Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
3ef0a4258f6dce431912ce6edeb6ef44_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ef0a4258f6dce431912ce6edeb6ef44_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ef0a4258f6dce431912ce6edeb6ef44_JaffaCakes118.html
-
Size
1KB
-
MD5
3ef0a4258f6dce431912ce6edeb6ef44
-
SHA1
b3e31103c1090eb5c7d64feaec75e417e659ddc4
-
SHA256
26640cf5ddfcd9763457a46d9b4bc8941dcae026d935d0111aff81494d9e3ddd
-
SHA512
d064f8e13d39c641774a079587ffefd68b40da5a449a74f4f34e7fb564f7aad27069bd28373ba8813d442b99e2d280d93183d1cd83a43e80cc9de23c6aa17aee
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15C3FCA1-8941-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d3a80f49f0dd9887be20cbacd024ab6c93014330bcb7fffaa8ab4a494fa1b2f6000000000e8000000002000020000000a86221c12093f5afe1fd4d8b293c240fe0c27d6724a73afdeef008e042323a9e20000000d91e00fc71430f092de25fb181e8d590463e32e9545f92e7d69b80673e03b5ae40000000a7c778f54b2779d6e2b399b67010b5382b2242465b9d257c845cb489bbcf9cc50c102236c827cf739743f11b931b0b66ea3d8ae1958204c9471d72ad7d861275 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b080ee4d1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434971677" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2228 2908 iexplore.exe 28 PID 2908 wrote to memory of 2228 2908 iexplore.exe 28 PID 2908 wrote to memory of 2228 2908 iexplore.exe 28 PID 2908 wrote to memory of 2228 2908 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ef0a4258f6dce431912ce6edeb6ef44_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d496a9d12a34170f17f0cbd2ccde6ba2
SHA1e4329634541e61ec22a4599d4ed9b4398f5e4c69
SHA2568c0b3c63d937c69b98de1cecc3f8c91e4fb1fa465349f0fe530100d754d8c2e3
SHA512d68a95296688bb5253364771ad2732e9f9a7ba6a76d04bd377ac71b719cdaf943c01d8d45e0c86e5c1196f74b66ac7c11c5c6ecf6064c9324cf293dfbfe4137a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af765b57b35264cbec139ce3f0391e2
SHA13f42fc0c00b15385383ec89853e12d5c4628a3f2
SHA2561afa10af7978c6b8e8d321d41913c25884dbda8096c9719b6dd0f97406d7edb2
SHA5120a5ee7958005fc038c719aa5a32923126dcc0b39afc24c76c4edc6a62ac0218a77c1951fed2355529960419b1ffba6dca04a23c739f57498adf6a56a8b5bc493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505325a4abebe16d2f6dce8d8176b95a1
SHA1ca957ce5fb5bca1fa72cd943adf9141f2859c197
SHA25620b697e986d61868cd617c69c2a75c9f0f1702f442b0730f10e66882ca1a2e99
SHA51252928db7d47d3539b76b5b728f43928e29965a08fe6c7322e8d0ff2a6ad08d20e0b8f9c7b0154a577f0195bd10cd8e32f5c1dffde31c94591a8e4eb9ecf5b972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b8984295f2134c2e8e7cbe07df44ab
SHA11aa42480846b56b8b3b25c8f9ec0adf5f217160b
SHA256f05167db4452b94387627f0ee63a10ea79b6c32ccbf8071051cd08c8e0dc9c02
SHA5124d2fe0c55c00c246355f66c18a2a3707b6aead4708675b83ba14cbc94221afef1b9424ba2536fe7b390d19f88bdfb8061e7c656d62feb22ed9665e68717c0718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58497682acc4a79705b6417f683b2f45c
SHA16f3517553c01c999ac6709a267974b5d39a63d2e
SHA256390dcbc6c03fc9664328b56a54aebf184dbbb9080494af7411af7fe074f5889e
SHA512ef1684ec147ed595f4571400c68eb78358289254a7aef6d4128d5f4b1e4f2e0938ecd869cfae1d2677a2eb43450f7d5e997e4c6cdc450ef161030507749da705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e15df7a2cd5dfad205d2c5e11d3ab39
SHA1e29132a8b1c0b82e582351b15738b1f7eb7ff238
SHA256926a5a1a9800ad6927e3029dff8f397cf7e8392955f874ebb2daea7b27389537
SHA512cbbc9ac22babb5e64d63162747fb2ccb6f0f1c64e62feda5c95780c7ffc76813ccdda5a4e0038205fe0b12577f20e0ec572623ed9393b8e0d14ccc7843cb4ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599750f41cc48ec032dcfa06b28a2a693
SHA1acc5166e039e1248552974dea0462cfbf821720d
SHA25637af295d9b3f8ac911c32e89032e919784408e14eed7a9ae20f13a3c56e3f6d4
SHA512d07903fd0c0145e3aaf26888815fbf3cd4ba3f40a7fe44a4d5eb2684fe9893f455425c240d4e7b07fa9456885ca1102596d132f77976e18345cb351132810d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bee762e8a312764e9d31b0ad17ed9cc
SHA1a1731c32b03f3061e9c301b70fcc8cf02ded5d38
SHA2565a2ad2fc8f2dc9af41884525500953dde5d7a5ea21b282e1dfa986ec6da606c1
SHA512a51d97a212a08e4dd9f30bdf54fc9a56287186736aeeb982d80014e6dbb638ec2b6dc835e14be84937671d4fda41eaa797578f912fa52d1789f7104192784cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce6120bb69c9174007d3fa376c7234e
SHA1aaf5363758e52e44e4595297dd41795e1b569a84
SHA2563317ac353b9c513befe0318f582794d48999a4acb426dcf41d197b41d4f08b5d
SHA5129a97c5a8e563009b2057e7f2533c62785e1414c67ceb10336354270f4a01bc1418e4b7a05bffc06f17c49f5295dcfb5ed4ace44d16fa27c3e42171cd747173a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59913e33e3849fa01e1e0c881a46e7c12
SHA1d3bb1c07090dca4c6f50c155da0b659e6c06a7d6
SHA2561a7e113aa41d263a346606765611d6a41f5a72e879647d8f1c901adf7b52774c
SHA5120758fad5d7f03ee6874676519a6d277065288db4480ed2b2e2496aa99865b8a615ac1c1d6e0a150e03521a15d381ff19543a5659e06f8e4ec62b85eac7e86420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591eb7772a442b34b7918f5fdf4d33bc
SHA1e6b70bb08076da7d2f13b0e34e6af643477b0df9
SHA25636389bf1b2a3597f8d807408bfad9e30f813c4823ddda9ec2813d492fc17904a
SHA512c2aa2d26ffe1e1a04e9c13f15c4dff319c85db18d42457a55ff4de7ece65ff78ee1c02afa3d2a58dde1580a6f04cf036509fbf5279d81782098e23a7d11de8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bca6ea17df21b0f22cac0cd41cb89a
SHA1fe70543e6406b0d0824b5225cbad3d265c77bdf7
SHA256820ae67f93cabec01d2b9aad9a5e381f825cc8f9ee20c2bbf40248c32cc8f91d
SHA512f2eda29e1280eb2f9ed48a37906cac2b820d6599de2297cd3fe94af9b3bd4f4651ca0b23e119751392dea817a04a652d3612b5c93da41323af24c3a9bfc5d4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3f4c4ff687e587b5fac92412a73c07
SHA164a4e4da3c9c5850899f2debeaab46fe1a8c07b1
SHA256702770a968b44cb814293eedc2d5a1bd55a3a302c01a552e7b11d96e47d67693
SHA5123d4b43d4025e1d4e15ed160f0c1068dfee6b3df94d5381d5ef13d05e06ef946710f40a34315a32cd389b6259ecf7a31d802012af90d0482cbb2345e2f79f31cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b11b99d05122aac9d1a47f0692d957b
SHA1290feed963e95f78886b725249016f9ea670ee0b
SHA256bfd1d377635dd2b44af59326e6870839df7d242a270f2bc5995444d277644952
SHA5120a748d4845b204a6dc6c2459b953b34323896d55681177363ff55c18a442e5df824b8ec476976f0cb7112c6489f0e17bd8b2b8992cf43fead6faaf5d44e44ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ec58f90c3b5a1b6c5d396b7e9f57ec
SHA1eb03529bbb45893da0732caef371732a6573fe02
SHA256b9f5aa817f81cd96e819f5f4de4df18e17a42216a72b09df1c3e374ee79a202d
SHA5128076765d7ebdb34659999eaeb9c46b58cd1c7145a135c6bb39ea4dce18b893f0cd20cf6c743a040275e9191c443a3a4bc60356ef432e3ae26f8c6b90ea30063b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14ff30cf9075c03dd71434d4e471297
SHA1fa1437cbc23071edbb82793e79fc42ad3399b0cc
SHA256bfa599fe1e49b53e9fa4411a59ab26dc8733fae6b3d3c1506888a9391d03c88d
SHA5128a21404272a2ac9e2e7bf8758298818e9db35ad8fe5295a9b3f63d986872508a88bff282f4adc85a60368b114c37c4bfb9474dd4ffb959b51b781ca3a1c8c050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8720d47adc8c30f3612ea5bf501671
SHA11898b02ee308369b4c30c6658ff0947a6e191660
SHA256f294f705ed0e33c07bec24397d1920601c27bcbb4f82a361ffe1f2a49bfe72a7
SHA5127482591f626abeaf7a68389051f910cd5edf827111787abb05029ec7810a9bcf87910dc2509250047a10d3f4770e0e45fe7b935fa657c64b39c91362c2144fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1034ba05bdbb91ca1fc38f73f7eda94
SHA18da0592eeba49bfb724ae00ae6a7f069958d22d5
SHA256445fc8cffdb11f189dd42b703ab453e0b6896c74bba3922f4b484d8720c62548
SHA5122a673164d7c424b78b74721830c3ac8a61a4c67f6463eea1e0fed153b9e3d894aff3a00a677226886a6a0f83d06f041a1c3588b3e159d2980fe9fe581022f5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7be5ece4aa2613d172f54562348410
SHA1d7846f6c4a445f599f7c9286592b1b4308a55df0
SHA256ab141540cd642c83a81dc129a7dabb2941aa01df3b98000f6564ae2c80022784
SHA512817bc84d6e41a93d3b7546e403e06844e06b224d767d512f63c2acece6875ee1f89830ca9bfa3ede2953b80adc974cfda7803e58e3f5cae9dad9da0cb0858431
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b