Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
3bc11eaa7a808f4955edfd5af26ecc02_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bc11eaa7a808f4955edfd5af26ecc02_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3bc11eaa7a808f4955edfd5af26ecc02_JaffaCakes118.html
-
Size
27KB
-
MD5
3bc11eaa7a808f4955edfd5af26ecc02
-
SHA1
2b677c54ad42fc1212b1db276b921a5773970343
-
SHA256
cd72dc24b66d70bbd4063bfb5324f00fec39612cb7978ffdb007593755aac9d0
-
SHA512
1d25362c1c55d0ad796142deb1c9735a22b188caf834cad93b42bf98c27fe9ce947fffe4e3029254cbde78d17f42ed102cdda1ed8c06c13f845ae7bdd0417f6f
-
SSDEEP
192:uwz4b5ni0B0nQjxn5Q/wnQierNnGnQOkEnt8mnQTbnBnQ9eD8am6lfNrQl7MBLqM:I5Q/0C1FNyS92O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434924077" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{415B7061-88D2-11EF-B5A6-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003e8617df1cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000d6dffc0a643a362084c328dd26d9fe883a27478085f02148a296cf9af01d1c13000000000e800000000200002000000096b2936c364c9d67ce68526c4c9b876da33c3d4afa2fc9fc8c6396fa987ebef020000000f084c13e11d26e5e6dd16d17ac303d6fa650745b6adb1d204579215da54d018240000000f2b67f61ac7733dbd6c9c40135800094e23e6ae76389f446bd69620e07b877e4797f1c24e7aa149e05455dfbed473b0fcc1d9e996231fc7192b088a08abc9840 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2152 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2152 2092 iexplore.exe 30 PID 2092 wrote to memory of 2152 2092 iexplore.exe 30 PID 2092 wrote to memory of 2152 2092 iexplore.exe 30 PID 2092 wrote to memory of 2152 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bc11eaa7a808f4955edfd5af26ecc02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0a0f1ea91fd6df8f99d3f4747ddf4d
SHA1e8b3f6566178ec2f45acce8d683efcb93d4f5734
SHA256b113227d8a60c355d37d9b0f7fca7de875c143c479ced4b94f8d3352d2281e67
SHA512ef3d12743056a1f095bb27ece491e11c5a4e864a934bd1d3ab52e00ecc85a44df7dfaa52977a80b6b1df012183a4d3c3de4e6dee1921aea4516d9f16f2fc650b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5452d4022b54e15f0793a7e1a82f491a1
SHA156e884f635e4da54c603397b633ee42f8ad3d459
SHA256c24452e77af7da11d9f0c3783015952f22a2a5973e4f7840330174d44f11f53d
SHA5124c07caf95ee10e8391359c31cde9df8cc8f9a0323e6745994ffc9005a3115a9b1a71cdb6c71a67848195fab34612273a0e08d1ad7db7c667eb2d9ed2842b867e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5001ae4ebb56f2f2089024f74a370c145
SHA17cad9ceb83ef3e62af20bbabcaddfdf58983da13
SHA256235a664a4189e8d299981fd0aa1c278cd0ccfe0aa9dfa214254e00b5a9c73697
SHA5129a4298c917304902661d98e50edcb2d24c18d2c87eb55a88c605325f71401c10bc3d12659f333ad229a13fbf04e0c3579e81c8136134b5e399c884b6ee54d74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad57652eea1efde3234e5a0cf0989bbe
SHA198782039a640a6d3748aa1dd7a374a4e37a39b5d
SHA25638a3eb1638ff7e5da3f85f498a7330631deac309abd36f590a7df45a79876a61
SHA512eebb81cec96aa305a792ae3b43f04b3097e8af4a57dc8a6263942d7a773c2968d02883153b2890c002bf0133209dc20366c3b2bd458ab8f5950e21cb5a79ddbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57506226bc44620beed241c4a1dc82b4e
SHA15765eef66531c68a4e1ef2800198bd07854da6fb
SHA25663d76b4d1871055e24c4a754e4b395d292a4e43fe571079f7dc4b12db6721ef9
SHA512d991ddea28454a43fad88c9f98b659b40815b145806874d744bed682d7e8400b7f33dd33560e682d6d5cd8998a4681f7da70d6dceeb3d0a42fe1cf5b46c61f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60534753b4cc2c52835d1cb6ade8c66
SHA155098c4609d59e6522e5df1bab75a131b7e5303e
SHA2562ce8047ceabc92cae798d09280b248b66e3be45b7d3d59f7d5e20aedcdff7088
SHA512cb9624f7a9c13ffdb60c7e4257af12a680b4d19ff9e4bd799c8f81762af41bfb41141a1dd11db332044c00706aea33de8e7fb444fa2e8d94ed15f9f0b5a29dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869449a376d519f78ed274e295120a66
SHA17108038625936a94012e2cee1353f37978d826f6
SHA256bb98295967ebf163fbac4538058d9594809e3c4e81ac51f31d5ae739f497fcc3
SHA5120b7121e064394390d9a3124b5b586bf508cbbc1b280a316960c3afbef776577f8046b79491c05ae5226d6009e6cec5f3326ecd9d865a2da3767d71cf09880657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf16021ebd6a04350b23bb28ec7bf145
SHA11ea148ee77f3c97185361ad027a6f97f116f8374
SHA256bbb6e14e299ec29f6e5c93be80520579d4648fbc36cafed3b55f8f2ff20aac1c
SHA512cdd444151b9d646154fb07a7db7f9e8bc06ebc44233912acdcddf23cbb0667d1b440703ccbc1ca7e23d2b415d22a4fee3f9e851b9911c53ce1616870d1e01259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff2bf14fe92dcfe57f8fc3d5e433bde9
SHA11848e512d99b7e52578de1ac07e4804e005e3e5b
SHA256d9e7a9decd64f386c5fa4f74fa7253aad88d73026b2f3f94ac53a6f1aca08b08
SHA51244d3fa18eab5bb4f795164211bb6f1121d88adf58bbab9ecd35d5a8b8a2aa4da639721f28ecf3874cfac50141dcece2b42dd29ff4aa733ce75882b94848088dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481f0db87bc8090c36c413765a5098d7
SHA1b3ff0bd7e85ba69c9b71e4ac7274fa3030e61bea
SHA2567be8967fc33b08a05959bf1a483bbc21d319b798a47353f26b0902ab56496e9b
SHA512eef937ac9eb396f0ad1520e354a0ace850b49cae002947ecc446ca52ef616d9bd5ee41fe078adbbc88b586a2a853f1bf559a3ef13a0beae6178296954e113277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e39a40b5487d37018170213e4e6a46
SHA12113595a883cca69807ec73168b5ecf57a890d61
SHA256ce78e35e62020f22e10b50c7cc38ee1b891cf9816223be3bfdcbd08f6f0c7a30
SHA512fe73f3cf53f587090236288ab877793e508b729422327b3970af904308f6d86db90d872a642dafe2faf6cc633c95a1a72aaafef6f9a7bfbdef777e0f4b9779ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d4853c64a45ff6c99acf559d747350
SHA1eff5aae88c75a4583ddfb02748b5b2859d9f8be6
SHA256326046ca929a118e54bf07f77e0bb6d66540b62d88fdd0baf2183dd70f9f9059
SHA512175bcd7fc7d671be27f24efaed753de59c1e6f8b7d7e295bc2863a0a3c11d8d4313b864a556a22fe8f1564e472fa9ac0952c5e8d83e1b5a2ab0424d6f452b69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35b56484e6c26ee75af03033d351078
SHA138cce8cf75e46a054d56b538c2bcbccab5364ed4
SHA25613284d41a295aa1f192a1a5c9ba949243d12756306e8df4f7629d360c0b2ff89
SHA512f386f587a3f7cb13bcc2c113ed64ad06c656e0a9185855f1f637dfa15622daef8f81fc8f778112b0d732448337a224704458222e1792c7262859dbf1207f0562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513401a2a2a75142af72fbaad74baf069
SHA1c9ff5765a0f203711b2635d1f7119ced7e69839e
SHA256ebf6a7aaa9313e2833d5bb38d145ee42deb40aaca1014322c5cafe50ec4f9c13
SHA5125f11e746799b1a7c4202d1a62820551167717f7e4f5c5267211ffd4560d45f990b7820c10e7cd64e03b45f997c9442a1af74cec6b7ded1feb814c8859eeacf27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8cc045b2184d2d091cbc94ec63a605
SHA195589a113bd3e5185ef1aadae6279fe7c8eff178
SHA25606c2d628e3fef5356941f5a16638c9a2aed451fa32102d93bd5c777d440d4e59
SHA512198c352139416626c273951d6f34028df7bd254347ebab3d5049cfafdd84c32fdf4264e48886778eb701a62a3607c4e16a1fe1c7d2bb2b9c72888ac2b1beb646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7bab5334825987cb0d44e13971f6b7
SHA10ac93aeb4b522a6d046c230a1902f558c5d936c2
SHA256a8201ed4da16ba48c33a376beb8a118aaa9c4871cb366ba7e6376014a0d7593a
SHA512c9f7da3b30a43f93d8b13930dcbdc3b9ef3d3f0e09b1249ac48f3d5681e5ef84e83e820d580a95af349260fac4c74918f2d0f7c463f9ef1aba34939658dea567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f29418049f73e12beaad191e6bd1dc
SHA18684883a643b124bf90f2a6b75df26761502882d
SHA25677a372c1ed5cce2c0edbe90689c5fdca8ba661400214a7df81b764410c9a0861
SHA512819b8dd61f56a9759ad00ef76399f55234757175ff84354d4c4191fcb836c1e62c21436cbfe3aaa0fc346b0a98abd24e2c1cdf69aa9b26784ee7cdd0b0ea9bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acf6898e2f55590cabcaa96a3ba494a
SHA1c2920e2f85f0b796eeacdc88a0f42d27b72ce653
SHA256d1399795a0a0a986afa52fac5f0c37bce0a78c0280b6171049645d77d41f730c
SHA512e2682c09ce61da28315962db1e93bab5c84f861c437ac297c3e0ecd2db6bbe3369b0bbec1c93206d7433673b8f701b908de1dc9c2829ba9d8468cdbba9303170
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b