Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
3b946b05d7eda2f4bf07950e8bd4bc51_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b946b05d7eda2f4bf07950e8bd4bc51_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b946b05d7eda2f4bf07950e8bd4bc51_JaffaCakes118.html
-
Size
6KB
-
MD5
3b946b05d7eda2f4bf07950e8bd4bc51
-
SHA1
29a36e2783352a0fbcf2172a0f9ac0a4a63bca3a
-
SHA256
6d1c6b6e7bbd3002c5f85491aa1ac8fb590691d636cd2888aba8170a096ac8e2
-
SHA512
1ab1807934f2851dec3495f246ef4d4a4a67b2bbc23fe1935c93298a52c5f75761e09ebff66a9a4442643c3c9423901824fdd785e8a5a551e24316a39a93ea8a
-
SSDEEP
192:64PPZo6ZZUXbLfyNX435NxF0UGYsBEAC3wdS:3PBo4ZEeX43TXlGHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008e3790d9a2172c4c84866976ae32928b000000000200000000001066000000010000200000008cb83e0edf5190d7513131ccf6b0f1dc5d9c1cd6a6fdca32318c6096e5020b1a000000000e8000000002000020000000289fd111aba8f36db8deadde2fc17522c6e58fd8407be04f623d9b92e155bc7e20000000731fa35fa9e9f3df5ae3166d356a4f059730852b86f9b23d0b6ecb16e5deb0cf40000000b339ac65b1f04ccb54285db2ff12412ef3b2931d8be4754db9bbda559041a5e79bc93788d1ed2036ddc92c24fe65b86c07cce2c645038303494b9bbe8f07bfb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c27a0ad91cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434921433" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19FE2271-88CC-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2296 2404 iexplore.exe 31 PID 2404 wrote to memory of 2296 2404 iexplore.exe 31 PID 2404 wrote to memory of 2296 2404 iexplore.exe 31 PID 2404 wrote to memory of 2296 2404 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b946b05d7eda2f4bf07950e8bd4bc51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564179fa8ee23f07e5c793a6dd0efaa26
SHA1a198e7ac3c2851d468fa092d4af7d45dd441585b
SHA256ec780969dfa60ab9d2ba1a960d699d188ae90af6275a68161fe01fb17f4ee745
SHA512f4ba2b42e19b7258034edaca1a641070bcb30ddeac780a04bc134fdbc6e8dda6000afb6a025d40a1f864a827d53149f71bd0edebf888305a0af24f99bff4e703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e573caed5c36dc846ae06848afbfbf
SHA13a8c8c6543104a5d473779ff901a66e0eb8dc1d5
SHA256c084ae1fa6a7b06c9333b34e67dd3f9895c691047cb894d68e57352a478d17b7
SHA5121b85292f207743a6d96d6784e4346b900f14db77c0ae28b9b0d7c8cff35393f6debfaa6a7b1ae1d99dfac9ee7431cc9bbafa0f58a2f8ea74b15ebd311eec4597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a6a79e2c60cf828aad99d8705ca4ab
SHA188676ffd28b8ebf2e40a8537021350ff9a62b3bd
SHA2561af0e4a6928728bd0ae149360af73640f7e91945b29f443a642109ca7ceae21f
SHA512e182cf3de0b5045d8c8c398c95ea0285239a21d37dce0e180ca0d39bd859e8f4950674a8b67cd0847ca578cede9025fd550df0ba97d747326931e0ac925f9d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8662b1c028b3cae5237a02554a9b037
SHA15d75dab0157dd586e5f2394ff1b04b751c8868ce
SHA256d9d5471c3c991910eb36ce71889c1b2f2f362af52ddc2503ae354615e3761c3e
SHA512b5c92cf19a8272d2014ce70cf5c6cfd7511ee87f861f0d661ce84ab841a6aadaf894617f947aac38bd3ba91a8a0dd966f17345a5bc5f2efd61c136ec4d0e1fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fc7fb8f8fc91c94e1adb0afcda082a
SHA182c79d29aea8b6f13b19e99703dedb4ac3a4861a
SHA256fdcca2045373fafd1bb93b8f0bed2d630aab12e4174707fb4c37fc22b1f8eeb6
SHA512b1923bdd553096ed00b57cd173cf586eba4be85496ba8f3c9dd289fa6a25595bae19c4a232933077be29b3f909b3c2f60805a8ffd5dd4907fef23a5f72cb0205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3080d980acf4e95393308ba7cea219
SHA11876d12a789e737300228ed17517c70e171d6a9e
SHA25637cc2a06e5231f0722daa4a7deebbcb08fea0710468bed8ddba9d168933b04d9
SHA512093c8635612891d7ff6f506c12eb12049cfeaa3e073282af75a518a157259ae324075291c10a1702028a7d609a416cfd147058a87ec184e3e6dbd051cec9e9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af244113ac3f0240428091ac64d2436
SHA194831202bb5b2b1c0f6a91666099378be47d1eed
SHA25642b460d709f0e7949bf809aac989c487f3f43a0eda58936e8a22ffa7232b95ec
SHA5122d6d581891e1549b89fec60bbec4b52a2ea434f1732a1557e7426cb5fdfca3c0df2f839e76f410401b240e7882d5cafd8364980c5d2bd409bb8a4f75cc14f1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fc5c53633551d2834170381d8ef725
SHA1ad94d3309709baf59726b33dfe42ec7b99c8e68a
SHA256cb8e941716ce481769ec8ea6db0efedb11c0aa4a7344d5127de9c8b78b16acb9
SHA512cd201c01cb680e5db1ba119453d72ff999afab18d8e8b7cb6010e821dcda91a2ef2560381cb8b50304544dcbadb34d5107a746c4f9d7a6316d00bdda5c670ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a2ca6cb06e1eb379a55de8a45d8a618
SHA1af9673debe238382c9a65af06898ce648bc6371a
SHA256e0bfa70c5ef3ca0986726dec1384df0e76b3098fa44db014727fffdbeeb9a2e5
SHA5125742d125314ddda1a72f18fa9aed97e78abd6831689036ca68bb19ec32dc72e9d3cbd4cad96eec46e22ac6d386e9ec12e3436462d0c87968c58647ba8862f7d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fae0bfb72a8774b0ece6e5ebe02929
SHA168022c8cdda3e42dab65029ac16e16dd3bfe007a
SHA2560813ba77d6b9a46ba4569db80aef7e89ed02e1510470e39aee0e1fa009d01b67
SHA512d0187061c8cacd65f7cde07f94f9b35aa2aeddac4cb4fb3594b7cccac48722b5d1956f7651cca77864754ced4a2fcdaf239dd514ce4ca36c60b292b076104940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa36c4ed702f8f6c042b9c0fefe5ec6
SHA1f3adb2c0f0456a0f6303b384625fee0b9ae8488e
SHA25600b9667ebc61a4dacbd166c8cac193c0b77f8faa04624281e97acf87544940df
SHA5123a98e5999c233f64d32b9a574e790df97afb0194fdd9144fd5bfaccb7531c1574ac35f11c9520cadd67476b17bb020b9f376dbd2797a8b817039779076a58d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573793164ff184fa2d777da0710c436c0
SHA1d7e5b4a2eae54dadd02e10ea1155048e7cbee9db
SHA2562831953a28397dccd18fa2f0b8d811174a6792dbc3bcdabec135f093d636e556
SHA51231aa34ad2d8e3bfc92fd14d9532116e623824be65cbaa5f6cc61ac6be456e0beaa4ebeb40b9a77b538532ca144833a38e9f6e0b4b0efb82a625d06689a16787a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ff3c19e6d11d92c601dcdd91e0e771
SHA1a42bbfc5b7f9eda9b40beba2e64a9781c2f529ff
SHA25612881abee997fa4d875aac42ceb35ceeea123ceed42838e6264f24a660991524
SHA512d4d8b8908fdc6ec8442e783f8743d0ca1c2a1d6a925dda993a65d6f6a22084240bdda1c15f41245dfcd891ac11f29514c0857f42acf54ff0b56c9efcd7a3fd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530149e3af9ad0ca42a4179faa9644b58
SHA1f21c42cfa199c102e8c9d874c981d22ffcd1cec5
SHA256f9e40a034fdca2ea1fe323d8df437e6bde7e69087d6e45583059598ce21cc61c
SHA512effb84fad144454fed99e5878b87fff839d7dd83e2566f345359dc4fd20d3499b41a8f608aa074d7bfbd2a796540279c48c852d114d752597c534d988c69210d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038f9cf7d7a5bc1f529f0be1d776a7a9
SHA1063885009c0a3abacd49ae6ccdf06fe6d019b9be
SHA2563b502cd999c2daf8c9e8d0b426929c5a160364db4f4daef8f7c8262d0b715280
SHA51254838adb06671d2f2d3d5d47ae4d4b606d92c4b59d035b721f31d597d35ca9c506140f38d876ce20733968fde286367614533e789b47ef9a56f7fce0dbef2874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb260f76965ac2514cb795d12a6c8623
SHA15552a83ceb0ddf0436e22a06586da7125f50bdee
SHA2563eb5762764c58c322461450533db8408bbe1c5bd9ed729c9f89e6222912d1b07
SHA512cfcdf57985a2881e5863b823ee0c35f002f1ddc36e8e8ee5d1a2fbed266f33d44a3d4580f617d1d73565a6fb9ed27cafbad91544e99cbca305149d0d410a0442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71d7119faa03653035cc89cbfe5dbdc
SHA1381786f0f3798e80c882eae3d95ed52f5edb0f2d
SHA2564eb26884103ba05dc88353a5299c99cc4ff313f80664694b4d333d3529571525
SHA51285f64895c18c88ba9e39544ca58d6396a122f8badcc50535d6abe2bc17b2bc3fbfe232ace35ae44016545d21888d8e4b4ed1bd41c15053e2a87656627d1a479c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d14d72c77790c51fb8855cada2da4e6
SHA1b64c08a76eab04f9eebb7c9b089503e5221189a4
SHA2564a8b15f16709157295d68eedba562fd47fbb5143ebca66eb712b777a95d2374a
SHA51217dd5421e22715662d911124e6e715e9117564bd1698f50f9fd2c5202fd6b4d28df44ef508890a4c4a10b5f66db2a96fd7a306dc833b72b3f202a803df42119c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0287a839c7452279864022803eaf1a8
SHA13600d59e0d2cda07ec700a6863832ffeb59878e9
SHA25628158adee04c2e0134571c165e0d2c82292fcb9c3dc43ff03750cea75b3fcc59
SHA51219579a87279c24825fa24e4eccea28d973708120cea473eb60a0c35d9701bbf85fbe3dc2b414285d7da2ee924abc8ce56e4fe706729502a4c6e78560ed410bd4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b