Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
3b9cbd36f33d57d21828b45ed5ce65a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b9cbd36f33d57d21828b45ed5ce65a8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b9cbd36f33d57d21828b45ed5ce65a8_JaffaCakes118.html
-
Size
12KB
-
MD5
3b9cbd36f33d57d21828b45ed5ce65a8
-
SHA1
1211ae16933f8db64261f3fff7ed64e67b1e8af8
-
SHA256
925ce1ef059c94ab7d4d63dac3e952e13790a9d287241854c45840c46ba82f80
-
SHA512
f6c3afe21ad93f841381b029053222a742b2253622e64a2c4e0d4d32abf5f40d182995169e898ec37078cf10dc60303880bad475769ae31db956423c364a296e
-
SSDEEP
384:ln8uqnGDnW0q8PKcHLYEj85yFTKcQ2UBBq5XNg378hYIY/EInYSz8WRJaF6ImF9U:ln8vGDnfuAnXAYS3eC0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000054918500139f79aa670e1ee014d9978fbe0d02104bbc5d55294c5e02d90cd746000000000e800000000200002000000065f9a9a8e06bdf0cd7e3ae221a121b2c0c0a4ac67b049d095b4dba45be5fa66b20000000ffa5bfde0e8f15fef05e9cd1be4befb476543f516ede7216fca14691e0f3d2e84000000037b2225cd3f54e9d31082b4d7c76aca6a77c8e270a80bb3079f8247acd17452af0b4c747ef8ecce275165e0c9e27e7f6e11b47763d3f431a8956f5f007b9851c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434921943" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000007e7834d332aaaaece2d8fe0e31eef617fe102796c7931dd1887b0aecbb86ce33000000000e8000000002000020000000504d1d2e595a1233812ef39a98f62d9bc6c3c372236808ab9eb735e8b9c626aa90000000ce215fe8976e9c0f4dc1bb6acf4fded929189053ded4d5711e30f93950e6b68f52314e291fcfd40a1de3d4e768f2b9103a56c566c2ce3e4fbc0623a57d9dee08aceff7887f24509cc51a9bd5b33469958dd254243f8c2c559b1ed3c91bb67f782783f8107eb87192a0031ad90752df95cbfe26f455bd55939e26829d5dde3d6e7d5fb7983214afdfbed17db7a374eb9b40000000ffffeb58f1366a63b0cb30be16509d7301148b35f5ac984eb99298bb7f6d03ae26c28cd88c27dfd363f97c15ff45914266b70e0f1be5c3bb3448abf0332e45fe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A037321-88CD-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a079d320da1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2076 2692 iexplore.exe 30 PID 2692 wrote to memory of 2076 2692 iexplore.exe 30 PID 2692 wrote to memory of 2076 2692 iexplore.exe 30 PID 2692 wrote to memory of 2076 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3b9cbd36f33d57d21828b45ed5ce65a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b1a4f0037551702e80047e4d250f12c4
SHA1a7d1cedda48b91b155314016b664117674227019
SHA256cc142a431a3cf131e7f7c142821b514e4257e2105c0b0ecd47b6e28340fe97e5
SHA5124c9ea0d85e4da6af3072a6cb8eaa5e1515dfe105ab83d17a9e6f20e42326db0d4a38bf821519f7ddd6e33d7e15dcd0ad8ab8269967286d5c2cc14fc648f6a4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8aef4daa00a7129c34c777a7c3aca58
SHA10e17d277e96420f3369ed372a031722bcf4e7f86
SHA256d851d37d1dcdfeffb2b86f2ee68e11fe873fa0b4b2be13d09d5251e4be5c14d2
SHA5122cc4e8f7757f9ac33005e09ba77852eab9892c374fe15ca8bd4fde7218b7998ec08f3efe6a6a11f33532053661db2d5c76eb62da01cf22e56c92df423d4d0e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504482aa71cdcd99b50b732b7870e3c3e
SHA122d76a5a28c0966fb093854d166d79fefb815e42
SHA256b956fbc5f48a8acc3e928f0e9af2f7e05fc3dc4dcb2dc3eb2bbb4d78efee8774
SHA512999f39276b687f43510d186a49df86ee1a4f2f80c151d3827d12260775ba054d3a92b89dc03923aea790a241fefcf1c1b86a9feb0976fa2420038ff83d749d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a70456e753691583dca1d1e153f3df9
SHA1fee568afc32c4258f3d88417f663627bad1f2335
SHA25603b0ff670f2161fa46ffcf9516597a3b2ae4278fc709988266779e69463be99a
SHA512f3dc67c83ad84bd993d6500a6aaa5950f08a997d41dd6a04c2a839e7412ad5c1acc688460b7a41bce74c50c2c47d6b74175a4819a9210a6ad9f420c8b69d647f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715d5f5a12134eac3bf6f4e39341f2ac
SHA10ce816dc222bdabc889ca8bfe23f8d236a056a0e
SHA25694e838a3d5bec4b074c815b70132d0ff9162412621180d22ef316014d56ced4d
SHA5125620a990a9980520d73d3075b91fe0b3cf47f8703f42d8ce528cb44034fca4043db4cf4efd1ebb0e2eb07d61aaf597c372c510e78c179f9cbfc01685088111ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2eb052c06810852c8d73ab27deaaf3f
SHA18e5954670c4d653bc17b0c3d7df4b26523c0ad70
SHA256de204dbe2d837bacd94d4e1253b229683d21d1c68c424f308a967f4e3ab15496
SHA51269681393c8a0307ea96e2d5bcc10fccf1446fb6643f64b03df2cc3021f58cc45b7fc434a605c9b2deb8dd6ffbafb28add8c0d30e746a511b3e886f6ebc079885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534e6374e0aceee1bf82d1e00dd4993b5
SHA156ec5ea4f8926eb947a6a0218f8f56f85089363f
SHA256d5227ed6aac6474b5d8cd6c90335f61dae7db92b6d3f0a5a68b842312d82ca7a
SHA512bd2fd26755c6b198d633250b49c12e944f6d4c826022a33b14b5482f4c0c7d9a9194e82aaa6e27896b5d8dc137f2d270255034d44a62b5acd46fea9cb51941ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29d021d5f19f674fd0a57a5fb5c1e15
SHA1771240e0d2d4a8fb3fb20714f11a4d78ccfe8f4e
SHA25674bf51eee608dd9193080a58fd79d67e0a20683f76d09a19c531557dcd933ada
SHA512867895a61082e617021b2aa89e92d49244517802e496dd598d26ee4097c554be99a600293f4f69f03bfd3097ecf4e9f05be53f3936c2e0b980fc4d8e9e8a7b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2fa9c501757e777f17a82204dbd356
SHA1ec8721fa15d1a40e33d2bdd3a1c9f0a0ee5e3924
SHA256c76730c3abc2bb2fc64c66235a68153341e75484e7228b532bd07efa9eb3a519
SHA512feeb222b588af4cdeaab235911351f4bc4e71b1ffc6c1c0cfa4e1f5b7a70e885607f413101bf6524ccb46502c0594fc6689d8b1e8d2fbe93e95bdced275e5d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789b22a6bbb7880f4c303e8ff6e83b77
SHA18e50a8db95774fbb509fd39a755bec267678fa18
SHA256d61be9548475fb0307052b340fab5710f1e2b61ea8758b7aa3fc3b975d04734a
SHA5129f3168d426a092f68620a9cd7135171045e7027a523ee4fd287291ba4a69b01af845ed847262e63ad9bc6cab9aebf443e4e476aa7c6fe55aaed13d0a65ac199d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ff214279a11dd0c5b5b27938958aeb2d
SHA1d27ebfaf84f173765d1b8d46f55547e72ae65567
SHA2566cbd5824ed796510a98140daa897c64292acf5b843705c9a271e9146de507986
SHA512e29a0c4f3d49257757ff43c1dcc1bba11d3e8b3bf1d8e98a84301b3563ad4771a7276ebfdc9e94ff8bc05da475ce1f0de5e9d2eac30e71d122f2cd32b490a0ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b