Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
3cc3bba64c535c0a20e73a4384e2689c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cc3bba64c535c0a20e73a4384e2689c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3cc3bba64c535c0a20e73a4384e2689c_JaffaCakes118.html
-
Size
35KB
-
MD5
3cc3bba64c535c0a20e73a4384e2689c
-
SHA1
f48eaa63f8ba272e266deaab562e336a254c2fe2
-
SHA256
ab5f83f595c57392176a7832d83f89aaecad566bc5b4787b9cc97457e61483a3
-
SHA512
3125edbda81cb162a4d2970be0dce6abf309ddfce72465c667a1b46300c4710837a8fa1c3b618c93fe92ceaf602380c4e66aa7182df6904e5176523ad56181c5
-
SSDEEP
768:ylLlIJbVrV9x1/LcayVZW8ChWmvWm2T5QCYIClmR3vSPSruw:51way7jilvlJsxuw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434940100" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FCED821-88F7-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d07f2bc28d65d643af269900f33087a3000000000200000000001066000000010000200000007b858c222bc46adb54f15d0791113f575bbcf8c07f6d3245b6a9d1e453a0badb000000000e800000000200002000000035dc4f2303377441642e0ad5a89bef7ee138c61e9d481f603d1abfb59b41209b200000007cdb0689a3d314b7c9e5e7a67456193110f10771edc53d63359a0880cf5fec3940000000ce9f6377153fb2a5665cd09a7363614d1c20bb3c983df6bfa28ae0d27a603abf59879b8a90b9478d4ef62603561b613631ab094bfb56a06794a3eb15077c8cd0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ceed65041ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30 PID 2384 wrote to memory of 2428 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cc3bba64c535c0a20e73a4384e2689c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b17bf5346b7db0c3e7858e58a7c805c
SHA1476cb5790ade706ba208824f65c0c32355468560
SHA256eb131dee49893ff01060b6ab7c93e107f79645cd3201f32ce7c2401656faa117
SHA512cfc5fbdc6dee24433b59ca5c53f80701b4991194dfa05b72fb5e71cb0e89c8f5041fbb51b0fb52e5ebb892faffa471727ef716ab96dcfbc2add46b2e32a6b43a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b03cb864d2ca63d67cf9f83d4e59ca7
SHA1c88f055f404d2f6b7abc5dd3c2943ba395ebe84a
SHA25637f3fd8c5e8df685c2c2d91e185fde901723420bcd431a3c49854e2f4c15cc19
SHA512c152bf0724d508a8b89b6f0424e281a5de4f401eb84baed473ebe5ebf46c469280e160e8f23914f3913eea2f505c192add7c1755d58955c4a4c2b27c805c9205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df36095671318d089fc234f16017b463
SHA1a470927ee054a20040410785c29554fff34944e1
SHA256d28a5979d01a047ca8cc804a38637920f34c43a08e2c84b1e8540b42c5028139
SHA5128e7fdd8d9085d30f84b65b1c496a498532971d8f6087b29a0ca67173144e998c094567bc53e7390ae30bdc6636a7216e8edf0e78d3dc5dc92af4da1ce4ff16b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529be3304a97ec43c1efae6e2d67d021f
SHA1f6d7da8bca03de7a0122d9b88b795552358bca18
SHA256d3b6ad21bbe15415ebd314b9bbd5c175112fa39d72638dae457177a8acb6f68f
SHA51279f6191d3cdddff4180489562eb87dbc758382f4eb85ce6e4ff22887c83dcb1b6cbf8b4673d925262879f395d6e939cb88120686bedfd03fedabcc7f3659db37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffad2aa5f06ee48bebd8a287ad98690c
SHA1632bef1f035b6276300632d0cc78ce241223a0ab
SHA256fceee5c39b55ead9c19b656e369707c2940891b5fafa06d8e20efd97c5bfd784
SHA512d66812eed4606dea3b3dc6afabe0a6d33e96de0b359839f09b9fb5297256b222ff27c4553d4f3119ed7e56ab8a7a13c3b7d0976bbe73ac6cbb29c15b46f98c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca18fc7434ebb95fe09979af989dcd0
SHA1306ee7a5cc0c8d930a469374da64a34c931afc50
SHA2569376307a68014dcdcd31c844ac9f69b4c955607969d0794d257a976e5215678f
SHA512df8484f56fd0efceecf38bdc2a1d31d2e6a617a70cf176b0a24a7a9c49eebed6712a6320f2a76fed8ef4d0a84f60ceb9842e793ca22d5ae95b1305f760eba41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce63a63d26c2ee970c1daa6603c0860
SHA1cdff4afbda4805a644185db2a9c46ad92163b974
SHA2560be71acdc443b1d4ed891fa188fd13dc8846074bed521b481f4fbffb7e997827
SHA512a7f2ebc7698a0ceb2f51a6422a44da8aa441ea423430e347bcb6a5f44a45987dac0b357fa1e623b107dc1cdcff9c62b0aad702f48ad53cb8440cf07ff45803b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52723ef86a9b9e4ea7bf8f80934c33aab
SHA1be1293f0a3425ad953c4a4ce0cab59732c46f7bc
SHA256e2df9957d3cee878450132761d9df27533c913da2058e8b183f02560ccdf6153
SHA51204e3e635bcc3006c39537f75e9657b751a99947b459ca7a679787c580920e5ca90978743846320c82abf8b2d241d0fcb02382466361627855285d492dbf07647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f927ec136a379675530b598a123446ec
SHA11edb7f8e00fbd5c7ff6c1db3a1777fd6f2b9b4a0
SHA25636d2ef593f21d83d9522c3a66149bf97ffc2ce731c7966493bb96b1b91acaabf
SHA512abeaf78ae595ff2c24f70915a21b51cd5b0bc4b5fccdf0275d434b278158b51d975a4954df40ce38913b071321f41ea138fc7c6477ca2a5c003fd858390388be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af30f7fda8caae4c2a87ca6a10d6a638
SHA11c60ca6f15180f2051efb2daeccef4aeb7153f48
SHA25616029226fbcb26ad606a5f81b43c0e12db507d8610ac8ad0cde514aeb0af9e0c
SHA5123ed55874079d7e247721f45dfd71f8f4d69848622d659e31752fdb05fb75c045611ea5688a20d705d714700247e9cb1eb3892d4933f9081df99e66361e970806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d971abd6c3f7f34204a6fea1e7f8322
SHA1ceeb30040470051fec38617c5a1f64629f4609b4
SHA25632e54d00e3d1229e5685f82f95fac85a54182f56608de5b5c50bf671a3380ab8
SHA5127f3a2b07d9e1eb58f347e715332eb9a8671fe9ee196410f4f9f8b93fd5bf243464abfc6b11be896ed348992ec6d98563d8d2f8aeadf832be047dd0430b1f83db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a3c30ef55296fbc6e3520aa3c04e3b
SHA1335ee89475effbf4b888b57c8e2da75ae67b19f6
SHA25661fd386883161f1d091456f16f24e2943edbdb09c7928f1804cfe56ca68c66dd
SHA512b8727d51eb96d51743ddec460dca6fe68200a586fb3319b324c9999c7818c526516acad2a7fc6fde85ca60d8eacb2c55c2fd8cdc79c6b82a9aafb0a2a3230e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55423c6fde76a8d538ad2bf7b7147dba6
SHA170eddcafefe11e51531b0392e723fdfca6b72204
SHA256ac92f982ae64a863fadc5baed0ebddbd0477ed307639c0ab3a80cca4b08eb31d
SHA512524fa6302aaa49ee260a8299feaed818464e19be5e1b498c8ccf6a2b6e7131c69d81ba266f1683ee4847275dc86278ae72bb23bef7dd357ea740c12337709ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0bb803f6e3d4b22a483b5d11474527
SHA1a3ce1d8f890cc81a1dd737a26c249d4ecf656541
SHA2566d2aa661857ab86265066d6c6466a2cd58525a916fa8f0c6dc0a28b6d24481ab
SHA512054ed9d55705788d8534640e7926c2fd9cca5fe05bf6e4d9fce46effbcdb424b8ed1f4c0abe1c9f3330f394e88c92d8492505c6a4cdceece0363155a0dcfd56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a7c6f9a86f737344eb1526c10f3ad8
SHA147443b2a382ff3457fd0e28c8ce140c02e2700a8
SHA25653819d303550d4fdc5151c1956db21d67be04f916a4145587843cf6b90f43b1c
SHA512c21e1e5d299b32ef65f0680092f3a40b63331adbf84b417fa1bb258bb22edf8fb8c109e082b2f078e803e7bcccb1d5ab1c58801b0aa46d06625913d90a5a063f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6acb3dbf9b9f7b44317df5ef63fc41
SHA1395e360cde410237e61dcc145c6ff576c783cb76
SHA256d5df230840a6099b3f58803d2394289d9017628b99761b99e982a28d357832dc
SHA512b0484aa82ec0cd829a30401f556ae84eb3915d550a216af988b28632a1f8c339f968051818654a6dec96c224bce4be3b22f764f8e77f34c2f9e2979b13e1bf07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556150f92830185f76833ae8118c94821
SHA14357d185483b51517c935d763acfe820dea84dee
SHA25652356792f1b82a9b1e13169f0572555ffe3470a88668e278a05a6feca51b726f
SHA5121a8b87103dabc6a742f4398c101b0529d92ac8888d4011b656ebeefa3b6f5364a67fa5fafc2a2b40514dcaaa4c3831f075f29642128aaef8301f412093c02007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e47a527476b90a7009c5c99f231cde
SHA159fb8fca41b95c0cfb50525008c5ae001b522761
SHA256d06a42e3a22ecd8ee394126c6947f3e21bc529cab8e8fad5b69edd0a5904c5c4
SHA51226c6696f173d2df57c0a1fb12dc73ebd6495ee34cd75a1610184be5462c408398a4a554ec90f36962cf024967e52ffc8050081cf7a3ff54e491522c47e9354ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a18bb7812970731f568b3cab5ac63f
SHA139b41b92574416d6df0f0e6cdc12f4d2ca70cbdb
SHA256104430d67123d042723523aa43e98b230f1c3ff6533245363b89a2de345314bc
SHA512709e0f0380118d2909c90dc43d4d721310f4976b81709be4c7a857e7a93f99781b51b2884a329d37625b3a1aad71731e0948aa793035c7458c381fcf450da62d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b