Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
3e549d30443d3b0d0861ba44f2763e42_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e549d30443d3b0d0861ba44f2763e42_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e549d30443d3b0d0861ba44f2763e42_JaffaCakes118.html
-
Size
6KB
-
MD5
3e549d30443d3b0d0861ba44f2763e42
-
SHA1
73e2af42879c4f9e0b27556f1268e0af42e6fdc3
-
SHA256
a06e5f59f48c7292a7a81d5e5a49418c66cd603a1e9a2dbb153fd27b7c2e625e
-
SHA512
b234a068decc050b2948c6e8a84b21138fe17fc81eb766c16c37fac1edacf95a1001935189378304db237e0e06539c3f256338478e04fa9b47cda150bf7b3583
-
SSDEEP
96:uzVs+ux7gPLLY1k9o84d12ef7CSTU17aYcEZ7ru7f:csz7gPAYS/yaYb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000002685683b387699c13895e5b8100cebb799c6473ed0e80746cad86511dc299f4e000000000e8000000002000020000000b6aa44368324dc4964e9c11c92c9dfbcb1052343cafc6ae565cb5fcce3bf185090000000679aaa132fee4f80b623b1e1d34a6c6d0231dc49c29f670deed7e7700def5a5c6bbb71e1b46bb0ddae0aaf06f6d9ee3c21a0dc9d18dd916ddbd821bcdda2c7d81b97904168053cf0ef305d439c07859649d2e925b9552f41d6b7057d550f1d53fbe45af7a8477f2ffc5f29dd357a0c88f9e5f1c21478cd96280ad6a4dcdac29480d8d5520fa7828a2932d149d94eca4840000000dd6da0ef99c055a0bb70a6c21b8dcd32ce0a2fa96afcd4647072878fa79c406b95341d85506cabf6cdced511b90960d6c7525e95d678dcc47d87231252220db0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a74ca8d8057dcb81afbe566ccb880bde2ab9007a3b77426e6694124e3ff68d2a000000000e8000000002000020000000b8ff68fb96dbb9aca96c809e3e649244c5ca1a9c91db970c2fa2a1ec0521e7a420000000af4d25a3c171bcfb8b996ee9cbf5d9c97e0ba2f1a67f680857aa092256dbd1a8400000002409a043a81a6ebef182e890b628a1e742e70cc38c88a48bbbce09d19c97bffa8efd1938ba4c6194c062707116e70cc9afd1ca75c9548af996f5bf4d0b6ce2af iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e81ce5391ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E932A51-892D-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434963076" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e549d30443d3b0d0861ba44f2763e42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584020f1b8982d67420a991d70f203e53
SHA1f9cba022e63945a42086a66abde18037303a8b44
SHA2569460e17a1af425018f23efbb7ae03d7ee9660d3361a229da5561ea3d2c722aa8
SHA512cbe02be37d072c19798a39d83f8b9c62cdbda0562938737519fc91cce187ec9b122a02123fdb97bc15f9614d6ae31307d3daf61d0a364b82ac0cbcec68572e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574621c688c373d9f8b2944c4ab524d91
SHA12bf9fa5ab9613fda9f47d987b60f9e09b3eb15cd
SHA256b63d91195eb1ffc2a8aced6305419886e6bb2be77a2c1d7553f372b298da1885
SHA5129c723d2e2524a6a35067672d0ff81aa326538cb1bbbbb3a5bb87b273c311b1126cc9cb597ea58b10811b07b5acee738d164fc12f5db9a5acf086e0a083006df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18b0374df008cc3cfe61c2fdab57cae
SHA100b7513272b1ba9422c73468314dd2bee10e412d
SHA2564664c3cb231c00d7bfdb71eba2edc66f68c2e0e6e6925531895784fe4246bb93
SHA512d3a45ab6ee0032fc8058dde6fea14a144bdedbabbcbbe155e0d9db6e62b160343ff8e0f87648d44c7e931a44f4e950539243f0bf1e07e1c1a54bba3d5ed24e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3323c7e74f72a5e15d338b7725fde7
SHA16336147725a2dc530b820efce86e6c94c10a3a49
SHA2567a4cbb4bb45792b91b877bc1d9be6c07cd155e71e7edba347d5e2577cc5dde75
SHA5120a3cfb79ad6fb5856ee29caaf15a9d2e0b8640592bc5db4f32c4305aa364d799fc6741b5ca4eada7bbbd0b58d0004c01831b9c777c20f921970cfc12d4a5a925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5517ff8dec3986c78c8091a82080f748c
SHA11d7fdb0e139dda6e22672c033ca7f6b4eb32f157
SHA2560e43b46295dc6bfda3fe50096bf7e0deda79bb236e16cc072071ba4145ad4d01
SHA512a5d79eea81d8bb02bca13954fb6b80c7d6967af0767acee8ef73cbb2f38fff30413d05ce51d1f53fea5cb5c1dd6ec1623bd7c2f3413a3e51bfda3dc9b79be4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f571dbf9716d2e77e5f84a0445084d
SHA154b5fed16c95d75c5f805ff8fb57a886b014a608
SHA256fb0b5a60242be453fef7c32018af1743c6272480da56e6894bf2379265541899
SHA512270749ca4034a68319e90e856e937116f52e23f5737c42cd43cce92586e418ab774e9ef1c9d5f075886337b2767f368bfa24c464c965ddb52dacf4770de28d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5959c29a5eea4a274694bb89696435f2b
SHA1cb03c766b4b7b2b6a8097f755d7ce453c58739db
SHA2566ed507c545cfdf38d5247beb2f871c8fad4c7ae08d5ff47078d7b1f9e3fee109
SHA512ecd54e1d5e71605716498ab38c68f2cb9329a2a98f69d905d7b48cf7b8160347aa75c2caa2d2cff2a6e44334f62d2a26a91510f28ee722fcd122393c6b5bbcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da522d6bba61944e04c23a97800ac61e
SHA161a35fa00b52b60f1aba14b375782416d92bf40c
SHA256fc0a36546586028b64df9b756b283e042b270458a4e51f168dbe3ccd644c3702
SHA512592a9e4e2a3b47ff43f7e7d9a63cd8a15d886bad9a7227538fdbade35c999994556df59b38e390b1d0478524f0c732755e6201a4b8ed197f026f6fac1990078d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ceb48f4ac9d541e438251645577fa71
SHA11256241b1094ab9ec1feebb91e2c9c7bb871bdad
SHA25648fe2c58182319065ce6f8b659c9c281965554efee23d4ce474d0ba71a846cd1
SHA512e5506be4970b91c4ada89e35252fe12f309fed916d00af946b449b4e7678e2df630a82a82f924f0943037c55ddcbf1d5cac07962a63b413604b3c99047aa8ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab11a5e422846a26485be85d3bd31f6b
SHA1c1e46198b7e24e8cf9bc38c222b78db92bb29e4c
SHA2562800974c4a655edea6d8348a7a1e65b8676a857de3529ca756fd3918d70521af
SHA512459a82e0e99e82f6a369e7c59e72b522d77dfa8d5c60a1e8ca506a2fbc5d429a15b501fa07568174b5bd9095b01da7d6a939d452682e7c6dd6ab2fb471780fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7fbe3b2dfb3a4d5691212e71ac1e61
SHA1bb9e580b2925bfd6ecdb8f46a547f31074088bab
SHA256c2903ec5866ff95581e4980e9feb447f50d1426ba9c05b21cfd1373e9c86a376
SHA512056650b384835f0b51651199ce3952a3c2f17af8f67fe073c895ca3853e803e6881b4a73c3a72f77ba5c1b3ec02fd4db6dd6c60c6f876ea1f42ba8bc7b03ce3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cba1f6542b6c1f4de2e531c9793b904
SHA1d8d89163e950770a810f8b4670a4317ec2113bed
SHA2564385acb47fe44bbac3de018488d48369b919a090fb4e35e99d524faeb8c68d07
SHA51206942e4fe738711fe9df24d9404be4651070cb7a8a536723db3ddecedf7b6dab15a5f75356c9f06a9020f23219c2e731897c91918b6ba604f59156d1e385e348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a3eb66f811dd506162ff00e50b37b1
SHA1e51178a16a5ad893aa9a927df1cc77816d7aacae
SHA256f6fbc18e72522d66e9dc06fa93218a419c195bed981e756060a37bcfdea44096
SHA512e646c80941c36ee945eaf3fad3841bc242f62ce256ff2e3e101a3b22055fe1d99aa928baaf795d23ec223486fd6735d505b3d766af30c80ec170dbc4220d2f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849f7f7a066f2c62217f7b1ccc1face6
SHA1f796cb8579a79000dd4d5d1bccf758bc6d9d557f
SHA25613a3d3fc518d8d88f974c6c2a1ced45eed76beaf3dc456e29efe75d4e31000ea
SHA512948b1ccd9e9d98bca5ac3d1b73854d64e9f024e05884e6c73140a04d87480af17cbb5c5f0690d2bae0a4b9873c6af9c0ce763c57b8df5d09be98a9a5ad1d169a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d6046feb615a2a2a2d03486de6ba5f
SHA12922818031c1ade81570e6278916ed1452955ad3
SHA256d82caccaace0879e2405932af701cd1abd90b1b5c98d88b3d020c2aa95106903
SHA512b51c53d8a512a6f85c0e642301a2d52d3b42e06f00010391152edc3f4e80a012939aefc25991319ed79f07debecb00b555d5f5941d119b70de47dae21cf6848b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a59aa34dee2f9fe70afd2b9d1acbe17
SHA1a2d6283b8b61864665f63a39c4a0c75f1b01e8c2
SHA2564263c5c65197fc5eeaf4c662e9dad21be6bd0377a85a1224babf5d82273ef1bf
SHA512b14d015c6df912b95235c89b72808e8af02abb6f771d6d7de954ed40b58896bd9cd2d2cd5fdf1e507dd4d74a8bc936a1eb6ea5effcbfdb78c4e06cda40c75051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574bde59abba7dc984bfa320dc9e4612
SHA11a66542634e8f715419e8ac076e381b2e704fd8a
SHA256e50cb7fb758206ec2855d158bf630040f0cfbbdbb420952e70f5a343e2b5e05d
SHA512a9816abfdc58ad6dd7ebc2f5b70425d37a022799773bae71055dda8d4831ce92adb24b8abd5616e3d4cfc0c29df301550f508a048d3b6bc10bbc81c00aa61159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabe24ba3bcd42e2e55190af1882b555
SHA16bdbe1c220c93ceded1cefcadfc627e0218c6cff
SHA256a617c8060183d484299f2864ba68607f8b27d4a60c102016aee8ea4475758a3f
SHA512c3f4b1fac74a4f92fd51a1f0cbaa186efd16db29fc8112889eb5183df6dcc083ef667422065c968cf6f27c09c568f918d8cd1cc3f72b3d0d2a12424a1f93843c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b