Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
39c3857febf70a9a6531536e47d3c5a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c3857febf70a9a6531536e47d3c5a7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39c3857febf70a9a6531536e47d3c5a7_JaffaCakes118.html
-
Size
15KB
-
MD5
39c3857febf70a9a6531536e47d3c5a7
-
SHA1
7366e23a606b083b64668ade3119817ea1c9944f
-
SHA256
7998c1d412702b916e7eacf222f33e9bbf085707f78ab02c039e9e1d610c6a51
-
SHA512
f51fb0870eedb6e23fdd78aa6b94a13e02c0da978f134df111b18acdd418a46b3e4bc5e6cecd4b53151f32d5ee5e7a137c6ead172a1842276bdc2e9bac6b82b9
-
SSDEEP
384:AmRGZO53Fe7ipG3wMzlQMTvdcAj1t98rjL:AkGEve7isAPMT+Aj1t98rjL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{113FC1A1-888D-11EF-83AF-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09d79e8991cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000003ad62009f8e294e6d18b79ff535c02902e4bafde0206b60a502e24fb3e6e94b6000000000e80000000020000200000004cb8306ac122fe5cdc67830d08ecf4a3b0e50fd7f3d0434ccd95d35b5697323a200000000d83e29570bffccca74ab7830dd5f186d221a52863b001f34b6416b1370244c8400000004c0b3ea6a31e03ebd46d133d6e3a8ab4f43447a4f3da9364b9be056496ce35537fb87537a59c6a4e8437ad7b46667447bd098e8654cb046d79cb37b91560fbed iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434894360" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2260 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2260 iexplore.exe 2260 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2684 2260 iexplore.exe 31 PID 2260 wrote to memory of 2684 2260 iexplore.exe 31 PID 2260 wrote to memory of 2684 2260 iexplore.exe 31 PID 2260 wrote to memory of 2684 2260 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39c3857febf70a9a6531536e47d3c5a7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5a696a6b4b1384620f8507c6f851e7
SHA143e03498d75c2b6d2e91dc15382929f8aed7e4f8
SHA2567e266b2b1deb9bbe50cf789a93e15c64eed5d4894e5bdea04b31d9e13c12e396
SHA51233270deb206649104107c7d7b5b313d25ca474ac0d916cae06115a094d561f0c6b877b47b39132a575f4dee95f220e87e71024be3f07655cd13234f69be4df31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2ea19a95e94737fd74393d207181da
SHA139b1a3490eaa183d9cdd310b1a132bd8280c1b18
SHA25604b0e4202ff345a0f30eebb3a8be918b3ecd9962b972c9ffeb0984a0dbf91391
SHA51266bc2ddd603dbc4031b23d53f12d390b4681f97d634178288e57028fe577a569907a5945cfc7e1e4998de567995f836664aee9f7a7539e3e423d0920c4bf65ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a4d416dd2d9df5beba0a43f2a372ee
SHA1eccde57420215446f7354d46549d219ab92619fa
SHA25692899b8d3dd4a575ff3f2ec7daa0203fb15aed42c258032e390630d85a82759f
SHA512d607b63ce74e0eecd98151f3c665e3828cbdc3e5e670050459c42fc8637c70161f1325b5f55292995f5264600c070ea91182c97520593e0b95ddb67db0cf40af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19a3994cf57e84a0179164cdd54fcd3
SHA19cf1e3b4ee79f063efb92482832d9baad1ab6d82
SHA2560d486a21702a2020e5a4d62199dbf39b4f6e9f1648cac848eae7ba963e7c3b15
SHA512d90db9cc3078087ac3b8dc0ba79f87d60e6f1864fa16c9e4eb48b0ccc08418f50bdf0b01156edbac1ff09ef73057492f24e0b0cbdc7bf76ba8c24164a0388b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ad5dde36277db2044fb6e82788dcb7
SHA111956711638c288108e91d460eb40d1853ca1e2d
SHA25659de863ce6cf316fda3da1644c9b342aeb583884be1bec5aa8899d08c59a98e9
SHA512792f0fa767447fb69a1b87f81c4519c74bd93b59c22dce8f3a3d4f27a2633f0c38085f1c0e94be991c031fe1f83bba49db8835fcc28f907d54168d3795ce92de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af0195240eee866dbe0b9a1ddcf8129
SHA1095171f14087caec4b1308c9b176347d2b640e1e
SHA2564b8c1fb36a18e07283e25a07d34b6f5d0bdcec01d9b3a525edeec09ced2ac0ef
SHA512e1a09afc980ec86d04acdb5dfe62f90d0dfbf0c7e2368b7f8787ab3d0d8b8586758806c1c8fff9f3483ce5057fc9f8e32ceebc7738050d35cdd0d6cded38831c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65626837b381f0a99c20adee8332df3
SHA13211b91771c5e2410258dd86c6c651b79689b654
SHA256d0a3ba6fceb5ca83d3f8e3a21353a03acbd9fc988ff5376d6b1f7e869efed02b
SHA5124d9fe5e4b8bfd22f21a4bac0591f738aeb295527747b0667534f5a090444c8d524ea92901964f399338a98040c12080381fc9d0fff974444f6dd817b68fdf4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1ae4d08a35aed93fb5423413056398
SHA1f04dd067a5e2710bc8fd8cbd108d6e01a56eacb6
SHA256e944f6349155584d40437422c4c300907b80d3f5725c0877b827be243b23cc6c
SHA51273a41b672ff2fa96da617ad10da371270c022c005b4abb05f9968ad0c5a70bfc0b47d983201991d37f6662cccd196535a58f098ee05c5a3e55dc9ed2ec8ecbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a62c80d945c2482e639b8ece1db4b40
SHA13b9d66ad1522228ac6aea27147c8d369e17c846f
SHA256df4d32906f2fe4c67440f06e5b386742754329fd448689ccb69256ccdc5ea129
SHA512982aa9ddc38a2e40bfc2df77dc8aacb6b2dc353643bc57e7c1f52bf7002e8f35bcba199890f7bc565bc19729ec002dfcdb4e346325110c1a645cf9e50622164f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8cce513fe6341c7e7b8444f381c455
SHA1ddad97b2bd0b06f7d51509b26c8292670a31b99b
SHA2563715d129fc9853c128eb3003f3ea2d25b20cdeee698b173c1c2b09208fc35f45
SHA5121c148f4af0feed6c243ca45d4465061770a434e436b257bd9aecd52340718246521e6b56411e5ec352e7d216259126fff99561dd200ae845bf2b6614c26df24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db1152a93baae4a2ceeab6d76682a25
SHA1180ccb84ff1824304497042f0e3f1134bcd3a9db
SHA2566edcfaf4333b6e3325774fced2fc685d6ea35aa7e73a6a5da46204a746859594
SHA5127d007b899042c607959ef43ddd81ee9b43c907577c58e8ffbe3316fe3471ca3932ed6920d01cf9ea07d55c97bd8e2e8f943b22c0f37543e8e6d6292f751ba436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583210a6e3caba56e46b6e511fbb33ded
SHA1d078ca0ee7b09ac554e0041e3cebef3f9c24fccd
SHA2566adfc85257556ad70feb17cf11d05c36cc2acdd589da609a98bf47defef985a9
SHA512337025e85f0ea245911962e39c1dbde96e11941d462e15f42ec81d92363b5c594f59a5850279e405b43ab116da7677009681f8362e5f3fbca963b680ef11d73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db473ded5e152e7532a34d27a873944
SHA10f205059480bd20442d8eeb9fc2dda5ef3053b75
SHA25641cf6fd72f0701f25098e1dded4e3af008fcca777b0d30dfb15015dc63a5b27d
SHA512fbab4b0504dd99fb82b39b47fe2d26fcd55d2594d0147be7e2ab097995c846a58573e596ff38cc76c1db420c01c6ba472e971c7121bc9e2da5d0079811768faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e032ebad737dcf3c894ed47ef5242a
SHA18dd4030206a01a88df83aa48e2301ae049c917db
SHA2567c1040b32298541a2dc1053b9e1f344182ba52e887f4c6b7e715502127fdf775
SHA512a5e11078bfe9c7ab984934ac7778e7c5a92391b0d4b5bc4d3d30a81cd1c3045411827b2cca55c3cf9580aa2183e57d2e7e9cc799a55050f76cf3cae19e2dd19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3fc9d3d72194458942f67df9e14ea67
SHA1ca2d8177818df2758e089f2c54a7d3e3387af856
SHA2560fa8fa0edba34b8a0788da1725098e734d2cca0ac0d11f5f6abd1e32262c6ec1
SHA5125193e5ff414a2678b055aae9fa715897ea2f681f164b48e89a3ee03f74b816b1800b3212dbd26ebc9ad9bc6717d065d845fc562eae91c6a047c099ce32c5cacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3af98103c553184731f0e7719472569
SHA12fe14f1b5a9975eca3ed6dd03b992a8eed7a6875
SHA2564eeba1d39786f4ddde98f3e9b1e6b37ff1873c1fd0bcdd24d50b775ef61e97f2
SHA5129d70f487ec75fc87584e81978f8a6ba40eecf7c164b4e098728417668a83823a224004ca53810292a75cb0bbeee33af991aa9977eb70690ddd6ae9e28e46e1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567500e78274579194a0a06942aeef195
SHA12ebf7c677cfa3a5fdcad48407c3a486c65becb91
SHA2563fb7e0f503d065c89124f740b97d0c32a625e3910bdf22ad8a4a7feb201c4a2f
SHA51229d46b6c78ce7a486421e77b6fc56302bbcabd7dbeb97eed519f6f1a609fe11f836a97edf6dc2f1ae685f24401dd7952c171f3db015a43c44819678d9283ab8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d27e2efebcc8538aaa2881905609a43
SHA1fb0d5a95c1d2d64347d014b6083e3b6376e921da
SHA2562551b7735ecaf6e611f63071e633bf6227e450225d4cf307e22ef8db373aa633
SHA512ddc1f1ba2763edac6851710e86eb0743b1e8224741b60d01256fbff710ac571b810365b414643bef2131809112589ffee98357115aed38f1aa3d65ab46e4372e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56617db56034c73ab8008fd61a396ae5b
SHA1b0e7b2bff044b2b0a6a21f7f66bc6de4607af40d
SHA256b32acccb34a693249ca0ebf95becfcc7f5d2e49b175fed0900a2e9414293046c
SHA512c6c56603069f141700c25378d27c8ea0d7c334056f0f8d74fc3529dbf90c301ad88db254a8d7a265930381be8f0755bb89fa8763d66b1c3ebd00fea236408eee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b