580a
SHA5127a2f7dc2edbfea3ded8baab7c106d65ac3c51de2cc653d1bfc03da9f19fb5d989b719ef1267bac598488b372b02195526d16b260970794a0c7493bdf77138aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd0a86d8ac834864fadb22f0b80fe7a5
SHA12277db3a3ea1bff1828973623ab927204a534e39
SHA256c98fae99feb5c2f2c66338d1d152960a2b6fc9d20da62e2fb4185de0c658c89f
SHA512753c4a2f15e1899e658654059f0f4b41a0bfa5bb5ba7bb890bcb681c95abf90138ed98491a5565705eeb592dba04749a72ca2a9f22073cbb25a5114a40044798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ecf108b14d2d613b1bec1be1618f50
SHA1835de4b09d5c932d8884cfbe9231e3318e51d94f
SHA2561280dda848e816dabd7a25a9adbbc6b7d1cb3b19c30e87ea7fb19a66e42df1b5
SHA5128ff31993596540ed678fd57a848db777130795889189cfd849d1a411428316c6580db77c704f8e2143f455a365ba5bf279099f42e5e4933ed532a058c1fc4ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50413e552e4ee3801ba6e56a576c807e0
SHA14865d007a76e511ce777dd9977e398bda91e6783
SHA2564172783bf83a1123a963f0b7a0371ca51ff8a36d8d9d78df9c8aaf335aea128d
SHA5125065c4aa7aa30949dbc9ff8fa30efea67cae26bac203f10beeffd5692b4556120f922cd6de7e675819a57d5ae7a1508f89c0bdf3d1a1cf876770ded9748913c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6938c4e894193183c80bb887370acaa
SHA14835e45b4b6f9834aed0404377f8eb0f7612dac4
SHA256a9d79ce97c17250391318d6cf7ad736c36eb186fb2623503129db953e9c29488
SHA51289cb55cce37f0dd407ad232fe5210615dec886c9c5c4cddc3b743978f572eea9ba6b58384cb72d6e9be099fe9d2b1fe71f9be45091a0117f1a6145d7d58459d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55752f3bb72921a83023a3307c1448f3a
SHA1f332a659ceaafa2bacafb174332f46f7a77b8331
SHA256207bcfb8f90b77e680af0d8c0935175487669ce71dd8a934b513ed9d4c11275d
SHA512643fafa1a6e8a9fb87e883d047230928729b594a2e3977ec1879c97dfe076f013b0564b7169dbe6a68f144572532ffde52768188decce137c1e0a484b6f6ecea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90b2b243dac38f07e72a1ae17bf2131
SHA15b51f319078119963cf7f05816c1b027f958b4a2
SHA256589d457d0559ee75fba4b255d4b8cdc8d630ead362d65d9dd41527e214a19465
SHA51299eb540e94812210a489a55e6747a4b0b1afc4607ac86a479bcedeea59fa7caf3bb520a8378ca8c384d534e361be2b954cd7e1eb55ea2f1809556c42bc504d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc518cce8a3e09b4a881042b8799ed2a
SHA1d17cc0df8b7cb5975c9a1d219c657473d929e825
SHA256d900da12a0eab8f5fb9ec02412e3781ed9ad3d7827e8be8c635f74888e8bd4b1
SHA512195057a0b6a35a1cb64249fd2b6f7bd442423f640b8abcac534d24fb2361f3130f5af60bfe7c10d3c07ec27b0fb910c511a343c4f385344883845d6d08f8ea1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed89fe6be0fac617101ac2f0ac8d03fc
SHA15f1868e8cc37c3e984157dc4d994723cd99a281e
SHA2566b5cb3c22d50b6cc1cf701aa7dcdfc7de208ac511a2819cc15e68290b0c5e438
SHA5124f85bb30c2bdbb2ea1cec4d7544e33cca10ceea49a5f6d8cf7fbfc0dad8baa7d4ef1bfd64110201a26dcf11740bfb5df18379e71688a9bf5ba879ba6935277af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313df6b7a3787f49abf467628b2b10e2
SHA1c84082e2e8b563eac8bb9171cb4e7ce8436e0c23
SHA256affa0a00f703500271a5aa0466d8c7e669df7c69eaed22d44801e3d4dc2751b9
SHA512271602a1a694bc16c7b83456c83badeb33d1df87ee4d09665b54a456fbd86c0f30b1f4015a49d264d597e06c8c5338c2c858e7b55b4e534257eb7c17b39659a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b