Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
3ab43b3047cc55bd6122a90e7ec9f026_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ab43b3047cc55bd6122a90e7ec9f026_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ab43b3047cc55bd6122a90e7ec9f026_JaffaCakes118.html
-
Size
6KB
-
MD5
3ab43b3047cc55bd6122a90e7ec9f026
-
SHA1
9a62c9062acea0e3687d5d97062f84e33f421535
-
SHA256
9a991ec4f471bd89e666c5af73b7ca39009759dfe2024d25d54b724f7e316812
-
SHA512
c79b992e640ef01db28ec6eff1e81b63f9f532f15d999c7ecb21e4a48770cc76a865622c9b66132e3e241f99d2ff64916aefcfdaec3ffa8ba39971083300bf29
-
SSDEEP
96:uzVs+ux7ZFLLY1k9o84d12ef7CSTUTZcEZ7ru7f:csz7ZFAYS/ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98E9D361-88AC-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434907906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bafd158dea31744f99abdc1bb05d4dcf0000000002000000000010660000000100002000000031141986fceaff125688514e767e2265b78e24e95c72e6ca738190e9778ad258000000000e8000000002000020000000db3ace084b0e81be7b8b0732aa87e45e54bc08c0fe4eb49536862d317e858c5d20000000d0b8f4fa27b0c7f0fc530a0cbef67501607479833291e5710e45c01febbc0e0d4000000047e1f20f45bd45d6a1b838ebe414e962b67bff1968fca39bffc2eac3f0badea581ddb112fa307afd7b64f47cf01a85e2cf94df4dfdbe566ed6702bc78d1fe639 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f059496eb91cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2700 2756 iexplore.exe 31 PID 2756 wrote to memory of 2700 2756 iexplore.exe 31 PID 2756 wrote to memory of 2700 2756 iexplore.exe 31 PID 2756 wrote to memory of 2700 2756 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ab43b3047cc55bd6122a90e7ec9f026_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f978990c053f45f76646afca2bd08e95
SHA1f175cfe726492e4c9f8ead99553e189ed16ab723
SHA2563163b8e8f83b722bd172d2d4607a3b584811f2c9447076fe617b245d5961a92d
SHA512948e5b10ffe92f72c8bbd829489be165ecf4846d1de84c55fe9c69130934678e48db420b71e92c39d07d0b1466e029debe591c0cdd02a420674bd4d60d7f35da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e02a77c6db898ee51a3b5bb666c70f
SHA103f17018eb8b77e7f08ce4967e3b01d434f4090a
SHA25693a8b9ee01cb02ea5359fbc91ec98792045cd53db0eb68a25434620c7c9e4bef
SHA5124ad9ceebb8163f43d1a80cbec83785a7f29eca9b645f6d6fceef7ea85bcc38e57c6a801218ac3d57831d9842a5feb1371ee8ad2bb59c8dbc3c3123046d5c03fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a44c2d801073c8895f4cb3d42355a34
SHA1476a7b5635bdf906b15eb9eaa6b8d366a6f27cf9
SHA25670c2a813ca775ebbd746e5e32cfa85df394efce4aa3a9dd9016edd2c4dcddbf9
SHA512d429c9ea713b1f7087e24ff0182a771428c6c7011bbd323da1bee4513b2258bf14b957ab808d47ef6023a8a144afbf6ba219758df4724349175e160ad24a01de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d545701bfff13d1ff44266eba1e5ac75
SHA1157945cf0ee4952a94c5875f3442f7f8c90e9be1
SHA25653f52a1a9300d4d63903c2b2417348032611704611ab36365b2ddec4d961d716
SHA51263d68e7e1ba15fa059b3e45fabf8e417ba6748aa45ec20a153f85a1263c6ea3b249054f210dd88369af763231b5a214c3b2830be05ed4b89f1b7cf795b1b1218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74fda95c99b2cff47e56e93c9c82d71
SHA1d1cb116e04dc0787040e6131318793caab07b4c8
SHA256d1134ca92bee1cf11b055ed0eabd6de7397321ed1940f53bdb043f090b38ba96
SHA51222b7bb68a28bfb782cee3a39fd26e69f98a998bac1eaa80940576a2c84b0ef50446333d97424911da365fc224487b6a6c5d8a32d9c4795c63ecbb24fa0895825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50882ada6f1c73b72231c81364960ba61
SHA1390d37d578dd64233dde225db98fd088f2d7d0df
SHA2566ff779761f501b4dd48e90216d274dc88433a9543f105e0bb3678b604ed2a77f
SHA5128e241294a3d98399cd8bd6c5390537fc4b4f3bb8e1ae73d4d4a42db66334a224109d77246b0ba534730258009040d81a28fcdbaae7ef4b574d436501e80b0c28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b65927260301743c081e721d2bb693
SHA1d2733a5d51d5250865608e518d5623d591fb0d13
SHA256a31957f1973a20f55319fd62f1ece2994e68c4a5452390c86a2b4016b97ac02c
SHA512db39e84871d286623e143ec5b94c46837ad8d1efd7d7dd221b7494655c6a5e63222d3a38cad0ec9f331129e3d1363ded4bafb654e41071abfb08208394e413d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7845982eaa6ccb30488871866b6761b
SHA19c563c9979bd73511ae2c033573c24ab061297ea
SHA256feee9f7764a7cd77ae3183dd1d63b3bca18f9e0dceab30002018ccaff7bfb45e
SHA5126710b36679c00f3c03a0b3a969a2a9700f04919c37644b9d48f7aa75d2b9d3cd365e55a68e0c72aade22e697568277512f4db8513999430a40acbfcfc5158901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53697169645835e78f9c487c019d925cf
SHA1f2cb25462624ffdc71fac3a602090174c49afef6
SHA2568552809a42c002edafbd3fa37750ce9406c366c233c4805868a4a669a9331461
SHA51282aa35589e58ed8d55d925bf0ae636cfbdcfb3d242d3ce5fb29ccfe607da0687e96f775155af1a0ea53f274230cfdbd6a129a83b1da9af49b8a1f0374493d4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2d73fc2093c1be58d2d91b3687fe51
SHA16e29a406d48372bbe3fdbaed55b9d42dad36bea1
SHA256745496f15c3f34c1f2561ba3d1a846ae5c4e260c00fd2ba87dee0a9a3e3d60a0
SHA5120bdf7096ba9326b80cb95a44bc6de3e2d0bca9a85a181bc89fc8c1d584967735139c29c98c7556950961ee11430c76b616fff6142c2cfa9be1d85cde49a1278e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9c6076120a8708fb5567d7d825626c
SHA19d371a8b1074d5f46484047a89e8b8daf913cf09
SHA256493ce460693daf8777adbcae4e6a0c6ec0f32b8043d3a2da0d643c5c1f938d81
SHA512ca4ab1c19537c74318977f2454e0bfc9d498cb105dcf36c8752723b86ab21c8b6f33fe5effcc6c097385b5edf269b589fc987e3eec0f514d1752b1b17cd35798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764547758449187882f030d15209ea11
SHA1ee25511a1108ea7ba28f313639e7807641baf773
SHA25648609a3baadd55f6c64960ca77a98b97cfb9c316776dc7b5cc82d8e189c6b37a
SHA51219517e26596db8e04501271d364fc47e9c5f498bc98554b9d9e2296f0ace4ec56b3547f8879ccf670166c9d1a85b4ca5c9c31406a229b6d229e6ca6bc74e59af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7d70173fafb385277b90b335a59661
SHA15dabaffbac025e687a76db0ce856aeed31c13398
SHA256c9a9e0199d7f160363ae29028065a76bb3c4ab6266802fc5a13306484ef9db34
SHA512b420f86d4eb5d0826be72b7ce2dc7b0d3db164ede063d366a56ca521365dbc80c00545a0519efa11e69e1731ee979be98d215d4ad4979031c12331682e5438d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9825b4ae13b9b5647c5699ca856491
SHA152f133c565bb561b60a5a06426ee55bc43e1da5d
SHA256bc3fdd4453ea52d4f4e0c54b1bbcc03504668eb0947831b14865b9f1cdd65f8d
SHA5124e155ee6dcd7d07c22262d9764eadaa51e95663255b065289c78a412d221f11600cebb7e91a91590b655d68b518ce9d70df293773d1649fb523de52095e3d6e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b