Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
3de5a85ca603fb632bb6152b47ba66b6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3de5a85ca603fb632bb6152b47ba66b6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3de5a85ca603fb632bb6152b47ba66b6_JaffaCakes118.html
-
Size
24KB
-
MD5
3de5a85ca603fb632bb6152b47ba66b6
-
SHA1
e433af36e741dbbd5c29351b92fdb9dd663c4691
-
SHA256
1cbc7ec06c3875c095fa2d0afbf012d0cb8e8d402b103ede6d65eeecb065f5d5
-
SHA512
0512fb2d5e6c8281f573867ceedb80b32982da391e9c0da18980fa64335c1b787bc965bf3c68cf8c038cd750e0ce3415fd058a813f5f62788791f6892cbedd89
-
SSDEEP
768:VWmjIZClCL+wsAXA05sAnhpyN4w4ox+4B0LGmBWi:VWmjIZWy+ws8P5s4hpyN4w4oE4B0LGmH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007bb9b31c82148042a6892b77ba1cfd8c0000000002000000000010660000000100002000000067fdfa6308902a0aaea3dbb7968f040ad807091b0b2242cfbb46b24b46ce7c2e000000000e80000000020000200000003ee6e1887c90b4254a8fbcad768f9e326b2551c755d18f688badb6d5987bb85b200000003a597e233eeea0517cb38570214836f3fd6785a66e8c941d7fc7650ec3df60754000000045354172eb09a7dd4a762364e3ec7bbdbbc194777400a556313a0a7356b2e90eb284b2c498aef8a112411d94bfbe2cc28f0623edb4db60a41849323da5a645ae iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908b48cb2b1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434957025" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6076FF1-891E-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3068 1312 iexplore.exe 30 PID 1312 wrote to memory of 3068 1312 iexplore.exe 30 PID 1312 wrote to memory of 3068 1312 iexplore.exe 30 PID 1312 wrote to memory of 3068 1312 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3de5a85ca603fb632bb6152b47ba66b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56272b0c84989deca55f3f855a6d1ffff
SHA13475e6e7634b4dbaf58de9e1912c7aa0b765cbd5
SHA2565eadf8a6d70fda999f197f417ba7873f3fab533bc2ea43b66bb78af6a7eed831
SHA5122018f0cfd6bdf0b3410279d6abc2b35f2c73aeb956e51e3ac6641d625f8eb93dc573ecb47b30b1cee9511ef04d8a8d384e2af6d5ee65a38da9d7cdacca0d65d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea363f8adbaa1aaf5004dbef4b96882
SHA1e7aecefd1632de4c5981b3bc6cff27eb795e95cc
SHA256cefad7e947f606a974908f31fcd3a0721c3fec8eef62bf3ab990d28463e1b6fc
SHA5125532e5d960d0e05ea4480a68cd9d3fb4a148cbb86310e6e51d7833f35a97360bbd56b2be23bfee8339446f4cdc9132363502157c9a743590af22499eabe454f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214a60060bf74070e68cde3488d8b3a7
SHA1360fdc9f83a97b9308e2260a09c681d787354083
SHA256d3c14ae5682032f6aed3e8cded7912f03a5da33ec695d009818e2a02a3efc437
SHA5123e96778d2c7e69161febde4a5f6b9f25f901d07e64d5c68b31a7dddf81944aaf3ea80372c2ec3cac0f42d275f00b55d6ae3143c2a91c350b0680872c1e41cc38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5308f71b3195b2c79152a1259b3c90e84
SHA1e5ff1273a3fb61b6622ecf714a206c3986e98f8c
SHA25646f25d5f08365afd2ead485875d331a3ae2e88dd09518900901e0e562f82fe96
SHA51217a8f17c831dd845d015145ab6146f52cf116fdd0ba4559a32833a2065c85213063aa81437f52deba150b0bd78eab85ebdf7a0ad42d87e312ab1a6308b633161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd8cee7237b8f36bc579ef0ca2368a3
SHA1c9247bc587bc6e7e911a9522a4488bf382d1bf9b
SHA25672bdb3c5af5bb416b6026340fc7a25a976d8e9b197ed05408d47547da8469d9c
SHA512310aff19c3b0089a1627946060f96c82edfa197d04f7dca3bc26d0ee103cdab10c67789edeb4f0f30235c8bebdadc73bf3d572edf346de5c24690f4fcb1fb792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fca52a5b07b1cf09a1e01e4ae94228b
SHA1176d996cdcd0fb9a892676c45f1b96db2407d63c
SHA256e345a7a81cc87cec957f04817fe5357502b4b83df2a3ba2f1ac17e2e03fa5c4e
SHA512b514ec42006d0b36e7a91bbcf81789d79eab157ca57cd57f6e0d1bd1928dc4a95cb433014e034ee3ba1ec72ba5bcebacbb9d3a18d5a822b3313c0679d9bf5fc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD518eeb2cb1f47c48395eb6b030ccd4b6d
SHA155601f59ae0d793598dc84cb645843bb9225c288
SHA256e72e09b5e7b9b6c734a04dc6f74b25fc7d12927d633cb3866d08f3db164e6bd1
SHA51231a43ea577e42c43d8357e366eb8ebacfda8f2277476bc0405d56f14ba6f40a09f1ac6e59dec04f9b628cde58d5f15c14f572d4f2503caa87d10a171f0b991c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LPQ313RR\f[1].txt
Filesize40KB
MD57a5290415f62d55ab49dcbe2c89dca9d
SHA166b7d63eaf9ab63296381b3223b81d73e908e909
SHA256d990cd9ed308863d297c9fd1af34e28a81527a985827bfe5c5d55d6b339cf778
SHA512d72cadd043383953622a1b78f0b9334e11945da803f76d4b14cceeca32d3ff203a2a10e0ddde6705011e5e31494db3eba621f00fbe6528056e88b60238345cff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b