Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
3e00c86b4f80a88ac25e8322f8b58878_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e00c86b4f80a88ac25e8322f8b58878_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e00c86b4f80a88ac25e8322f8b58878_JaffaCakes118.html
-
Size
23KB
-
MD5
3e00c86b4f80a88ac25e8322f8b58878
-
SHA1
27a0a47ad9ca392e55234f156851cd6e22233fbf
-
SHA256
2f3f922c4d5dd7b978aebbe83038dda59b45c3d717cde528fe61c34fb02f1805
-
SHA512
daa9996d13951336239929bc8cb536aa5be84701da1f310a7499aa2fa3083fe69190a5eef8ee6d495f52973a4ded83d467802982d84f04e4e7d62412a464a729
-
SSDEEP
384:SIV3CsxHY4yNeeCs1SQgHw27ECJVkTwOz1yvYoegXb:Sq35p3ybRMhE8kLpkYoe4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434958474" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57923621-8922-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000045ee55a2d546f3d7d7e129fb4a322e4e09b718330bdae9a0d8c99ea85dc657ce000000000e8000000002000020000000cd70dd6223595805a396964462e7597cbba29a0b0aca7a841c917790d96e966a200000004a5f01f04eebf0469a271628fc898f122e6195d59b73287218d86941ca7f027140000000f97c088a40446b9627d9b9022cee69b9f8a1176bc6ad1ab63a3bb4dce23a7edf058157853122e4fa5fa0b901d6a0afc07e8bc768f3229ae6c3b7b99872b5a0ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b37f6f2f1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 iexplore.exe 2356 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2504 2356 iexplore.exe 30 PID 2356 wrote to memory of 2504 2356 iexplore.exe 30 PID 2356 wrote to memory of 2504 2356 iexplore.exe 30 PID 2356 wrote to memory of 2504 2356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e00c86b4f80a88ac25e8322f8b58878_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2078d95ccd86a5fbec9cb2c4443e03d
SHA1d2a691224d29f1aa54f13de7095c3635637018df
SHA2565057afe2dc0f3a3975ef0944a248de623787f73f369dc4ce6c3f7134bc460967
SHA512c3eb91b5c4a04c53e253c615db4faa95dd93da0d3c219732a8102c9bc7b0695a95036c8601e1e7347b0218e75101f2e4c3da49aa9ac0aff0b1d26ede5c3d3160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc749ac3abc81dcbd19eb091ee0700cd
SHA1a0da0205515ef1516f0bedac580b6f3a095c2149
SHA256ae591ec332f9aab21f29fa5ea6b496f7bea0d2d0124a5d6f595f0dd2edf3a317
SHA512c386ba05789bef6636dac4ecd0f185189a50d5b241601d2cc9b00dd02429099f3698d9ff6eae647415954ed821f98ad8ad8f1efbce0c87e66f8544d3a39ea21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba01dc947154d692686c4a213c8b8a8c
SHA147a25169b8b551bdd4ba287e5a9fe7b234991d78
SHA2560bbe90e7537b20e96bccc27937543e5aefd290135eeccd75b53238fa1489e1a5
SHA5123906fb40abf16ece7a46ad05ce9b6b720fbab8abe877df5a190cc8624249ce5bfd73faa656a8a1db6fcf90ea584babc827669380c9ebdf40399b4b360dd78bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc0f3cbf0cd741d16e8ff6ff517efb2
SHA17b5b3b2e3d5320ee8ea4bca1daacd7936fb3eef0
SHA2567672740aff3bb1dd573b27dda97cae739bf654694a5de453e571256d4a8562e1
SHA512ae41a6d5e5ad7b8770bc8cd69a597059516b08dec79b48b1298e249720be014c9584bdfa793156fea48ad00db1c5790c10204493a99e0ef925a346483b7e32f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec488ab4fb18061bb0c4cdaede674af
SHA115f8a40ad5e21c8b563c667cd1b1b5e5aa2361d5
SHA256709300194a88393f33d82f933c14485c61b4c8d9defe2ed77781d50253cd1d8a
SHA512f0f7d4a2ca75e1c424fb6bc2b2da24bd8997d36580d3f14851be12b69be18452d754ad4afd8da2729f5ed008abc21a830c45ee999282fac931da55b6eddbc67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f80583299b12bdb03e47c7418eca497
SHA11a4213c52a554b094764d80c7526d292285dfc82
SHA256eb0e1e66bda8e69013d06a3e8e5dab0fb3726aceae36560e2a2bd8acd1f21e24
SHA512ef22670ce4539dbb5f7d45e526220e2dde2eb641b39051ea8918cfdeaa6d272405dc3dde0f14434aa3460a4962ad4678d7cf6f416b14f36802c781a9aeb95d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c67417198cdba2a4c982fdb59dbefacb
SHA1bb0720a21cbd7852e8427753394fc73c9adcaca5
SHA2566c99bc1138e11a55ee1ccc0dd51f319b49acd1b9d5d376270c8f0691c469c610
SHA51203e96d4699b4b75b80a35238a8b5ce2d77fc0356975a74271aa18300862e876cc23cfb6124d4155a0515b108b01a422bc65268402cae70d059606f54969ad6b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d3ad6a25c5861eb34775d2ab510c28
SHA1e500144579148b9490d963a26d5d2eaf0c41b68c
SHA2567b68882b9bc6898d9e3a621dbf373f4203e1a5b7e1fcaf5cdd25262b32aaa516
SHA512667632c98a49d51b6fa7dfe4722122c8cea45f16b277289ca480806caa1aa65f8292638bf6579ddc046716db933c701e6013b8dab97dc251bda7a6d96870599f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7932cf9e92a4fce97a01aa94c97f7c9
SHA1a4694d9110a863ff42a39cf69cfdd5fa243c282b
SHA256237e3e5147d1c8c575b3c88447646da6d519227ae1ab1582d8abc6a680f3d30a
SHA512c177c4aa7eed740701f746a740d5406551fed2060a13fb9f72391c999a6eb167cbe45e71fb1018b3962f537a1eb2a0d2ce9c05977c74b762e47eb1bed8f4d3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efbed92ec522cb44f091e30dc7e4bfc
SHA1eaa1248b68553b6a98359642cc24f8059624d5c9
SHA2567c3ab84c61578e9d4337cf2c8072581510829e9cc11f9674ae33d7ad90e40323
SHA5123f9c5688b6c77a3033684712bf71fe4f232b2ae26944ec365f394f8912e2c27dff211571acada461c1b1ecbd74f8c55b1ab3c472aee6a1bf970d0e3cffa7c665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b20619e73df99eb29324bcef803803
SHA1a7eb343bc265e54807e212312143b5c1a8ede001
SHA256ebd35cac2c73d65a24380fec9c29ddbc7fabf6d950eac6a88a928f4d3e99f45f
SHA512de39069e05004f279c6e19bdbb07b1d328204c9542c372be01bf505bfa51abe65258324ed1c7bbe795034a1214942f7fe3a2c3043d172dd6b1b4453fddf4a25f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558daf94a7038263ff8a13b7ea7f35a00
SHA1048bbb62484bf61711574f64b0f5afbfcb67f8cd
SHA25681fdd35fb75a44ea5a847b62a3fca4ec2551b3f9c616e7e892db3fc0ceadca48
SHA51222de1f81cc9b9e6815c52a743e701c86c0f80b0d729a027c7d98518c882d8678afeed7363f333a96bd95a8b1c1d0148ddc1a2012a46a97953548f8eedf1de471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501741f0d81067703863762695e7923fb
SHA17d859c003f5315e5095ad73eac570cc98d10643b
SHA256fc2f8fbe917c4c85ee7f62c1978e371f5d5b5e0247ef010a2275af7679bc37e9
SHA5120393dbc7b8c57e0bc477ba2d34451876516c02227137ce780b9cd53727a43b2b2c43214e645c6fa92298fe9fc0a30528a4cb5f9a85a90aeb214ccf59037e4391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f62e09a795d797ecc1172e54c5a38e
SHA1f27a6cd186d0fd2da96abab1f7facd9bc926e2ae
SHA2569e567d6159f5782b1eea5d0f77e8463dee8cf03cfaaf2016733fb4c567faa322
SHA512845c0bd89515e531ec56f68b42de971a7ed5aede518966b8eacfff196b0454d82decc3c7c7cbb7fe36caa4bca23ec7c410164214002da0adba3316c5d3eb0101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58290b4ab544edaf6e96baf2e12eee0bd
SHA12299c6a6b81cfeaf7952b07f3e1a7f4d1715bccf
SHA256fb584c02408a7447a272cebbede94ce1187868b26579c4525a68f7840122edc9
SHA512e97e6fd4f0d0999bc77b065bf372413dbb9c444f6f04be2fd615eead47e78257c6f9adcadcda9b4f56e959f6abcc82d56c9c90693aca2ea10675d9f7c270aa0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277ceb919114cda6bf5b920b4e568e78
SHA1ed896fa5dc08ac0b594b004a6a24ecf1a17d71bf
SHA25620d3b071b97a315ba1da08449545bc3a67adae5c728a38f2ff305084925fb90f
SHA512e94292fa8f21d0d2190b81cee3864d0478109513c02b3db36d53ceeab3f54daa74c4b5a6bcd11fe57fb3a7036af9b37671f77541fa79436c3dbad37f727f16c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699696fdcdcb103aabbfc81630955e0e
SHA1574c76d72c61cd4852fcec58702e6636c8ae44ca
SHA256e3b4ce7ed4550836856aac9952dea422fa619f2fe0c0ee4a316cf713164730e0
SHA512ce1fb4791e780f2b08a6d0ca524ba3497d1a9fb07d054646d19b376b97f484f77d4c47c42eafa5c64d9b79146d1358fb07913f88c8221509c7d69951b3f54b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2f12661ddb77682b94f33426f6e6b0
SHA1d90b9ebbcdbde6625bb6543abb7844323edd2f2f
SHA256f187b469af533c50ff8b7ac315c18d0d468c956b5a36b1813c442a0486936098
SHA512ca60c9b6d01471eb1704e1f339ce1dcb2f430aadcd1bbb0e7db08eba418e2981720eef1c13e4b386995445356ee692e0a8d1337570e8aff62ae05e21bd352f20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b