Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
3d2145a5883d66c5b18e35534feed995_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d2145a5883d66c5b18e35534feed995_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d2145a5883d66c5b18e35534feed995_JaffaCakes118.html
-
Size
6KB
-
MD5
3d2145a5883d66c5b18e35534feed995
-
SHA1
945c114e9722019e2f7fadbec4526742b06a354b
-
SHA256
024c7305e4b55201a9f5ead3ef698810428221c6febd04a1e53d9cda8231735c
-
SHA512
4c376b04edb5e42718ec3eb245a7cb6b3704ed99c6dc5b12734f12094df1952a0582e2d0de8dfa74fba616d125cffdb5da4318703ac85e2f4a96a0680cd0ef62
-
SSDEEP
96:Djfm5qV2oNEWzOMxKDJyjXIRKDeWo/nym3rVgt/MHK8:Djfm58NNEwrKDJyjXIRKDvo/nymbGMq8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A173E401-8904-11EF-ABA3-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4013bb77111ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434945713" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000003095a4e466ab9f8a589673f2933ae37c4e2fc63451cf848909a34aa18dcf92b6000000000e80000000020000200000001500960f21bcbb84786bde90522de01bfc5cd22f9162da6ce0f1f230d3f7af1e200000006a4f39cfd3e06f6531eacb55e2836649ed71eca0cf93f3bc27a5bda72a935e9540000000328f6dc4a37237e40b0f53e4f245d19f71d82da8051035fa9db81af661ad70666eb192fd0fd1f90d1ffb65935d0e5da08737274613ce2eba2ede64dd95e442ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3016 2380 iexplore.exe 31 PID 2380 wrote to memory of 3016 2380 iexplore.exe 31 PID 2380 wrote to memory of 3016 2380 iexplore.exe 31 PID 2380 wrote to memory of 3016 2380 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d2145a5883d66c5b18e35534feed995_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5eb70d65b3db552a2559d9bd5082d0
SHA15a34651beabde1c78979e6eab548639d2e329085
SHA256b180b36d95e20c5bc6421a37b2b9ad0416ed1f918a6a53fe914b89c72e8c6198
SHA512ae27c8279efcbd2942091507a029cff81b6304cbf2f24dd637f5a41b7e55c2697bcdb383522062bb96804ad9ca2ad8881c566a5440edff595ee7b73076379592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66361ff44113f8740db3bd7ddf128ac
SHA1d65774c2e5a84800c60c48eac2df3c47745a9bc4
SHA256baedcf86a8459fdf98513214fc5785726882ff202843b045cca9f74aa5de12eb
SHA512416a4f9e024946d5eaa5943e553f9a7639ea8a657ed3b03415eceaf71fb9cc744db9429afc4e4d3ff3c7902f6ed3eaa1cda7d70121aadcc7aa33e5a282fe3730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579da61842ef0f14a50bc1fa1c9012215
SHA1f6de5dde2c818ef14ec61d2eaeac117b55a0b22a
SHA256d47f9874862cd8168113f391a9b48337d91d351887647896907a196d27de532b
SHA51252c058ef9c3d8e85ec6448b633528ec5aa70708acdd1db4c82bf4b9bac06dac8500aa3c2f56f0b59a5f647b580cb4055cd7256f0e1547b4654008f347e6cc76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c881d050184c941b252fdfaa78c1c6
SHA178dbcc028360b5d96bc5aea0aff07070a585c49f
SHA256158032f3cb929e784b71827c8134b4c7ba5e8b7eeb5da8e1d4db463eedd5277e
SHA512611970c74046481fcdbf786b662a87aa88d2ef51704998dcf18b1437af18f93255a442ce395dfb62f981aad85501b3042168c828966e31cb6dd718ac354966a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877ac0de69b629f3eac90f4cb0c0aa42
SHA173baeb839920b0dd966f94bd61170f2b62be0122
SHA2563cf919ff0d136e7e1e2bb22a91edd061c7baf16fd0a750053dcfcb70553902e0
SHA5129ea6481c874c8ace23d8d631147690e982b197abd84516f791606a3e975564a7750fa70b2d42685197785a1501a1a2402776cd79863a266f1377b45bff3aca95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c718279b13fa739dd33b4ca2138038
SHA14ae34a8bc6f2306c832d4a43185a7e69ae54739f
SHA25656c98cf1c0aa26d55468fae528d290d991f7d39814c22bebd03fd8d6f7598b78
SHA512cc825a65e7067e3ca30f4bda041b3af3659e03088c2a24a70a27960e4ab7482ea7457dfe4efe5d6e78df843c05624c22ffbda6c3d1454e41755a5c4a60181a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0dc5f44e527cd369d2bcc9a9df2fcda
SHA1ce7d89037b1fd2bc308b10bc871530c233d5b3b0
SHA2569dd3cb7c1a219ad4ff16d330e2c642eb536b96a8c4826324ec52f642a707652a
SHA5123dac3baf7229a5a7ef20f15d193c01020e4456c657c36f5dcbbda715c0be53e02d6f117e0aa96d3de5b46ddba8252e4cdbf933d4fbd2b7c93c26ab28913035c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003ff6648d87a3eabec24c786d5f13af
SHA1292644f4de6ee2b7f5eb760ac8899d94e4c2c797
SHA25627afbe179a6a8db2cfb8bd489f7f786a4d077d19b1e102efd3f6ea5c67a294ff
SHA51268ea395f8256d8b4c237ae6fdea6f3bb47ba76c0348d976a948a712e280e2fb7549addd5e70bc9bc4c1e5ed2e6506d28bd012fc600b226fb050f2c22888b62c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574c078df6db3a8ded968539b223e1a31
SHA196153429adae23548afcf16fc3c05979a61d79f1
SHA256e1bb46011b0deab3697c681ff4acadfb67fbdac7ad6340e4af441325fdd2353c
SHA512b75b3726b0f42c2a0361762d118ad8daf1aa1ac0a3a23f99d475f05c5b3f893080a7885b5767a45411d6e5da2c7d3a3d0c803760b2fa2b95a202a3857b6a9611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c729d25568aabfa8686438bbc2f9568a
SHA1c100f62ede465f678dadda0a015ed50188c523f9
SHA25615696673d60a83ac5a179bddc4650d105980fea5b14c68db3b0ecfa06b474efb
SHA512ceec6a0b8c8672cbcd0cd3b977e4e48fa42b0568e0bfc3f03e82a3a5d57f63849557af17cac64911fce65e3ac3b58548e43dac381f83e523f59fa02bb00ee95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e5fd0807a28a0e2e9996699976e2f8
SHA1ac5f0170c9e6f0773d3dc9c838a9ba7d04d08c15
SHA256d00d4b419c19a51b58b832f9b3b73ca12e60171722681236ecd2d0e63d2d6709
SHA512ced6b7d457bb2130c6d23e6e2c577a21cfd5b5ebcba73910191fe4f61722ddf62d4bbfb1b8a268ae94bedf3c0b49493fbb817c673a7f255267f1274f2efed2b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a7c62790b8c5c5c3c6ebeda4e2ae978
SHA13ca5e35972c4e314cfc7f9c944d2b4beed916428
SHA2564c5270cae1420cbdc04f842f1632139e5c9b6f2cf58218becc6832dd4cbaf19c
SHA512f5208e2070da6494066c389c06e97985a5bdbab7e71d42453bf7538abd213a073c3f09a5379ab616a63e9129727bc67649c267318645690202eefed692a09319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98e43d625ca4847ea03bce0a266bdfd
SHA1de794de7f51ec37b1d4155b30f29d470ef357b95
SHA256bbff50498bc2da4fadc117c0d8f0ea48e92df4fecbf030125bbe59285ade6e60
SHA512f5e385aec212223f7b579770f74e0b4c02d1d46f8474c2af9282bbd609f1ac63c332f2c5de25c6681383c32ec0deb80799fc4db881a4b8a7ec2f8f22309dd16e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf70d07c8327019095337165d5084317
SHA1c3677cbc9723f7da82aaf9ece749ea4aa05a6b03
SHA25677cc8f423e87f1c66db8c75f7c081fd31217d4b36663b0e220b24b83933b05c8
SHA5124b9eab96078ea1f6c23356ec2238c516561d9768c525f9d7bfdb64da529132f08aea783dbf1745837635b275ec87114f5bdb96c0c2878b270573cf150e5bdaa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594bca9c5a187e9b359631b2b9e467f6f
SHA1e1b3efb08d2907c8e04715f948e6ea7ab505b4f6
SHA2564c12da24d700077f954975feb483f21b6cb1446280db2e96b8eb424a4e46194c
SHA5123efa0e1e702f15eeeabbee46d769b1f59c6adc8961b146df2a05828cc6be01aa2d5dea7db8f5d7ba439e851c347a8d4a90533ebf1058eac57079f6f0af41cd72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc4aaa5b88b0ca36929bfa723c5929c
SHA19d320fabb3d2b38c7d9d9190e78ffcc4592160d9
SHA2563cd49255edecc9acc79f2e79686eb010b80718ac5168fc25f660dfe4934e77c9
SHA512ab11e3f0f17fa8ef0ffcf5b2cb78cc802bfdb80f62c15aa05f1fb98738b5a29ae4456f65d729012d91360e7b8d4f5d8c037b21e2897ca3fe82e6a8000fbdefff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f427f802ffc8b9c32ca96e56ce91b892
SHA120da0cfa4169fd4f188b9137a8c37c9a59276a35
SHA2560433e940e4488ed097517b592a55353a5b4d02d5fcfa91d1b4b8209ff6424238
SHA512332d2bd402b227940da99cc52cee332c9d7c74c2102c0ea2683ef4a3f4d07eee8d0c5b2a51926135d8d58f882cd5b5fefbafbce5d08626c27a4f63a1665be44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9d67519f3edc3ededbb54091a087850
SHA119dc749e0cef298417b8f41e998942509d1f5522
SHA2561ae9bb6922f3ce2ae1f57c7c5b2b39f8ba96b66e7306dec137a9d4a45e21d959
SHA512cff3a919ea237a285b753eb8ec788cc97feb951dcd0998770bf3b24f3e1894466c7d55f2ec267f56043a630d8d01b67ddb3ee9803b1bd041ec71e2cc4ba759ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2a939223f51a3bf37dc33e31792ebe9
SHA1142c9076077c286e95829e2f64e739d819f978e9
SHA256105dfa254e580d144e00b0b2b6fce59e032fd27500e3a88f7dc2bfb5418631e9
SHA5120add273351e4ca183769a5a0cb13cb3e5da52a25a9ab9da39c2e4ed6bfef8b4849700aee5da9db98836cdb6f6a069526d26caa39f1b696470e4ed3e1c64eaa3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b