Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
3aa50386dd51719ee1a409b1873a3bb5_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3aa50386dd51719ee1a409b1873a3bb5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3aa50386dd51719ee1a409b1873a3bb5_JaffaCakes118.html
-
Size
53KB
-
MD5
3aa50386dd51719ee1a409b1873a3bb5
-
SHA1
99a25ee795c214ac5028ecc07391dd56bc355da1
-
SHA256
ab5d0e3deb371e9e7a8c663db38928dab892f0b1f334d725ae02afe9e4a512ec
-
SHA512
4b63ea64b696c1fd327a6111be5b6af5de1a8e57b9eba69cb84d214dade80d9578761199990f2df3ee02980d294c5b7a9787ec987339280999317b19e736a17e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlYf63Nj+q5VyvR0w2AzTICbbZos/t9M/dNwIUEDmDH:CkgUiIakTqGivi+PyUDrunlYf63Nj+qW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1E0BC01-88AA-11EF-98B1-E20EBDDD16B9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a2bb89b71cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434907086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000000584ce68799af15d6ef7aa4035fd8fc9f17f023b906de8e3574bccb7ba350269000000000e80000000020000200000006e6555c0393dc96b2feba5c05bf3f111fdd033734e9361b64acdae977cd4fc09200000003b835ed7196932c494d924011ec24442d97ef483cde38e8120ee182cc155132340000000fab65cad99c0ead88681e5f941a027674f3c905e37a469912c7dcfb75fd0106792caef28e19180b0fb328fbd079a777be5866fb4a98d3728fc16595eec7922a2 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 524 iexplore.exe 524 iexplore.exe 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 524 wrote to memory of 2008 524 iexplore.exe 31 PID 524 wrote to memory of 2008 524 iexplore.exe 31 PID 524 wrote to memory of 2008 524 iexplore.exe 31 PID 524 wrote to memory of 2008 524 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3aa50386dd51719ee1a409b1873a3bb5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6950cc2e4a3955be6db4fe20ec73184
SHA15609bc39fc18043b86121426c4169daa88c48187
SHA2569d9a1651a6177fabbc08274aa03114439ea901e9cdbae1ca01e4264fa80b4a34
SHA512479d08b4c51a24ac68f5fba02d72f8d42e0799fb92d5439809d0fee6fb13c5eea229938d18c607f86da7604cf02e5c8af62802d339f9f98823234b2811853a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af77f5224d3945f5b2cf4ca98a0c1811
SHA112d17c5e1490a65eabc0e840028506cfd453b167
SHA256727529ad72c4dbfeb85c9388a1cba42e6d3a11077a885db353e64f817e616151
SHA512c98fa18580511c6be8105b0de807bb3ffbcb7d88f5959d7f21d3c26de382d2f63b13d02fcb6e40d0b0cd7045a2ed260b69306f21531d3d1d2c62cc0cb8d360de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3b372952726afabfa315067d6db260
SHA18862c1ef82100598ae13a121aad42e3ffb5e7544
SHA256a50fa8f474d546f75d22ccf779560af9f78e727a931467298698be2ef1ccc518
SHA512352111ff75e3db981ad20e5576d6219987d6f4b077d904c19ac4951867f6c72b9cf25f3f155a21613bd3a8d3e03a4833e1cb5f68eede5f27b16cc77c2e7d2be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7bd90d3131f1ab9009369705554177
SHA195f1462d233d4adb52d422cd531f3eb7340f023c
SHA256bdb1d945d8210079a21b6cd59a8ffc2dad1d55fe6f6a5dee9c43ee5cf340f52a
SHA5129ca0565353fb7b7453098cdba553e56e068959962fe9ee6e68a86f10a26019c97ab9bb14058dfbfa5498c64f487ee7e17e1cf333d4cc261659c5dd490247a0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bbbc2ce18a195efa42848c2f1bf302
SHA19abc7e5212f7d8734f112437aa005dbf0b3cf05d
SHA2563ebfc50e1f9dc0d2c26dc4e2ad8f71f6e0c2123b777e0baea5736d424b6bed3d
SHA5124b30b78139eac8295171df39a02158ef9674831ed03295083af0840e1b3d56ab77d4a8ab60f1b0f724311f20a3a55da3ad950f24a46e35f16a3cf77c0ae6c829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57043e9c6776933760cdf9d5656cfc9
SHA1b891e9b5c8d5fb4c55aa97ad73e419eee6b795be
SHA256d4f9e17a611d1ddb035035db4a5374e6e2852d5fecd4e3d8ed3edb7a7d190f10
SHA5128674a3d4c8de1ba8bb72b570ae7379350b2202171d0e26ea65be66537b58ef3463d3e4ef1b799c6669495e67f76997792adb68afe00a0b38f90dc300f222c1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22fc4ad8844652ad52d839de6990983
SHA17d5cbcc5c14ec3ffd163ec9eceba40cb0c525bad
SHA2560d411a128067bb604a6ab81a799f210fd81aabc28e73d2d8afc278744e9e8be3
SHA512772261f587a4c68d68e63c159648d3a5175faed5c0841431bd52c13aadf90e05dbce49dfe1eb5b2052ff2308da4b38081e23b06b74ff9b52073683d5e4d79fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af1e1681cf881d04c7372f5db11f77c
SHA125908d5e3a90c3bc270dd7a771533ee38634be74
SHA256356743cee68e2b2b0d3dc3ddc63e505e7bef47e9430dd9c5f631b1016568fb24
SHA512a16633aa37183e082c793c790f9b151e74a772d4f319c76211595390818808b2b4f6fbe8d200b37f8cbc1d26193ef098a3885825ec81c87bf28befde5eb78c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b8243ebdbc91bfadf3e66de4d8a697
SHA1024bfc4efb0a4855ace8d79696628ae5537b046e
SHA256832bc88e1494cdb86f73f336767f054d4cd90d08b7878c26ef4acd344b851d4d
SHA512891e5c0c35ce8b34e1080efc934346a29ba1d96b25cac5c3052d96c9857df46125b7a0c9576b889dcbe49405fa0360a0e17d6c149e8f06a2ca4b211bfab38a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28615a77438c6e160a23719ee84fd5e
SHA1308f85edc591b279e65c30778cd29d4ba10c2d93
SHA256dbba26f1b5d02c195b35ef0e293100ffc2f20c8fc88fdd9429fbddba43e4e78e
SHA5129356f374469c6a77f3fc25f6e19b7b0e98176129eef2c23078f29bc8255cff59bea738500619b27b5378a8560aa705614ba016d93910135121b14e703cd0ec90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e4ee34dd1c11e40aa82e48d24308bd
SHA1dbacd86ea01036b6b7d0a74b99ed22b005a4e78a
SHA256fffc3e923e5f4955e22387046455a275ea6bca6894e0ffb26023c53db3c29b0f
SHA512e6b95f8559dec568291bd16e9602a1724e1bbd97281d0a5a68f79d2be17a722ee677863d4d88e51ca71f8241535ce3d4edba7a3f6d8adeab6bcbff7e8e8847ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f76b6644afde9dd970e9ea012900d72
SHA135f35c7987561755bb963e5d3bd9e88b042f6f13
SHA256b19b741849fd7953c197a8c32f3b0a9c909ec7ca5bff4848762af347f8b04574
SHA512cde5a0f2934e541e5acbdc3fe1cdb31f3180a3c83b3589efe408f44968c88d976eff7542d8cfa528b19ce90924fe65999328bc7473717e2aae3d2b475f44cec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad30b8677efe075279acf1b9ecaca6f7
SHA1267cde9677290a637de5d87c5835556aaca5bb3b
SHA2569afd2061707d9bf6a5393d2ceec1b6e5cd343b807be39e9bed917266f19bbe08
SHA512f6bfbe3b078b1523fdada5d8817f6b47cfd0a3f31031b279a4fcaa7a053e500553cec595aa105c2db52341709dccdafa19fa43b404f52b09f7bfdc3dd5dbbe59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebce8128f9f2464a6d06f95f2707fe05
SHA197d6e49378751c8e3e90eb511ad12c4b80ccb625
SHA25615e426737f2a62a1a7d49b5edcb24fc56087a6e00973fe52db5b365749933341
SHA5123edb2ef6989e737e644d38c00780300436bca0e1528ac9c74b4603d93410dca62c54719fdeacef9e4a62807b54f91110956d780fe60333dcad7765220ecbafde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c28157ddccbb8a5c4220a51312acb69
SHA1f5d61150c1e7bc8b947394263d850b967830708c
SHA2567f3db8efe91980e27aad33209c0016234cdaa40515c43176d1374d3cec51b80e
SHA5124e3a337145ca2fcce03be254dc4de06a76dcf2f6c7e1952c7230addef5f3057da0186d039ce6bbd7eb69cb38e150fc3efff30b93577b55cb36c5609ab4500012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5780b7f83c5d84813e1367a43ddbb5c0b
SHA12dec6bb3f87592e71c24a4f0d5687a42903d3a97
SHA256c1416ad8374d3cb1716bb73be54144d999224fcf60e252f8e632949ee2a12f51
SHA512aa2f18b24d6f47aaf0706808902fdec58f8643d4672fac08397e3a96bc28bef3e75de1f08b9ee4fb0229c6e2cb5f47cde08267b62aaa7025b7660054ddecdd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556c128e537359e72ad1c9dbadeed4c9
SHA1b1efc00967973c332615f4c1cba5514b74d0d9db
SHA2560aa532ba4840c8677e6a3c565c5094e961840a778ec91231bebf612b7f264dca
SHA5124c1d3f770fe83c7c21d801fd63cf4b77be112e59cda08fa7118b5967a639d29c49cafe774eb342524f4f880b24dd75b8cacf653deda16e67561d6ec1e2e94463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dbe792e15eb53dc05a672a30a21ef1b
SHA18413897d22674e3e8113ba23e135f557996a4761
SHA2560877e434f231592e03e12885ed0b88cf40d93565fe9fd49005846b5a8d638c44
SHA512a2e52a4f60f891c6e41525c6b3fa40bb81145ee81186e3d534bfe7b9f18a821f6f58d645a8221dae88c4c85deffbeb3c5125734943221c9f2285a7f11fbff528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057aede13bd1f7e459e01dd846fa826d
SHA1070ebbab4d9336cf54685a9c53075268f2593714
SHA2563c7ffd7b47a7ce9d52b2b4d228bd63288a0c59ba6b4b203130fbb6d08bcd257f
SHA5121aae4d703869846c27777c145997aa42640c1ca60df2724d688434d6c73ea9b4056989e4879c5e129b6ea4734ead904eea8323ed768050e458c945600409c2d8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b