Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html
-
Size
26KB
-
MD5
3e65ba77a837dd5478a20cf1b9f5e80e
-
SHA1
c76d305cbada0974919628db3cb0cc8988bf30f6
-
SHA256
6c66edabe1a582565c8765f6a41b3eab4e1b3785a6ac147528488d4e86e7c7b7
-
SHA512
eb1588c186c43b370f2341542f6f03704487820469cb715848b4d167207ba10bb0aff949d388b6778fe4091c174c03f07ea35501a0621b27853dc8789c872299
-
SSDEEP
384:4+QfPFd9QZBC7mOdM8YBKfpC5IgSnbmFe7AcvG6SokJvAgo0i8AvPd:Zcd9QZBC7mOdM89pC5I9nC4EIP0i8oPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B742021-892F-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509c78323c1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434964063" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006ca43bfd586f244355516a7a3b17477b43fa2494d50258a25647f7456e842395000000000e800000000200002000000069f7fc483c9b30dd73eef02ccf668f332f1f3aa2ae253bc917dc3c68cb0be86420000000267da75156f29a35fdafe2c52ed91ab024e00e2339e63b27cf80b5cfc7f649b04000000036919933fa45b32d0c9d3b6661fc67c4fcd0a4cbf16653469c2a3d96f1b0e2a5422d145deb1369558c3614e2944e9b885a17094855acbc7dedb88a458b5e5845 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1848 iexplore.exe 1848 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1732 1848 iexplore.exe 30 PID 1848 wrote to memory of 1732 1848 iexplore.exe 30 PID 1848 wrote to memory of 1732 1848 iexplore.exe 30 PID 1848 wrote to memory of 1732 1848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb47a7a01397d847d3f3370eee3f37a
SHA1ec9a8b7596934cc645b7bfa19a20b4738cffb58f
SHA256538de24d81d654f93b9b43bed4b506d844be18c33528961ae0c7ed6a110ccf8c
SHA512a496905bb7f2480f9bdb8bd71fde57a156aab6f33f08d1baed7267e9d0457ebdf6dedba0e7101fcd6cc565872e2083e10aacb403c6b4ad02257b4ee4312552c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518117a83962861e39d1ff5054b3eba32
SHA135afb00072b9476c51259bcaac5d7d25060ca2ae
SHA2563d2cd26ac4b79dc9bccb2ae90b55625a65c7741298dfeba471bace0c33b04485
SHA512cbbf9088fd310c50e8660e03294b01f24ea9a9de420be57a5f2878ebf41b1f1e196014f0f279e4e44d9f842543e4b430ec9717466b5e99e239cd91b8a21eede8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc0a669d51bb969bddaa1b0b1d16404
SHA1f886bd3a4a82e08920d223d304df11225e7e3877
SHA2560877a367e4c142ad2d1af10829ed87bef47655973538dfae24d6f2c25f2dd061
SHA512a63556820f5f97a7fce22c54f0acb0b1b516ba4589a84eabce4cc6fc72463e06784b3047a0f60dfa3bd5fe4a11ec5ff618b67d8d54fa70086cf39bcab842a280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa1bea3c6e63df40213c6f0fe61342a
SHA1fab2bb38444e15af080b3231d258ff1e0619b46a
SHA25658fc46ab7aa429ff88404485d7180c46500d39098ffd5e6387f42cc13ff9456e
SHA51207ea275cf3f6e4f3a2cd2c35b5ece4a2aa42b7912424f47d4b4f0532f235d1fcd846a8fb23b17aded967a8e5baad34a6c8cf6b4f1cbd35fefd379f2d679dd1a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9dce01991624dd564103e58621585f
SHA1daeab86908674b15c4a242cc612e419822ca3ade
SHA2562a5d39309d3254c51b1b3177b1c788751309b1e22e504958d526b1be8627d0fc
SHA512e6d9aad5d66bc2de3dd51c5257c93834d7d5b1fcfbcade8b7d7bfa47270f2204b7f1a10a531bada6597b9f6c7758291a5f914810e8d0069b7785e6e31752123b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d368ccd07e36a94d39910e8877a92b0
SHA1688c543924dd5f43263e28dbe107723f87be3552
SHA25649c628d924eaac838a6a907a13b84a774bc0148cb547a6138e23d926702b161f
SHA512f0b7a12c4de7778f200392ffb1398deec32c7a0a87047549bbdc62301ea2890b569b345d2039bbc5533f9d0b8db5cb077e42254fb217fbc11c2497b894b33df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ea72150a2ec6431b383b05bd508136
SHA164b9fbd5195065f465bbf20b5b7682d882b49591
SHA2561739e83147f0100e27c54c69b4f3e63c54ddf3b4b1cb75ca58fe5dfadf2e7833
SHA5125993ef19a9b77d220a9ffb6c83ede41f3f5f0109c882f2f3abba9f08b2d6a123f95c0aff5c510c65aa803ad10ad52c9433868fbd9dc61dadf6219b921c16e2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fcf18a5b01d4b8c344566b44a98b26
SHA127cd6ef9a721ba0f6678d4128c503bd2e4f55de3
SHA25664841ea0bdf56d5f209d2306437be78668e71b4f0fedc7d4413422253dde0404
SHA5127313b85d3e23677eb2def5b8a26f7e5da9d6098eae4f74a11d4a8714bdeaa46e94437047c1c862f8053f89459361a1def61d11b6e13e199af619d878275f0f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c6b5b2df541468f88d29981dda12b6
SHA1069531000fb181ec3444e7a329971b52b748b3ff
SHA25691b4e2d5d219c31308ab971714803631970649873b96a99a5be6866391aa2c96
SHA5120cc0c7d38d14c3d63477f9e9b277d158302d0ef68d59db8891e1a2cb2e445d0d2fbc05475db761e0d84c3e294863d05bc187906ce6164499168c06ce2e115b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b86697e92c60fff23269d014154221b
SHA15c348c7dc2a68588fb75c3a4ac310fa41ca6d719
SHA256e0a0bb72281c9a6fb087350ec9e7bbe33a8ef0e6ec4ddbf0535b1b96ff5c4d29
SHA512dc873e719b51def9fe895d5d174903e2e1ee862f7f6df18f0118f798f1bfedb1abaf1852a642bce679999d3b959d0131ead149ebde8dfe6fac3ebcb68a0b907c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556018a10b6fc113548c3a3bb96da2a8e
SHA1af7d850823a51755562371cd804f2b4193a104d6
SHA256b9467c17c76c681d6470f4eb981728be0bf83956b51b6ee3a4a2b5d2bcfea176
SHA512df46400e720f9f3c68a9bce42c69e6501405a1ac6bb030ccc7853a102728af6613fd78e8c6af18925fd5293394d204e42b006de24f9ad46262e968e2d6ce296d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6740c90a148e34c7a17d8aa24a9463
SHA1c66cbd9081cd134304c695c687f8a9d5e887267b
SHA25624d3024ac6e0e14fff90bbf9f8b1fa58bfed53c0652497d650820071e03ce4c9
SHA512276e1ad7ac1dfd2966f0c0a357da3ddfdc636a68c3855f46a89c792b7d9be504a2751ecc152a66c545a61518809a176a4007a884d9ed8cbb6d84837bd6453d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e70e0e4d4bb38e78faa36e4ac356611
SHA1dbb75b0bb560f9253bf0ce4f37fb65362ac81f1e
SHA256b8178e7d06360df1f01b67871dc10e647cc64f0be36efd5d45d48e441061837b
SHA5127a78ed13634322e4145d720d87cc9cf68fda0fb3f9820da9f7004f1f60c9c7a46b05bf60002dcd183018ffeb31ea8d9ab68bf60912179c11539375de9c2ea896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec0f8aa0b88f6226c8a87278001eb0a
SHA1cec29dec881ec929db5848224814acda27bd8faf
SHA256a0aa9fdc6b8662c6d3690aa4577f6d18d822ea17ab21b09a512759b609c2138d
SHA512fbe74852201cf5faeac936a01ae03620c2f6bbc5106e5bca4c2b03a26a1fa9439e4437f001a23a8630666d700d920fc44573e139ec65a62d8b5c2a591ee9c3b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5badf4d9a553da206d7bfd80b557e8
SHA115dac06f62ab9c0b395189a3dfe3ea670b24c6e6
SHA2566920641c591b03455da4f276db2497901a1aaa0b5d76d7de8f8221c5630354ff
SHA512b38523c1fbb0d0583bee1e945d16b2820345b6099cef16573b3cf3bb457527ab530da73935a828943da930c2373419077c6935ce849b6294cab0bcf480639f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5439e4a794477634a92812e9c0f780e33
SHA169b140e3826c3f85f8692cf84d541aa713aab8c0
SHA256ae47d4fe0ad1c65e4f092182a7638b8fde7ae1604751913c62e656b4a08324ca
SHA51223e03e57dc4959c2e6ae4134ad2c3cf30218ec975649bf2bb5c92dcc39d3e364503e05af7563a3042acf89062741f07ce5ed75cdf037f54c402501b7e2604659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c660c2cbf0f3bddcb15f2948b31082b3
SHA17f3ad3c31efee0d193eec4085447b25ac735cfc6
SHA2560f3e9eb6f9b8ff246f454ccdbfff2425cfe1b8f0d5b5335d1463befdc95b7803
SHA5121a20b2b2cf782e318bfaa3e875fc0fc232cc5f47738c9e0a6022d615195d67b6fee0fc55cb1671e75241da99978f0ccb0036a9fc08be32b249efed9c210f0fa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b4e1802c135a2a38a7ac2715b70595b
SHA1a7c2d848f6ef80a47ce5d24a652a298f9430a6c4
SHA256ea420eb539138192cb22c0f21e0b7fce3631e1f4df18934642f3a77a491b492b
SHA512ea2ecfcbb223e0888cb4b4ce3dfefd9b2f7e5bc0e56f3d792f0a962dd0b429fc77499e331376421b7ab09430d95dab5049294f27bd3210fd0a29812ae53f0ed9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b