Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
39ae9c09b420ffe8ea985cc8c5bda91c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39ae9c09b420ffe8ea985cc8c5bda91c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39ae9c09b420ffe8ea985cc8c5bda91c_JaffaCakes118.html
-
Size
9KB
-
MD5
39ae9c09b420ffe8ea985cc8c5bda91c
-
SHA1
f15a9c07ccbc09769c619314f59bcf8667ab5e97
-
SHA256
9fdf08a37ec4a7b808e1e7391ff5fea02da46e8b9548eecb5e452a19279bd802
-
SHA512
f6a187f924a12d54bc1a528a81bd478a6cc326781105ccd9879774ac7b528ed149907565856a6018f713e82b55bff6372474253913e2ee97cb17ee6410248334
-
SSDEEP
96:uzVs+ux7M3LLY1k9o84d12ef7CSTU5GT/kzHZCDpr8CJrK+oCq1/XlVHcEZ7ru7f:csz7M3AYS/czHoVFSv1fPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ad157c28165c3381004c793ff65e0118bca59fec9d56c7799a1941c1c5de255b000000000e8000000002000020000000906252ea88258ed42b485676f7208b9e948a5a1f02c164560098c924c8c8a052200000007a3b9fd0cdf4d69377355c74032712048c6a244a6cd13e3b36700ee2ced6909740000000891283a417a8d9ab639564d2005482bb760407bfa4dc874de9d68cb36211b77e086ca75477964f344a50794751a0276a05bb7822333956bb0e5db944d6502b86 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00579f1e971cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49939D91-888A-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434893167" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2740 2764 iexplore.exe 30 PID 2764 wrote to memory of 2740 2764 iexplore.exe 30 PID 2764 wrote to memory of 2740 2764 iexplore.exe 30 PID 2764 wrote to memory of 2740 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39ae9c09b420ffe8ea985cc8c5bda91c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebf0a4bf3bfbbcc8ca3204ab01294ac
SHA14064eb1a468da1296833652477e558c99abf5194
SHA256417d4bfb99eecd100e710899851a5d2d8e825235b38e12ff4233d9c7b2938e7b
SHA512467e362306cb0240c2424336af1116dbf7e11c3e9591431c9e6dd5806e6082290631a4ccced52579fd9f690e9d74109cae7d018f92fdfdd83615bcc55e06fe34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65d778c62a864f08d19e28f9018b2cc
SHA1598183fb66b56852d12cfbc7aa83455956c7c4ec
SHA2564cc42eeedef1273840c4a56339007212f76935148b2721be512656f5d9d22376
SHA5128caef2c103c9597634482b8b537b8a2a8dd426b901375d100dc3befd22eb78f99c878a1b9d73532f939bdf30a84ca91e7e05966608645d74e9b25452b3607fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f07f7b0ba4254b0f3f1f8b6ad1d7e1
SHA1fafbb1c9536cb751c4d31b6e8dc223f7ad4d52b9
SHA2561d3bc7302bad078639e07b539df961db312361fc5cd75ca3ef86572f8176284b
SHA512bfff493957583c7a6be620c1fb6f3d993121cd048dd6138f8757201a872faf9b4dedbb274e8db265e9fb94321825a77cc3cfdf7fdfbbdf8bd9c17d079125fa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586315ea33fee9c262ca9cab14860c9ae
SHA16143e584f7e7d3ca36943c60ce486c120bf9b971
SHA256675f7d1f6b05aada336f01260ce88025d8271d27effce95191dc36b3a5d94dec
SHA51211629923d0c2bdf545528110973331acaddbf3211a55eecd155ca665fbaafa67663b9b54fdd83db7a15ccda2c7d73b23286697d25a5a453eb702edd56e37efcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7ed63fecb8c8a0a838883ee92754c9
SHA1375b15b9744185da72cda38d427dfd22edb25bcf
SHA2568bcadfbba973629e82383ffc6d791e9c3e96e529c30280c9eabf09c2ca02998a
SHA5128268fc22b4a9107c6213838f21dcfcd10eaa82eb24bd8a9b457c205e91f6210a35f84bdd03f85695a1bdb65de1751f100f2add862bfd7dc4ce24e58637d17053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a4221b5f0639712a4b9dfd630131b0
SHA1b19ad8e2c2e029796cc97b5a2bc6e73bfa503207
SHA2568ce4123b6a11761eb198ae4cf609fb335f128e2738bd8d8e40264726186b7712
SHA5121ee109248781ea391e619a663f2620fcc6d9ac12cb09df342eb2f878b2ed24ad691bfbb02e62a7268e4c01282d2db1024865186dc176d5e58c0ac4e91f276237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab12b63b3cd7747b30f788d1df2922a
SHA1e2ff423ec37f52b15cc4f1b950019136383149af
SHA25607111c2be43b5b45658b9bc6ba57a520f879f4ab095c329905b24b32d0858458
SHA512dc447a9619545cc3fd6fbccb01c3ecd960f4fefb5e62c49d5c3aa4514f4c02eaa9a0300606b308297ed038818b53fee835bd26099a077f9fd951e9d27ef5915a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4a1b2ecf4282d3f4a76217c584c629
SHA120f5eeadbcc6ad16f45dc96227b520011fd1fe8a
SHA2569fa7415381dc7d10c8359c3e35398a66393eff0d41943b7161076515e8dfa61f
SHA512a71a157b0b298dd298908375109684144e4ae8674928bd0e4abb5808724aa14648e8428f0ff8e707097f8af7adf08c56f1af02c5e081e063ed18c3accd04592e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55854ae577b5f9dd1b8fbcadcee6f2bcb
SHA15d33c600237f5621a473bf41333dde984d1c678e
SHA2565b2155963ca07230f89452035299e068b6c5f61f7361f53ae220393cae2fcfc7
SHA512cd43d4f6713a76b1e8f5a926a4992a646066e807b0dcdd2a8bf63f867ced474d84bb1323f2074ce41d5f1f7a466fab5b4270ed5317dbc3591f2a2fe2c08c9c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e2a2321ade0a149fa5b66035802d38
SHA1e1ff8d9dc25e37b666a37b1aa0516fdc8a71c189
SHA25634da33a1369f2b148dddff672c0b4bed0cff37e316e347f6132471fb60f94797
SHA5121fd7acf00ca32f2f161b3186fe56b28dbc45e4c7e022dc9e9ae59b6f46964f0bf7e2d84ba5f61d9e5701aed96c5c0b63a90202803ce209400798b0fc7b5d1c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cad9e0649fb2b92b3f3cd616f4ba3e3
SHA1595aa656ba623ce4b16e033aff807fb15bb2694a
SHA25622178a35a199d3518881f835c92aa9689e3e59024e53ad2e32bf9dffe763a4ca
SHA5128c03080a8dc7d48a1a47de4da7013b44ec86f3b966ea7e6a77c31ed6523278361faa3921b50eaf54ec979a7ec26f8bedb10175826c2b4430b1431b0472c00284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55897735607f235b0625492f395e52791
SHA1cbffceed72a19a6549b8c8503cff4210bf1c018b
SHA25648f7652df39cdfdd0690bba0544b94360d58123d6f83f5979e73a47ca2fe1fe2
SHA5128e8d1baca4285cf7771d27b7cf5b93c9831b6b874fb51332cc515247fda119faeb18dfc0f39af9db9f2129bffba84de4bb9ebdc1e4fd5ca568b15501842622ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07df9dfebd933f38622fc861fd6c3e2
SHA1d86d392c9460c7943068b6887bc556e74481e981
SHA256928fff6a918ef82d35050a3baf8e8a03ae1a3f28b0a2e3d15c2408acf86530c6
SHA512bc4314a54e8b0fadfa9091f2b9818a318e8e384a75d449b2fff5ee6cd8a56109b0b9541f1497d3461a848fd3d3c715e55d37736fe8844ddcc21f128ea70d9351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a58eebbda6ab17121d2be5bee5fa8d
SHA1e7d923bf9aed38b9ef3571c8af14462fe842d7d1
SHA256ac0b272f9736d33d1c5897fa6c8e8d41c46a1b86502697b72a26f4eee038abfc
SHA512e0de2267eb0c189777fc43373151261d69bb618b9bfb7bb69982e0520a766e32f107ae92cae2e4b3000dec8db9564aca8241118b554b96bd3894d9e175fe4b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f96ee0b07a0abe3582cdb1a66ca4842f
SHA1c621c71ced2168f5a23dc3d930ad89b92db5749b
SHA2568f5936991c9f1f1d3147080aaa91b5572806c73aa2edde893959b8641b1be0ad
SHA51281b3a239efa7fa8fc7f1b9bcb18ea1c0770fda73fccff6a32cb8630c977d88dc92a535feea22d06b6cb971fb74c956103413dd84bf5a509993ef4c5e5bb0fd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd26cd8542808c77db8da0fb885c897
SHA17f079807e247435b13bff59ca404d4016ff36e48
SHA256c42bcce8db65fa2be41640a0deaf9f713ca90e6f3f4fbc358c643c7f1226176e
SHA512fcc9cb48b0bbed0ba87b171bbf2ae30659368d1ff1c2d882b84e50c03fb7521e0dab1d12f82f21474f2d01261834a9afc1147a3af80592aaba2e9a0ac78eca38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d6f935242c44df770e859c60558988
SHA143e87891b8b3a0dd00bba1f4ff0cf1336c85eb57
SHA2565c0840f0bf4a8c832776844ce9eb9724664341869b1621b0b1b30c4ae3808527
SHA512a2437d32956b4e1809cf7c574ab938bfb65581604f00924ba71ef256f19ff8eb7d5ecbd2843608852cc9c42152845d868bde4c4feef1130c6ad12949045751c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e58e6b9649b8d228e783e934142d218
SHA1910f4df9abac02b2c7f4b66c42374d00096b45e4
SHA256ac529b4923f29240b6e09d1ccfc1d144dc38cffce5e1778cfb51b3ff62e1d598
SHA5127f6bba4d7d4a86f920585aab591fb4ca9cec59afe70ef1f925b5faebadf419f96ffb3f0f5d4927f25d7e17a1b0b70bf8bac2c0ca7d67d0005567f3ae16f84a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d92fff48a0728ee3b722cac9cee283b
SHA1fab3d7485ac9adcfe891ee3a25dfe52839f24dcc
SHA256d7ab6a86a47f24dda5fc9d47e239b2ebe5022d40f86ed7540c02459fce243c79
SHA512c8908c989b2832fa5341219895de5cca10162f4d702e6c0c996fdd7b3e1c6e7e6a88a6f56a846fb26355baa83b7478f5f16fc69132ed8811f7aca4a32c2b1fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed2ec0c9b041441ae436ae8e5943dfc
SHA10f09ae68f2fdd3c731fcd879d4336c937bf395b4
SHA256cd39a368ffdd2d47b32c670930635af30bd453fbda1559923345389c04d5548b
SHA5127559453962a53770616e7086f208c19a54a06da46e76bdca917e50944a86a04cac4b424e07378ac396f2a8f3717c540ca9439fb51660cf6d23aa0c3b50573ce4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b