Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
3b0158bbad1c04e6dff10a1182b05d8a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b0158bbad1c04e6dff10a1182b05d8a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b0158bbad1c04e6dff10a1182b05d8a_JaffaCakes118.html
-
Size
6KB
-
MD5
3b0158bbad1c04e6dff10a1182b05d8a
-
SHA1
bdd852448b0de55876904f3af79bf1cb6cd98cb3
-
SHA256
9f5ed74c0eb47c772f6ed13eef6fca568cc40014a512d1d0c75a34aa946092b8
-
SHA512
883b8918f67f7038ca2d21028eba0436cb61d6ff807262d3c17414368c7ba042587741970ae32eb85c479cd0daa2d9697320c5abde1480d3919cf762103b1fbb
-
SSDEEP
96:uzVs+ux7x6LLY1k9o84d12ef7CSTURCo/6/NcEZ7ru7f:csz7x6AYS/w4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434912539" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bdb6159468e62e4f92192b6c4bc6f23e00000000020000000000106600000001000020000000c623a817b53dca451b3fc88a7df854e938a5f2bdce18fb29ca3ee2e5579ff59c000000000e800000000200002000000052ea6493e8fa4759083f79b53bc63506cf276277531605befbe55184bf94e494200000008e151d719751e38dced4901fbba0a3e42c337aea817262eb16cfc83ed7eaed81400000004523f7959f6b90b229ae90cf3d3839b7685c3ad98aed54979d8e80b57954d539d0d6ae62ba3f5e7e279051ca9f6421729364a4e7d62838ac171ab2b80f69ea83 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b4ea53c41cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64C60351-88B7-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1928 2328 iexplore.exe 31 PID 2328 wrote to memory of 1928 2328 iexplore.exe 31 PID 2328 wrote to memory of 1928 2328 iexplore.exe 31 PID 2328 wrote to memory of 1928 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b0158bbad1c04e6dff10a1182b05d8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75d6fc247ad2acecada2754ceef1722
SHA1320a073b27c1ccf78117067fc35d1ea5fc0d99bd
SHA256ea645a0e3ddd753afe62d728b5d517e8d6ff5515a36bb802b31987e57beb2e4b
SHA5125617940e14d73c6f9230f6b05fcfe17811427b2dca2c6ff0be58d95fa59bf5cb8f359d8d47b52280c17cd9d54dd979018f26d71f69301601a51b9fbf15c0e10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f10d5f6fb4d82a81058b67967ca424b
SHA1693b1347a2c992a1c16e6014b3cf1dac10b9d7e7
SHA256d88862d275a921e5c180d50ec04b5a704058160aa6c8a4248db11b88b1b17fbb
SHA5124c2bb9ef7017cf1fa2b880a6aeeeb9770a45c655190eb75c0b8910c2f15a5dff48d8fa2301bd2a79770897674b50df37c41949c3af9dbfdc9cbccbc9a6bfe9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2df65b41375d1e58545c571aa389156
SHA180996d50706b4d7a830071ca28a9773e94ba7cf5
SHA256ddf8b45258f22544350c9484e548683cb72a9c1d1130d51ea467e05fcf10823d
SHA512af1118762b105fd9cd15564ccdb39e7865d8e46e301a7e894172809746a27bd6f0a080f6ebc47da306955ae35ab4fcbfb07b8c497fe1a92ba814ace46ccd6d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1aa4d616d58428850c1ccc6c8c1038
SHA1c5b7cd6e7410f7431eecb88078399116ad4e99f9
SHA256e050d39906fe191d6f06cf546811d5d8ed4c5d62d6e475ce25ea48dd2ea9ea5b
SHA512c3c78f5c66c679eab007110cd347260fb9b733fdb5a848901addbb511506369529c58f8aa3f773f837110c990e235f0aef8eb919cfb6551589a5da53a6cd1bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c02b11bddfcf6f2e79103c8fd1bbe1
SHA1a4925f0aa5bc81f84c6250c737a02c93eaac79ac
SHA256f1b14a895d1705a3f1fa1cd0df4eeace98ac9ff5bf06e8823d0f912b16430196
SHA512306db2fe9f0c14ff059d45f22730b7599b376d319a7ab844e75d27e3839141875b8ff233618d2d6abe730505f5eb2fff03f0f8e7546661629ef6ca0ccd856c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a6a9db9ed26d877444fef80411cd75
SHA11562be1491cd955e04920aeea9d6bcec18b97da6
SHA256c8bb60760748f59030bf35aaa9240bdabe7648d39f2610864c6f30028b295a47
SHA512d4cef27c0746872dba51b865cd3791e88a7afa65c4070599e40904d77692196a19a7bb1d3767947e1da929ecd2326fe5147c92028710b2176ecca864c17ff6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a741bd8d94177c533c1f18a44d33c05
SHA165c81634662eb3d67c612d68c9a72d74ffd1df4d
SHA256b19d7ad042e6a94b329495dcf8cf97dc44e6cd0b1ed07786150a4e8007aef47c
SHA512fbe54c269d7b3dc77a173890abef055af720d2803646fb79b93429d331bcc48000a7237bb553c759a63d14f9ddaf18317a88924a8bf4ac2aa6fdb589dd441882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362e7d91bb4d88341b1dd90b18d88dee
SHA19c31e62b041a83d483da8f6af4976707e7fcbdcc
SHA25694412f7f6bfcdbbde6065726b17169fc2967fca3cd278ac7f1eb0ba7c9c73de0
SHA512464c31e7c9f9563c7a2511bc83b12be585b353f82abb6e9b37b89ca155161a75d145c90ece93104056c00e529dfc1e3db4464bb638ff5b6a312735079eb03e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfadf60994b45a6bb6a332a35b4503d2
SHA192cf568c3495d1f999f6b71e31ca5cbac903f684
SHA256df2621a54d60a7671747512c0918e2fd1d7937bd9987fe7db8e04b6f2e7e7e94
SHA512558e912f4e43ae6584751c5b357b837fe45647bf74bd4e3b1f4ecd770da86c3838eb6703b0f03b5af8f8a9a73abb40abcf981c2dfe88410bfd3cb9fd4240a5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c19793eb01e743948b1195be02eb43c
SHA1ebee4290d42b885a57431a1a88d0c43d69233676
SHA25665184144e9ce55961ff2e31adfd87d419d8c7040d2b24da2ad9c3a1ffc5e039f
SHA512a6ca39165bf09e7c7618378e1fec08f7e4fe102a3fd4db5c51e4cfd440099a651dbca90699462ad0eed37685a5e6ce87d78a18b72681662ec98ca713b6daa239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5651b81763fa02a3f51cbc45d5ccbacd4
SHA171740bdba95e09178415ff1ef8b2b1263ee4e23c
SHA256e590bc3cb8145d6d793093bccb788b90a75a4122a9073c1d8360692bb359cbef
SHA5122df52261a244dec80e70f0d3afb1efb8fbaec3cfbdaae5e2ca32e74a06b863167b89b035c1a1443f0c2d236b7caabec59e70f8deae1dac072b2d3ab0bc65088a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca0e1b4ccd3c58f738fac0c05ccd80c
SHA14dd607f3d90d18ab4e9ee7b54c107b920f26b92f
SHA2565a6ba68192a2e30313ea34b3548f03889209c15687718ae8e7002265de93e53d
SHA5129ed58633290d4354ea65c9d7c97f833c60eaafe6a862293a70bb81134efcfd3999548e602aba74fa765b13b84b5569507e28a4e3e8e7413ea578354f364f59a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35a11de467d5a607a1da5683b538330
SHA1180463e14fabc97b9e86e85f3e71bf4e84f6df7f
SHA256618c83b90fa2fd26404e9c732af4de6db9eb5a4741baf3d69e68bd7ecce08819
SHA5123731fcffe9148871a0792ea4c22b52b317af8ea9c94e4894b378d54b92550725b2cd89d3e8f1970d64571bef97d6d569d036e7aed70b58cd344d5f51480e9ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e55344a05f97cf6dcb9b3653aba604
SHA12e6bbc2be455ea6fd2474db09c3b342d045af7b7
SHA2564850b3c21c7fb080feb69d2bd273a2c835571be7fdec410206d0d299628494a6
SHA512c70995fc05afac9cfc2fd1cd46d9916c8ab2f7f6bee5deee023ccbb973d275b9954cc576958c43d2e1fd071eb8b89ad2144c7b34368dca6fbc99b947dfacf32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7db9b7921da75170b3514e9f3f1ef5
SHA1c7894108dbb39ec8776f8aca986826a7a696d032
SHA256a1f6f9c223fbf24e863c5fe565577d0f94c9caad0e76daeffc7bc5bd9836f2db
SHA5127872562dfdd77def9c7e0bd59dbd83760374aa86f8c1fc5edc4e7666016e192a2a6cd745859e1fb6c837f099e22d26e5df7b70caa41d216ded3333f642e65390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53092e0762bbed38efb9218008be0bc16
SHA1fef5741ecf80013b5fedd313121aa18f1564955f
SHA2565f8711ec3a935fb7874f6819d225e43c6ee9e2e055f0a200efae3ebf235cb6f7
SHA512e181dec353c91296af85f3006dbd00821cf76d3a96cfcd8a27ddc21a8b4f5274f37cef24696aba3c48a6b7c74c3d730bbd917d296c9be9626b560538ef07b3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b10b5de1910ec03b2140a5cea6abbb6
SHA17f229df2c871a77e66ba771e54a49be54433b893
SHA2562c4861b9902878e1ad9e7c219588e6ba0d9a6053c149935f76203ffa6b32cf19
SHA51234e94d7d72f6a692ae3a5e0563b9ca6e1cde10ad2a77213121403453210cd5ab0f1e9952a2d347b93a0dcdae7777dab6c108016a0a9bcb2518fee97ba09cfab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd74c1ef48808260e506855d87b9327
SHA1f505b33713e7a5e8c8a84d7bf113a526ceb87325
SHA25609735b96eaf5673e84605bc5cfbfb48d70cd3dab34564b8c8ade4ef4d87f150f
SHA512cd6d9e59a02fce397e975755098bb3d64d605156652b74296f0620e31df091c8ad19992c2096f60e2e9dd3f85b98514af53e12def8e16b888943caec5e810a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515441f16fb860fe16a167f1505374405
SHA11aa803e9c2e79ef11944978e8536c7dfc805a51b
SHA256c6efa9f24e0430d19ba39dca664ddbf429344d82935b85c7d7fc90782ff0c057
SHA51203b9abbebfa6e5ef59d6a853e35678bf30e6965252f772d90cac30f48c6e24025df5c8a0031fcac76fd652e0c762a940cfba421a75d66eb2f2a57065fdd6dfbb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b