Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
3d62fc43ac5696321bf7790c8187c787_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d62fc43ac5696321bf7790c8187c787_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d62fc43ac5696321bf7790c8187c787_JaffaCakes118.html
-
Size
6KB
-
MD5
3d62fc43ac5696321bf7790c8187c787
-
SHA1
803005efcaf9431eee67bae4dfb0ead59c0ae37e
-
SHA256
7927ce8d47c70baab2c4b2a402af1e7a40ecf320cebb5758e512793c556280b8
-
SHA512
f48438c389c8553949ceea2a34edd40f59ac792fae2505674440b18e89c6b77a95b0520c8a8305a5a1e717efff86444856372a91aad4442145ce5f2338ff27bd
-
SSDEEP
96:uzVs+ux7AwXLLY1k9o84d12ef7CSTUzZcEZ7ru7f:csz7AoAYS/ub76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF90AAA1-890D-11EF-BFD6-6E295C7D81A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000040dc8dbd0efaba2b67c2dc97bb6f368154cbb7957313b5833f4443d6b01f585a000000000e8000000002000020000000894fb163b3e26fac0aa50a4b54bc19593ddd3b024e38937d1bd8399f8e03341220000000a428b4d632220c01e4a8eb59562150245ed117a843f732cae95951964af2e652400000008d685209e39eb41304848fdf06c7a0bdb48ec8731b13987685454ce0502600ded8a3fe0433f033e0895e3a752d1972a53178eeddb038ba0512c0ad62d62bf372 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434949628" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b182941a1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2760 2080 iexplore.exe 30 PID 2080 wrote to memory of 2760 2080 iexplore.exe 30 PID 2080 wrote to memory of 2760 2080 iexplore.exe 30 PID 2080 wrote to memory of 2760 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d62fc43ac5696321bf7790c8187c787_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e14b333e06379f53a738475574b91d52
SHA1e72a8ef9644aeb61e08de13e139f2aa599d269b5
SHA256be9b45c3e74bdae5db67e5c4908ff7c196d8cd76d2c743e7f2304e48b37d4f16
SHA512151fb802c3339bc3d5df44c8805174cadd7cf9dbbb825efead9eefa41f44fad2bd6fc1d269938c55367ed47d615f79a9bcba889a6a3ec4aa07fcdc83e35470bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500066af72321cdf8d10844e525fd4b4e
SHA1d10dc1fe1ee4b0dfb7fc5187bf5862f6db1073a1
SHA256afb93154cb3e7e8acbacc63f5ca614df9e899d10f6514db7aed4c3adf4f8990c
SHA5129cf4f647ff9eba7e83d92493eff6105737d212778eb10d07670da8d1c10facc8b011658390c29d44cd6b0ce03d5881b25f1931a0fbeb51894be504d76bf7b3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd071e0a141b57df88b89dd2e477b58
SHA1928143d0f97742d6a5f7d396e005eb6a5e344cf6
SHA256dafc3ec24f11431f726aa208e3cd1bf2c3148df60ab9f8a54683868a6293654d
SHA512c00bdc498f0693e63b0293268bec3853c5a2a0c265708540b12916f1748af930bcc771a5136ba47b210328232a97b91dbeca2bfa00dcf79dd4550e9dbc909823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a41d48a84419fe21312d49b98696d9
SHA19f4a7ff2f18b15f4fc20665b540532646e98eb73
SHA256c1e16c89df0492bfe6ee0d598e61066bbe5dc4dc8ae40a905312de229bba4967
SHA512b883fb8f053b908e5855b288642540e28d33817181606348a496e09e00eb2875166a762e80a2b646fb5a3be174d7eb62cb9b10c8fb0f525bc93b0c0a4150ba0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d72ee2682de6bf619e1fae7382642b06
SHA13b4ea9347654da565277af876138ec06fc68968b
SHA25657955b1cc2188d171ac12d7233e0c6878862315a9748726daf67ffd64018adf8
SHA51270607d61538d33085f45916874999e87f4e407579cfbfa38114b61469447a89886bc814f9436ff46d0367ffd126977c6dc9893a53abc1cc2ebad483bf19de69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7a3d5de99d2cb6cff5e87fb2c0d89f
SHA152461c0f8acf4f15cc9a7bdbf4ac5bc57988159e
SHA256cdf691c0bdc165e0848bde969cebcd2b7eba14e4eae42345b740304bc030b5ad
SHA512b3f0ec202be3059b551bfd618ac7ae7f615e6af685b9764a1ddab6711aaef3c7645a4046547e46a191bf9de1dfad4f36c48bf90e64552326b663520f75e01060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c1ba7eb541e4cb4b49582c24274281
SHA14d004007496d91203b134a8337b0d8964b984845
SHA256d50c4e182ef94c86963e49f313421a30df6b7ba6b7cb7247ed4679f9eee5c9ea
SHA512e6ed2e46ae89de35e70748e0f894c702f6dc75b500f158048e2c4a5348c05b7582f1e7c5445220407555da4c12be3df875b28d7e0a3f59e76b4627a5003e6fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece09283d6fc6e5b069f3dab5bee0666
SHA1e9bccfc99b3b92d04ccda9c52ebf42c61a196111
SHA2566c363b31792f05914c75ea9ffac38ff12568da56345b9d13334ccaf139062ed4
SHA512a70735003bd0cec366b3a63f7cb0399d8f91628ddb3c73f40d94f6ed766855fa73e04793d97a8490281300b1f8378503d5f7a3cc8668dd70e224df8ea7df19f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517188593dc07c0aa705cba36df9cf7a9
SHA1a29123fcde9d537bf7a686121fad46da9770d0aa
SHA256ce7ae7715ec509be5fda5541a79cdd9dc2d7ee619927ab4bcad95352ac118e7e
SHA512ed7af2ea56d953e0872965f6424126c1411de449fd59e4a1731772d6c9e741b788f0d39b10b54cc1492ecf15bffce944671d0014ac8b7740b749516de9e25813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53121c04226e9217f44c2ac3f01846171
SHA1fa76452e13628d6bb389fd418c678a1b3ccf105f
SHA25606d68716bb92c3e5453beb68caff1fe39a67540ed23e148ab7199bb1616667de
SHA5129f8811a5fb885a7311108f09403c3d9b4977f29faa8f9e6a78cfe21096f5c7d3727137f796bfa429f666de32fe3551e402f2710183b09f1d65e157d4034c9dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e0b30d65ee73a988901f4abdc45576
SHA164f05ac4f02ad07228d355a1aa0d1b6e15a73435
SHA256d32f5d6c8ec83e610954c049020190100aeae2f670055c81fe72e46459378793
SHA51240a183c7e7c4973e59d66f83dd90e1cf9994625c5d83ea7a0472ddfc892426deb1cae9f066b368df97c2144d46fa4d258d9a935b8d7dfd32a444dd4a4da36355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef4bd65994684b93d44cc73f55ceb86
SHA120788fadc8ab1036059271a9eaced8b5fe9c1099
SHA25682ccc3a87b7bc6ba496eb07bf3928bfee840c947b7042023b5109db396aa99da
SHA512e3d785ee7dbde6e84a9c26e177344e812df156485ea240774cebd448273d8f0499e8ff4b96aa495bded6543f2495fb5c78202ff278cbedc640284eb7adbf1d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec7906b1c148505587a5944d99cc5b22
SHA1f5471267d483e4af5c8630e033f7f20183b4d623
SHA256f6385087e68a9cf13d52a55d932dad5fa5c4531b0064f87350159587cad149bd
SHA512911ddee89c902b48c074ee829cb332711d4e900aa00cdf01d037c264dadcfda5bb729ea955c30eb6ce1b9881036e20302963db43288fa751eaa4613a6d3fd3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b710b0e0667feaafd5c7ce952cd537
SHA1b5b3887ddd3bffc63ba9776eb7cf4a8048fc4170
SHA2564981f3ca6f1d880591a23a0ca5066ea4281e7554e779868d3d8e80fa53a5518b
SHA5127c1d82f9e1aa25254ac450687dc63c88b6a1563dd3ffcfc7873bf8061087bb7b30df3f6556b84a63318f27a661b1ce3db05bd1c0d6d98a19538ea167f92fd338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593eb826fdc846bca8adc97807599f7c7
SHA1d02ee3d04b0ad43e860cfd7ef73da601224d1c8c
SHA256f1e19d1139f486d92d72eebdaccd5051a39cab01db059d6f2cb818cee257d0f0
SHA51266012300beeb00d7bebdcb6bb3e6fcd54b7bb04e87ee3eec72e79858e187a2048df6a025e6a1caa72dec5cb817aaf5466118212b92a95b98d159d99c9d9cbd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515423a011c453068a3ff2b670b6719a
SHA149d90d53f7268e9d84050a5502d71191518c84e5
SHA25614e085bd1682e5c044c8095137c1b3eb0e4932cf45f7729c48fa9113b6fd978d
SHA51250640e2d13baa66c908efcedcce22b2635c74b64a5e04132f11b3e8057f830912dfb0974ec3f910869aabfbd0e38f54b56740d6b9fc0c8595aa6e1752db7accc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2762b015af805530459f3faa137bed
SHA1b411c58291d96f108bca710a46ed5ba62430ff45
SHA256349029d14910dfad35e2ce8af140b684c34e1eb99d040d2a26c1a9c0292532c3
SHA51277b2f22c299f03acb4e1d3ce2a07d67b29ca9e370113d5500327bcac1ec422fb4454ab6dd5e562243e9adba707abfaeb4ad457ce05e109c0624287f733bed313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce6d0c2b7af4c5a51b75dc9fbf4e849
SHA115fe6233bd89a008bf340aa6a8f06c76129c69f7
SHA256f409647bb92027ca2d766039d1d1ad3294924d2380f842043767545123f6e125
SHA51229cbe6842406d89a517c5d2bfcb8bd4477604129391fe9783c5d87826a61871f5654e6603531ff512611c2cb2f7f3762a48f1149fa8b1102c8bd79ffdbac6e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a9ddd366faeef5905272df22c161ba
SHA166a2b44d0194de84e12ee6a0806908e5bf1d4675
SHA256f1e435bd58897004ac1cacf1c55add924b69aac1e26d47d62271a749973738db
SHA512e46c0f8df09adb378e5c10ddc9cf64524f401bc53d8d81ab144439578dbdcfad6003f987dc10cc0ee15edd60af5377014f0e7006c81d410c13e79906be6a0e3c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b