Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
3a9c951b8c59e3bd2644ccc6682e5445_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a9c951b8c59e3bd2644ccc6682e5445_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a9c951b8c59e3bd2644ccc6682e5445_JaffaCakes118.html
-
Size
57KB
-
MD5
3a9c951b8c59e3bd2644ccc6682e5445
-
SHA1
4a922bc972ab26ddf3c41e8b24a5a60b91c7d1c3
-
SHA256
a8a3205029e3a8dc56c1aca05094fa641797d3d9723b589ce7c21bc7be24bd1f
-
SHA512
f10c49e0fe43181144d756317885ed658209e46556197ffbd1135ff7248e88070f81f14d8bdcd6be5f970f901a4072570adc3da87da49677144cd27ca18e24db
-
SSDEEP
1536:gQZBCCOdd0IxC819Uflfwf8fOf3ftfsfufqfrfufxfafmfEfUfVfqfefdfQf3fyU:gk2H0IxgtIUG/lEWyDmpSescNiGlIv6U
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FAB1051-88A9-11EF-9D46-D6B302822781} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700ad965b61cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000054fa39c01071ae70816efdf317c537e4df9e348f1cfcc8067e46b0746a2c6022000000000e8000000002000020000000bd948dbaf5217bc51b3ed4fd2dce5fdab8697d967adc437497b9585b9e69da6520000000ad2a1aca4fe05a75c2a8fdfdc264abefaf94fba3d9ea94567264bd1cb714dac6400000005fd3b7fc6b7a9992ed898396a81d8357c4063ba0a9be4c0ae0690dce719a8dce290e3f5aeb3e82450ee2b8b5cc9de7d606ab5f54821d51fdcf4b4df66840624e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434906599" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2880 2528 iexplore.exe 30 PID 2528 wrote to memory of 2880 2528 iexplore.exe 30 PID 2528 wrote to memory of 2880 2528 iexplore.exe 30 PID 2528 wrote to memory of 2880 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a9c951b8c59e3bd2644ccc6682e5445_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596532ebbce8443aad3a143b730689651
SHA1f8edca82a49ec58291085dad3056aa8fff2c291b
SHA256ae9733ea555f33ba6ec04d9bcb92adcfebcff7f68e1392fc9ac9f7d7d245139c
SHA512afd538541d37df312e6e2fcc9a6569a854006ac94f59a851fecd49118ccea575ce47138c1a398a378d0ea0204c6aa57b81fd6fa394b567940d61d87e55030120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c3804769a41ec0fdaf125f9b8fd7d5
SHA1d0016c54315c5b4e69399a32666f8d9554849bbc
SHA256230241d8598329d3523bbdaa7ac11ed9bb110f755775972c1c4e025aa71a69ee
SHA5125f948526c03de95cf41e57d9e116ba6008592b3dae4e6d0e14beb1e9fa4188d84c1753a3fcc6801442b5a52921cacf1ee8489f7c6cc08e44474cfd81a957f16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52300075c72cd2546fe725d5e8a00e446
SHA1b57f6d767df16aa95c7a0e06e333b7e79a316bff
SHA256dbf2375f93a33203451bc2568fb4db2ff246a215a42a2cd5e1b9e2c441af6a2e
SHA512e9996217b982403f1d8480eb6db4f37a90a94aa2ca261a9e89d3e30e64427e45c8fe114fc57690a9814b6585eea431d5c6229bde263958c8def0524180aff920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b220d7cebc5fbf98fb401fd30b2898f
SHA13b1ce41d52a122815bddac43dc31b9641f8a3e92
SHA2561c29f5030046e52ad0f53d5a91cf0b1c616b551041ff3372e3610b49f573c22b
SHA512fccc6c484dc872e9a51b3976693c5ad7fc06e695fa17366b25a4b64fd243cfe16a6cdd7bfb1a2d5f59125b43df4d9dd7871cda3bf1a5f87e2421aeb7ef70997b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54461a5ab12a165848deb1604ebf034b5
SHA1abb80a967b3cf01394290a6b95cc115bcc25c0b4
SHA256bb478ac9e811468c2e42185d7952f486563dff861bdcb79e48ada55969edb73c
SHA5123c77fe66fc49b61d8d9a8e28fa748c2c0d9c001dc4b57efd821b52f00738551efdeaad05811a06639e895f9e67a5f694f2419beecef06e9272b2c819ffc1b480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac32112a047aa180730fa6a7e0d61bae
SHA1d2fba05fd736df55755efb2c8fe02fe09f82daf7
SHA256f02d0bcf6fa13601e3d577520c7c712578575b14864403decdae4101674c914f
SHA51255ef10585240ac85c2c019c29a484c373eaa063fcc69bbe73a8cd66cbf171dcb258242baacf68ff47e865f2f408f659fcb2382cc6bbe2ddb9ede8207a336aaeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d70299aa51735e8c66861139347e42
SHA156e57a9192bda38b35b3db7bfc86fe0922a887e0
SHA2565807d2193eebe9734120836569b186c5ebed583507ece36cc9b90dcb9e9ec880
SHA5127974368dbe1434ed12823ca00dac32c31d7ed5df3373f270ab357f468ef5a0bec299a173b8208bb645777fc89d4bf7a8b02d89d64b28fb2c47db6b3d17dc5fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6892a7a5d015be41046d5fdf798a12
SHA1c711c557a287edcf8160f180cf5b08bcb5106b04
SHA256f8bf4fb395c677d23ab97a9f342eced9aafff803dd64f5fffb34b7afc10f74c4
SHA512ff133111c21c8a7b93a85de9bb19da5b0a98a3ca2f87652be167b2f32281d9fbd935ddadc4bdac3b571d4aa92cbdb098ebac954a4639fc2a42f1633a2b59cad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321aafc4e7f638e77b0c0b856d47e552
SHA1c2b7434e63a2db3bbf154f82234182511b56ad8b
SHA2569a444c5ec3db4eb1b0ff639f23aca610ac7e7fdd76da31c294e2d82ff9101d6d
SHA51275f57ecec594acaa8f294cc67a6f4cf097000344d0f5ba133b08c74545e5dd99993e7e34402dd5f7101627c4a48f4630bfcfb335d7c55ef63834ad919ffceec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1915be446bccb9d11851a0d2e88a36
SHA1ecdf843ff9735fbcbd25c05a374e264bdc0d4658
SHA25644efbbbca772bac851cf04437b46ccef78c5b200974948cf8cc33f5939acad27
SHA512ac7593365029511ef8715d1cfa3bda235cd053e63dfd00b43daa4fddd1f88edc4a135984e39231386d4b018b10d4d3d4244c123d1386f11d24b4d5b9f3ae2752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf54b64cc1c77212ab99672863881bec
SHA16ea9b9d955fbfccf64c936e7b4b95cefed6a4570
SHA256c6c9195f0def3ef8e8414f9cc640e3f07e1c375579bcd65de29b6ba29901b8f8
SHA512b3ea68ea7a39de96e1137a2fdc49f56f2e65491ae918ddd722b27af4d36de5f1ef444a00c1c58daa03f092c08dd71aa542fda0638e4f9e1de486ef2990c615e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01cafb8745bab3524115cf3f0acea25
SHA1e78e7ae3763f5c43065d0a1bc6302d1027e685ea
SHA25686a1928d43a53a2df58d7f7b72be9d52ec405c75d4139d0e0cce9a8b63d10339
SHA51265af36bd70f210425fb7f4ff97d79575aae391cc6e6f03a88ffdb26a2af25982a933a01387f655015bdd059c387320cf3ecca86332c22ba578d9ae70f8fe7cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee6011ea58600c86b95e450dbf690de
SHA1e469e0de30dd8e6055e41e3e1e9943a2ee57298b
SHA2561a2abacbad78a0d691f3f8bf5e717b6171bcd097abd58ca9abebb24ad82a3a05
SHA5124b8dc9cf1ae2dad9ad40801b54117b8ebedba3f884f25f45ad39c6de49d4bf3296ab9d5b89efaba84936cd589cc99b26aad135e089a885454ff0d96ae240f5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540097b41da4eff36b7e6ec7439460071
SHA1a0251bcd3585715e7df3204f2b8549fa8089891f
SHA25607db1364bec09764702487d80ae2d019d94af03fc8ad6b6ade13ae89e6897834
SHA51246bab1dd34831c83d7526bb2d8505c4940816f0160957b2cc39f30f466dcf47ea6eb680c3c826fb1ae1a0bf012577fceb1b1fb8450d86d0ef86a110fff68b8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b67dab498fc9521c20e634b429cc3e
SHA166ce09eaf0d3aabbb9e1815c67c4f7eea2a5b521
SHA2567229e317b7cd71a9a56926ad8f74938ce88b494d15599cdd250ef89d0db7cb09
SHA5127bbf7c81dcc8949cbd7ee483fb7ec19b31bf4653c7e00033d21ffae45831fca1a3c02f5d16ab9c51154f1720d5c4e4581240c34d8d228401fe7b4d22077d4b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70342cf633a47fc80df68e0dfb44611
SHA129be61d3326efed17a443a9f7387026d23e670c8
SHA256506e0537d5bd4ede14f6c3ef418eb6d2bdb2ba15e5b032647e9374c67e1cfe0a
SHA5122e6496c91a76dc7e94704f017d8a487133936a9766aa7873499f8efbfe6db427699b6540359771c4df68a50df2ae8a42ff1655464efa46a3490de9b1f1e07307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530df305801967906ed1dd6864feb53c9
SHA190466248a2b639acb244928550dfb70cc8a55a1c
SHA256e98f119d6480cfcd560d99e087d04bb2d153d58848c48678de4ba612be083aae
SHA5121f4df005b492fd13885f4e5b690f42ed65a9940fe74a839d8724fe8568e60d59154d00638b0cf573e371ccc48a7e5454f1641a224903316380641eaee65503f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b3ea4c553b5bdb48a10c377da270e1
SHA18847d598c933b0963ca2e16feee1cadea27cd98c
SHA256ef9ba127e0dcb25baffa80e50a9c460bb8028be5ed8be31db606bdf70af79bdf
SHA512206777143b748801be6ce297d5e9ca81be67e904a97adf213bcf4042d79450b4b69694742217707f8f2e9518bc57d92ecfdeadc5d9786f17cff1e67fc5d8bddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553dd23ae398d1ec7cfe077d8b616b9f1
SHA105c99fa9f5cbb460516ba709a5d37d2c4cf732a4
SHA25679599f39348176c01008ca3ce35347c03c0fd974f495ca904efea05ce390eec6
SHA5127a2f1b9200c959566ad479cc00591fb55ada070a3b99740a1d5de461e19b0b559b7c821137bda183b77423cc442b433343496baf1abd99c4ea52275925885190
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b