Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 00:48
Static task
static1
Behavioral task
behavioral1
Sample
3ce5dcafb3f343b9ffba4879747b2fc1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ce5dcafb3f343b9ffba4879747b2fc1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ce5dcafb3f343b9ffba4879747b2fc1_JaffaCakes118.html
-
Size
4KB
-
MD5
3ce5dcafb3f343b9ffba4879747b2fc1
-
SHA1
3318c6c76568ec37a015d5f45cdd0ad45d9a7245
-
SHA256
fe2986e3185f3d1c290d24ebd6cea295212b6a8496e8de398be1dd8c6b80673d
-
SHA512
6a30536b5d709214f17c3ef239d97d33d967025bdaadceaa978ac5ab61f6105c48d2a2f85b60f2a7cf18f137f041d0396ecacdfbb5f2106bb31e3440f9a1b117
-
SSDEEP
96:kuvvLx7Me+J/H0Le8svRMT1bg+saLm94Yu59lSlpLJT:Bx7wJ/HIelaZbg+saLm9vu59lspLJT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434942378" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000f14f00f2a588720868b76ce0cbc544f38a23174d3cf902380c16a0f659f2650a000000000e80000000020000200000006870ec98942d09325653ab5d3923129fec421c2d8d5d6b16e0b73b99c088848a200000007757dcc09e34cfe46e588d410b92fd75b72a24304ac0e8d2ac5776e6ae294e86400000002df65d16fef3a68b4c7a28553c1540c1244e1336fb4661b2a8f368d9231f821c1ed4e4dc3c210bc791683553b1fabc89ecb7d2a16d86a97d6ba8e2b9c68fb94b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d3f1b4091ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD98D6A1-88FC-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 iexplore.exe 1992 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2732 1992 iexplore.exe 30 PID 1992 wrote to memory of 2732 1992 iexplore.exe 30 PID 1992 wrote to memory of 2732 1992 iexplore.exe 30 PID 1992 wrote to memory of 2732 1992 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce5dcafb3f343b9ffba4879747b2fc1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3eceb1b0be9d1239903e60555f3752
SHA10dc17b57fa8588ae04019b69f23e8a23191b7359
SHA256d7c1c0bc9a3d4c0bd5619180e27f1cdafb219295b0874c0545d46e06c2b56a2c
SHA512f254528d891f647ddc96bfe989c673086704b6460b5048e2f13e28722dcd352e672e432a4f5f55cb66b7a877cc25ad8a5cba6c5cfbc13d0115400d4dc46335b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840454eae4ddaff3930a29ca604e270a
SHA11bffd0e0d231705c33eea1111e6139840b8ce97f
SHA256c678a3081599ed120a9e4e309217d25f42f530686531b4e7416ba859d51e977f
SHA5128483e3f509f9920aa556fa05518c012560090988a9f203c72ff2c2b3d4650b97c6de15e72af6f0dbd3e2daf0bc6b92dd4a938263d619269963d1e256ff07017a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529341a0962e6b723226f62ffca8157e6
SHA15c86447d1a02d00311dcc85f103b3937aeb7088d
SHA256586a72a87391096225470b6639f85b8c111369c48c31ca8d0675620ea2cca140
SHA512e4478190d249d66ffbd870640da6f618d6ad67da73ae4be3b27cfd74cb0942f15e89858d82ab9f509a215647e963d4cf0692aa72b3a0e66aaf661d443b4864f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8c7f1667b5044a505d2369e925a8aa
SHA14bdd6cec475e6c9d88469c0599a6b7ab1820ee29
SHA256a60a208d344a60bf36c93211386285fc9e732cd520ec64b0d055bba064375517
SHA512090eae847aeb29b6f611601bd2d8540a3fce91e910545726967f20486529b58dbf767285e1fa7288b4150740b59906d13fd58b2a2452b40da6ba3b795e40136d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2ea7f093d0a94757f567339eaac2cd
SHA1476894bec93775727977f443fdf74d299ffbfcc6
SHA256bb66659b46c72e3ff559eb9e0d1b33515e612b24ee01c0c1d7dd8352e9ddb67e
SHA51265235d2fe57c2c715e7cc5d0138c95efaaf7dc2ed982fe1acecc42e8a49f0b6acad6ca0fb6afe449b12a05b28254bc940a78072a1f9567ac6ad45bd9cbb7b7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575501dab3c6dc6c67a893bd4649ec8c6
SHA1640c2d96a9daa85af46a8933722357b6fcacceb9
SHA256564381d86b3425ac4121ebc03bcdcb9de61f82b04fbbe7834d23fe0af898c821
SHA512e109de4e3d6bc772c580fe666d5f3f19d3c5202d92605551ce7e2fd571bd5772454b79717860378d52b4fab9ba15efba64607408a468ac2fa51a01300f26c287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937c379acaa36c35f692461854ae7cfc
SHA12e473962c6f3c7a335ab6e7850a29ab0f47f317f
SHA256ce75bcead1da1ea39fcebd11fe7508d023956dc6ebe9e7079e9807c321d96795
SHA51277ac49ffa8063a9b2f2852341f7c40c974f82e092d2e84e6c7ef03612d74c1ac18ae5a583d1426090941d0020edc772616d1ff6e52b4ea8173d73574b4495860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad049200c8b8bc9d49989bd38ad9be69
SHA128c22f3f6f7bd76f9a2cb341ef0d987ce910f5b1
SHA25649572721a13604232bf47e3146ee3b6b67d370d7d358e87a00c232c496b27577
SHA51227c9dabf3e979996a539282d0bdfd8219bb79600d8848b1eb800a272fe54490d6ad687a99fc68166dc19e32efbc0e48d9fec99681205462d9c66aabc0de96519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685ce76bb57471a6464a516f443cd752
SHA19ab18919b53ca87b1539c80fa657dc05acee3608
SHA2560d2ae7e08f41927f3f664a363d6ffc051f171bbead8ee77ac175ed7fec244e14
SHA5120095ad261ebeac3477aaa453a5c3add5f6476ba5bd38cdb2f5d95afd49b2038f650c9a25b270f73294c5887b3167f81ca4bb5f826f6808148339464b40d489d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2dc70ea68e91e479de8b9df70a7259
SHA1a0746be27a8d9596992b1343f0b7cfee2e7cbc33
SHA2565600e4283d682124cbf232487375d228864183c9a26423676a448475e7f25d6e
SHA5126eac5263a1a8dcf05fe810e79ca3943b36ce365f75997a78f9cbe4f7dda997d5477701d17887f338d73dca92a2bc5c95fba0318be1286e337ab076157d82b032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26d006d7a8a2970fe97f0fadb7581f9
SHA161976c07509a8f151184c54a94340c63d9250b35
SHA256d3d78fa23995c12608c27ec46162ac33518e00d87648aba770ad75f4982c498f
SHA512373f02f552879e104175662c5b70a2a95c61d30e2d453e2416c32e5adf43d6530ab3f4eb3e2d8c7bffe1410dd2dc4ebf8a3d10d6a4dcdc6a867d758f38b84baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281d97c6ef59139aaae57241ac06895a
SHA1c74590bf70eadcc7f2ea5b485a5664b5fdf3f859
SHA2567e47993a1353afc882780f66ad58bc97070b8dfcd5a0ecebfe5063d88029bf8f
SHA512421046e8de4ed010698bc8218261e9ca5889ea83f087f2c0c864ea03d9ff10072bee9d5578c9413049b80b468e85854ebea6974270aed52c3effa105ac43cac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde8ff38d49860c324457c5216382888
SHA1f9397bbda669d846d24b3e517f09795a6272282b
SHA256098d08d1860bec15d10ef6e6ccb7a5eda4c3389eec8887ffa483ea0acc8d0e08
SHA5121a401179c20480baaee9cd36237d07d9d6a59fe3145934ba88d2b9faec50adaf141f383ae592806887d101eddff188e93d341db821fe782e14160cbc7383a470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a8901782b2b926787aab84968cca89
SHA1a2449d31892c164c8299c4392826f415ed3be183
SHA25670cef564dfff5b9ee34778774a696597f8897535429b6e1b5464a45d717f356e
SHA5121e1efa67b948b24d60507874d118056e9f84073b3d8074defc8e78c90ccb6f7fe6f89c31129466d658c5e6c1effc7d46c25ba5e24aba58aff4a50401a6f0936f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c6e69cb9efb053ccfd8e05ebfc0fbe
SHA1fde74548fe975c1175f7f42b9d3b707f69c0cda6
SHA2566599a280783323399c0a9f357b6940a2717bd0d59829a9dbf62052025467af25
SHA512913db61ad2a29296103938ea0afe676cd5993d74e93880a75453ca25e4bc268132b6b219286f1bf07f319911187ff220c4b14618567a94c814b1f803e86d1932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4dc3e1c0ae9a05a614247a74b0f70f1
SHA19e4de90f3c0a56faca0a652dbd94a49c7ac577ce
SHA25698d283b3967058831cb4d321b8b9addbcfd9062996579c00faf188e4ddcf6ad1
SHA5122b02a7ea047a2eb2f044a1688d2d2b7b92adaec563908c44a86e6a6b808d3895d93e25f2fe14622c1a7328d4e4dbe4a21d926eca54c11497109614f18b049c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e51baf8b74f3fe83ee29a5ebe6aea1a
SHA1bc08c635cbf5f28fefbf5c16f1335758f9ccd11e
SHA256fedd7e8ca29d11aa5009d39bd847c7330b0515664c60eb058364b56b0f06aad1
SHA51246e97b0b1dfc4c3a7c7feae5447c52325a2f38890e87948b21207f1c4877e6392289bc3a16f12172c491444e490494129b28dd13ea8676d18e2c802968503e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3d3a389f6c3365abe2b289ac5122c0
SHA16c40e9d0557756110c9a15b9bbc478e66b486634
SHA2561b1b904c33e363138216a64d6288742ad47f710b6859daf9d70c9a9a4e7e2f98
SHA512a051c0d306f8c794cbe664eb349c16aee983105c88da6254b8f6d38e3ccf5a51308ab2016619cd43d8ef1c010cc8c2f4e6094e1b484a0730bf7c348f840b08e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67f0e430280b65c9fe92cdb39eebc6c
SHA1918a5c80c4d088392e86348a9f5af85528300696
SHA256ec69e62f163d471be9362a9d05a310976354b6780fd0096f8736b96ea9fdef97
SHA512a4648a594c47164a55c2cc5ca8695d4e303482de8dce72532691b7f7f448670e62b86f0f65580dd75e7fee3119ecd8a6edbf408cee802bf54370e68064d7ebc9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b