Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
3ee3d1638360eabfcc7573ab1c898a5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ee3d1638360eabfcc7573ab1c898a5a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ee3d1638360eabfcc7573ab1c898a5a_JaffaCakes118.html
-
Size
96KB
-
MD5
3ee3d1638360eabfcc7573ab1c898a5a
-
SHA1
9debaa5222b76efab77d9602d69f8acfd87fe77c
-
SHA256
b1e46af976c91a8c91fbadcd51084c7be9ff80e05bd3a7562440af99bb2b1f1a
-
SHA512
f1d510e532cabf407eec57cd1a8fe52cd957a4f51d07e6385d37622e0b17c1ab9900ae72a780334d029406c5b867923e50ed30e32bc969b04b88bb99ca0cf06a
-
SSDEEP
1536:SiSBwz7m7nnm8CwzZ2wQzRvkFZWJRigGEFhH2csw:SiS17nm8CbTzRGIigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC88DBD1-893F-11EF-8B78-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434971072" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f2bc22dbe4a801768f4ca6d2a61bb2c610de7508b495dfebe674fa083a32b3ae000000000e8000000002000020000000bc0a7aa8974f436c1c7c3ac6aa8741100a8bea9a3fca5361ab253bc250fcdf3120000000ef9a341c9db73ea5cfa2966493b195b34e8bb62aa3ca70b31f4697f707df81d94000000032ae1d951b14158dcc07f6f7758a0e9a41c178ae0c078eb5f9353592cc8e70835d3a6ca7dc3aeb1db2a4f85349520024c1336d03ae48fe4f353663c5b5e75614 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c1ce9b4c1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2500 2364 iexplore.exe 31 PID 2364 wrote to memory of 2500 2364 iexplore.exe 31 PID 2364 wrote to memory of 2500 2364 iexplore.exe 31 PID 2364 wrote to memory of 2500 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ee3d1638360eabfcc7573ab1c898a5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc1dcef52c1e0200dfbc085d66ed33a5
SHA1c62e3306a6904d42812b11346661adfd42e297db
SHA25624428a96356f9251f20291898a38b0abbc8695599ec67ee337ea04dd9d51c463
SHA512e105b44e41006b5d561bc02015c55976e868fd069219f64a906f180d1dacebb1906bd74e54bd6b8ee1c911f27da82aa49f9efc8b09c4181b1d98cfa4c73d6a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9e25006a67e33cfeeb9c55afe6845a
SHA1deb5e19c54896767114efcdac4a6a91f13a65641
SHA25646fb6186cea386eda266b1bb80ef508e7daf108eb30d2e8eedffef7d430522f6
SHA512dca9cf578f2aa95f7a19b2b2c5e904335a08f3e4374f9dfc49d61180482ea9985048311de4b5a4bfdce02ac695b47971b474e23dd75b2cee679696dda55c257a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551142fc803509c6604cfd94add7821b0
SHA1d1ae264a5d358cf033d03ed2c25dda38ee26d8fb
SHA2569e745823d67db27ce029e9be8dd5aad92d053c8f46a354ad856a7caf2fe9e0a7
SHA512a09c712b2ef884c91602f1e420a2145a273b57beb3d27b4c3f60ba3bbe360e03a780c3d268bbd2f1fe2a6f897950665c2b4da0637ccc37bd1358b62dc860be6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a62962df09f5f3136916a1cc45e01b
SHA192c8f072c369c8fb9955c8674f3aba91384e8bbd
SHA25660aee1fa4fd5c3962f455d1a8a927c8d48e86b2db3c7885418b425cb1d8b1030
SHA512b20acdb5073a17e95c380bb0f50f9956677ee277c90d49d0a4e77fbc91d5ea2f0e03a3cc60d5dcba9cb686ce2ef3eae4f7ec35e1ea4925d44856be86ef4f8782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac40a387a6293403e4ae0ade3071560
SHA1f6fe844c8929d3d88bf3772eade88b67f251854a
SHA2565d1b7d4d9ab7d9c7aa7cdecac81e0c601f6cbf4f5a3c38ce76d356249c135bf6
SHA512322a222487f7102aa7f82c175f114813984db5649403c6ba917169771b44dae0e0ef4d96ee19173064e097e2cfd93a35c021b94bc2742e0756a57d84ffcfab90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab953490351703a62a12a8b3b9d2dd9
SHA167173b5e7c390ff605ebe0d59dd341dd30401c12
SHA25696506f8527d5a5d8329ba0d5b0c034c89b62cdee793c2a506989ac6bdb775ca7
SHA51211d58be7aca13dc67064e1527dff26e582a4dd8345b1ddf39f4f9727f6e6acbcc302682a617e1192e483e36568fb6d2195d152439e4b79e507326b9f7de8056a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e52e020b1f81ec49d7d967c842b4f1f8
SHA132a3f7d2eadbc778dd06b0378efd0c8de434656e
SHA256613e0127966909b6aa592e00ce85fbe5952e007bf28bb8daf2a4c089f4cced1a
SHA512a09e4e8902688cc292d2ed579b9abaa271c486d88aab47461c46653d3911352e6944737f532b4a82cf114398410bd10ab3846db5f8312f9102f3f6659229d750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a90a6e3fa334292ac3b6b9cf96c818
SHA1cc05838b51779d19a08eacb0998e7c4149d3ae16
SHA256ade8602540b578a6187b963a488110584415988e0ce8c9e5a5bdd434b6544252
SHA5120f365991d2a88ea2207cfe1dc9546a07491b00318fd032d487e0b408dc076efe5c824d093f94fc8f5fa5441c4a997ec7a2688585a4b59cc4b1af077184a1212e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529df44be1885a4e5d4da9064da405dba
SHA1e2de6bb48debf0db50ac73348459d606ff40808d
SHA256bc561d2d8786346d9ab7ae50963bc922974c97e57b2545d74452ee6455691c73
SHA512d214d1805b89b2d038b809b1ac4eddf9191c720dfb4e7f28c63320be7399c1002978f23a4a44448ee7a1a2f68be26e8f05b88a8e2c3770c0cc814dcf90ba2614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac5f2eafdc13032c5fcbee128aedd355
SHA1e2f27f208d9ed3dab417348b5ee20de234288a0d
SHA2563bca78116ae6bb1ca59480704a4ae743ade7c805cc5af17a6dc3377299dd1fce
SHA5129051dd557990156f8d7f82a2fc799423bcba1b9da931294ef8f52e34b0c250f37a4d584dbbd39e887e791cc6b4ecf195c6027236353ce4a9a29771daba358593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40f82ef06328967b0073ec1dea411d0
SHA1f11f7219fd56071788e13f0937d804ecd09dfb41
SHA256b76ba59de6e3f338e8ee37d70270b842710b1879506ab75614555a51a7c45cb7
SHA512857d5cbb6e6a50369b861882f5f8fff6ba0737463548f86c7fb598e4b183e9497316d9719451c43106ebadf11645f491dd736d4aaf8d7526570757c256c01a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d223d1415e487ec5b49132d766569c68
SHA1000099bb71fdc36302ef3520be36205f256af5ce
SHA25694f5f706eb7b9d669d909d1675acf8ae5046af2629384756b51078f079a756e5
SHA512a56890bd27ed9135a8ff23423bbc15fd98cb1b472cd4c2ea72cdbc07c31a0408af74bcf93b9f4c7984d936c542a33c94de35e10acfb307b3d8319579739dfc96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a443d7686b61e4fe14ba034ad0d70f2
SHA11460b7d635f00f428ebf0c5a870aae65777a3bd3
SHA256175a90165705f267b86dec4d8b1d8ecc28abcdd8e9939c4a6471535bc7a718ac
SHA51209c81291b36f83deb6e4082894ab7607311fb1474fb8d332816c97dac4209155e3b74e34cbab8a2f558f31aa6811d8274e8d5e821a8c03178e2ff634fdb127aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81ef49d1792684b2c0c63079c3840e9
SHA148fa0c658073e572c48c9a249a25c3024a59a4dc
SHA2563a999cd61b132a3093fb26d2171495ba4edb1d3217a78a1d6892efa971bd859f
SHA512cc8fd3f2859430996488d4f6119b56c13b8a497789d4b76275b0a37081f35fd562a6c8071347ab66f75dbcdd6cd747c228e9dba74737c3c4a944c2000e027b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9048257239dcf8721aced92e78ed01
SHA179e203a355ae5b552df8001bd17f3fdb079a28d6
SHA256a85346f2f86fb5900d8a73858099104efab5854a8673d7044c77e418dcbe1d2a
SHA512d7497afecaa4305c07f03ab8fb685159973e6cdb9a9e9d4b2276f88b7b5032e762baa842112d3d3b52710781e99d1618b9528797bdc43addea22cb98783bd264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549020976c4e05c2fa26b0f657c61789c
SHA19b39bf9982cb68cb303c0e5730fdc514d5c111a3
SHA256741edc3770fc270a9b2a8eacc2bca5741493ce3676d31c58e1bc27782be41b87
SHA5129c7dd39e25d6f980bea169871c4b8995a1cf6b2968541957206fb3f6fe2d76744ea5dddf75f6e4e197b0b603a4eea696f35673474d6d7ea62d2b368256b5d4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58426a14b51fb48413e19d202169248d2
SHA1d6e9f7a26a80f5d1faada340a45899e2a6592f53
SHA2560f2af4cd5df79de5ef64956d3a09f431b846c5e6eac38ceb3eae55d92d1fa5b9
SHA5122c597ad4e081809d93c857c59e9c896ad0c76e61b32044bd4371a85271b694530cc4c5b2acb29e0a6e3b94e1e373eb9277a9241003f4099178d998a247797ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb3fa1c7bad18d840dd8c01a0c5a26f
SHA15069faf87235e4cc164f0a3d6e091d6ce3999374
SHA256c6d56ce6601e620bbc3ae31ebd0aaef2f85061a76d09a7ec363fee8ddaf8b8fa
SHA512ad9a58910745bbfa3fa7ff5207888410fc4aa3e189822269881e551a81cae556b905199d76125630c89dbc06999c2e1c1dfc3f7a2a1e5a8d6bea3d201e883570
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b