Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
3dafea18526b91303ad82a61596496de_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3dafea18526b91303ad82a61596496de_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3dafea18526b91303ad82a61596496de_JaffaCakes118.html
-
Size
139KB
-
MD5
3dafea18526b91303ad82a61596496de
-
SHA1
03878cff2b69d7d3218d5fb7633c57fbbbac0951
-
SHA256
89e4849a5f010a27722c5b2dbf2e0d0f9460680c0175dab35634b7b9c0e4f7c9
-
SHA512
fd66f64d4935bab0ac62e180d8fbaed3b13dca4cca979d76d6b5c26d4cb3b77696e57abf748c98c0bb75487e5ed2d6e853549bfe86e67de1cb54979d1e6931fd
-
SSDEEP
1536:SF1a8T+ORoSHBC5lB0syLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SF6XyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{890B0D31-8918-11EF-80BD-DAEE53C76889} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b667e4a3220dd94caa0d2b7354399a130000000002000000000010660000000100002000000039b70e6d36ce8295801c4f697ee2b99988d1580e7329247da5733b7ba20b713a000000000e800000000200002000000050350f62cea6ad0263fdf98bd8ecefa692c9a7bc0207eec74f7fe60eb89dc5d820000000fe6c0370147af6d4ac4df264c8fe9dc28111c6a2f83b825b92accab97e8237c540000000c0ec46220cb40d27cfb1a97b41dd27d47010d3708932384031d4fcc93e3ae30647a82d7524c85ca26dab6505138ceba712e2684d7d56c8381058e5f33992aa14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008ad69d251ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434954262" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2176 2280 iexplore.exe 30 PID 2280 wrote to memory of 2176 2280 iexplore.exe 30 PID 2280 wrote to memory of 2176 2280 iexplore.exe 30 PID 2280 wrote to memory of 2176 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3dafea18526b91303ad82a61596496de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8568ce5e369f9df7bf7bcee77207569
SHA102c719e11d40a9bc66a126d075135a65ee7f713a
SHA25650264ca86dafd1b7f082cbca787beb6deca5389739345ca4641c557773bacb6a
SHA512dad4e814cebe99cd6c6f767463b7dc8fd4821cf1cf0bde0c25a133fe3aaa15634545db3d908b65c63b3908efc75852e66905da29533a818d42cdd19af0912268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d7ca7fa195caa43696465474366b29
SHA1a3d2772c05b1be902281f9dd864170f41ac6c374
SHA25651c37e1c9d6babdd7750a6eee7b4d20a9fd80a857778ccf7512e1621a821af5d
SHA512cb2615f614a27a80ee75fc2c89bdb8375ea331e19d3be3fbaa975b2e1bc3e45cf61497747777badcdcc0defeb03b3c4fc142bb36529c0d5842823dcfcfa531e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8508ac1e97aacffd64dbd600ae6f48
SHA1b0a0db3e06e89f259a574b4c9b96b51e31c49867
SHA256e3148aa2f300e818d113df169c4484027ecc4d931255e45b9213d95c14d2ae2d
SHA512c7f0c23b50b81625350d6264dc2045a0dc48adf2b065bd52364a2b1c0865dd8422761944f4a37742ecfb8771d0b0d3397a0bccab526f3d66d32a71134323c5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f82e2de7b2ccff1fdf7f02b93a6a9994
SHA1f3d66a90e472e0c0df7777789b24db63be6ecafd
SHA256d928766acaeb8bc58d9238eeb2b1e72be5b1cc82cb7002af598671b0dcbe4b6e
SHA512fb9f3f3f8ebb7a8f05d67269e973e20a879e0903f7f1297a03504b5478739f1dd15cd564055ab4eb14619fcb05a0ac4e47f3042eddb32c81773cb9fa7161243a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61950fa8adb102d825b22e7e120acf4
SHA1bd82a0c78c491a08e546d990ce2989bf057a1f4f
SHA2560f7fe571ef4bf7c6b3efd586707283c251f52596ada832e28c39558aa6ef87b2
SHA5127ab490c1009458ac12a91a2a3330c7ee10d2b8823f4fa37656c669a46111cb2ec2f4fe47688dc44184aa3fb4062704e0bcd514acc6030dcd519057a0a48f98a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee119a986455c5e4e80a2f64b0a6b852
SHA1e894734acaa839d83ad5f53970b0da36bfe67ca0
SHA25629c9fef439e07762eae546bbab31153b5ce37168f5c6a5d0a95ac3cf1d0eada0
SHA512db5a1b7439447ad4f62bd03ec238e8fb6604ab1963265b79a16121cd8bb773f68a391b175e090d603b5a9da1a510b7e38af8919d18ee76299e47146a8bc353cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584519329f200f15525d7a204490014ff
SHA1025b4f0e9a0796c7fc73cd8c980bedd112994eb9
SHA2561ef329f73019c9e60c81f25687afb8f7d2c982a152847071c28bd9622ed2bec6
SHA512903f3031c774e77d9fa3cf466be60422b88c63f79a779348f8fda92b51b420467aa5972fd3006010aa78b3ac6e897d04708133576d1a418411e3b6941fa37db6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c537334264023044081b5870d76e62e2
SHA16aba329d3820ab607f69ac35531691de134496e7
SHA256126ea115b9a42eeb3071afc6f8342c45264f16cb1063ee89e9cb91e76e562de1
SHA512b9c96eae56f2ef019d1d25d2274d48e60e95ae13594ef58036d3af87a3d9bda6bab43da2205191f9ce27184102b0e1c324ce6f651e84dbd25b466d2a5e7a79e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38dedbfa5c7fbc475e8409df165589f
SHA131dfb3aff86c57fa24dc651340a724de612ab23b
SHA2560d82b5b63ff9243f138a9f72320b73166793f60953c142a1741a7ec2097c8991
SHA512dfaeeda5e5c4a0e4be3d3cc454389c9fecefc7c76bced66f6567920e57f41fb62e61a1c517839a9772bf5246361ae22f07841c5d9f50cfc6581d4eca104fcc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc93061ea4a9bc9fc4cbda42a996531
SHA1a27a39fc1bdc9844036efb5c6915861b3eff27d6
SHA2561d4f0807e2f772efd5bd9f2e74a55f3978562fe39ab007c8e22eda395eba2de5
SHA51262ac6424cea1088c98a5ff5bbe87470412b0443b7e8dbf8d5eceaa25c7a613e7f2c86ed4274ed9341ca8c63e4dc18af512632eec015d20476c464724afffe1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cccea98832e7eed7d0cf8e5c11f944d
SHA10c2eb7e1186414134d4ab093b11f37c0cf618639
SHA256fc9e079ff5e686786c8b4aa13f874cf061e68c7cdf1caca1f0608d5c63dca2c7
SHA51270761c3798ee5e1ebc5fe22e3436030a67312230affc301c260e325f3fbeca114b1d98991c448cd9ee2fbc4657e8f2e656397cf34e27ceffc417bb258e7f9e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d2b6f17fb49d6143c75eaafb466f43
SHA1bc2ea412f239a5f33091035147b179e534d51090
SHA256c4f578b85115bcf1326f2041bd1a622d4484fec6d2f5917156935ee9f16c7315
SHA5128fc542dc5e0d18b9569140ff3e2e7650c574088de05383406f27a49df48df9e5c48232de1b7a24212e6a6380f1f13db75bc2f39ebbd0295a120a6f4c38971226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569572a95e8f132118d2a068c296d90e
SHA172ae2a8a90b9f1e25a588da0c2a0de4aa4979955
SHA256efb28fe0472dab83e9f7881ce7b8e7c872aff64525080410897afdba87e83e65
SHA5126e3291b1211279412f208af96c03572683573e46695f3a135f104bf50a2c7cc5faf927dc5d141b75bb7643d456f6b6ec50a03f87717d6617ab81002069e57296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df217d7571b376b753e29d0cf89dbbdf
SHA18c358b94b55c4b49e63df6433256656d6f3334f9
SHA256694f14963a57d831e4e5c6513ddecc7573af4b7c7a6b9ed8ead78a640146bc30
SHA51299e815dfa14e09f55977f528cebaa1aa42159e5f52f88ea09700abd99ed942b6fbf93554cb1babcd673ff6751115b2a5fa9dd3a85993438371f8fe182bc31cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fdeef512465c03ecb29961c4544218
SHA1a70826c8f31a9efa2db4ac24a5b89d9f05cb9304
SHA256af9c7db306b4a2ffed3105a03043f276c7a87091607d0cb40d24c59385d3e184
SHA512f52e9661fc654a18e1e347b557b8367db00d389131b93bde609245aaf8c9eb14af71cd634eae353460e754f5976b635ef7cd807fe545207c6bd83b3cfd668044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b221c35d775c5863fabe3044b392bf
SHA10c24063185c3b09cc0e23bc6f938fbcfeeac0f1e
SHA256d9f1b22545e037f46e09e07f628aa090f87e6c24b88080bec6272bf3eea62906
SHA512d402db9d48beaf162eb0ee244cd51ec781697654d07dc46bc1b1f4eccdcf3b8833fa21ee8cc6d3eac081fb34c9b75599b4d54ae7b8c3fb757c49fdea3d86fca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b64f73a71f9ece3e76981f68841e9dd
SHA1eece10e0c94f90b88da5c7e7d8e39c4fc6072087
SHA256acb8a0d4acfec8e5071913ba1fddd7fa3c71d60daa74e8b2430898b6e84dea55
SHA5129425f5e46540a611ceae83911544671d7ef7f839c26a927af59321dd2a56675862b440a5b14cc9d3d247d50889f298bb1b4f39d8480807a3f7791380eb6ea7a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e70cf88630198be3ba288685832562
SHA18f3b356df21653c60b48a6e4f760a545dc5bbef0
SHA256b2ed58112fdd2285fe40ec41f42a40e968ef0faf546793388d2514f6515d648b
SHA512ccc954772f75315572fe789a945d3c9d8324e71b45f278e9d7fe7ef41ae01379af780f35025277c84edb072eb10eab0b4085fa31e12bc3dbdfa6bf07b1502d98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b