Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 06:51
Static task
static1
Behavioral task
behavioral1
Sample
3e6768d9c83fc94842070f4429ebe861_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e6768d9c83fc94842070f4429ebe861_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e6768d9c83fc94842070f4429ebe861_JaffaCakes118.html
-
Size
2KB
-
MD5
3e6768d9c83fc94842070f4429ebe861
-
SHA1
287cd18a1758658ed95a33c3049b402378d8bb10
-
SHA256
a298645799b7f3c85f5741de26639a218ab1792a06b2331c43d2eff643b945fa
-
SHA512
4e5e8f29a0d11ebcb646a0deac07aa5761490c43568865bd3b166781274b9d35448fddfcfd72dbd8a1b77cfe609c3b5941cc8cb7ddc8c361dfb6a0b419e9dc05
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000fa425ffafe1852999a5f5efbae067a31113a4c8e64ba989efbe3e66b55aa91a7000000000e80000000020000200000001fcee8eb375d24e2933cfe6031f08145a3c10fdfb7d5610a096ac86f3abaf31020000000052ebb5621a69b1e67302c2bed56e90694c5ce866a9d4dfd5cc301fc8504e1f6400000003ebd3d5eb848ab1e7b49fb35f81c8c8c35d4595297f3b14ebedbabed45713331acfaa21e9c447794e0cea5d1c196273c2bb2212390d8a4d1b10cb8ccc379b8f8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01134603c1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BBD6C51-892F-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434964144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2368 2336 iexplore.exe 30 PID 2336 wrote to memory of 2368 2336 iexplore.exe 30 PID 2336 wrote to memory of 2368 2336 iexplore.exe 30 PID 2336 wrote to memory of 2368 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3e6768d9c83fc94842070f4429ebe861_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c0f2030a284c60220617aa15c8486f1
SHA16efd9a6ba79f9da4ae190932e20d746707a253fa
SHA25604461f8a8b9ea4414988ccb894fececc973bbad47082279510422c0ff05039f2
SHA51268874927202bcbbec1265282ee1089f5db56020d7654cdfadf220e8b91342f6819e7f4fd82ca40f8a28fa61f32e88c6f4ec1a287daa9834e06d01f1060466bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565bb479ab8c2f6004152a0033d7d7617
SHA15e6154bc33d340a26a8baf3a61b05cc7eb6b13c0
SHA256bbded4989fca46b34a5b8556affce6233f8c4b0d6edf1a3e028a3d4fd21c93c9
SHA512688bf73602b534fbe49e821ecd854119fefa7114845c77deb1b5e065a8e55001b7f82989a955c02540c602c87c93f84ffdc7a3f7d9de4dca703082f297e7882c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51243842130c8b5446235112c2f4bf06e
SHA145ef6de8cf9fd8aa286c7e9119518c2e2a420d41
SHA256d1fb3b352b89228f68189093bad952c8814ffece686b65266d162ed1518c3941
SHA512050ce7b7234b55ec5fff7a3752a05c0fcd1984303c0b603cda5b370d1b2be9b79ca5758d4390779c40a9cfa304386f4c86ecfc7efc60a7737da27cbc265a7128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50978e05d5230b9ecafc987a9dca7c08c
SHA175215fe422b62fbc3893f8867b9efb19fede9a73
SHA2563581caf80c2313ef9cadaaf6bfb6833b816e5010e2da86545904245b2510981a
SHA512f6728eb9d4db3a5fcd7ffd463887022c59d87e674d38355ff88598853108c4349728cb4d43e65e724d6c800118af59206b2389d6e2aa01adde2fb88e9733811e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59714824d6bb9e440d40e327b3ecd6efa
SHA1c73c7e4128db1a9585092ac091cfab7a843e8be6
SHA25615cad5967b8e688dae1f81cfa843ae470caf08ecb0f13f1dae9070f6139497f6
SHA512c9af615bc2ff1584e15a4c4ab072cd7b86aacb853bf91e8a72c07b99882cf42f1939cb7fe7e8f4bc22d6e0e9f591ae3e22684f23601ff5ca0e21b3b790287650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c9002b9353e6b932ffade2cf057037
SHA1383cac3cfddf97e85d8ec998856c150a8d4484cb
SHA256cdea6328cae1bd3b49e8e17a194bcfc8030b91147b7bd89c1b26e08f295ab631
SHA51213196187c484a7108d9d82c426acc6178997bd2bf0d37a2e0fe7ac677f0d2605f3cdf6bc167f0908346cb16f0010e98dbf32a03b01f1b9333862ce1a75e90a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ea8db5608d380c186a72994c601b37e
SHA1c5d40d7417153655f06138bc584a7c97be6e372a
SHA25621f205b1ae6d47a4b1fe89a36a9f73063d91eaf3c6fc3c80c9d400029ae90f2a
SHA5127ef74c5ce3e3e3247e87b781d575a56fb4a6870c345b4e96a47e4477ce13760c59b00c6a29848bbb03928eba55007cc010b11f4ca71432b8f46aae61de76508d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d83fe96079fe3e6785d7853f7ff299
SHA1c01fd95066a8724ed64de3fe9c61f86bd6a050b3
SHA256e790b1786eb57444f225da6ba1a04246c65401cc0fa0337f4cb335dc1c4c1593
SHA5126eaf444287b83b2fa5703ef9f0fcdfb5554b66fa314282ea70e263f21da934aea3245906292df677669e0e47e4f7d48ee950f0a6861025c0546142a77945dd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fc245452d50003228236a3cdaf5e55
SHA1a44280952c20b27a3a1dc89639a61f1efa0fd980
SHA256ea172a77279c402ba189290f9d837fa96895c8769c595a990afa2311119a5bf0
SHA512245a7526dd81213b671aa2e09e8ef7497edb289a640a2df5811f115596197628977b49e53be81c886217efda98ec44b24f11850bac60771659715d907ebf8813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3651634b1d8853ded66e7ba3e0e7e55
SHA1ae2cfab7e8a42166866b270f4ae81e8cec609e49
SHA256379ce6f469f7d5c680604dd710716470ed985677bbcfbfab6e1e44b2dfdf2887
SHA5126cad63e62ac69e6c6eb0e2a9c94c157d9154652f59bf088f21420e745da376b00d91fbd5743cdb8ec7f12965f0ba9989e5597994faae2c0f478f5966b5f51436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59606bb22f88ba33728412bc0bf9af1f4
SHA1a8249dca945a7770b5fa16a7515c13b07a1aaecc
SHA2561f685107ff19bad2b0de11edbbbe00b810f541b367ca8a23c0f003e43cf3a395
SHA51218fdf14eeb2788211a90813ba474232210a74687e22a9400f2ad3395651eac61adce0e0acd42a24d11c443b19df864dde58f019f2e96018fc29208acbeea5e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d45db7b17442eac7fd000056bc7bc34
SHA1d636a86a1df41b5c39359324364c323b20467fc2
SHA256f2e615fd02d6aeabaf59c5fa05ebe979ef229106525016d58cf3658536c5b3b1
SHA5126ae312c257d877c87bcfa568c78862fa9c514fc8fd7f38968cb6f7e3c0e3fc5a25fd56550f70b5274ab502c6b87e4d40a8d32091392740726330d5d341bc6d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576871d553c8a4647f248503fa2e2403a
SHA128fccbb0c8788e38f9e09a5674179bb0c87ab87a
SHA2561ffdc816787776a54c1bad679e758f5a92ec3b97bd7e1ba2b81f7c3ea3284ce0
SHA51249d2dad2e7d85a98fcd219537bf67a5dc030a5d206e648e21ee262ad88a0210b7d576babe3c1068ca68505ee41cbf41f76310210de2df412a3ac65e2ec5b3f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a55745a96403ca590465b6a6686bcc8
SHA1be482f0a3c4dab34a3f04e57ceb208f0ab7de439
SHA25630ee97139aaa968ecef9d13631022bf3dd8e86b79569b10b4733664b2fabb09e
SHA512c4f075001b71849a350ce4b0d155444260e33708ec9fdabf8522dab5eba9834df79372ed9d945a878a2ffae7ec2e17181429b0e4ce4cd9dc051a1a64d8d0cdaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541b7cf94781337d6a1c36d87672f47d4
SHA15ffe21118aa3e701d6f7961e7040db986d6ff474
SHA256952f50e17f2252e1b249c1aa8c24df211b77d466c12f760c666312db408484cf
SHA5125ce12af6e0818f4e87ce704cdffc3f8f523c47a042453e7c0695a24806452380cf42738f451aba54673589e3e96d57327593b4b33b7fe3fa6c2ebb85671b2cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b128692bb8d4465568fb322cc89405f
SHA1fcd49cdd98f558cb6052c21578f266bcf572705b
SHA25652de7b4447311603b281bedf53a714ec0b38c1843f99c3da66814fa1d848bc6b
SHA5120b2b6bd95cfd9737754498d3e71f747cc8f13a5d14f0b4f14d6c89f9778cc7af00ea849f44b4a7cf3eded1936fed2425d30987decc44409fa49a65a1e61413bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab31c58528e0ae3cc9c5bcb5975b9912
SHA12563fbc42c82c5cd765ed0912757253864dc6828
SHA25624e60f0ddcba5498da27461f3bcbdbcfe491f7b6bece5e656b625696d64a60e6
SHA5128687cca9409cdbcbaed2bd0b93ae6d0f511552f727a86f14fbbbbca8f180fb84b7f0a9f00e81e03ba7c090094dd7466dab4c107b9c106725498a0c81e8ab3d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c645b102bcf8091e14f46590f39428f
SHA15781d64374ce11e220282910936a3fb1fda18801
SHA256f41a54155899070199f2703141802d549d44b012c2c390e608483b60d313f331
SHA512f502d4ed4b7e4c5ecbefb4a08f2ca11d21e4b17618283b32f9426ad55524ff703afd25edd7c28da7b19f639639f189ea98035293a9205a4b5308af93f2604e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579c924fd79159d6c0cc8421f6d3c0804
SHA15e2d36b50254dfc582f4eb6644fd752f5cf575bf
SHA256b67f25176a9eb04101b15377cbd2390506e719df9b57e47d0bcbb8b05e7ff662
SHA5125b6049afe6009b11e9c5c5c5748861fc39f56466d5556bfd0517fb3c28952792370d1e379c0c569a3be272d648bdc21f744c5f33333bbb3c1d44e6584278b444
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b