Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
3916147a43f087826a3c4739dda66075_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3916147a43f087826a3c4739dda66075_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3916147a43f087826a3c4739dda66075_JaffaCakes118.html
-
Size
6KB
-
MD5
3916147a43f087826a3c4739dda66075
-
SHA1
910140aa0fb3a76288ddc12513ffdb268f9de73b
-
SHA256
af5b20784bf3757703048ed8169a223680c3abffd949d5161a97b5ab69ebcecb
-
SHA512
e743c876e414e60678ab8ea9afdc852caa4a2b65ef0fecbd8af9eb37405cc6ac186d05de860a66852e4597c8e8f6b7c14e1788686b0cdced20767d21558a8572
-
SSDEEP
96:uzVs+ux7XKLLLY1k9o84d12ef7CSTUWbca1sLiVcYR16cEZ7ru7f:csz76LAYS/T3R4b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5ACF6A41-8870-11EF-B267-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705de12f7d1cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434882029" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000cc18f259882a1a89e405c2cdf7651bbd191ed445260419362c4cad84be2875b7000000000e800000000200002000000074a0e378bc2fa7e9371aa6ca580cb208e60320ced162848a24ec15659b3870b02000000099349d73207b7020be85e9805005e0f4f66709e69fbe2cb17583da200e284f98400000006d9794bb3a62c15510b08a147cb8d72f0479f2bc9cc41cd8f66c6f13d05de4dd58f083b84e060f195e973d24699975bc991d9cfe08c2451a7d026ef63ac4c591 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2336 1548 iexplore.exe 28 PID 1548 wrote to memory of 2336 1548 iexplore.exe 28 PID 1548 wrote to memory of 2336 1548 iexplore.exe 28 PID 1548 wrote to memory of 2336 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3916147a43f087826a3c4739dda66075_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2171a90fa6be378f0f37a1ea1537c3
SHA159daca461fb256209a458ae8352f13df328a9b46
SHA2560636d934a27989e8a7471c07d4fea2ea58c18a418f3e88da381f0245a12591d5
SHA512bfaeff08731716a072a3f3d0f1ed35d75942a6396753db6f34fc5a2bd56e6296fffbed993835b174137f9a1379bb1ca9dd90e9c47ace0cd7e9528a708105308c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7d11f712ec16605042ab0ac5ebc4d3
SHA12b74771ae8c3297a7eebfdf2489d02ce901a3972
SHA256a1a9b846de1619a325c49101bf042c28cfcdbf88326fc49647310d8c44887422
SHA512bb8825fc41611d493b28270ad1f7fbe92f5c1ca83a54ff24320f2367ede6901da8e40eaf3433c9c24f235c9690b3fa80972407d182d4fc58bf94e2ec1900a538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e433d23e23a53646170d8bcad19bd95
SHA1268ee8b055505b8c11cf818c55ea0d3008d74ec9
SHA256ae594b9a3350c0df5e3c3541f6f4bae7dc078aebdd4cddac0d91a7509724a9cd
SHA5123b8677fee086ed85a0fc36449278e87c4ffdcacea3b49d9fd1e9e9bcff0fc3f01720d04add84fb314799ee47bf2b1995f1d7bf458d185f93e9291e87239b5009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54adac42e6035b31a182fbb67325e75a6
SHA1ff94878f6a73cae3d86cb74ba4d6551989804430
SHA2566d2503caeeab8f3b338e4b2820eb000d6029ef98a8780af53a127819271be600
SHA512d2c7ae7d41610d0cd22cd415e575973c62b0a35f113e0b564a25872a6784ce826e9f4dd47ad47c3b073555cdedefa0513ab0c9b2a4817b3e22f0dd112045ec67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9c034260a728b93489eaf0c6492690
SHA17c3bf926162e2723aece9a3e24b4da3a668a7add
SHA256fa85d20893ef6aef174989f802583d70d1dd11ab7763fe3e42ecc3bc4a5a2adc
SHA512e74a867c7eb35b7997a69b5a7663141917636e388d239ff285467fb2cbec28efa52b2020c202cfc0add69a35a7e4c92a16fa16852dd6a5b0e514f4b06b2f5db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d233b118955a040b14cc6b1a0f4e6136
SHA103ac03c09054749a06cf4f2165565090d7c8e894
SHA2564edcc3def6be728fad8f11d407763c5e365ef4ffc263efb156e2d0e41ec721ae
SHA512cafe1cea19169a84881767cccf1b15b47c27addc1d65d29623870f275463d387c552d6d5a75dcddb1174c80ee8a0c73c4f32571d8f7e6fc935072e182e52fa34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934ae10f154886d621038a67ab1de1c0
SHA160ee07a4975840ba89c5ed220ff6689684fa2e18
SHA256b099503130bf9640acb52a443fd2b991d17031aabdfb1366a5e74108a7148c72
SHA5123e995722d42324c07c573eb68d7df7a2bcda053461b1cc8096a36c98f8360703b99057ad6dbb4f3034503935f3a2c02aec6701000fae3b3f764b38e35cabcf4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551183e79656d630822726ecc214eb229
SHA19c60e26e12c4af9cf4fac4c0c82ff4220e1130cf
SHA256bd6cc543a812aa78ff97e015d4c72c1761f13e2907e73028c9e68a56ce490007
SHA5122c1c29164421146bd49b54ddd15b126eac9c4a96ad85cce0d0384a112d796773fdf942dc2793f5c6d32e35a3f4157fe1db122e3ebe4fd3feb548089d28b36dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78fc655cb6e224303b2cad37ddfde65
SHA185130d0cdf6b62ef1f2856ae3fe8fa8e04462f4d
SHA256bd95240ff363d4cacd3c4fd71bdee1ef26bfe9775483d55f82d4369da7cd5724
SHA51221950c3c9d799b71afd349d30c2ba1e33aae90b0cc24962857d232c29d34012e8ba3f9169f939c75210601a6f41f30687ccbf584abfcbd4827e499d9837ee554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50541d4f57b25fc1893e886616e6012d8
SHA128d4feae2e48a2c3051a9cd5b8a1cbc6e1085312
SHA256a536360b572b9ab44c52f81f690e087b2ce597b9aad3d7907c73b207c8135acc
SHA512aa5a229fd16912154582131d980a98bd22db04867ab0227d406c84389831b3fb04fdc396c5ea77f6b1f7c6f7f855432829e628161b7762d0190683ed64443a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a5359029d365247b3321e9f87c3f1c
SHA137d5103c56eb3f1a6b8706574d76e9c37b14e6f0
SHA256f735cbeeee59848d367ecb30ab916055715a87e8db5cf7d330ea0e35e4c57b4d
SHA51224d53ce9559fd17f2958329f5940bbe00834dbe2aec3c26595ca244e1a48e532178beb02d800da242ea1bb6274bb959348adcb314a6e3df40343a5827b24cd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb337d4ca27e6b6d02b7b77e0cb2c0f2
SHA11a412d784e14dd97ef2860bf13f6ab76f844bf01
SHA256bf2d30c2697ac0917199dc4057bb41a2b116d85b7887d38eb71dc0d347616aee
SHA5122847c060075d500416c8906ac91e8b4f6c5fc9cc7fd420b6f6a83e08b3a76e5d5f7bcac84234955249f095ac6d06d6525e9a917eb09e353c8c3958270a3281c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7397e89ddfd7d20cb0d26e7100b0b6
SHA1b2f4ce727f7e887e97a2d2ca771e9d88cc4c9384
SHA256ad7572b7a039138aafe3136f953b55263751ff7aefdf18db318833dd19deb13a
SHA51296438d54d69ce8185a64da777d505baa01d48b6dbe8a4a66c42cab512b7be12d703d4ae870f6b6b6987224535ae5a9b4888cf7b549e7c6bd4b5588ec26b60b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a400b7792cfd62a7b3e35b03e3d462b0
SHA11355aca21ab91cb871672c767b9a1aef104870d5
SHA25644c737892bc23e549b44b6961ae8b84dbab6efa3618d10900d306261dcf12bae
SHA51219245c005c4d530c0a5c81ecfdc7e7be060c6a8326c7831a385613ed944b8f6fa664facfa10afa459f4beb65e2e5d0ea9dfa70765b4a7352bbc630eaedc4b091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5eaa5e4d83beaf2ba17396156119cbe
SHA10e7315603650bfb173c80099f6142acaa0dc12cb
SHA256c1331293b9bb38903953e5fed6a720dbdda7378aaecdead3cae2ec48630e138b
SHA512ddfc701a00032787d94452c4c62ea4a499fcdbc6bddc2817a81a4357d28c36ca7f7c51ccc87d4e87dd5f72698e4981aaec46f831ad484825772f45f9685c0093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fb9595df31f556d186eda16b6433670
SHA16795cc8f19d8c256c9046a11bde6a0c10d01a589
SHA256eff5de5358def7a6251293f40500e7f081eb6b28fc0693a69f738a3ecd8ebbb5
SHA512c847b803b9a22f976abb1533f6ea53d2cdd60fa8adb2330ecc8348d299e3d63486f8ad4d72caada21fb6f24e0527f409486dfbc8715ec134860139cb86493bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564454190e31ca7063e7375181c563e2e
SHA13524bdaa7cd0579badd7333e863e3e68f66ad33f
SHA256cc9133452c70d88b48a115b6686204da3d64cc621e92d152545bd4fcab6cd5b9
SHA5124a031f20418ca1ba8af354092f0e7dd461cc8625bf10f75d842f6c7ff4f4bbc97830aa3624ae17f0a2ecf756437b26d7cced4f7bb761b113b010d90631e3b866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c53138b4dec6b6ce16f741f0374a70
SHA1dbcd02d6769a1c3c1f746d319fc224289335c66e
SHA256081a0398995d269b7a8401137fc73312b9101f7c1e3d0fe2bd053caa2a383613
SHA51211876299baf175e25c67e00f50f41284f9ec7bcbe157c99c1df6a630333c0c125d23e934fe14c961ebe68dfa561bbe47c03e61ed5ba23ea076a74c707ad2b69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51297684b66287670d1408d691f6130fa
SHA1c420c537dbc0f66927d14e8c3280ea0185846339
SHA256cb0ddd41b43e571f0a702476366d5932d586ffb38bb2c51f786d3c6c0ec49809
SHA512e03395a6ef5136c1243c9767172096b93209455299844735b06bde84a3bed620533a17b146183510edbc85b44a29684dac99ac84ce69cfc6a275cdddb303e792
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b