Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
3b3004574ca2038c0c4d91d6cf26f114_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b3004574ca2038c0c4d91d6cf26f114_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b3004574ca2038c0c4d91d6cf26f114_JaffaCakes118.html
-
Size
53KB
-
MD5
3b3004574ca2038c0c4d91d6cf26f114
-
SHA1
599b90f683cde1243ab0072f5232bb2af420d0f4
-
SHA256
b510b01e3bf9b944f971da28d71acccf806d6b9a746fb34f656204cccd30f9a6
-
SHA512
abe9059cecbe04b9e495fdd80d16aec144b5d91964514858611ab1cd80e20277652ff8776efd7d0207812ff11403680471695eed3cb5ca2f18c0c738a021200a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlYN63Nj+q5VyvR0w2AzTICbbOoW/t9M/dNwIUTDmDt:CkgUiIakTqGivi+PyUCrunlYN63Nj+qy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434915195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93413781-88BD-11EF-B984-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a39f6aca1cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000823eb13a89f48df26a3ee5dfea5ad657905aff38297cd56cb66be8c3cc7d1030000000000e8000000002000020000000afae2350603df76e1d6e5016f2c5d000f57ac8e18cc114205c7443d113513a0d20000000c242d7316e5ab5d0a925c7acff5e8ecf1e2c9ba064a8f18ec4d6aa3a758db36040000000033e66d23f15621531e3e578a1f7e8d71ada3b6412245e67548f0a567c4c44d1e3b8ae92d437d725302d460cddd73147752156e58e4f2b64321dbf30c85eadd8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2964 2204 iexplore.exe 30 PID 2204 wrote to memory of 2964 2204 iexplore.exe 30 PID 2204 wrote to memory of 2964 2204 iexplore.exe 30 PID 2204 wrote to memory of 2964 2204 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b3004574ca2038c0c4d91d6cf26f114_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d034dff23112521b152b9a3845b6d1d2
SHA150d241673d166d9de0c175ff493091e89af8ba74
SHA2561924b5564d44bc8f12f64faaad98c8fb58b0bec6c01ab765b4dada3e390a45ba
SHA5126b4a55ebeb527a2f71c8fb687ff87beaf8fd917eae0dfd4d1bf33282b6c8e8fea759b643d766a3943721f499deb4eb086c0d47c417ed2eb1142656cdba8866a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52390627aae19376e60ddf79c04433351
SHA11fc19454dbfa2dcebca36bbad9c469b804d039fe
SHA256b5447f6915c8302ed845e90dffc52e1057e3962d9bb9d195a3afaf8d8d12198f
SHA512a7317775c418015a38d7ae01a69d105a47b6a8b99517407827b14e6d1d11fc6dd107b24862622b97ea110f5f5333fc6be2759f394e06a0b71ab3beea87e9938d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42ffb557735e8bf4ae0b0a73e97c769
SHA1c1d21b348870a5f6ecd6f64653c3ed7e749f2cbd
SHA256cb54c0dd4edf85c2ce022594a01668c6cdcc3ca77eaa8e205486babe1a25bed4
SHA5129551f40df36bffe23b1502b21ee8f035071f29ffe2e62deba29934a5d99c07d2107aa07cd583cd699af1acaf9d3cfadfa5454594f6eb0006871f7086b70ac183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52e0ff222baf52500ffb49f2cd364a1
SHA1ea209e03834a4ca2300b728b2bbf10041232d2e5
SHA2562a730a6a588353be14a244c02654cb64ea735ea278dc8e664a0812bc0b9adcba
SHA512af96e560e4d1f0e5ed88ed9d2266cd6e2b55a45b2895ae1583904ff15ee34d36b4f6203599441517ecc597571bdebfc91e80ae05234767653c5022fe7fcd6aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524820858e0aa14cbcaa6a1872e6da445
SHA1c32e53d8c3127cfc83dbcc8609950c5d4ee04549
SHA256a996c14235bd0808a1b0bdf9f0568825db9fa312a0123d3bdcb6c34358f4254c
SHA51263fac00ba896db6dde2d045c8f579c4f2a1bca999cd6e1f77e4233924c563020c0848a849224918fe239e2368133b94b5c4d3fbab5fe9ff632f40715c5fc1813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca04ab64d79bc9dc6e282a1e6178399f
SHA11c8756ec2535553b9151e78c6589f0489146a667
SHA256e82842d9376ab08f8fac685f9f6bd9e44868af37771032ccb66dad0eddc4717e
SHA512030b77c09454674d38478aee6026203bbe8d8e250dba2fdeb51e2a9e71ddc66eea086e3abdf72a23c89179bfd0600e4a744a4ab4a56b2f781deb458931728004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a11b20abc3460835f4021483c4efb61
SHA12b1958a8d2f1287da0e77b8de254ff19fe4cbf3e
SHA2568ce314cc944c77021ea96e51b01f6ea8f226a0d38d73e166c2cde6cca6f9fc55
SHA512651a178ab06ae9fa14cbe9a591c31e6c32703ee14aa5df1069a4e99e5c2b0b42f26185bfcc4ed5aa3f6dbe576bfd176756d1356ee618ff598a8eda79a126dab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9adad96caab9b696f102098beaf0925
SHA12bf93787d48aec7eba54453a74b25c05e9902262
SHA2561f45856151792d40485e685ec04c9b01e50ab35730f1e001fb4f7c8f6fe5215b
SHA5126046653eb7751b5ecdff3b4b7bb109a7854c23c4087112fc66dacec25ac900ee86d6887562bb361cd47a8a934172e559dba4ff77147707cbd051341739d7f8d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0fecfc9e80ac37a14758c16dffa5484
SHA1f2b0bba54e77b1c9fcc701171320e310d98d2b36
SHA2567887bce30d05dfd2d61c452acef477bebfa0f9164d655ee7ffae44f18b28ccff
SHA512c6092b81977657cef3df1064debfb60ea7868af3e24a1845d18d97121c670b0cb18c4b779856f2e9527470df083f11a4bb9554793f78744b8e1ab9fcfc3842a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07583088ef5f3b17f9d94e65f1e853d
SHA119f37d4fa2771b894df7a5b7669268428e64e6bd
SHA2566361c3ff76fba56a9872c3de8681f316c6307282d0278ce2e25c568ba9db9f5c
SHA512a988091f5d6e3deebfac1a7a3fc1830dd9089258347dcc730cf4e617130f0a620afc4d9a5df2da18fe21f868320080ac270847ff3131b7b9fbee1f13b9405689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b018e4b26ebdad82e0359ec7c4718d73
SHA1d36670b01ced5905d22ade120ce3f9b6cc38afc0
SHA25618554d554d4f607420c2a96278b5c6df9d9035414e298ee4569bc0f549b3a86d
SHA512e2cabde41492c55eac891650c84941e547f178b6caad391273bbd4628c4fff3e6a82a0bbdf058dba48d5f34fa71738169e10b3c1437111c84bbf794ce2fc59d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277a110c5ed0d424d4625535678e189c
SHA13d08ba964fd2d79d4fcfa5828677e48215b5392e
SHA2564f4afc61c0ee445946a83d4f8c2568262346cd80aa6bc80bef166dfe166f5de7
SHA51234338afc0d1de27e8444eb19299cf3f22172918ea9c86d9e88a8525bc0e63fb77b29b8348bcd055b1a13d0398d197df2d6c32ff2d54eece70befa20b51780993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06940fbf881352abfc9cb275db858d5
SHA1f7c6cadc12e198639858eec7d6d815d13a1d5513
SHA256df2d3d502166d80e3bbea23127b8df309036219dbc98c437042e82fa796f073c
SHA5123c815ae88bf46d38fe2540e46a6edbc3d1591c6e0d56fc20f0c5ec4a5c7dce1faa6337aa1a35ecd62ce2b7bf0173bcbcfea09d0b89af1626fe46ae93dce88050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f445ff3daa565af85335eec818e29261
SHA13b9190264cc4939787b5a9df981b05651ecb10fc
SHA2569cbfc6f91a38b503816dab4a5bd2e1fe0fb54a6b10c71823e7b52c56797cf37d
SHA512ede6b2505d77087f8c199f32fdfce696fc109768a8d516af079de0be346773f76f20ae96866ce10d8c461ebfd2a51079a01f1cf0e2470635eae9e30f0f6c7eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caef2a1cd1252bdb06c87dbc68e54aa0
SHA1bd99e87159827bc8b615f047c6f6f9ddf563911c
SHA25613cc4b053bb2ca298695d2f290161237f29563d69230141af4650706b1858eb3
SHA512703a8776c45b76cf1fdfbded542e8b8152699188d5bd69b84c75df817c9243ca0d7dac6211313e9151ea1811baa4599a4a5e3b1553d7f9b38b435d9e17635267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a98a04dfb1f81364edabd4164960b31
SHA18a8562ee277312c6f711e08a1526ccd209fb9340
SHA256a323e32fb0473d9b9047e43539f8d6732fa9e0f147f00ac84859f16df48cb0f3
SHA512f604bd50efd53dd1509b05190f9efa2a4c63568802af7272bf1b6fa9818d26df3353fd67b759bcd8802537761f7a81dbb60eaa92de1b4126ee548c9980c4fd2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a05de33df3563aee729dab27e8100a
SHA162c9a83cd3eab4f6dbf776aced6c75988392329f
SHA2567f00feb1ec1e43e211fa511b20a4c283e061efcbfac586d135ddaf5b03f3dd89
SHA512d8fa56fa5b7c8e51db73051bc8d6aa8b4cf718b05002e7d44c684e935bfdd77ad00d0ef0d615a69898736581a93cbd2f066cad9ce55b5441d01ebc02c1684512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e32d5c4bdd4ed373ee7b74d3a0f92bdf
SHA16b630766fdc6694035954ac731057079f775ce11
SHA256adcc9c409b330f8b7a07b5862779a44dce88890e099925661eeb1c28f9e11ee6
SHA512a5b0006341a698a16aa16f12debaad9873f81684945386579547d4cd663f65fde91c7c9fcf725e149e1b9aa29a208234aad1f454bf756c0736ef9622bccac41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512307cafb67e8cb4319b53fe05081442
SHA1ef382087ff18a825a6f0f70a095427b63efaa1f0
SHA2566ee79bd04e20b8771f73e71fcd11709e08954fb4dfe5e0643aff0a86642a7276
SHA512519dacdfdd31f8ded2c197b6541c0805f0288646929ef73af454d08858b8e2dbc7971d4170f45c2ea8278b0f81cce315e81a91610dd5ec8bc51caaa39051e6ef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b