Analysis
-
max time kernel
135s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
3bb8214ceda4e1a73041d28780a6b408_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3bb8214ceda4e1a73041d28780a6b408_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3bb8214ceda4e1a73041d28780a6b408_JaffaCakes118.html
-
Size
95KB
-
MD5
3bb8214ceda4e1a73041d28780a6b408
-
SHA1
c0db346e2a509ac7ccd4c188ea6590e1e07cf150
-
SHA256
4bd309076c518f5633cda3a486703aafe2c3fcd448f3854e9e19008faab1e6ac
-
SHA512
4d9698b06e6bd9b584d7ce7de4eede5e409bbdfee45dea3ad2b27ed47641a9acf8158238198e08611beacd0278a7dec5ed41285b8f9b2c7d5a6ff679a5611a6d
-
SSDEEP
1536:SuQcu0dyFR178/+TsQLCVcKpCp/BA30kCTKBBpQVEBE0+:SuQcu0ibI/78C30kFDQb0+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7FCBE71-88D0-11EF-A88A-DE8CFA0D7791} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000001682fcdf8fbad15495ade67ee48f713a10447a329a96ab906b10799722839717000000000e80000000020000200000001691ee26696e00d07f45237ba6da749d7c0f012be8d7f938c07af3d959d6d4432000000051e1b59f01d9de82b4a3362d9cdb90ff5843f8d907246809262e12739c99f2f94000000064697218225609dd8c18e324014c2566c3d702f917667d5471a04467d069debcd69374292fe157db7d1d67af566488d5b3db765034609fc5ad6e530794404a1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00686bcddd1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434923525" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2756 2492 iexplore.exe 30 PID 2492 wrote to memory of 2756 2492 iexplore.exe 30 PID 2492 wrote to memory of 2756 2492 iexplore.exe 30 PID 2492 wrote to memory of 2756 2492 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bb8214ceda4e1a73041d28780a6b408_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6e70f67e2e908febe6911407adca70
SHA1e913614f36f532c60bf318f17907bde3b1cae97c
SHA256477a9424f8459f849c6226085861144b7296a123ec78af6ec1cd9ed430eb5ac4
SHA51206e1e83a3dd4371a774ceff03430f7147e2e1850474eb02c4c3f4667393828b9ec18d61eb380bcb3b10ef6a1569620dc82aa0abcbfda05162034bbdd11c60baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e23c2b8f7b303c130146cf3f41611b1
SHA17f97c3e7cdef4514e29ca69731043ed45e3a8e81
SHA2568d97679bbfc812307d32958261b5f257da261cdc55de3f8802966a2bb427a6e6
SHA512e77740f075533cd455c19c68bf1e6c26920aba1bd1584254c6b4bbeb2ed1bdd4327f9610090a9f35edeaf9673fe6d7200c697f87144a9f9f602096803534597c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704651aa77fe0a72a4986acc7f47ca5a
SHA1aa4123f167c26499e5c9e3602f6d41b66e77a257
SHA2567fa16c74a34a85a385300fb74228511b8a5bc7c89b43e0058e3901b0ff5cfcd7
SHA512ce4a9e0e7446fc8a902a79474b6963254150c982c47d8f78da0f5b32ca291e423cf62540785015eb582ea01da990c04468368561209c1eea9421828a31215207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54480d4badaf02f934f36520033cfe5be
SHA112bcfa8e22e422cabac1021e0c0bb1ba48f54ac5
SHA25689ab72f7fde4aae47ad8ede384d74d1d96d11ed4da68f3c0ec5b6c6b7168880f
SHA512e1f80c66819d495d13f884d1a03af0fd866ab689922fc05bc4a5697a47f6f6b2304b19881e4a034dad1823a502a906d75ec1012557fbaaafd4078a7b5f94d1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e75901ac07006f27c60bd21d087c7d9
SHA1f68f947a5a1b7e551d0dd7a3b6ae74d4fba2023c
SHA2565c6c1e81f58d924cd4b209b379695051fe0432ced8043e0fb17c81f7ca712ffd
SHA512d6a087bb4e96614fbf13e0cb8b29c7a3925e999100118880ba09af37be64e84172015c14061a54dd4593b3a60ec5d16c49615089480f4729bcd8aa033a842eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d70d74f5005f12a895fdfa28fc9d4ec
SHA1ccc14dee9dd7f25a8874d23ace7a0af9b912e46a
SHA2569ff8c282167ffd9a56ec6f609c9ad42d248d34793da1eadb98c8b242126cb8f0
SHA512ec4c5bcffbe1706eda25792649d95bc5a221bfc6a7cc935715ea87be5ddee782fe942e9ccd061b67bec676fc645dba9120e0bb62bf578134dcef1177acf8e241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5a1dfd626adc6e24c417660aaa4270
SHA1027f21f582fd9e31dc0b41005d4e8014b77beda9
SHA256a2ffaab64718671e36d14b7aad06b100ca48b24501f515f569a62a9408138fb1
SHA512234a32622184061b3567d2eb2e35d27fcac5ff4f32a0b8f5723bf8f7faff49e1bd9f6522cd3126b939042f7b63080b7cd3cc389ded46709c0153375612eebf60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000ea2ae21a03c1e85e739da3170dbb4
SHA139268ea89c1b03177b7c10e603f7f562d690aebb
SHA25670ca062fce41fa810977b146e7a6e59c62286df134db44ad96f71112e0d43014
SHA51296439f6bca6cfac9db9ac2d50f73e8440dbcab27ea457d7844c52cff266a5dad8e44c46c694eceb8f5d2ee2b310eb18c267f0764bed797c5b6f6b6544d7e068f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ffce462434babe326b69a29406aa532
SHA1bd2835303a4a36e33745d30cda2c5ce1e97806d8
SHA256b1ac1c3531250f24317ad2d433099798eab923f85ff7a3fddc714f640d411b4d
SHA512e2072ff310b1f8a135e74d2ae23cb1d79f9467e75c0b1248ef82e941f95c4bd9ffbe526585532bc8cf73f113a50b494eadd8703a654dbc27e10f2ec80aceaf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd96e1a323864e84fc33c82fed7d9cd
SHA157a6fb423123a73402f4643819c3da4889c7b90b
SHA256f269d24a38f5e764383768f31f2345afc2adc88b1c74cef8e4358556b7a8e647
SHA5129a3ac9f87868adf1250334fee4d58c4bdf37e965ea2003920ea1f597099651faee70416c42566b7ec7e633a53d9c542ff8a083f687c21b765a742b338d596c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588af0a8a216a7dbcfee9a0485abb1e2e
SHA1d827c9712a2a3bf0ecab0fa5fcef6d38b0a992c9
SHA256d8b1a00f9741f9ea96827a5ba171068b73218626e088622a1548cc51c69e918c
SHA5123ca27ca0918a464f21040c8c85b03ad11b96f5ed3eb916214cd15492f9c8a1e3bb9ced35485fabaad382aaa3ca8715feabc32a3fee51076ee452f56ed35fbe18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598463c822adb0dd89afca24b6ca93eb3
SHA1713caaae32738d8cff0b66954d519f67eb341ba1
SHA256106e42dccb7ae001b0d5ba868cf1cc75b25f603a9bb473d69e9fa3ada37f7182
SHA512b5c03aa53109bc07ad44bbdabb86dab6302a7ae8c828f122b38d44e563e684d298589bbef2920b64c335c0444f8b486e11ebd89494ac5952a498631c00d8b786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911fc878e5171d0be0a698e396d175c9
SHA1f5f995dda90ab30b2fb259bee8000c46e8e672ea
SHA256c2ec0de4aac5968dac1d6e755cffe5d88c00ee7d959ee8e50d9a6d2330ca2f3c
SHA512f06a7040a41208df082c81bb7295b0178dbf2880d515b6c5dd839ed851d62260694a46d035df5b189f69d08f4a0bf280cc2f57dcd8eff13538d053e9d38a5ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f16c6f533f94d3f9057f2486923f3dd
SHA1f492204a4846e730a4e0a38a4d7fea1c97c392ca
SHA256d111f5b355c4ed34859977c109a522ee38bfe8dbd94c9c7a479dac6c87627b37
SHA5120b775e4ee9d73b3e9de7b602548ad548bebd29cacb155b70f23560e3215743afdc13ac656302851e4d9ac8a33b1845ec3a0a13e12b6cb990aabba1ada8410820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341d5dad319057b70d3d3c5fbb5a0a5b
SHA188977b390198ada6538171af17ea05f859a9e14f
SHA256ec2271b94d556a8dadf2a8e47abe3f8e106a60ce51595e8ac9428f056080fee3
SHA5124e2ff03db20dc69dc8922db37f51968253d5569ddf28cdec2cb45b4af5d87f73d58075bd49c70e03662ada2245997e1f03b438da6d65ca66ff89f7d284ad8fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fef2ef404a818d9c6cc1d5b70aaf57e
SHA1541aac8ddd8764cad365f8d9a2bd8820b84f2135
SHA2560b8111eb126058b163c2fd08659066e7d83c15ff84e6bec04bbacfb48100256d
SHA51252d24ddfe289021b3c23c6ad4e79757ce09d12c7de44eab9b6c577665ba7ee22476ce6cddb4ed59e8aaac111bfb3c7fb9d8f453464ab4893712e57850c3fbe19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013ee4b7f155a747540e3b0c59e760cf
SHA13bb3e11f9701d505ce095a31c7481f5c0c4ebbbd
SHA2566d5525da574dfaab40cc15de1d182becd47228ba0f7cb2c03fa93d96a6692578
SHA5123f2a49cba947162abfb549f39615a03e673c69d8ef5d6b935a5266094ed6d4f2da1c48f2518a124642cc98557a767cf2ed8ade59a00b8ea78697c1a2456a82f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ec3ec0f6d60b3753c3bb3392a240d9
SHA1e8eb5f3a59ee4e5c8ff7d0a4cf44011cfc48610c
SHA256043f7bb1a3d6222877aacd34207237a5a4f1627f7b5db1a178e88a796bb82205
SHA512e506bbe1e049c671fcbda3cec920bb7aaabee007ea2e47b7f3864f5a06277c5688042a3a2adffcee9d4de0743cd87b6796e02cc28be64166154348d78385a892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56141dfcd0fb27bddb085de795f0b9663
SHA1aa8f0bff5717f905f32bd555d4f7ce838eb9af28
SHA256f807dbe80c9cdaf351550111bc788eb2e04b55300f1eb318c9962ccf3f3d2de6
SHA512255604127ea09eb1c8a95caf0714f2868dc6b6d21e0798b2e2deae50383829319fc558d2e79bf642104bcd5d0030528b9e6797d9f024099e6b69bd32ada12c1d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b