Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
38a33c54e05178312b4a1ba29df68e29_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38a33c54e05178312b4a1ba29df68e29_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38a33c54e05178312b4a1ba29df68e29_JaffaCakes118.html
-
Size
80KB
-
MD5
38a33c54e05178312b4a1ba29df68e29
-
SHA1
109704922c4e9daf8bd308334236965714580533
-
SHA256
76584176c8831c5003b17e4d5642d99514f8da226dd8e38dc9ccc9417d815084
-
SHA512
be50b6dc728ea5a8dc6f8bed488854fa7d3235d29c216781a563da3f15d9d891943564c76360236fbb6b084ab75fd371fefc0bd6cad02884d1eb38129bb63001
-
SSDEEP
768:UmkbuyAz2o+hSSjMk7zoq70Jh+IMzDg60S7VtMLLDQa:mrhzMG5LIQgyVtMjz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD8662A1-885B-11EF-8D08-FA6F7B731809} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905663b3681cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000003580e5b8011805b6c5f074ca22f34afd8d183afa711bd7a2e2dcc158a160bd5a000000000e80000000020000200000002470eb58831f0931f743ccc52061c3916d21a749c63cdc4d768b2214561c7eab20000000d5fe0132da795eb128102bcf41901e60df5cd91e0c321276c9e1165aa585c6c5400000001fc628639b1c5ea51a5c2b280c6c1cee7764886cc6b5d5288171ee32f73956faf23517e498dbae2b2bc62ca014fb6fd2ebf38bfebcd96d674d779891b5278a3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434873230" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE 1640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1640 2100 iexplore.exe 30 PID 2100 wrote to memory of 1640 2100 iexplore.exe 30 PID 2100 wrote to memory of 1640 2100 iexplore.exe 30 PID 2100 wrote to memory of 1640 2100 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38a33c54e05178312b4a1ba29df68e29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d28281ab1d1ae8ab4e73821f9ff459
SHA117b3ec90a1df3f11d820aa6cd3d5ef3149462f2d
SHA2567c39aa813e4e410942a7876d9d8b317623903149be38b635cf54ce65416c05e3
SHA512cdf8723ca3a96d2c6874d815418c1283db991a598d9bcaf688394ab5a0f11f4c92538ff76b3a89779d2223823b07ba525bb7f67e77f178a415347d3f990c76aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54231b13e97bcc958de9a4921dfaca60d
SHA1b37503b881b47ca59ec22f7f6da026a7840f2a58
SHA256144d397003a43f38033bc436c7f6bde7e33dda57f91a8fc86aa3691ca0dbedea
SHA512348aa95d5e6c7130df12635a21935ae01f0d7f488b7b6b5070a05d373a7c2cc602f8fecf98c5a11bc62446ce8628c3a181754691cfc77de5416ee3fdf3f9d3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a2bd8048e11a27ce9afce4592c6729
SHA16e599f7ba8e07de544362732ac563d44d5a2dc26
SHA256cf26877ec26cea08d2291d0cacf56fa401e40a02468d9bc06cc967416f25daee
SHA5124ebc4918b1c44bd04b46070337d861cfee07f97c64e68e08d8a312c3fd0051cb5aca07c9d80dbab006336588d75c878c4c0a4bd8d1bb039c7c8a6a22fe1014f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d6b617be4d4af29f72fe5b8b19d502
SHA1cf944d8a7e1cffd656f885200d6028889c49fc41
SHA256530bbf5c281e64b1980382a63530043c22fb687440e803269cf6e1b29db5419e
SHA512a949b2fceb246d70ff8a4924d35008bfceb3f8a2b221c55938729368669b40423795a00887798554c12c76e1bf8f141770f0fff0fd7e41935f101b9e78f08171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53176444dfe850dcef9203000090258c5
SHA1a41c18bfd25832d324c7731a8f26f846aaec2a2d
SHA2567a7d5423f906db029bf436bd3d76544b91fdeb84353b468dff7971ecbf07e1f9
SHA512c89191ec6d06084d1b4ef3d9b5c24176f465f2c0dfe95e43360c34303cedd6a9aeddb57e10091af7533f811e9e9c7f099f43855aba4ffcfa0661e0f591c50371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53220e9bc5a0dea32b510bce1032806
SHA126c1b49449359566a5d30f4150330ee6ec7f915d
SHA25615e8aa885e7cf713384dad2f6df01a0bdd28e3ddf9f4e8972e7aaf2902bc8946
SHA512f37c584a166e973968771fcfe37fd1019553764fd02006070321e971e68a1afd9313fba447a986e79ce0ce5f0b9e34554d414976815a4034ac929739779dbcb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c0d69426a3d8edf488d243b74ebd7f
SHA1bb034b84a6aa378ce7df1cd44a5ba63dfab7dfd8
SHA256e0138403575e81363838d6e4476f07de7e8d53ddc974b1fe445a87907f16bc70
SHA51227646e0b2ddcd13ca0e80ed4ac21723c40265511825b29ceb3333d4787c958c39f083a3797e2f9d90babce1b5dacd746961855f7fc81260ba487c52d2064efc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a464132ba40502b55ecbab1ee2d40507
SHA1287b07ca8dc6fc22bf30fdd192c7254f6c28d963
SHA256318ac021a7e2be3d477fd45cc0d6d75ea67b44bc13efa8f8634a7fff55331ae7
SHA5128cd691e228864a6cef08c63a4eaba995b33824ce38c21acdf2b7f5882238cb43c8fc0d7df6c5ea19b35e99e8694e17e4fdc52caec3c3226ee842eab8e9cc1a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b44accff9b9fe14817c37d21a093a3
SHA13bf6e6ccbaf2e1f046d3e51ffc68e145d3e3f903
SHA2563ce3508734bf10b426995ff83fc49cd021d98885440af52001a8f8a08b23431a
SHA512aa697cc83bbb568bd9d7879a1157f2c95213c9d66f42afc7b98e2fb3af090c901feb0c75258e8d91ee9cbeae18a43d83d2a0ed5f4cc90a8c537735622cd405ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8e1e9aab1fcd64371d3783222c53d0
SHA1304c6b93fca5455232731280e14e7a76cc872300
SHA256ecc9b22281b7e1d8216d1fa1d4178336d50de7f4e810af7bcb747ca8074f4e85
SHA5127bb6fede850d211dc59f51341dc54d585f29ce884834c047d6ca23842da3d41e13b993f65c88f3770602230e27cd4c0bc169e2e8aa0ac6ea95aac7e3da8e77fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9474ebec48c0a559f1d992140a22b72
SHA18f14cbe602582f1132a97837ee2eeb1ad5738e78
SHA256ad3ced12dd3871b548da90f58102c53ffc839249a2f4abdfea82febedfab8e90
SHA512ea514e7dca1c3917cbe3e70d743abb543d38d82832ce7b9956dfa295ee2574c020e08a3a27e9a852b1f515d1374abf550d737ba02d2a6f9137f059eca7aede2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a410d40968b761d67d2a4d85e3c73a
SHA1a4b1f664feb7bb34ff4423d2eb135621ad22a613
SHA256c3da7e04b4654369cec25ff23409517e2646604599ccfacc667ed1a86a786079
SHA51209aae74af6f2004cc1f1c9c25bb7348b2d542fba705be424e83f3c9e0219402d33e8f855ff8110f7e5877db659f21e2dc0b55b52cf9c0feb959fbb7e2fb04d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2398e2c6ece0b5f1ac6ee0904fcc3f
SHA1426735149487d02a48a43480249bef69162e4522
SHA256a885f79a066ee13bb172deea6edf90e030153bc02969ab211799e48e2e762d14
SHA51291fc29d2edc6a058529f2b5d2200950da35b08cfce97d09a591894cdfdecde6bfa65d409b515cd7fa2f2dc3246c447b335b4ac92bf4ebe9a6e83d4464ce2f421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c80d7c827d0b2ef039a8ebb1f99021
SHA1f08f83ced3059303f3d901e62f4c30d5a423baac
SHA25654371ef8e8f7a08207d5474e0c852979e0654c28f1ef4ef9613285541421913a
SHA51201c3d73b9599ba650ebee8e43333dcec9dcb8e53027ca9826c8547b149d0a76b7a3cdb0b44fda144397385de250050b79f7f34f6918123ca5a63328fa0be6fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0dd785435ebcb093372397e33ab861
SHA1d0432142c21ee1cca5eb766e60fc18d354b53cb1
SHA256f17ca7d11e94b40f6dcfa692705dc45bc5ca1f6f61cdc94de9789b489228efd7
SHA512bf17b0c6766a1318381c90135d084a4963910da74629bb3321a99e6278d3bd9205cdf48f6d48f2b5737abf88281edf23d1dbb34a13a0f2eecf0e137109b059b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc006ad680560855712f4415b9f7f1df
SHA1317b0707174b50ee973ee3142c36fe10b7688c2b
SHA256ff4f25461adc0ce6d3f701bcf551e7f6bbd8d565287adf46c1cec39526f8a7bf
SHA5121ef2528abf1e348212e184acd6cd15415d8cc581fc19d088c54631e5eef32fcd869ba3dd6a060bda22c6eb52a83205336a71116975f1592f4bd6974a8d7566e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674b70678523d6ea6a1e3cec7ae8844a
SHA14c7c83ca8eb12614ec080cc581e5a1928e101095
SHA256599929f2b13805b05ab1694a78bd8c1ba76284478534701e65c3226b8fe14abb
SHA512687131cbb5bda1ae5f795da97dcbd4373eed1de583f1ee51ed850b96a364518ca28531e1de734992fb0f2b7905a67ab3d79f871963ae3747a9a065cf1d8fc642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58131b418447e586486f2f735df83b9fb
SHA1a4d215a17610dded93767a6c403c3e70c8223fe5
SHA256a54959bced3ee53fa6495328091f44aa2875ce668fe9326b2925976476fe05a2
SHA512f082211dbd16f0944658cfb06b6ddf91e302bb5c23252ec5012276553b7da9bdd0b251a73df9f9a2a230b2244a62830589cc34896153d1b49f54d6766270de73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f626bf924c47e8e55645bed830e618f
SHA189718ad436eab0eec88a65b95c5377280d5b4455
SHA256749f304b4d7de35577917b14ab87d1932abfdc4ebfed4d48fc4e2bab6a4524c8
SHA5126cf94309976e1995c5c71dc48ca69f77835351d554e13547724e822a9d8cf7e20b63c15a4e170db2c88aad655e04bd188461b9fd84f85af437438952b2a2482d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b