Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
38b3aea5393b10efd9a026f52e669da5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38b3aea5393b10efd9a026f52e669da5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38b3aea5393b10efd9a026f52e669da5_JaffaCakes118.html
-
Size
25KB
-
MD5
38b3aea5393b10efd9a026f52e669da5
-
SHA1
a85d2d497cafb55601bbe5b7102b1bb3b5cf07d3
-
SHA256
b3c4d3f39638078a7f129b1833570fff2a67aa52130cfac0fa1d7ccc1b119e1e
-
SHA512
8d97003c1bc342260bacc97c615495928cd99c42c4a83d47892d293e18aa7ebb6d53639470a2a5e831a8a2d092daf651b694e938c301f231a5b9d5f5f7890da4
-
SSDEEP
768:kmcSTF8PZ08/+x+O+W+Y+9+K+y+i+H+s+H+R:kmjTF8PkwNVX0RZJeTeR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434874206" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24827ED1-885E-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000522c52fadbf49a08491db31c8c8cd143e4865c6718ef87d5f1c7a8108a24e35c000000000e8000000002000020000000c9490025651e170624e2ab6cdb0c624b5c2d8c56e0cf875cf3686af80299ab852000000081f51afcfe5927d5dcf8b7281f3b7dfbd40d7512d288db3b4e3f5e35425fad78400000007ccc29416571812e26338d95141eebc6f94e606f3009556bef5745f5284f64f204e256d1c7c0f3f15297488e133cda17e30165e468a55e8d1515cd031eb0d8e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d9c8136b1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2264 2072 iexplore.exe 30 PID 2072 wrote to memory of 2264 2072 iexplore.exe 30 PID 2072 wrote to memory of 2264 2072 iexplore.exe 30 PID 2072 wrote to memory of 2264 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38b3aea5393b10efd9a026f52e669da5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef6af063e9a6f1ef747f223e54dcd59
SHA10b0a14d5c295f5592366591b2375ef1f05a529b3
SHA2560de2c22781757a2e4de3f5d415832855682756dd7e7957308fcfbe3c93337c63
SHA5123373bd71f03a52e7e1851d91de95c38d60ca892f793c216b7de6b626f9a4399cff32145aa2e416005aabf3cc314c125094f178dca04456f6e863f7cb50829943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ff75c25e50a7a6468508c8c79bf3d64
SHA1c1bddcfa85a8ee8e4f341a602b7b065ff8f7ae01
SHA2561e7976fae9ddabd5cf9a7cab2a8a220d6a1342b081861612b36f10310e27bded
SHA5126c672b2b8a3516acbe977af87bb56c96ab4be4ea812fabae84a1570fa2eae88c16dc09e6881d3afdf000988d568bac4dd255b7f8b75d19fd50a3d69ab0177644
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd8f230e157326ab9254e848a73ecd9
SHA138ec4434a7c07ad765d3e8c7bb6f73a774d080ec
SHA256ba0b02ac1caf86b7b9a5fb62c8e1ebdac6d5162e6f55a6a3b6f98d9bba3d65ad
SHA512eb31fb754a195ea3c6213018f3482e530dc804e3d181a8ccda4069e90d933780ad1b8f2e9bb9525c6749cdee262507db54cd35288445c7f494276d349658c735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd0d3e68ab9eb638428552a2fa999fb
SHA117410ca4b22ce59ae39bfd823ec136ee312fc16f
SHA2566966960277169ae5230319882e5145b027201f5bc0678a24d3fcb630c764a6f8
SHA51262b1076090a56183feabe1962db2e2795e6e1f25e3cb2566d079606c44ed879061a121f697d62be691c628d047aa143b495bae0e3b3467c19146d1e4c01ddf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d003719c2d2cc27682def42784e30d03
SHA15d399abe3db926715d37e4be1fca4c1eb5536181
SHA25601e06d3ce59bbe0d2fdde46dc6ab1f433d70b4235aebcf3b10f87ab7f6e13398
SHA51263014a4980838b7ee6b9f3c3ea68b05df6804bc599188839a31fad21788811780061e6ce4c4e2976acb25973053936bfbd9d9519ef79b9fe3e2943bd28c2e1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea551e6f21d896fa8a7dda84dece8dfb
SHA1215cf8ef0b9f44c68edbee142eaf1bc46853ce27
SHA256b64847af81db55a9f13ef71c0f547db496fcd9407f115057404d693270247a95
SHA5122a7640313e4a877e45750a4df814e0d134ee3b0af8d92f5fc4babe8650c1f1e978c8d55a31a7e9467b83c9db9afe03f3c2d06b9ebd9ad12db68ae4e37e3875ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5420148e09335351680def290fd7be6
SHA1b49e82ec002b8ec79186d73f58442830d20e3b3a
SHA2568f9ec32be8b5a52b32e813b1e62896c016bb252195ebee661c57d00fe4b85aed
SHA5123aa55d50e811433d3f3fb4d58557fc094dc7c003023a93f53035330f018e3b3614ec1e836b0fd04d8f699fa6fe70c3d1e619c87ed6c465c2e10eba321030f73e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c15837a130986af682383267a4f0a3d0
SHA1cbd78d447c286b9675f3c7aa11409df9cbe00b2d
SHA256cb880ded76b58b664098d1ce6432369ad76a532732e1fc46114946cb3503ffd2
SHA512f88d2826db10d2c940b7db194271fb8e30a5d7ff33be2d41627a4280df591cc9ed147d58457ed71a34d5eb2c7b47840841b9461d9566e0e644ec89ad2163f3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757ccb8edc0499d9e11c1d43df6ccfa4
SHA1457a81a8ed19517f7e8e5988bd5131373e453a52
SHA2566574f35b75cb039af8e646d9dcb37d1310db61213518937019562fe1c386a038
SHA5120470ea8312f0fbb0ca07959038a90f30d3f66157e845cf1a8b280fdc0dbb60118f3d18501697887d60f010ed04d54716b56d4ade1a7222c93da51536064b5f09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b42f1cf64f2e437f39fcfe177a6887
SHA16b85d80429bc5d5cf3517f9bda703f462294efd7
SHA256958873cedb9aaa348ed0366e85dd0f40b4dfd0974698255e22be2ecbd7d6fbc6
SHA512136290ff7e0efbc1c3227fe806bd66e53938be419ae026ca349f3e69e9b0ec441255f79ae56c561f63e99edb11e89149559959e99b201a14ed99a83ce6c1403e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa2d8323e8b38d46f7796af9e1e1bab
SHA1a7266a9087b70e7c72d9883b35a5decb9398ea89
SHA25645002c9d21a5d7aa7bf9ee60703f8a368e0e80b4c148909cf73a947cc0324f92
SHA5120495ca4050ba4d0be8d32be8960a0a16aaee9c8611481b38ef2f50be72ab09f77104b5e7b83f1b525bc1a7370cc68864c39b0dc85c9512015999dc375579f65e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b90cafbcc53a34f1b3838bf10050cb3
SHA1e21fa119b45e8bac905aafebc730f3bf5f7bb3d3
SHA256fbc5491d589911e56b1376b79b89ebc60cc9b1b68935829fa7aa3c5285baca9f
SHA5124d3cdaaa709281d12cd33c742114310f35d2329cf87edffd8df59f3a34e3d0e40554fc90be5e77272973ebcb910baaf8525ac87e3a8a94d502125210b1dc1c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566015c999d3e4a97488d8c46cbc3c733
SHA1f888affc2b1e1b275bbe7d675bd262e35e88757c
SHA2561a7af3fa655098a556afc60aa66c067187ff4ef3bc81c8ce1d4e89ffab7a6bd8
SHA51242c652842df94675292ea59922f2385000cbe848dd38b80df06d61d553a0c8ecd4be41bd0c056517e9a62474f0526c1981b7ced44be59e4beedafb89922ae815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f1e99b7d2d07312f2cf67190359669
SHA188877da4340a1ad24aeda82c4ed72b7bbbd4ec43
SHA25693864e1ffd49f8040d1ec92282da9f143a879e205e004cb7eb5556b7346d2c90
SHA512fda2d32246052d7e30979eb13489a7b86eff40e9db075f30fa3e576a8a2206fe467eead5fdf648c556b864b01881401943b1f0f5c82870e307c46a5cfa6ba442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b6823030932d0ab3c3232b1579ba260
SHA17918a36808fafdca877d030b310ef5c81fa1cec7
SHA2563f5143211d2c64db004aa5724c27497d93c68413f831686fefb5cde10e675796
SHA5128ff6c27a040a7db2869c55a7f340dbfa297d368ab06dbfd6a34144ca8d240bf0262d4b620dd07bf83f5611f422ff313f9d0fa891a77802c151b800b162e943da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031846fa80b1599ad9f752e07a4e147f
SHA13f11dc73f0b698f00752458a184ad8334aa6a2f8
SHA25698cf39b91b2190d9bd4459bf0dfc1264092344fc07bc9832a96d57c5bd4e4cb8
SHA512fea736a887bbbd1ec12739bda109b4e5efce750e73eb46d61765c01ab5785ef5b355bb2b3c4ddaa61b5fc48c73a31b0ff53ff4e9480c905295d534f1fa0d7099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dcfd4fd41ab4422b56c66217f40181e
SHA1b59283019fc5b986fa99c61da8eaecd0c109c49d
SHA25692c27c2f95e3360d0711868ca4dcbcee13ca17ec4e4656271f84a315bee36648
SHA512a60b07e67b02173127ef1bb8a8d7b3fa08987fbabd6599765b1067761d721c6152322481e5d29ffc430e2359e6fe3668ded0c3465b2d2f8b766eddf60663e84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe67022ab12e32155a365d5de21a532
SHA1b4523d3e565694f8de4494b4edd4570cfbe7c593
SHA256784105df9db4a58094c5907e68b80d1f9e6931dc4184366bc3a2f4178cef77b3
SHA5126dba533a86f549c90d41d5d702973a5d1311f4977680ef939df021666d4f11d4b21fd962eae108e38a588045fc699d197b84c5590acba4741874d000a4e15db2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b