Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
3b40f2c9e6aa3597d4495cbcf32668c4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b40f2c9e6aa3597d4495cbcf32668c4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b40f2c9e6aa3597d4495cbcf32668c4_JaffaCakes118.html
-
Size
3KB
-
MD5
3b40f2c9e6aa3597d4495cbcf32668c4
-
SHA1
a2d27f3c24cdfb01f1f0ac8568d0c8c8c5c64f95
-
SHA256
bb6a486eb839efde7dba31cafcdda424eb0b250a8f7a5accf7e94f1b3bd7fbb9
-
SHA512
a3d6da8bca934ebb712584e84c63cd395cd1aadc6eef42ebac7d098b26cf0e8fade0620598a0ca407918311dc7eb4893e6f9754654a355f76c652c7e87dda33f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d49f976fdf120d45adf0ca7afd59a06c00000000020000000000106600000001000020000000d0210bfcf4577312409208dff6a558109bfef3f4d583a1bc3e8a6a3028e571a4000000000e8000000002000020000000c439652a1740c8dbcb8ad10e4d934ce5d50e76cb9793c21f5ceaaabe3407fd3120000000399a413bda1de5d4e03d4b78b109670390c49dd580cd661418b2484ac1fe8d3e40000000a5f870e0de8e9c708efefa548fd1a51a0d5d8783adf99fd748a5bcabeaffd090ce3c03d4dea152a7855f41d076c89704e65ccadcc4a2e8f665fafd62e5ecb400 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0747b26cd1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434916374" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{520125C1-88C0-11EF-AC29-D6FE44FD4752} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2060 2448 iexplore.exe 30 PID 2448 wrote to memory of 2060 2448 iexplore.exe 30 PID 2448 wrote to memory of 2060 2448 iexplore.exe 30 PID 2448 wrote to memory of 2060 2448 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b40f2c9e6aa3597d4495cbcf32668c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767072924bdf36a5ff60d1136c9c3f89
SHA17a5c4fef8f1117bb73644564141d9959b59242ef
SHA256bd692919bcfcd7dc3d697476ae2dbe5e076c86a583b0ee48a796842466cbc576
SHA5128a3bb117bdac7ab694ab6e5fd09ffc646ada7b60c48e9fe9f64ad2eed6939b466512899b46febfa1fd945d1778d621fefe7fa8dd6e56b977d61a0130b08e249a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c481f3a329612fec3470131218d9cf
SHA1370ecc20a0573079d1b26f05812cfc822e31106a
SHA2561e759aaee45f7eb38321c9c3ff9d5be80010f5d36a2162295b85fda5f2c9b01b
SHA512aadf03c7fab88df55a5feef3bc3842016540bfdac2901e431e0db75ae3099977d956b42ca2bbd5e81ce75efd972a893a8c3356e8990f33a4a7257e6d27b1c713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220b06650bd36a9a3a4a788b73617a4b
SHA154db6b8460ceee4c2dd91e99107e47eb31a92144
SHA2565a7446ec7c35f1dc9fe83a67ec6320b55bd467da4b1cfe54b0c304c8ef5d7955
SHA512b20d3fa489e96d3d26893706e6604ad1cf1681957e8b1c7229b769043e7121f1401f48c1ffc1d2770a9960768bf6765afa56cb167faa17cba2d5c84d0f09644c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515f881e576b594db0ba204735e1e1094
SHA16319c45627f698ec8ece66794874205ece5143a2
SHA2565c1407c3ad1c327e5bf31d85b3d4721a82dd9759318c83dfba73440038acaf87
SHA51279d68badd13fe2ec1d9b7d75478dcd45ee643e894ebd5fd6994b83cb1dedf052ed25b5b9cf83a7407b16f78b49adcfe515d1bdd9a735e9805f7eaac3369878bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c463da05b43e1ceb803d2c0251fd7ed8
SHA1df418b1266e327bf2bc12197d839ebd3d6ab4a9f
SHA256e8399a7ddba1fb338c39445d65fee9e6e2c8be609970f01e473d317cf2dab266
SHA512e7bf99b7bc0fb291e1bc7e65024f1df6bcd01c94dca97337e67d75a2826189c5f8531fb7a0f3108d2c2d2c9c7c6b04d22d5323239605c589e969a4ea4b704cc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa08ce2e31f07a5adaaa53aa1d47c0a
SHA1e114ae7ee4683144c3b5cdd6be9d65716c658eec
SHA256d73cd00105e16c53ce374de1639c4405ad8c8a606be2762118ad8a776a996015
SHA51279196c5196a2ae19f86292df9da05df4d173a9b0012db19e3f5ec3cb57e0b57efab4dac965f5fb8578a2c169ddca9aea6468764b3dfa8d094603681b3a83664c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553432ec3c0e1a8ffe36d923d245006db
SHA11719c893c11c273fec522511cea83206fdb6b7f5
SHA2563756825c678f397317f6462652f5bccc12a570190b07857055c518340c0eb3b0
SHA5125139a225ea919c638358f9597ec3e6b35d78b56f742e5466b76e3c1714ac12d663bd03a51e927f0d8d05fc63beec14a2f1c348bb0336161a7722c08c39e59aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196480178403215d337fd27f47546cbc
SHA196463782d56e835315136c46036b6c753d91845a
SHA2563333d5cb2e56eae8ab99f6fd9464216b23180a03697bf0dc132c721145142815
SHA512f0b308817b8a4e29439ba06baeeb5b396ca5329f1bdf5efddb454e785b3f740183869192db797909e4a8ebd7c935963efe5c7e40f9c945c300840e2ad1fed522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd46780313947221ff37d9caef0f95b
SHA12e85e8fad895f26a20e0dc2390adcafe67706d75
SHA2563dd834dab8dfdc4116ab020f343b0186b9a7db4911dd46fc5117efd78cab6d60
SHA5128ec32a2d57755cbe41b5fb0f7b7968d3e723822cbfa84b0de9e33b03026ad72a281c3c809d17758224176991edc331df4e28ee5fa9554140c1ec12d567113905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53151e016f4c194153dfdb9446670c48f
SHA109cb3d629ed6f70b44c8cb8c41626fd025689a62
SHA25655d84e172bc94cc8469db2b8ca92545c282b69b8e376227bc33f3d429d7a3328
SHA512ee3089ef8790a1054dce2eda3d6525ad36b0572484f6341140de64dd107c2273cd56a1c72a0f194d29cc3f1877fac581d4cc4db1b56c41e9aa40031790eb4286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535514a61bf016ab83d8f0969d0a25e00
SHA17da9b735e5cdf6fb4f171f792f977492f1073423
SHA2567835117387eb3cc0bffbf0e75fe8dea3c3d4f5ee88308b239c2ab2a93c7103d4
SHA5123d126ba709b69785492f16cddd8798304dd336c9a1b90a33fa1b64ec85fd177c701a5e55b06868f8b09fe2a69c48430e7dfddb15aebe02d3e65c4d3989d02447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187cda9b7afc66403d2dd4d5610f0894
SHA10bc6e64f5038ff1ca2ab26dee93f65ccbbedeac5
SHA256dd454465ddc7c4f02260b5c3f6bc018e3b436fe83c785de4cf4238cebc4ecc40
SHA512f5d2e8b2750215931e73a01a493a10a02d6d8ae5d815d505f3f2850afd7d0b23035ac4481827006df7b94c30d5a3bd90019e671b34565c139d2e2d672b1aa264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349ae0b74e14c1203aba7f3bcd1ac894
SHA142044d53cc6e7922f6df146242b252ef63ab815b
SHA256027e168c622f516d035a704e5d6d0bec66ef78152e2593290c600a833a790b09
SHA5129e45d560707d667b1d0e2cb8f588743ddac9099843fa306aa7adcf38487a88b96729ba6d8ae110f08504cb90f359dc47a3df0a11807061684e3da23f67376cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a292ba656419f317217f749259e222fb
SHA162a7cd75416dc9b0330bbd55bc148dbf8316e754
SHA25684958a85a7d493703f05e5b7904489219fb6b9122129e646eb6ccbd3f3c42d9c
SHA5122edc1d3a87371ed5afcf639d51a5b89cd61dd6ad77397adc7cc2e4e616da8052ec6fb790b9fdd8333dec8a0f7dcde942218b526ee210c2b5cf8233352bf5bcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df866e7c237afe5df41a2bdddaeee1a4
SHA11f1d0c3a4ddb5dc6a45768b3058cda2a6240cafd
SHA256682e7125fbbbd099fad1ee10dab739ed7e7eced0f60bdaa120512ba63e0c52ad
SHA512ed0cec21c52b3495ae6a03f4c29b418cb6345ae92f63a9306fba66cda3c4cdb9f5a9664e17e5ccb8afba112b779c9852722409de92e4f64af6ea05967d8a08c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b07cc0293a93f1b6b7b30b06c75dc1
SHA1c634617d6d38666abf339b5502b0fab2df392185
SHA256647315a2c080b804f65a58f5023d9cbef3b1a0960dca2875c89c9cb23c4d5e7a
SHA512761faa7e94fda4bb6e6fdf50d2bb6b4e2ec6aaa4bee949ed48a329de29350141d1a9ac6259339a23ccd2a115d4cf3e6a501485fb72a1b3a1d030b9c73e69020b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc56c5224f46fe22674e5980af4fb8f2
SHA139a4fa158e9e3974d9b760f6ec5665d97cc773da
SHA25686f932d634acdb2cf1bcf81863e07885fb2abebca819a51d5c4e02a315ab9d39
SHA51262bac7b0795de1cbe8a30672ac532a752c91d7a6cceaa549e2cf24a38bcc4fad40f30334ac879745396706ee0f5d74a238be02c0149b89e0a5661480f4901d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901339de0264dc63bf08e54ac4cde2ea
SHA17d57703718211e7bc482f254f00dfe7ac47296de
SHA256e8d215b1246e89d8fe1c341e77269ae1f03262d0cdb9d7bb53095fe9c757fc49
SHA5120b71c1f91cac2f5805efbf12771234dd2ca95d9d2c6ce1670ba4685e5dd43de41abe3a8d527c7955767ddda0f84967e75285e8da0757d95c7c51d88dd9d1030a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b