Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
39811a56bb142a2469546652a6b0f09c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39811a56bb142a2469546652a6b0f09c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39811a56bb142a2469546652a6b0f09c_JaffaCakes118.html
-
Size
9KB
-
MD5
39811a56bb142a2469546652a6b0f09c
-
SHA1
f59a6c398b04cdd329296028290bbab156179c86
-
SHA256
39f6a2f6a7b360447ea776d11d9aec26aa91860e570f2cbca7604b89cb5d04d6
-
SHA512
4926ba76a78b2c575771b2290beeca2ce7211c174688ef31c29b9cf3f19edd49a7368f5c564b2f9e724c5c8c8b3a11e2137ed8e1c54c2aec984c2bf509ed68eb
-
SSDEEP
192:dOW24KLD/cIRvLjZk411BUbuxICTuTAf1cDT+NqjNYGdvGNyj2Roi+oCJItAPian:ZKLD/cIRvLjZk411BUbuxICTuTAf1cD7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434890391" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30aa29a9901cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2EFD8D1-8883-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005719fa3514a5705e8e767dfc3b7ec199be81cb2b117fbeb5289439306a9bdfa7000000000e80000000020000200000003c6fea0397ace8567424f1520ebd228ca89d66be066ffc13de671a6737d2f2c8200000005f941037a2ba7c5d2952b3b2e454664e410b5e17bc3e7fcd7eff06bf5848b8634000000067596119cee4a3558db1252ddc6742720c0e32745633af0cd484ecbeafa50c31b7b397cbcb8c531948c89482476c22bd05f2c19a0358224e3388885e6efc61bd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1824 2500 iexplore.exe 30 PID 2500 wrote to memory of 1824 2500 iexplore.exe 30 PID 2500 wrote to memory of 1824 2500 iexplore.exe 30 PID 2500 wrote to memory of 1824 2500 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39811a56bb142a2469546652a6b0f09c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50343fc3c2431a1af26393c3b9b9da5c4
SHA1e7987dcdb9f1cf804339736f88973ad127856b60
SHA256b4844b6b2d030a6ad2406d1615f574d71e289d0529f71b59b61b43fc867dd18c
SHA5124783e82172fa30b348fe62d384265207a4a73ce21ad0f872c37c9ca01f78794262c376586aadd905af59bae7fe9fab8ab97f22a191f6a14f8a4853c5102ffd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f1795fdd286d8ae89cea4648815951
SHA15914f25df05b42c61dd42770fa075759a870ceb3
SHA256482c06e53c46ba1f72661f3286c78306c08fcdfe48a01791004570e5056e6c0f
SHA5128fc416d3c0aaef9e0377d69e9c400ff9ed07024200599e9cd489357b752939e0390d7b1f1bc880a087e339507ba31558a33d1383dc53733420168c7b754afbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d0a5d0b12a14716e212b6610d883b1
SHA1fc3151c8f6f17c5b61605afbc345229c182c4cd6
SHA256f313d274166ab98e247de71b54885b5e87c2bfa10cbd81aa251190775dfb4b4e
SHA512952607495a8a1e21d3d61bd91e07d22776ef3f362592f55ab5ce7c7a57a5c9ce10838b231332e617629bc544cbd936e79280b149d321bcfb2886651ff063d744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379134b1d2352c728f5f5531c60c4930
SHA16955b1d30eda9a8ceef9a7b0d488867662e77920
SHA2562c82d657a15ba81af536776a9fb191fd30c4ca3122ed224ad5bec6f62d7f0d16
SHA512e962a824508c60f8bbf0d375ba0559301c148d7ce0be0740e8f6ebf0651c49baa6a4964a0c35936f73fad66beb5404505b26b48e902834a6cdb486eba00f50ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bea475c868c21323e67aa655779ecc
SHA135c53a4b39b7a38d15f0611baa761bab7b1233e1
SHA256fa639ab83e69d461d4870089477b9d2f85eabecf1829a3272ce0abcaa9f32ba9
SHA512da2ed78efb2cb56e5aaa6d96283f17b2639060c12ff3bc281820ab2907a25e9f2f9ded2a6339a076f5e712b56c98e28fbf819a92b35c97a1d12ba013f638d845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125ff5ff4f9c6b8cbd36c7b122c9fb1c
SHA1e418b7f009cddd6f8868cd074f487e33148c89fa
SHA25653564ece1467edb58c1d1578c6d18f36ca00556e6895a1bd315737e4fc275447
SHA5120635953560c13e62cb0264b621916c5dda40fd01cd77d93c356bd7431fb5ad2f3eba1d967c4455a9346171598487ebe2c4b3a54a201f52c7e6533447bb9b0f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ff60a44b9b23254b33f725e12ee012
SHA1310e2cfea6b5af561b56c2a287f1982e84d78978
SHA256d617ccb26f1259a99ced7021f2d4860979da911d33bdac4f76b35303557bbafe
SHA512d08694ec48ec4e2cfc42b63ceb09cd176310d7d301fd815891751179dd47715c9c9a387e7a131b68d3d11d8ccb52bd3d9a2b5832e170959221982d8eed062e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58a7510f2fd5ef0b99023ae610decf0
SHA14f7643d696486f3d7a5947138ef74abdad87b4d5
SHA256da2c24056db2d4c57ec2f04854844d827a9fd8a3c32ed4678b8f66150a064b98
SHA5122f198caa0e7ecc94cfdd3fafa4ea5ff3ae3ececfead3b82f419c2ab24ac4f2f45212df6234c32bd6b7ecff736731fa3d9b4bd8a9431c18b2e56635146d4f3749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5495124c6d1bf9d7785a80535e4c61fb9
SHA1262875137052cadad0229ca067fc4a6d685ad552
SHA256a7a572d26e767c8f7df2f8a8c4547904ab5ad1cb6db5961a7a24be787313a4e7
SHA512d0a3942b4aef603f823236c95f2f672e1c2f69cdc4fdea56d350cffcaccf67ea2450d2614525a852f611236f30724ff36d776313083fc448ab30eb00c7845316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc979d13e332dcd5dff6a8abba24b9dc
SHA15c8a5cc3fbed645242b0b65daef781f48747cd0d
SHA256e86415e7bc92b3328350bd253432bd8b6985334db3c4b35d3d0c0ade0e1e6570
SHA512354fb425beca81c9be5cb004fac901e8209c48efe3aa81ca7aebdf0f2526eaac1104cdfd27b7210122de625ac77ea64f4d0bd8608504c6236cf5837d3f7abf57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501159721c2cffb9602d81c097ee084f3
SHA1be992c6b879f2c87da0b37ea17dec13c28288a0c
SHA256ba9da339955c04c3af8ec411f1ea529f8a94ec82856a37d79a5f247dccbda892
SHA512d56f4cd6da6e79fe292a6929f599e8989ec5a178199f7a06217c67ce504acc2e0b10f9c5e1a7b1b7eb70593a01d3a263055ad040484e6a07837d277d2debf4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36e2079554aa1054553a21fbab2634a
SHA156254b63d3c29add13bb63bf00c4060e14c4af46
SHA256f3a03a23b99ecd345055bb3d416372dad9e7e5fe0214e142a5e91c98a1c228c7
SHA5120517e386636f5e574564e8c698cda984dd3b78f66cdb4bdc9b93953639ae6c5813c2f07ffcefb67fc3c88acdc157c6bf1875be9cb7a68132de10f7279cf2fb51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a68563d15c6ada8eb63cd98a9168de
SHA125668912fb089d5bdcc2916ac1d0ff92c653e1d8
SHA25698b7f2f52e61bcc363700b18368cfa1259bc8bcdde1775f3ea1b04e771284737
SHA512a4674c4cfe495620b6b0854036ec0e96f19d48f3df8b494a46a16e6a5b1bb7511fd46d7723782c876d776717376ac8870c74d5b4a1789ccb5f9a364b95214e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0b2d631925a9136c0cbffcc5768ea7
SHA18c6711918241651d0cd6f58b9715706bb023a1fc
SHA256a2c066f26887654e0c4cae91dd37932cbf077f01ef4415e82472b363e8798dcb
SHA5123c65c0232883f94760090290319534eb1d825f44fa3a42fb45036816d340eacf5f52437bf3858e9bb4232226a79210473301014d53d86dcc16bf245238a40b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53197d005587273ccff933f56488dd4f2
SHA1f52e50c2aa205143504113e24559aeeab44153a0
SHA256629c06aaf90236beeffc12069a52232a9bd5939a45415c57ab384270a397f028
SHA5124ffbdaa06cb2eb5d95646bad64934f533174fee7b74491f3cc4c8ab56e61bb74c9ae00e45221519747a83130fd4e40f0eecfac7f0b5619a09a989303ba88ed78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d7c534b08a17ea3944a0abe2c716da
SHA18c3bd79d16d7c81ce2768c11cbb3c7f06ed77c68
SHA25645b3de1464fcc2eda2e3784b536ed72b0d5f0a6cbcbff53d666a7e0972308d1b
SHA512e58e42b566a25f1b30d64bf7121ed6292daf36bbaace7be8ac5c9e5bcdbb716110bbf530088d4167ba6eb015573776d8d5e54e5f4a784861c6b6be89b4b7e980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901bbe51b18d66eb8924fb5602f20a72
SHA17d619ee82075b01657dc108b472c1db8c60f3f7c
SHA256108b4c2732338e08303697bb158b0afeb40a924eafc6641719a568e835bbb897
SHA5123aa8b28920578ae0a54f5a7d92259e76cf259d6351a0bfa34f0baba71bae99960d3e5b6a71428fd6e803aed4a10210c405d1c0f12a773d812356c2f369ba973d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f37befb785cee25a141007540288f3
SHA17431a391eb3cd77264478fdd42247dd797e8e1f0
SHA25682d2f821bccd93288f2d18ebe6b896f05b24ad73cd45304c9324bbf6fe3aa43b
SHA5125a7d1f16af304724a6c36f79d0f000f0b1a48a7ea4662288849a08df5e02a7bd41c70f345bdd0629e6f45c301848901a49aa96bfb6cfce685d12a4bfec8b0fe1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b