Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
3ce6bcdf0141020f862e5da4fb4648e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ce6bcdf0141020f862e5da4fb4648e4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ce6bcdf0141020f862e5da4fb4648e4_JaffaCakes118.html
-
Size
35KB
-
MD5
3ce6bcdf0141020f862e5da4fb4648e4
-
SHA1
50a7f6ed1e77218da01cde0ab1f76d04eb205e55
-
SHA256
b83aefd4fb386cd83db8fd52296d8f8a0404e19346caf4a80e6e7fdabf80615c
-
SHA512
4aec466dba5fb163ac4eb7f9c3436661d707fc3621aa3d00455979092d7c619034ac4f63921c0cda66c5dcd6a663deb2671067b65fdde7a068f4f04e0e8daf6e
-
SSDEEP
768:SnzZwZFxARHd7aZDsgQSFjhiz3oqS5kxBGk+6ypar1MEgaqgaU735bN:SnXcHq8W1ZgaqgaCN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a097ede0091ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F145CB91-88FC-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434942411" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dd763b33ea1a2b4fa5a2827556c9d3f00000000002000000000010660000000100002000000022c847fbf77907f2310315853dc54c130b4db63ad8fb782b413a9865294fe99e000000000e8000000002000020000000ab34d40ee87d4c9de71886c8bc503b41307f3aac4fb798ec42fcb5ca8a32b0b62000000063aaf74df376dfafc27a96ee121d77dcc65c924a6834cf7f94ecb29abba575a9400000009f3d6426a8cadafd9caa632c813a92af396082d4881fc78bff89ba60acd2dfc786c4433a03fa216bd1edd3aced20529e5a3a91e1b40996caed8f6b272c44fb4e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE 2308 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2308 2324 iexplore.exe 31 PID 2324 wrote to memory of 2308 2324 iexplore.exe 31 PID 2324 wrote to memory of 2308 2324 iexplore.exe 31 PID 2324 wrote to memory of 2308 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ce6bcdf0141020f862e5da4fb4648e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587ddf65e3ea820ec2df1bae001f42b2f
SHA1ab67c5679919e2af263483981e8eafe323a58e7d
SHA25663d0c38f4108b473ae72a6da6f0e2117f4c8a1a45a8d7145d5ed8c0f2b097aa9
SHA512811e792e069123a671b0ff8d8eea9e02e74541d7861b868be2e4cd2a2afdfaf1a3fc74f600e5d4d838943f88fc44c5d2c38f331b9f27e65cbad86d72a4bffa34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560401e8189c2525d80c1a07182d54b4d
SHA1b95f9230e4a6b94fd369d5549b040446dded31e0
SHA2563d6f9a85091eb2e1dc1003376e2d9f5a88a69a9ecb7a3f2f635da6fa209a591f
SHA512552bd4663d81170982c5db00f6039791a4690ee635539ad51ea02a47924f3a0b8552a6998caa480ca11c8343515e9654a9878d2ac28a46bebc9ccfc5a09a54e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c71a09d009d8973cc3a12f82267543
SHA147ee04ee984712929a02690417423c9566140009
SHA256544fabb798424d417b09a0c9f8fb2473aa38e9efb86af772f52efcaafa08ebac
SHA5129864720d1bd30bddef8989e19f4a17310a0720cc458d32e3e0dd839cb99832c9f77df004095b7bb1cb08237fc4a3267ca063de73801b39ee3f371366ae30fd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ce31e174e62a61e50bf8f4fb69919e
SHA181f1cfe08b8d6e7829161004d6f74b837414ec65
SHA2563947f8155027bc2e4af4bffb100e69214922bcab558d42d55ac25ae698ff59f4
SHA5127378f601eefd78888a73326928546e3a29c700933fc6ea8792083f7b40cd2487a534dafc6d0865aef04c395c3c6608813995a0db04d655439072f5a3f6e74f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b687eff853404f0ad64b91bee3a6bbdb
SHA11a85191d9f178922d26396329552ab8673f21b44
SHA2563e6d6880b668db37d1a6d796d64cf998a0ab91aa8de2673055ad2d457c49983d
SHA51210384bffc21b1aee3e0933593fd076003e6d2ab8ddf40ac625977044349d03ec37634684d2ac4e252956462d6b278cc4eb325243f94aa082650ab5b75871342b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e1383d790c88faff056d12e2aa727e2
SHA15fc479a7c7e7ee75ec9ef4cd28a43c00b3a1fc43
SHA2568b8efe912b16edba4b7014857c811e3d9ece1b5ea628c958d3ea6c0347ad6192
SHA512e7e5e1970a3d2f162ca6cbdb1379d7959b6f1ba526cc347ad5208a65f83f61cdf83ccead15b0d3b58edcd327a79cd043b222a1dcbf8bc25eeaff9f9cb5341464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a94a5b4da8687468f284b7fd6195a994
SHA132eba8a4adade4ad0081250ffa6d7069e13fe72b
SHA256bfb3bb4015a1e2d508f1485f8043924e275e1f0a878f400f25b3917e84d09e90
SHA512ffbd4b4267d82371a24e4f9117230247da278fb794de5e8621ce536b92e6c10ef5814a5e6a4959160949dfeba2b5c3d74382faad7ae50418da77fa1bd618d60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56955b258692a9b9b6abc6f1e02cb4fa1
SHA1c941e26475b352a0ad2f3da617ce2d6b67df252c
SHA256e9365b82c5e7b346653b0e30df35fe6f18432a0f9cc054aa642d800e80c62bf9
SHA512f34f4ed1a1b3c3c319b5ea64f608c0196d2fc5ee98d874203abe56db4cc6834b899510a43ef17bb8189721c83172bd2fe2c6404d28f7ed33a8102e732e6d5d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa19e73a5f3e0ef8e81e686d2b01563
SHA15351761e42cbe26047fa8852a8b11d310462cd9c
SHA2569c3f29334b34ce803da715df7b0fe28678e2b3fd3e08a58fb9d683ae979618f5
SHA51285c262e32a6e59df40a51ec7e27338f775e6e8063b08dcbf39ac075340b563d51d91485e239f3593be69aea41af5a2fc9fc1ea416dbe18d028d3527f02ccdcd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ff5ec33302eabb201093446c5e40bd
SHA1b6c156c8bc3f3113632c823b132b18d9a0738b3d
SHA25643927e525df87668a2c898b2c68408e061bf8f7b09a207e2bf5818bbb9a97af3
SHA51218468ab0dc34d5d9cb0440d782914c87ba7c781bfcb417dc82192b59c2e0359c68884eec9fb2aaf877de9a93d65cff64b6f122c59d3290fb1dc40cb77499a178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57043b22aff244cd6cf08a6e6181d45a7
SHA14ed53ac4424f9a6e7cc4ed784b210c4890878676
SHA25618b75940b608e9ea7342f99a30f5bf03c3ce8b6e56bc8d774372249f01054190
SHA512dbb0c1ef5212f52aefdd760fe9fdd0ad2bd39ada2f2f5d6601031a2691a8623734f8319893f9a87e1a90c7e638c7e588906767e05634f91a3eb9e7e70f2d175b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf22a276d6e61da0479f126701bc5d36
SHA1e5f09b5ad0c843ccf61655a339765282106c8d44
SHA256e49e502f72b798ce83cad652b10f8689e4de783df25ea15150ef540b7068d439
SHA51271a1e0e9e3aae2403ec9086bd99f061e3cbb9f8bb38f50e0124755db720439646a089b2deae531ecc1bb90c265149fd2f6ea13717f12cebb14407a59fcd2ee3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da044957ffdb7369a936e1b305a9f75
SHA172488956e8a455c2a5bb98f89396cc773ce68091
SHA256cb342c7bff8d2bce18c1f776555c20b79ac29be1ce0098c50e40ccb4ade6df89
SHA5125a562a3afa9128866554d1a97fe8df5e409e5401264eb4e064f9cc4cb9805ece9bb64af380dc3502f07a28c2774e1781d36b536d6ee88ab6d701053df10dafb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2210ec56b8fffd6b4bdae3def7fb7cb
SHA184c13073ec4863ec0a098edae88703137c331d30
SHA256534d95880911a6cf53d5ea0cef5d27abf336b48b5b84d593963a0d8275c47e84
SHA512a9b09acb700b850bd85d12cd915f34c5e035bbef795ae6a724be2afa9085727a216f4c4720435650b7ca491d3e31dd58a080ea8da365684f11b492679cabb9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50714fa1092db07f4823315a7a98f390e
SHA1057fe346280265550bf4bd85331117d03cfc86f1
SHA2565a85aad97de6162f7fd9e256a5f35985d7ab4954f438fd383d2f71bae29b27b4
SHA512d6006376cc33ac990fc8e6cf75d87bd32580233635c4afcfd8995fe93df555355ea3f5b115de3c795fa9daac27d09bd8ef7c7c4760638b1a505fff236ecf89c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216e7b45bf370c4e191e620d19691305
SHA194575d779b4441f6f1859d4239015c9aba4773be
SHA256e28447017e6cfcf3f37d78299c9fedc2190e0982a2e5b6ac417adf5df96e78fe
SHA51222955f94cba763638dc3bd5acfe8ffc6f41dd6ccd2a4e81217f6b4ae7ba06e7bbb76be0808a4ea5243e93b46a9e109b565a7a93254fa48ed18058008dcce5561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3eb43b27de557f48709cb81a2e8fc4
SHA190e7e95837c355865d6acb8e418e41cb4b46d2d6
SHA256db8f2f0b7ae1f7e1b4ab85d0a3a357d0abf6bf2f9143e4a8c274e4c2d697a9aa
SHA512c4ed79d69492ee24d63b22cdc4b5d6b0bd1b1321c855a6a96e2fb546ee4877c30099494f8287b3189ac7031f077bbef6f6c5b99805a560b12a2a6ccc5ca4eb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51012d985ce9d022dacbe4646dfcca0d3
SHA101fa3d1b34a55de7657be9b8b515db6cd84cb365
SHA2567ef4ea6676d1a321e2020affdde389537969ccc7c67dc65ff5ce2dded39d032f
SHA512036c68fc4f85db812c9ae421ea814af2d2bf5a3ca52678397dabc2eb05ce8cab0f984b3e1fec19630a8ada313543283864e248e1c6989b237cb0eb0e96c62a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59802a8f90af7bef68dc8c13632245479
SHA13a632ef234422485984f89dcf3b3f82f8ff4acd0
SHA2568e28b524f26771bd24b6b003ec6f1ecac6efb20f3a46eec84a3d2c3fcea6e2d4
SHA5127b0adf6cd285bd26e4f58e6e739eabbf27f1ba3bc9da21e361d42dbe4b9f0fa71cd7969337a9e5648fdeb3d698acb39fe691e68d0475444d45fd8502828b02cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b