Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
3f3e5bbcefcfe161095a4f6597f0fd2d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f3e5bbcefcfe161095a4f6597f0fd2d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f3e5bbcefcfe161095a4f6597f0fd2d_JaffaCakes118.html
-
Size
104KB
-
MD5
3f3e5bbcefcfe161095a4f6597f0fd2d
-
SHA1
5a326d22799be2afd8d1442d8aff61ba0351cf65
-
SHA256
7d5b09a278235a963a4b9fa4dc479896329f5e9d6600167b122cef19ce5c5112
-
SHA512
3b24f3cda181deef53dfaa191550f80cf7ded52749e642ebcd0f5536d0bd974d559ce8cff01c2c69b583933132acb2e1a8c25b1bccc262e302db65f4bee720d1
-
SSDEEP
1536:yFGM9NMS1ucIxY4a44il49m4Lo48rPC4cW4o64bJ4YW4ez4ii4eFk3hQUk:G9CSkRk3hZk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434975969" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5053caea571ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000618f7962577b974695c547f43871d68b00000000020000000000106600000001000020000000d40fd45da036ca560514724f2b5596f930ac36a0b09dc12c3e36acfe3ac10cd4000000000e800000000200002000000098a55ddbce36105265351d6d9f164a05001f353501400d5e6b774b23a202034120000000bc722d7d696c5f3e8530b8e86d5a92b16dae509075021d57e8ea95c6f727a3cd40000000ced65be5a0418f13216aa30cb533d24a01f7c87c01ef97b7c94e9fdfeb9d2fc988939771b42ad61bcad1feeef59cdd6762755593b4f28df495a14051217f8e1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000618f7962577b974695c547f43871d68b000000000200000000001066000000010000200000008d229874d9fc5c8195ca60c3e26b8a4d37ada18a893910450865081f6fa4b7ba000000000e8000000002000020000000a17298f233aee4271898e4046df3edd648f4cd80f9c2fa1aa551e403b9359c609000000053ce469e7b6d21fb8a0648c6847bc41b046b6c684466167c2ece7d4c5c3da3073e13bffc637b9b018a612cfae9419ae4428219040b718a88a7f385d52046443376d5c5f19b53d21bcedc1f5629c8f718d5ba055aa76204cb34d1c559df5a8bd9b1094c9efc020dbb57ff5d13447cc3d26e8a553e8c7e9a8efde38cfe284a82e87bd29e641e0d5a0f0e0b7de134d406da40000000832e25096e949329414c0e64dd4cac15d6bea303351c1b37d3a4831e25599e5824a91179543eb1cb922adf11e3818efc7a984a0212c5629258aab8996360695a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13682E91-894B-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31 PID 2860 wrote to memory of 2700 2860 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f3e5bbcefcfe161095a4f6597f0fd2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ab69327da07e450e84022a753aa031
SHA11632910dd458921467997dc1bde9eebf53f90a36
SHA2563abc5335f0cb4ab92bbe1901c3d8b7539489c971c2b56e95c20323d9a44fd9b8
SHA51238f8c19f803685a27ead8a42e60e49e84d17cd2541ba3edbc3848e31b3fb4480b5b41d263daae5ea077373cdf68767de260f1de7ded56ef2d917cbccf4d728ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa707b1325af80d8915642009572820d
SHA17fd3512d8926672fd92b412ac199f0c8b35791f2
SHA256d38d74d1c24e76a3a7c36f7092b58265b57648ad449107f3a106c22379232121
SHA51230adc6b9dcac46e3f7d8c6460051965c26b3a205a1f75cc8e22c01e31081c7108150459f11e6a2519bcff763892752fd1c3aa262fe0db7328ed7440ea01c333e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53135928a52764482362e08dbdfd38e15
SHA18b53f1b607f67a2b6fa4b291e302e7bec031c85e
SHA256fbdd328ddc28f48b533d3050961cc91c45273fb4fec59da407c957656ad3544c
SHA512a529fae02c771e99e97a3be8b263603d5fc538fbc740c4cf6e6a865e9fc25c69f4295a5aab2d35f22cc16fc2fcdfbc36ad0e3457ed6617a3c90556549b065509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e64b1eed806c01935eda09fb4626df
SHA1ab3bc6749920438ed8c55da68bb896b6c9d52db9
SHA25657a9a2a890eefe189510b3e3a60521dfe7e52e9eff2af38d355d23e1ef512155
SHA5124a4203c9dfc50edac0f4cec5eae2851276ff027da7ac8628ee1617d9d032b60fa5eebb10f8d6720776c8eca84cc44338acc8d66e894229c1d3616eacfd30c1f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528868ab5f435fd25874b561f1c879d71
SHA1aae7b6a8d0dba063e24ae2a6b36f07c70d24a27e
SHA25640ef2dd29e627f28810797cc8b3833bdee75d4006e4c82d12a3f0baf99110f0f
SHA5128f7037b952a1c2134cb0ea648db780dcc655dc6dbf7292b954affdb9472e2238cf00375c3fc5499fa59cfe44b2db7527978a30088c5c296e14a70a581fc12974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57070497c98545da286e424c0829bccdb
SHA1636a9ec5c157ca9789882683a887ef885edd9a07
SHA256af6c4caf3698fa61a13eb3e6176a19ba4f1e236b0646c77b82915a61d5088ffc
SHA51250ef2e31e020b296d3837537258ac9f7061b45500ca76ef449432500543043e4e6cfe9b1fbc536d209cfb940295f36f3880d384e5245b9942d8b850de78c5676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc8dd87e92f9acb0b35a1ac4606d15c
SHA16cea0669ccea9e6f3d7075f066e2286348ca88d1
SHA25668187adb139331afb03096587acdc866408f4868622ede376190583347f448ff
SHA512492d7141a1a9f1e1c8a45460c2d73b0ce57f71c1d8fc979c45f3066f89db73a7f48998ed3866610113007e61d547d19e445a633668b251dc4799eb9f7e89a135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78c4edab87ffb19de40092da12ee750
SHA15eaac38f8f3a059b0665601831153035a5bfc377
SHA256b5cb7ec8d6cb952cdd665a8736012158df8156be2b04a8b7cc3186a0b19015d2
SHA51225d150c9af500ee8ce568f68c193f0eb1a9ff54151b28be252156624ab33ca09ef0961894979f477b1e61396f3cb6d1bbd4a631a7e67e31bf467e5990729d8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d828e5abd3de4c5547b22a1e17c6ca
SHA10fe5a4d14e19ad1d10c36594a49c89c5e53619c5
SHA256ef728318ff29e49e8c4ca601a86536ed047f5c0e60f4bf8ba72edf0a942217ed
SHA51232ec27e874429ce6036d43117e2ea75e67eafd84a8f5cfa086052cbdc26113118cc214f5012cf9f512ff488704df56306159734cbd87dd0a7885d4403db7fc2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f046f1b70faf75c0d2f88cc88d158869
SHA1ef7e02773609ff93c54fa888f5d82c92256a8cb8
SHA256ec29ca36f4d656741ecf2eb28c35a4e642c886856b630823bf9caa66678ceccf
SHA5122e95b3f0f9f4d8caadf215f4ba0362eab28f2c9df2fe9f58a7e57534754ca2c01abe74871566d820246944e7b89a1b335374d9e56a15454243a7a0a389599af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be5152ec25d6ab214ae474ff17246ea
SHA18ea7b3764909fa36216a1800b166263b815f4df4
SHA25629b6481f510e4c2a564c9bc7658acb6dcfcb3f754cfc0aa12f77b34f2d1ac999
SHA512ccd6eec87bee9f858e8b98afd74d930a63d25ab952dce3b3f2d552d867a1816199f31485fe2fc21381d9233d1f2a313cc18ef21ae36b0c412f421e79f88bd4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5101106a78f6f80edb74310381a85c03f
SHA1e04ac6bf36d8d50a535b1ad176987e74a4af9cb7
SHA256be5961e7b3aaf86ee4767f60f109bc5ac6f4e12bec1451719993a2a0ffe1ff9d
SHA5124fb179303880decc6a42d9b038b97ad1c1e591f54125b1b89492d9ec353a4cc0ab5054cd4a52653e78ac12ac90feb5ef56cbfd4aeeda7a99e6356f3eec67464f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597bbbcfcf3f6db1dcb793c1296796a6f
SHA15618a14c865ba4ffe8abfd7b0ddda1071519c11f
SHA2565a4505383579411f80dfa30367131bc1377a98384a49a5a4a1c7603dc7f70a62
SHA5124fa046fd99fa29f6974b2e06313e2de2a22e5b1c2d585a061113a3a0479ebc3d74b1af13834363e4b5b720fe3c721166710627002ad05fdb1f1cf000efdb2ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52530de1566d3f1300bbbe118ced16888
SHA1f31842cda702f8ca47d7751dffb353aba1070e1f
SHA2560121cff5d6ffc86f2bc78def564312c5c9fbacf678a35136329d95a29535ab94
SHA5122b89415bb853b5b5aeeec72e7d416d85a45535d49c1e0c8a8b554f2e556067894d7eaaadf4dc50daf9f880c4d3acf97e4aa7c763574251faa83d73b2decf65e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d839e49e631a0da7bc13378b01762014
SHA1d5c8961a01885bfd9b1e369b8652068a85329e75
SHA2562b28f51966335349ef2fc61b27fe473becd10122a0be84c02004db8319f79513
SHA5123210a483d28071146752199ae9b70aad60c4db9f1f6554fedc898f611ab9cc5a30edf4fd3d315a34f5b7fa2864d15c6cec59f6004e3ff36636f4a439f16417e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fba2a6b55f6d8c8125d964ee3407f5
SHA1db099def2af437ae612a3e49abf87772177b4111
SHA256ab61ae5ef9680e2f6bf23948d19e9c57e2fecf5791709893b29856ebfb6274a5
SHA512749674bd1c0efc4b0fb466a16537fa027cd3de6fb7049103ef200dfdb267e0167a660f8fb36bdb69dff79b20e63392230470c2e15d088d12656c7b00c813532f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec94496170bc3dca9ef642004bf58f3
SHA1461a29635d39a2c5715d65d2af21c654aa68ebcf
SHA2565911ff5ea308ec19ca2705dc17c57fc6c5d9a9d6b9a16286fde3e319d6e7de1e
SHA512edff9e03c4cf2d3bceb34b292b048ffb839b2de881cf76b3dd74db7a5fdb01cf6990757279f277a8e3c3c99c65700172566e34a177e001e3b89a42d8e7f75b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a298941b39e27ac7b2169b643ab935d
SHA19c423e99a0a5220dc726fdb26fd357c4ce69ab47
SHA256667e384f22b8bde4d8102a7c8a3b905081ecb43649d9a3d09cce3a29458e652f
SHA51213188bb4bd105ebacdcbeb71292cd2836ce721b02cad6a783b44ece3446dd091171ebe8bb5f9641bb30275f173b7bb7223f7f70252607ff323c432a6d9e716e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b