Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
39649feba44bf8277dd7a5b904af84a8_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
39649feba44bf8277dd7a5b904af84a8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39649feba44bf8277dd7a5b904af84a8_JaffaCakes118.html
-
Size
18KB
-
MD5
39649feba44bf8277dd7a5b904af84a8
-
SHA1
f12f6c0fc5c606c9287061f7c190ab77f6e06724
-
SHA256
ca8d697e7775ebd91301656de80be593131911148ba7c779a2d80d11f1c5024c
-
SHA512
37e5acf46b0b9e8b21dce05f62eaa0219de2ac85842401d1cfc56ab7ceacc311f9ff8049335c688d957edae4fcbc7c3919df8de67aa6a34f3d6fcd2af7c95d3f
-
SSDEEP
384:pu7lP28+ruMYYBPNg8OdN50apu54GiCSe2Jvtx9L8YzdmEQEGGWqQslD0QHPkNdp:8ZP28+ruMYYuCapuSGiCSe2fvkNdHJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434888486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000ceaa693dcfb0eed3e4b58fe5911563e58bd967e798b4f86a4420957e674bdcde000000000e8000000002000020000000d5578d8213b523a2e2f9c008b2777b8e9850d6613d3de06350309e2e50abbcc8200000002b9ffc7a594f95165d398ad5334a7483adeb8520f334be3d1eef56463b409fa840000000842fbbbcd61a12fef656f5b0820d167c4818fa8e3c6d65027de080d2b994284cf785de4d2c442d5ffbbb767e5cdf0ca65753ee134a07210958a77f556ea65044 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{62A8C311-887F-11EF-BA44-CA806D3F5BF8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06c883a8c1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2480 3040 iexplore.exe 30 PID 3040 wrote to memory of 2480 3040 iexplore.exe 30 PID 3040 wrote to memory of 2480 3040 iexplore.exe 30 PID 3040 wrote to memory of 2480 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39649feba44bf8277dd7a5b904af84a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292f7b6e033c117e2addb9068c1d4f3f
SHA110c58e25e79a74c676f509f2e0ddfd958841c11d
SHA2565dfb637a7df0d1e3cdb458437d1504a0457aa00a4fa8e3b3ee446fe9be621b08
SHA512114b0e57caec1a46d02e70204abfce829e9bcbffd3565caec50380fca8790e4332287b4599c8ed674a4b1dfc35978933e8ffd83c88763f89fe7eaedf4f79b272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e3ec6f68431a2472419a04dbf14d19
SHA1c8ac9eab03344f6633a58c699ff219e540ec290f
SHA2563858497fb149aeb8bca32848d83dbda503da0016fa43ebd85be287a5b9436703
SHA512b43aea819fbd3cd05834c4dd4963296a2442306875ccd9a6cbff7e70c8b01d4800f9c860b0632cfc58e52cf74920147600940778d03babbe55906d672ffb1307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552004cf02520e857d403ec1a5ac5238d
SHA1d0ea2bfad18dce294f49f511b91a87d916248fbd
SHA2564e49f560fd476c59ad901d9f144a8cba8f7b473bff6228b24366d29f0ce23b78
SHA5126df2e77c319332d67b3fa6d978759ac39d4e84afdf15e617e1a324dcc007aed6271580e8ddbd09e2bd1a4ea5f7328549b387bfc11fbcd8fbfea2614835ca6d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530565ff4cd553cf8c1d831cee6a83e49
SHA1a0e86741472daa29e21af9e36308e03600267ad8
SHA2566d3a0e1408ec2b090a9a2444066d128126a70127a97df7a13e4763b86663c184
SHA5125595848319a3b2974cba3343c25f6fc065e4dbe69d76883cd59ea6544846558f2da3698ad04afcddb79f741a6e07a1cdffc3ef963ede8f944f4172f1c395ac63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f68a2c763218c7a6019d7877e2d620
SHA1caf02b6d66039de221cda6ade711dab755646196
SHA2562ef626316048324c43821e7dcbcaaa8de3647bd53b1115a90e1b77fd0c595bb0
SHA512cd03219e22a6cd365db677cf7b6fee21f60cb9d6c06e988a32d246062c9aa74a2901633cabb4b6e6b52fdf6f80b1583946fbc636938cce7af31e37e70d3ce114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59718099c5363561d6fe8e69fadacadb5
SHA1cd5a2287b37942011a3b56654aca83d9a91561f7
SHA256d016e31d3f20df4af02e4fccab3b8fc6006bb18fd26c5d6f5908ef47c2f4da47
SHA512f07e7405f701e1030d0a73f286c1ff6500ee7c2e177ae23183aa8a5ce30d8719d6e6d43f4603abb739ab756b298acbb85a8dd1689819337400faa34c21705516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578846e181fca0d5c1595025d75ab2cfd
SHA18427a305411faa06e644550ad8f225a03e694efa
SHA25639e89ea14b73a66adfd49e1b12114234b80888924c5c83f5489df5ef8deeeefc
SHA512a14f4d566e8aef2eb59d68f7d2899b10f535f75125128e9dd1e9b96fce8ad6f7fc3e0116ad5f8dce9991dab137d11cd711946ae3ee549dcba728602bce0baf69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da85ed90f6be4f1cbd999919a2ca10e2
SHA1e680298547bdbcf5f6c9b31698d23075fa9b48c9
SHA2561903cad8ec073874b26999f96fae491687f168b85837afd4ce7e9d7f148c22c5
SHA51289418531bb8a93e514ce5300bb31a68761372b72d215dfc96dfa2e5a171dc4343292a63e293a08bdfa29c43d792a13a54b23ecc19fffec37468c34c085545abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc60f314c01eaa5d7c83a5f7c759b56
SHA1350257032c607818ff45f0b7abb538d953501409
SHA256356bffe13ade525a69b74db40bd25d7f7e3d4909e521c78df022b398990a1005
SHA512c7e8bb77a3f7d9ed8c8f3b65d296517d841ed3c1a04b7c74a57ddbe9ca414fde5b14fac24c9b83e9c56be20e8ae0df79354f877a3b96ec349a30e7b1cc952ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59621811ae3ef7f6dc4f51561cfec7373
SHA1a62b905bf60659d717458bc8a468c274313a03e6
SHA256604314f8aa85c486195a55550b348d80f14a4ab55861ded3f8c92988e552c192
SHA5120b7c82cef7b8d56f963558b28997313ae783b815ac1054b83d7fee8cb79de0c96e96cff63f92dddc9b926dc56a212e1d088a4e509e1af02cbae026407d497b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44cc59280429b71265c500a48591e00
SHA114f9026c67364890b482f2a9a9819759596202ed
SHA256084a03d34255849d98cadf46e891bbcd290bb06dc1b7e1fff67950e53fe08efb
SHA5128cbf3c7d391f0fa6dc824181314a43507bc4d620441efde2d2a6b333033d23425f5af6391b2c19989bbfd115501f310c040e3701ac3faee797d5a617739784b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2311cc6df0bb70522a1b39e6acfc8b6
SHA16d9f640f16fe56c54848f694c744c81fe3d085bc
SHA256b93b3607bcdf81c2df1b665641ccad0efe7aacafa36176208a36ff7054132fcc
SHA512f1a2cfc422676899a8312417ae9a81ec246fc7f830a3b811defc787ea34752b1c46632c8cf14dbb0e56a89978127de6e4455ef7242ed7512621fc78860c1a788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72757b306f41966437f14810e35e48b
SHA176268c88b82696d5e448a391b00af067a5333dd8
SHA256bdf98e0df0a21551dac81f7d822c5fcb6aef12616aaa9bbd5be8c0698d88d067
SHA512f54faca400a11d056f7a2f621664dd1e11e7135746573b7bc030c5c8b42cb49416b4eb13011a038b2e10f6a949c1bd69133381fafb438cf7eed6e7994593807d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e64b5c1a6ea506b983c1503289896c
SHA1796e48047e7c6a6b8873e9879527528271b721dd
SHA2568a86a4c224a74952f3084ea9780aff6973966fcb3abc1d16a0e12d0c62fe240c
SHA512be5046a0d74f74ceb4ed844d92a5db1c6b2182fa278a4f6a0c5422c778742296894b7c2050d845b798d6439c474155bdb4dd7a92f6894cf5bddbe65178f30f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7dbfa3fea482f7b9446133226a4ce6
SHA1d571aab82cc6edf5995954dbd9fe4f2a7af73d53
SHA256db2ad631011e595124befd563eb9846d5faa8f8646e8e0b2d4800af1a44483d8
SHA512ce0d5682da2594fe3936c9d0fcf58c83e43971c804074a7c9354b9e9350cd89f9204763e46095ff7f012077ad6b911d66f879e4226bfc28455ac3b03e116eaf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2d5a9c9d2f4b5384d64b5e00f5ef8f
SHA168cd4b9b8e9838bfc08ce0c3249b5d5c1ceb4cfc
SHA2569f2bf2183e895c592b772b5e6083b539d87a515004b2d6abaab2daf9ea8c86ea
SHA5124c4afff316b0535797fb48d13692d5708cf02c85ff0fcaa8816b557dadb88922461d21950eff99b814e47bb242277876f6109e88d35ca1696609320a2f4e8f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59101a28a9bca0d7b960ee800bdb69b00
SHA1a167af8361521a126cd09c840bc95e656fef31dd
SHA256f39e8ad29a21f3dd23ce260c1fcaa1ff24022a52a56af64a03a7f0689f99a426
SHA5123caf0dc16bc65e4de96aceefa0a993c56897ef830d08575a7ebc5f7d73dada2925259b98d6da053d6b8160c0b6f1494d5a434dd543f4430742f6d75756c1807f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc1a068827890eb9a24ae1e00daae39
SHA16644a4f7bccd25a6aab731934779464a68e4b5f2
SHA2561077cff9e29a82efc8b99cfdecaac65b6d373aefa2575b6e06d278bc6349e172
SHA5122e82f1e803dcc7691acca47c268abcb808c3a19c45c74a424ec245f589991d5577206c4b17a52c67e1f35da9d63d9329b91ec4d4ccc91ff3519dbae9d7ffeb3f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b