Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
3d787990f546afe0612b7b4403f94823_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d787990f546afe0612b7b4403f94823_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d787990f546afe0612b7b4403f94823_JaffaCakes118.html
-
Size
4KB
-
MD5
3d787990f546afe0612b7b4403f94823
-
SHA1
6aa013fd680a991434f3e0126de6cd3d9f53d9b8
-
SHA256
f085a0f9891858a12f5d2eb9e48b21e9f6b2c33be0ba2d2278e02c04b98a939f
-
SHA512
e04a180f3c8269781a5de778db17fe538afc3d17ff89ecb8779cdb1408dfa110cd33031889b3a6e2926f55e6e4e29ddf85a6a07d5a128ec9982263b7c5266dfe
-
SSDEEP
96:1Vd9hwVPcoGg/j5yntxI8vq/5K/u04Xz0Qpy/:rdbwWo1/j5sxI8vE4/uPjP4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F0917B1-8910-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004cb1a8dc5146298f6f0c8667f42ac50b17bbfb6edb10d2e91739d47d6f40bee8000000000e800000000200002000000065220a210e52ba05bf5ac1c630377c91d57c9562c0c5336ac3ef36e39fbb0477200000003b3bd50a5a349b0f2a6a4a8fd7b07e8a3010bf75889435bddfe2366e43fe8d9940000000addd987b227b8d54bf884935de31d0120d4ffb34c71994124a08941d621295b71cefacbed08cbf29369f1677204b4f9f008e05b8e275586001d7bcac250d9feb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b536781d1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434950862" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 iexplore.exe 1600 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1384 1600 iexplore.exe 30 PID 1600 wrote to memory of 1384 1600 iexplore.exe 30 PID 1600 wrote to memory of 1384 1600 iexplore.exe 30 PID 1600 wrote to memory of 1384 1600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d787990f546afe0612b7b4403f94823_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d06a7f5e05ae26b6d7cc2b0c25baa6
SHA17b8373c619ebcd3dbea9621355bb7a24cec71715
SHA2569c7bb6665764d906ce04d0c066ebaeb08479239436e162e827c4b1aaa975b231
SHA51206b0919572cc32bea52ce4b1b96cd9661c517f3a17e79cbb486f19c1f6475d5a1b3da1a85a14bda62da43fdce979fd7c395c2aa082c4725373cfe21150836833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21d3d33f420ab3391d21b755b8a01d3
SHA1c8e0db4f9657e5ce1f40d7bc45ed2ae24752e310
SHA2568ce515d7bfa819b90251b5a7a012e4d6e2481df5df73e816b02616a9bb030f09
SHA512e9e66180798c2e79940ffc4cb3416b5e010b41c3e313a9cbf9ed7627375b10cf8d666cb03ba3446f5741f8c3dd12620cdcaac8bb27f37584e3fbf6149d676402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b7889185a214e13424dcd1df49ac26
SHA1d98733d447b34790d1d73377843ec7e30b99a6c4
SHA25613be260fef77143f1f1e0aa18bbc21cc4a7ada169d935dad5397b1f043ca57d5
SHA51284ef2ebe0427b5bd4644292ccb38cf52f02f0204c8ed4bff855155c502119363540107e278e97dc0078e93a005b7e1f812e8a887de7efb9fb8da4c75d2d87aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255fab64c25dc0ade41286591286359b
SHA14943a20d2e18a9e7c1dd6db1abb15786e4098797
SHA256fa5ee7f1512b55d7df151c51693eda9f0d28af998bdfe16f442afac1eb1f99ce
SHA512d8bda8facc31f9a1caf3d16cd1c1d24c18bae3a6041979974fd9b7699ee4af031172a3c8881a6c02d182111449cb83323c56c47d6bb1a5777a4f3a054bbb5732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e388577f43ae9f1b2392a2e8fda5e0f9
SHA1d52b845a6f8be3a7badce520e797e40586e952cf
SHA256bf56ead6c44573f5b0ed0edbdb7f290d3fdd734cf1ebccc3a2e2649271da8fe5
SHA5125241e4aba4158fdafaf1effa2c5fae4d8a6beab54da4d748bad09fd609ff7c76cc4d0fdcbd72b184e7c62478f3240c2d9eb492902c156d3e858a82a41e661964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da441bdfa64037f58388eadc7d284dc
SHA1e73ab12d2937e2697527dcdffabc8ccc3bca6230
SHA25697be26caba42bbe9d03814192d9e9d732ac360ab115392e33d871935e8011bb8
SHA512b485fb94b2375fe302c74e47f1bba2bd5825c16f4bb92d00aa70d7095699696a48f4d30db48e2177583664a38ed2c84017486a97a09a64d927e63d3bdd28a9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe78d33e0409ef98366c1307be6d707
SHA143747a757b04c55696d5298d38be302886e21726
SHA25680a2d143f6ce8f28bde8af3b59a100d031dc835b495a0f45a4179cccae8261a7
SHA5127a3ca147b3962c3f7419607919f0a2db5a63abc46b21290fcf2b6946d15f285ffd78e2d2808f9f6af44875564f9f3d9277191f702dd931451498f85eb8fe805e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b43b7b2ef9a7eb6ca3d334189ca00a5
SHA124383ba1fb4267f7843d44695b135d553b10af3c
SHA25615efe7513d51e4515078fdb1500b75fcabb10610422782dde3ac2bcfa9d7166c
SHA5125807abd3b95db4b77f5f82d06651debb42f4aba635b5224bc9c4484800ec6bc48bdddf9f7b47a37d36a30a6a97f9a9dc78655f1b5bb7a87dc3c00b18df15f817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d16961576d737163c51ddf6cabbd967
SHA11519dcb7a467341e1ecc656345cf01fd0c3db651
SHA256bf4f9e835f4253ee754920c6c674ce57235e7ceb29de41fdb25ab0b8e42887f5
SHA512baeee74e1e814d38287ee7c78659cfd5e1877d8309c17713a8c62c912eb9d21663a00a2b204f63f6af467f934876321372623fcee16a1735ccec6f959a0dcbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d612fba6e337ac5588eb06b6f65978d3
SHA1b18e7b35b4e4f47e917e99f9d815e9bf892f2ecd
SHA256ba1df86b3370ee82ed686930c5b9cee9f15144341260d75be3a4877349a8d2c7
SHA512347bd398fe209606212b1365da2e076942bbb45a6fb249aca328bb8570a6c1547a9d8637bcd08b749c2c32c806db441af850a7b5fe953ba7f1146f95c64c6b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e73db73dcdb460bb09c46ba3a823f04
SHA1af7e91bbc9ebe37e91967af430dc0dd2bd974863
SHA2565d8fe81caefa5667f546ab5755694f3550bff54cfe16bf8e6a6760cace28b399
SHA512285ad430469b24d72fce7a33b6bf5d4c51dce5d5a419509e1ce4db5dae0a75f262a47fcb6f6c8f2fe9ae515ef67d0aa61ff02034b02a1a9e8f7c7d400c516eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557799910c221ed6a181a9a31381f3201
SHA1f0e03d0e135ffe98ec5ea6ea8f4e1289cbdee205
SHA25655f816031d0703e5abeb6470038d5bbb90e480f83dc9ad1c32edf3a310d4738f
SHA512db67cdd01bfe8dd79656b92aee5ff1a358e4ce029275b65fc15f504fd94b20ed84449065a10c28cc38259a7d700790f8fabeda6659634758cbc46962320f8eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51faa335b7a61241379d8658cbdb32ac7
SHA14faf0e04ba6f57e4ae06ddb677a4b4d7f485528d
SHA256f2b081ee0fd864ededfea414b7a1f0d3a638f72c10ed7c2a8e4a341380c51b4c
SHA512bbfd0f3529b4511655ca2c62abb4b394af16fff69e1332665a0cceaec68d1c4e1184c7591e020d4de3f851c78be124d96656bb5bcddbd5b617cd61e55c3c7a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783cf75cf318963b4dc74ffbba73b7dc
SHA1bd8c841aa72ef28b46a76b3450d8d0c0d4028427
SHA25653d507e924a5b25f93a1365331f916cb43741aa65ba518e71b6b857e3dacbb62
SHA512c39d4af3053335584c426d5edd4b262f2df46f7029dd70cd4d3ef099d922b9bdaa2d978718c45a94c67cb900af32655f7b8ac6bede423d7f5368161811c8c7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3230a953d2fdcc4b83ea0eea180046
SHA1571bb26097b48d53e3b48d5a84b37e2fd6a8ba31
SHA256e9eaf9fc16900509f0a8b806ea172d45b763ed63caafa7501a5c3b01a91c0081
SHA512ff94c71b287d6a1ddf096a0ab0d15eeecd578f61707c35047cc0a495116638fb2f49bf6a58e351456ccd1999715489cf383b8c84f1bdb71b9116ac3ddeecc74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374ed629013649bb2fd9977be38e7104
SHA10923b99c218ec5a244ecf7e2b2d2128c25105201
SHA256795a828760aca23daf3a95a77d654aed59dae0734ab849e760e7af6f9d992f89
SHA51292fd23044b14a21100f3773b2695fa9a0f27d4a9219b4506bbe69b4fc2e9545be26cc9f1ead7387b06c1b5720f8744d1faec8fb98e51edff6b089a2e6ed6c661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea87a0a4d4e7662058239b41d9987f15
SHA1bea78a477ef56f269a0cdebe399aa3be0bef9203
SHA25616aa3315df4db837317e540341f5edb06b6f16348aa52b82862edf27f6fe2d89
SHA512bd49a3b5e0e8b76939ab53bcfa9571fbe102a10373353fd38af30c5130c5bd050006f19c8c797ed6f4f44f53ad4e8f0ef3ba0b06d6ec77d08652b9a4e8c460b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c933504e22f4ce2587df87a8cd1eb53f
SHA1a9cf312680cc06b6da290fbc6276c4104f6b83ff
SHA256d6535f2980426eb0b21443f7466699f976d4ea0b272305ebc4ce0107390ab1ed
SHA512f42859e668500decb94079bfbfc5f3e08e472a26b77641625a49c6b06a38b2ac0a4283de75c6c5c3e11a27e6919410fa8c60c64ccd4a4576e22c933fb3aa11db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9575b49f1676980c84d77af86ed7985
SHA1c96783b495e39160cc71fdb82a5b02f559937a05
SHA256bfcc9b688cdc7dac5f6eae1bcaec20dcdd52044219c67ff5c596e07655f19c69
SHA5125f0bca7e25b4682f0a4ba0b76e73416d1414bed25e5c4579f5d21faab7c4a372d5ed190cd1d3ed95e4c2a311e14ade123d8d40fb6c120f1a7c9d1c4ed00fd6cc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b