Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
3b4913bd9ce2fe2a65a4daf4abc25456_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b4913bd9ce2fe2a65a4daf4abc25456_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b4913bd9ce2fe2a65a4daf4abc25456_JaffaCakes118.html
-
Size
13KB
-
MD5
3b4913bd9ce2fe2a65a4daf4abc25456
-
SHA1
443890ea86b0edcad65b580fd7f3b821993f4348
-
SHA256
5f6adb5e42387ad642c17145c7fe901595fd1dfaa9ab4cd89b77fdd5b5effd20
-
SHA512
39c104038476ae1385ca36bc873f6352d8c95651267adbf3bed0060e4d773d66a3ca08a326c3ac4f807cc97cde4a8c720dfc2fca62a88506ba04e58d91a7b557
-
SSDEEP
192:R9Sy6aDTpv+MP+ofv3crt3LXr5m0B39fLJ+jI3NPPLaMnTVAG/E8DlJuk1:/Sy6aDTpWMPwdpKLuak1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434916846" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000534e514c3197fb846e696a444a993c8abcf7e64efb03123963e2193a3c09944c000000000e8000000002000020000000e03f8009e44ffbbaf36eb473b5d4bda1a94a1a09ae3ff5b8b8ccd2aaefd23d7f20000000201cbfc02d999726bde2098cf007267d785d4dd7006293178a34fbcdf510d1b740000000d64ba3cca991c572506537eaeee818d9cbfabe47efee6579ba18e1ba57c75b46bfedcd0adbaf0d4670aaf3a60271f0495a83baff13db00be8867d1228980c5d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6BF47031-88C1-11EF-8CD4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e86643ce1cdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2360 2676 iexplore.exe 30 PID 2676 wrote to memory of 2360 2676 iexplore.exe 30 PID 2676 wrote to memory of 2360 2676 iexplore.exe 30 PID 2676 wrote to memory of 2360 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b4913bd9ce2fe2a65a4daf4abc25456_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db0b45855c4793a32c64728db27d62d
SHA116833ff592a23d800610e6f13e953ecff649ddc5
SHA256f5357748ae604b544cdf6c401282f5519e396852347c63b5840fb6cde6548a37
SHA5124dc6c4a30bf42338b5b04f116f7d5e77b6ea2a12c4b62afd3c0c28ac79424d54e06b5f9ec26eaa7dab1a81452150e25ca0ecd267efa013dabbbc1d5dfcbd9323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e5d909634d95c220f5c97a214b5bc5
SHA126278364b570d3bd5888108c3fe745efa795f76b
SHA256bc12f99009796da5976279cb30e150857cb4ddca4b85831dcfd4eabf92b95333
SHA512cbb7f136a282d8b5d3f08c2cd1291a0926fca34e7c484ae2836f155f60325bfcf3021043b4a5a8ec768779c41fefb75774cd790db1da499992a2ee329b538f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a516d647706db4e4b0e3c52c198d1328
SHA1f6b1cd62c69d874c248e61c6c75eb7bdfba7b11d
SHA2567d0059b55caaa672cb8ecdbe4e557ec49be1620df71c8266c9467547feac6f71
SHA512f220e46215b6200b4324acc8daa9965b8f53510442ae02cb8554922294aad5865a76dda28fb0e5ce861ad1c2d4f85d4da90cb87112ee4206641d40b684dc9b33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8659d96d5b9cc93ebb8a78061eff70
SHA1b980659e1875be9a1c9977fbf76dfb36a56d6687
SHA256c5d8e4f43c6b4d3dee221bd426a3d424da480077dfb6f8bb29c8a8668cf67545
SHA512f6805993db0c9b00b5890b054aafead8bc801791b69ef66e9dc860983f6644f5e0d9914e6a9319be67db18bd53912220c0464181843a9867fbb4141ac69c1b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5519b4be3918499e7fa2cf5b9519d7b88
SHA190342f58a20d67b9655d4e11772583d0a1efbc36
SHA256d8e0335d2668c7a4ac04bec63224a5da70e32597913da3656e090b5c4932fdfe
SHA512d0162860ef74fd8269606697ff45d89069e931123e2e5ccbea4c8a49780ffc948bdc94a057587b12f1f3e7b3ead7fc549fc3e42d6322ef8162ba14b27fcb991b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a4084535de1218f580438e0933b28b
SHA15a3f6f5a5042eb11581ae3372c928e19008723e1
SHA256ebd2d41053546fb447ba3dffb9f31503e6baf8195e6132b664a0ffec1e5cf231
SHA512ca6fbab812bb51af4844cf3a1f7c57728bf509e9673f3ffe5a14768caf8e5c6a863b391dfa7a072a222530950416b47c932d7b9119c7c0c75ee083270d235144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511630a617c6c791c6a4a089e4517f294
SHA12b500f72217f7d6c8415e95a27a0962c20c97c38
SHA256af6c6e4e963ae7023d5ebff2a00e9187ddbb4e7bac4e11342475768abd7e41a3
SHA512a15806a119eda63c8a4bd1addfd3d17d39248b3159477dca2ffccac2ba9fe4b83a48a235da8af353dee5e7f836ca7e37b3ee870608f059d422cad8c591b7f0c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514e1ef31ee7c7a90d911bfde1a89e37a
SHA1669360ced54f0510289b90667034491d21852562
SHA2562b840e57a86bdc2bfdab8743327780e764959779c9ee9087e76c8c7043b2f0fb
SHA5121c219cf510098bb8427195951e4d48edf03c288d44fbba3a12233edfd1eb4a12654b0a2cd7a69290d305cb669fa63dac9a487c89af47876c11a31775c213ed88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dab151739b8c7362070421469f38898
SHA126f0beeab59df038e8db063f04e1fa5b82357d6e
SHA2567be99e6a6a37d9b89a257689ada73a5ffeea4dc620b301997445d53aa5af1053
SHA5124d0aadf8ac3e548f0eadf90a682d4850648a9d90e361bbdd5b1c02f2f38b8bb9003602a94f1935080ed428569dfc4cfd3b0ce4dcf8761f32483cbe1a2b790eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f4f4f2bcac45364c7c36b8282ba5e2
SHA10fde9935aea3101ef7817100fc1649bd239f151f
SHA256ea5ae6e006bc4c056e67fdebf02653ebaa74582c023edfdae67c2d4790809956
SHA5125d2aa967901017b362b6d486beb4a9eb94cd605fa21675a4aad9c1a81eef38fb74852b5d016b017d12bb2ec3cf24b7bbbe37dc6a7d8af67d84a46d1347e33d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53693c8e74748bcb5b757888d56fcf4
SHA1c4057c9d8e6d53d6605064a14da872571c9e3829
SHA256077611c211f706512f5aaea75e671ee34d768144bc6a4296b6b42f6755f425b5
SHA51217e73beef8c951d5c442124b8c0128175cddc8b3ebc6f2345d89f9337b01ad3e86c0fcc3c9e61f3474f98bd2ff140fd635bfbc3df704a6084c3e3013676edb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827c4eca0bfb02876eac8ac85a1398b6
SHA1afca9d1b8fa455be23ae32070abe3365b342fcc9
SHA256f7b17d1a3133b2cb28dd95ecf0b523db02062778eaee0248c6832b0095fd697d
SHA51238fbb4f3c56f4e2b1f7fd96787f9cc9a49e7a5255c1e0c422f809fcc25baf1fca8bc94294afcb7c7fd9833647b1ec9eee9a04c660d766fca4da4ebe77c2db491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de04bf286bd1a14413fe0251b100de99
SHA155868b9b9ea0c976205db2c61286a7116f60093f
SHA2560c04cf619069bb11a343bef25b65f4f73e54bb0d627d2780487e1af084128990
SHA51295d8a532cc7dc720065fb673696f774540d9870e5bd05604aa9e2a992959084914bc4d7021272d1c79acfb905a1d1c9f915c88fd823eb8677d8de0a91cc837ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8e59ca8414e822f320d886f9ef8d24
SHA1984b9ca313e811f326726217f8fa0840842bb9d6
SHA256edc56a64c8e1edc370886b3b43153da6ee36a9e16146fce1a32316e7f7490b51
SHA51223b899344b5bcb425e95ee3ce170fd26040a424746ff843b439c8f6b71f84e15b4ada31e084426548db3e6cf765d49f2922815a989637d904d302d55d1ca9934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768eabed4ce81311ed3c037d9b4c1f43
SHA16212673f7f97e392924586a8c57efa635c456606
SHA2566d5235d47a9336dc9bb8d7d53ae4e2de851cff8ef9963a213eec58ffe56d5b1c
SHA5126f832d80270b4c681c6ed53ead148c5ddc1f68e05f0ee273d3f960de800669dc81cab504f2ec00777dee688da807118bd2a623bf971551e9f4bce5fcff6b5bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86e4de2ffac0c7a0785e7b9ffbbc097
SHA14fd414438772d9e1885498e49ab74d2df5fd3f12
SHA256282f3a3936fdcccbb82ad76643829b7ce970deb29b915edd06994dee339d9ef8
SHA512cef5797415d7941694d7c578434833e642d3aff8eb073a9b049a348bf1ad491367b90dc96a8921463a7cd14de16eea9cb48adbec4fcdf33865c13f7355ad0d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8580dac1e37b815aade2df6837cddc6
SHA1672b53b123faef0391c20dfec435ca336d271b1a
SHA256ac460e09483f25581c9347ac086ca1a1a273040ee5fd37b9162f0e41f024c6e7
SHA5124da4d476cf66575661a1aa024518c1a6cdd42bdd1d5d486b7ef13554600e821be6b1637d443afd3b543a41b8134a34e7d3becd61804812c003ff20728b5c8e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19a1010b78fa4dc622a070645b65a61
SHA1f59a8ae192ec582e9de965ac5e889d7043a40061
SHA25630aa65c6189e514421fef9bcbf0cd51e5ec83a2ad67589f638d32537904a24f2
SHA5129c0bc82e3f0fc13631ec608cfde9553558a8ec03615351823b04936c31f3875b0d27b2ac09e37ac5d5fd31deeb304e6b5e177ba2723773b52bc00b968aa4d626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a67c4522419a6f549ba37f331f1ad0e
SHA1015a5cc66db87ed777c4a45c1c1d0202763606b8
SHA256db1462fb748bfeb1b5e0578486bae88fbdf63bf5507bac6b88b91f28653b04e0
SHA51203b40049b7098def7cef6f31c02cf43df44470a7deb983d552d4c910912bb157e82d6e61d4ad49b40ae15611213b72def67458d4068c8aea09c7fa16773ceaad
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b