Analysis
-
max time kernel
139s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
3963423d5f8c614e163eacbbceb32243_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3963423d5f8c614e163eacbbceb32243_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3963423d5f8c614e163eacbbceb32243_JaffaCakes118.html
-
Size
324B
-
MD5
3963423d5f8c614e163eacbbceb32243
-
SHA1
4e5d555d6719b3b33be0acd4eb2210816497315a
-
SHA256
5ad7e1a020b92588c5f77ab0ce29812c2ef557b4ecae3126c15e338ffdc7ca09
-
SHA512
f0fbab046409cb8afe7d2eec0426060edda024596f8d55d6eda513a5bda4d5629c82192eeb57d710bbc9c12f53c0e879b237fae860c3ee16eb8c4e9390614fb9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e2de0a8c1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434888406" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34605F91-887F-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000aa0ee3b2ce8673fa89fc5f3c7ca1987f367ea90635f03132dbc1c1cd51e49818000000000e8000000002000020000000a45b5b30d368f61bdbb1b01a4c7ef71775a6f715a4956024b82ace2ef26c6c6620000000aba40107b204b2d011730cd091a8c0ad4b901cbb8f52730737711c4c210cf7574000000023b004f799cacc7ef936fbab2feaed845e3a18cea551fdb29b8facf74db273512559f9e126998e4c2c5224d50aef4a68e346b05225551ccc15ca32e2cb50b64f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 276 iexplore.exe 276 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 2080 276 iexplore.exe 31 PID 276 wrote to memory of 2080 276 iexplore.exe 31 PID 276 wrote to memory of 2080 276 iexplore.exe 31 PID 276 wrote to memory of 2080 276 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3963423d5f8c614e163eacbbceb32243_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a395553c845ad8bdff75f13dd45490fe
SHA1451341dcbf6bd9399cd352fdb9fc0f0c0f30681a
SHA2567f75916df3fe393d347f4259430c6b6534c0dba81adeb922e55ebaf25b469f0a
SHA5129cab184727ad12ada27762c4c5e90cfb35c80e0bdf0b64deed1c8f6e8f67d7e94a41b97a494b2b570c712248187b7c7b12eca3f6030a873685df7926cd014312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52573bf93ea93b80cbf40c78c5be3637d
SHA1d379abe1ff92f6b8ee1cc95518c8918705481053
SHA256f475adeb91816aad7a7dfd5725d6e6a8715ab0d8b566f802531dd4d2e01d531d
SHA51221688ff05b2e07ee4f8d1b2cabd247027f1d67093bfff1b3821fc6e653a94189f6e4285dfad3761db89e3f18a16bd868aa0a3ebdd173594745e63372a44ae58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e605cb93e451154d5ce0cbfe23372bbb
SHA14d0f9cec1ce30cb5a9c55f514d6eff4f0f299f01
SHA256ecf8c53a84360ac7bd714d62801f48eca024665d06103c93ca4e7e9f8d83d9bf
SHA512599c21eb0a88bcbfe81d5af6dd0d3e27838f4336f13f448253cdecac281fa47b4972914625e529cb718d25393dc23c3a5c9c108731775a0dcf984c123ed23a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4fcaa995f7e46d0b085ab7f44b140b
SHA1b4f97997807f645c60e41568d166a6704f7e0acc
SHA256108d86f2ca849af4d3eb8e3fd25b480e1836397649dc21bcecf880ce2292108e
SHA512624b3a986ccde020b4a8bd7bf7f6fc404e396ca9d398eab206c7e65778ea23eaacb5d1b9c14393acc46dd76705a70a4c1bf9eeba1790162515ee22eddaf44207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53919dab0af4e288673365e9875609612
SHA14357f17f58bed054ec8b781af986e8c27c42cfa9
SHA25686591343f480a5a126bdb653756e92c75a1c3c9f4fc00060929f292ef16087b7
SHA512e1cb6e697e64d503b07aefe96722b4c4668459d99ee087c3f90090aac6f8f376ea65c58eac5f49cf972f94483e44ea252cc847a23b60ded195bb4b9b5dda94d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506fb550ba4476fd212973ee2300c9a62
SHA199b18b5ac63bc3e11d1607b53dddc18c1d72fa4b
SHA25659bf418d55fd2e8a4d4db6fdcf118bc502c8bc9af27158b3c3f226b1d2741f4f
SHA5123d9b02447b343b4cc7af2c3ff7c304847b71edeb83c60e93d62e04e4cf09a52c7b8b2af381bfdcf804a184550babcd6186b87dc0ef6fda7a2bdad39d729bb741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f57b57ae611dc5b91329a09468d4692
SHA1683978b42579335132c78f534d2ef5b1c8b062f0
SHA25664a768b0542ee59b94e0024898d39ab894ce3e42f1c3976830c9ad3401683e55
SHA512d4d0fd9c914642d11e56accce4d0219afa6938c6ce75b63db98f1d21d6a648914019dbedf90e9257c36b44cfc1edd4f47c767b8479ea0cbf17ee1ceb5aa4555f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e85d052bce2cd3e6385069053e2bc7
SHA18b3a09f1231bd7431febf924d9148473de7fb7c9
SHA25627139796877af3baf3025b5acfd573b465baa48aedf6b3d5864ca3f5a49fdbfc
SHA5125504035ce0895232e33a21712e54131a586acbc921dd2822b7f948b03e22a4be56b408d9e7ee0ddfa1179981f9a2c38a9d5b9638e0380579e07c81cbad9cad12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebc61f740c34e43833862723ca348da
SHA184290768c8ff4ab5038c8962cb0b6b7b51f9f683
SHA256137d532c6242949b46741bbcad2d17ae9314c059db502a2612a771593e5710a0
SHA51272727d184d3bfbc0098cc9e2a90e153fd251ce8bfa26c1fa85ea3d6b3123407391e368d63092211209e8fcff6a540e1610db30d8c0b5b96224a5d94780f1188d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5035121d0e1ce5ec0042abbc35b830
SHA12c02011fdbd26ff9db2d865725276601a4ba5c01
SHA256bfda34e7ea91567fdbeb9aaf24d42ed02e82bf0cc1a53a788c933ee2ed6d0e5e
SHA51281ac388532921fb697598de6eb6590ad82ba121110c5ff14a9a6f71a0db30da61c3e8bee995a9da4fd844ead46f714ad40b2bfaaccabe9e2738326290fd2a64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef22eefbc81e99a8b1492608970195f3
SHA13e0dc8525d50f26c9c43641b3b0b392fa362f120
SHA256d56a4d02ad76e933d4646121989cfa02a88a12f0d4084d2ed1673b0849be5b37
SHA512a3002c05a664ea9f90404b29fce2d30e8d12f7285498212463c6cfe2b4783fcef72d3b3a8430c65f93a03234615a7fb87583e55352c3dfd780a5c4e8ff2d2905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54549e4a39e40c221f4b6ac677d5d26a1
SHA142c113f9be98a013401dda8d6771938727c3a487
SHA256147261ddbc141eb654f7d013f357559ac89f8448b36aa31e9fdb57768c912b80
SHA5121509f77ac7870d1844d2700c140cae7ca82ca434cbc9303c32b6d2e2d8dfafa8d5f1ab8bbe2c36f6dc67fed8e5fe00c9f17bd852b034c9c53a72a875eb652e1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5571dc2d7d1f80a6bf7af990794452
SHA12c2ec703129bdcf6833a26274f8543db8fc50980
SHA2567950ffa49b77086f868f76ce295513151dbb29c1cf035388bd34a5545448bd1a
SHA5121df7a94218fa2c5b6c971dedb9de47266085ca581a87f40114788e0b95a8cfd04228682eec53657d6dcc4c86704c52381bba3aba6252e6fec5f4e2030b878be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bcae78119a36943fa2ddd303c1598e
SHA1ae1920ab14b2ac80aa8b15cbe2c24ae956e4b817
SHA2561c323ce0058f3594d8e8de5e3e1ae5035dbff48a9c92dec84a2ee62dfe03abd7
SHA51222abb9344b4ccde38f2cfa7351dbb283a403d31231a22b122814c44957e2658ae9768d324dd2ef9b8d56c6b0873b17228315fe7e7e7d423aa78028eec5c5d442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0df2e53b01a9ff31f4ee4dd71d464d
SHA128c8e6c97a427d6b2328c0aa333f996c8cd6b5dc
SHA2562c43d662986d9a1d3a872e54900eea48c84a5919965a7eac4b5c82f89276f842
SHA51265c7cb6af9a76e6f08cf7cb1d7545bdce0ddbdb2b0a02af142f49abaefea7cef80addbaade292c4612ec3a365990f68d888b9771420616aea9ff7993de5817cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59f7a3d077851ed403948ca98c4b0cb
SHA19553a2ae4df124880c7fb0b211616ffabbedc1b2
SHA2564ec1331f968c4d68ba071caf94886379158ff1fa16537b7b779d2639847171c8
SHA51226a1b63b9737fdedfdbf79bab430f7e4fd20d3221bf5a274cdd0fa7fa99d992762532d41c19e45e9008db2fc4d16c4ec69bbf95f1e46acfbb971b74c26561da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e16374c897bdb20b0dc0c525964f0e0
SHA12c9230445347695bd3d8caf8c1f39b2d0a57d2b3
SHA25612a07e85c63f95ea5e3d741cedee6f16d16d842b414d1e8a386f93a61a10d72f
SHA512f74f3f760587b5fd0fec9638728e99383d973a79b02e9b1bc07ff0ab559fe35994e588e2abc221d07e13faed1cdb9be6b9aeee8fc3eb8440d633a48e6804c57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98b38b71b4d33b3c6630483d8091b5a
SHA11b374c2ae761b58a366248f6e99b7d2af17b1a9f
SHA2561364b29e838b72bc83872c5f8767ebea94d7d4579ba98547f4021d716518ef62
SHA512116a18895d9bd086d0d4b8855477aa6239d8bc076ddd028c77c60d1313137cc0c33ff7c784e3c8bc273b908f9b74113c1ac577f9e237a91042e4374f1fc09ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee95714042cf33ec2dc1781ea3914ab
SHA1c4af84e26a73096d02ed4270d10cecb461056ccd
SHA256661043a552d7a2e3c0e06c7a7186fd3e9ad1fdafbefe91acebdeaa85a3cb5c35
SHA5126e62cae8de597d68df26edd7e622dd61beb91c3374b413f81b9ad869b8ab6528dd0a065443c57e50c73977c94e8cb386e2d1105df63e13558ae3e16166003257
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b