Analysis
-
max time kernel
136s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
3cf4bf250af95296cf0602c9f61942b5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cf4bf250af95296cf0602c9f61942b5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3cf4bf250af95296cf0602c9f61942b5_JaffaCakes118.html
-
Size
34KB
-
MD5
3cf4bf250af95296cf0602c9f61942b5
-
SHA1
e24f8b01c58129c387859ffc6a7764f21d774a66
-
SHA256
79477132f78447fd2389c1c6eb7bf05a8dc120b210d52ce81e1bbb47ec719a59
-
SHA512
c616f24563226db821cf780afc966e600ca7f3328ede7ce3be8c806baa6cd269bd882ba296100ec94295c827723c5b9882a5f77fef1560a41a6bab1b5fa83c51
-
SSDEEP
384:XCRX87HCOdZ/Y+8Qo/IxlhV8RHznagpNp1qalG5:XC587HCOdwi/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434943160" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000bb4703bea2beec9f1d229ee02e48c2b4c0f8c507b94cbcce7de06c61604c27fd000000000e8000000002000020000000ab88e25068918ac1ecba2b22e8512329e1b3855ceed0c34a78b68e3aaec0c6f720000000b9c1ad2aa7a85208e9b785ae2fd2c394c38d02a5ef07264478047c0d03d9661540000000ff31b8e902d7056a764baef4e1341578352bcbffc146397c0b421ae7ae540b1aeffbdd648d3b1c5336170aa91901189a86484f78e3a40383bcbcaa68aa62be12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE8D7E91-88FE-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07d4c850b1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2352 2544 iexplore.exe 31 PID 2544 wrote to memory of 2352 2544 iexplore.exe 31 PID 2544 wrote to memory of 2352 2544 iexplore.exe 31 PID 2544 wrote to memory of 2352 2544 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3cf4bf250af95296cf0602c9f61942b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8f34ea8dfb8fb1ce319c45dfafc136
SHA10692a13e8f6b4b8fb922923905a73c5f94b5310d
SHA2566e5ca8bfa06d6de3825ad27fa9aaf8ee07f87b55ecf5a5e4fd3f61596d3e502c
SHA512ebd0455a29cb4a06562b5467400f669f9ba4ae378ec4246c5fea1b65c8123dcd4dcf1276bf49e21dc11e9fdef0720e8ca23a1170d181f1cf2694ac359a4b547b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf5daba44503c4a5f7af993e27a03e3
SHA123868015e76721e3a614863c2a0ad5cd7c8f56f4
SHA256ab59af4465f92abecf2037157b26c147ec9e1b20e1793b6d58b622154da3bae6
SHA5124f0f6dbf33ed4c8b4a6e172298fb308e7d814410dc8ee6cae7c6ae10f5a0c5be8c9b2c23cacab822cb6ec3be50a222de7f7c42fee24695a193790f517337d22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d36362fb719cb336ee1eecbda1e848c
SHA1b06a595b10590b594b79bfb1daf5b698cf2e901b
SHA256c3a3719371f115fc60cd9db971056b16c3932912a49c9d269c97d45226cbcffc
SHA512012cd1f84c2d67cf8e905e24279a48a2bd271bcaea3a44cb8f57c091d3bf056c66815b83be591a7bcd5693c9e053744e23a91c61dd5c386400fc4bd348761d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fc059524468d3bc0533f2fa1c9cad6
SHA1d0a0229ce2874a4f7896776427b12d26d88416f5
SHA25626d1cf79ded52db577e7ffccb52c1c062b126ed7dc14b57edd28f3bb5182a622
SHA5125a252c18594d08b0520bf3543f1c9a191860b699f8564c3b4363602216a5de9c12452c7f0f2474d25c9bff2abc29263d484555bd0c6534ff5dd3e8c8b4c8f3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdad7008f00b8b00e2db669f993a7bf6
SHA1a1c1aca6e1cc43133ba6bc1c60f1c5e7d34d0246
SHA2560764c09048308371174a38db140de1f7f4ca4ba9309dab9c065f5b35d772250e
SHA512d8bfaceb82102decea6c0202b12c20e48332d1f0fccdc1f39d32b4ca8bfd45a88c483b576b74b8407e2b3bd655f912099de0ee8030d74fa7b9dcb9601543245d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7362a97032080c32968e0997abc783
SHA1e014acb3bd2bc4813319eef3b0f8b97ea61da797
SHA2569e0e027373475749cc1dbea36ac552cb7e9582c2ac6b0f674342fd00f36856ad
SHA512e61b1d3b53467a7c2d296a576c59e9c3b82e103175c3fbbf7a4d6f2813de1bc61dd6cc1aab95b54950b3b67d99ca13e9f18daf39f694c74e0bb56d7137f0d9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8504e5544dc99142543954365ac779
SHA1fb32ef5436ac40cc2fb60045083312dbe3871795
SHA256a4abee851290fd79661045c266db8ed658a2050619bd8cd736607225d9237d71
SHA51229f7858b709df7063bb3faf7b71ff10aad63dc4bc4155759a907c24d45fd8d6e2ad3e85c59cccf0572ae46cb1202b75fc20380300a936906bb0dda4948916ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee1b73f053c2dbb0681777138245aa3
SHA195db55f7523a3ed1b2c52ffb957bf9391ed229cf
SHA256e74affa3d2fb1f5d08f798e4de23c659a364572b87d1088170b17b30a103c1d8
SHA512e6d9b74a6276030448b3dc545b3d8b079543431d91686fc9611c63b6ca3104bd44c8e5014225370e3aff0ef42efb0304654c487a0f5736b0b0735140c454029e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b160ec7844042586ae54a35955c78962
SHA1124da3561704dc2d04db73f879bfba99838584a6
SHA256796cb783f72c305a5f79e581a0327afe630bfbb1bbf8ff5441df07153b804df6
SHA512d1c1a01650750468e4fee081f01d9b89ac0d1e75c2f7054692c6daeff9268bf841a54596c8b825761617dcbd0cf5528f6fee8b69b685954051711bf57ccdeb4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd67ba5fc6ce2ce5948d244b97b8af4e
SHA16e9a6fe2649a9d90b5b904ea5310355866e0cfd4
SHA256a7b1a9ae2cf1ade3eb93b0433667c481800aa5b8563e3013e605cfde1f47c9d7
SHA51207cd7aa89407310b5704fb7ddc2d345e5fcbe3ea2103e41b78ba93ac493293996a229473a8121553b7fb4deee7441fc3a3b701917043c4a51894e60a536914a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598cfe241161eaf31128b6df448ec57a5
SHA1b89f47627a49f06a8b544eb08851e69d04de850c
SHA256bac3836d6867b8692ea00889f49e5155b837c368da8419914600ec11df7925a4
SHA5126f52c181cd753be89df00b0b6c5aaf5af112b8c5c4cb143dc6e9d736873671d5d6e41188c4b68ce50d59f7d4b8b7603bce54c8885b7df40e24c0d5a91b4aed10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faf84048ae41757111905d1e8a206499
SHA1b630c06e5ced3e663a5e3b90ed3a9b3b7adb9a11
SHA256753a14af8e44620985ec2cd2413668c1bb39198f9536ac39494432b3d7913266
SHA512b1f6dd64cf9cd62eecf39eb3da2583d53cc1cb66bb5e12a2ccd3f590940776e1ac86738b5aa598b4c37d0392440d4157f9272daf58e05feccf5f8a3ffa5db06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f269a5f733f0f3e86ad4e3d5d4c2b977
SHA1a2183664ab9e5226c9f8c30f86cd14c5f906ed35
SHA2565cd3f12b60ca2e7c125d4450af698fa818ccf22da8ad37de83bcf35f0304c3b0
SHA512b4e386b79fe437a6eeb12202c36de6342f148ab7fa3dff69d0b03a85c8b83bf45f0e957885a03ef03b8bf42fdd6053fd06d8d77d50f9b8747504367eea77cbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f9c4c304f9283f27e3f6a76f41a848c
SHA181eb8f5fac61b7da19bb7e2415f4d2973a07a1fb
SHA256a06db184169cb15accee14ddfa03dc811af0204692affff2c88317badb47b2f2
SHA51227be34cfe8f741c376397a8f9b29520cdf688cf7400ab2a91386ccc0a93ea091c250e25ae6de02a2df20d11feb0caca74b6bca6c35a5d38c2fa1a3e7d100d380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d149a21a6ec4894cadd32d5ae99263
SHA1c74539804c57d9dd79dfcddb9fc6f99390a8e8d4
SHA256ce9f4493f4e595e82196d8b9b86cb6ac6b858f6f32fbabfd1044f1d89fe9ee29
SHA51275a8894cb8dbbff703e9b4b60e16100a8b1a52c8355f1a302d91963201f3c86edf8696023c7afcad0154f4350d3a77ba83c12f3034999884eb49b987b36fc477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd9471954ad319aa6a031a8f09f1b7a
SHA175c07e1733f0f3f2bea2b3e71aab35386c62ef5a
SHA256b74e8324b97342bb7b3937b97c93c2c0cd39c13aedf5a4842bfc85cb75c69769
SHA5121f2cce6af2bdda0865fca61c4bde6c4abc3700ef9bd2f190ddd9abcfb13f452413734a27f12ff2af046501e0975d75dca46cc333c70fa46eb13bee308c06b1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8ed688700ffe57b6732965ceb9689b
SHA18f6928cc206d37ddf81bf0b61d0f523e57b4da79
SHA256881b9e3478ffb51b7045d6fb1a903a7a82b1f7677d8a3a06fb2e22070987a204
SHA5127d3c5ce27411df109ac6a8fb899f693daab02683e432947c0b19c6edb428a1cf6eb4e42f7a2aa67dcff53b68376a60fc57820b4d0335b6eb6ec20481278ca0ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f69a1eefa99bf708b03799d5b0eef3
SHA132203374a2a9fcb85ee1930457aca0af25839224
SHA256283a94acf51ab2913bb6a113d6b9d0e770ff53f800165302135d3d2d43637a32
SHA512a0e1727a07e054e44b02ca7d938520b19806db4d26b0bd410520a055a0f4d8b51eb56d6db94c2616582d636cda2078f7162dae0241048d5715ed62bd0dd6f08e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b