Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
3f8176f8e50c68854343c78328e8254c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f8176f8e50c68854343c78328e8254c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f8176f8e50c68854343c78328e8254c_JaffaCakes118.html
-
Size
11KB
-
MD5
3f8176f8e50c68854343c78328e8254c
-
SHA1
6da2371642610e77a124790fc4d22452c57792fa
-
SHA256
6855c9b0027beb8e28b430db588b8e3f499da61671b0f6928cffb9a41c84523b
-
SHA512
d08560d4a20835173aee61837222295e2e3ac48915d066aad0908f20429f8bfb85ab44fbf3808e5335c321efdd0871358b3fbc55eae2d8b776b91d4cb2f6549c
-
SSDEEP
192:FrPYqc040gM4q7ZWCbJx+WPsf7+0UmUW/LxRcc0WVGe15sTPtYflldYfmdvBYmPW:FrPY3040yq7ZWwJcWPsfK0Umf1RccX45
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000fe59ffa53abc833d2e7013e542893abedf16629c45e0ea3632d3c9068c8245e5000000000e8000000002000020000000a74bfac9ce9bf0e2fe2d0a62037d2f2dfaacb3d4e307148e9583217fe84a89c420000000462b693a244e582782a1f2c79cd07582ea1a11cd4cc46aaa2a03590fcebe700e400000008c4fcb6d948814bf044e205dffbf33c2baa80b833f840d0ba031dee5377b6d2ef181c5aa47f4a247499cb15394386732ebbaad10b4b4060b398892477f43921c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A86F2591-8953-11EF-8287-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434979654" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d1f17c601ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2336 2316 iexplore.exe 31 PID 2316 wrote to memory of 2336 2316 iexplore.exe 31 PID 2316 wrote to memory of 2336 2316 iexplore.exe 31 PID 2316 wrote to memory of 2336 2316 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f8176f8e50c68854343c78328e8254c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c0044d95010496913c74760674557f
SHA10ee0ffb9908ff724bd51f61e2c3234c75d8f3019
SHA25672a182b9b8d1726c9f37a5cc89f9f8003fa72d5d6edb88a04118ebed0f2c2aba
SHA512f3b3f3b024fdbf51e553f915e880a0996d9034387268ea53d3ac12bbd1115c712a5d8b45a7b7a8e8e3bcdcd65b5467ac78b7e2d812a4f4dc5081157aa02ab5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f170b90aac4b02dadab045ef847cb0bc
SHA12108448b34379b72b63b367c02a27080b712c337
SHA2567d880f21f666b3da785c3dcc7e7136a5cf684cf3fffc300515f07aa9a3c58f5b
SHA512b969a60490e463f67b909b43a1fcdb6752a6a65b210481b154aa95e7c0fa4c28b3822710497f3e4bfdf3c01d9d06ee584d582e550c6e218ba0054fbbbdfd65b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5774010f5c52c65ca69558bb0848db
SHA1e3df5c6a75d633ea77d856b00eb0396fbd3941c4
SHA256278aad27e7c53707bd97fe3dea2f86fc93e6a5dab192536754c85b80f8596f96
SHA512c0d659ef1f01e7cab7dfe04ac8eeda487a412fbecc84eb7374690128533e79daf18683b7660d1937e7a167c6be3ca0d278e26e0e0e370e83648d995f52552a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522be7917e3ced773f8d8cf0283cb5d68
SHA178744657bdb945f1b4b8ce17efbf5c0133a664a6
SHA25655f992032fd1fca615b2e280832a3503b70c09c4cff873df7e8085a64f6caf49
SHA51216cc5437f0abb315832ccd549f73dadc951d5781b2e3fafb66421c2de0330fa62e42e066acf59dbf293e018a83f29b39cbd12034577458a0131447d372ba197a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627b1844301b7796aab1585e56e27661
SHA1e3e9250090ea7f50a225f115d3bfafff1e6edc64
SHA2562d34e90f7f659aa9714d400cfa96fdd8bd4c9c4287705f4734d4f30f2ac4c47d
SHA5122a51da63000c1b3482caf393b73f12dca4c7e392863768ba422ac5b46497ec6359508f8d880aaed64aaadcd9f82962fc403628d95b4467653ea8764a08a4def9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe73626cfb9794700517f7aca6ac491
SHA1899cdccf01ed455bab2a243491594e58ef512655
SHA2560f77da7aa67ccf9d43f097aee6d6f611e4bf923b2d80c8ef5db04961bbc07e81
SHA5128a729248cbc3472f95ff4695bae04265f3e19e6a6923323efdc093dbd8ef2095e591e9068feaa0f8547197774df12065bfabfabd5b8c1f728840aa4d72702b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efd5d433e11713720ea830e112b1db6
SHA1aef4d1b84f94166cb001c383e5e856678b49d2aa
SHA256bbee719db0f357493a854643782d6e1cdefe38a09266684f693b13778128e64b
SHA5124dda7338d2adcb235e479946bd956b3e74739cab0ef727035885444463e59e95d06f837b543faf3ec19df160df9927e6808e03fd5291317a1cb25b59defe18f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5145ee45011dd17c59558ff80d8e6d8ef
SHA198fd264c62edcb79c997ce1ad1b6efed18700161
SHA256265d403b9998082c7b26cc7d4c4969d91bbf8cef77f4bda68fa3720bb5f80fd2
SHA512f0ce0e8813b8c6354736a5262c4b5f405b485bbfdb6f326acc2bff0dfac015ba8adcdba6627a00275742fcf9be3768d51ec49c7183590ac343145f57127e8e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655f9351d279b3e493a849ed4d1ec7d9
SHA1767d095f0b1eb3a338b7ad6309f27990b919d734
SHA256fa6d4599c196fe7580fc33c788270197e8c2291b3f4612cb1b18d402449852e9
SHA5123c45b169a1af02d1692755fa62c2080ebde3413bd3f37b78baa94c994afa89d1e7c3f4077cc7cf6c1fdd846777a6feb40bf3b5ff93de27d7a4cba04553d9f1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096aac88d5630272d503c7b6001245ba
SHA1064a77d3a2ca4e68ee862b32a416a52b7d7a5c64
SHA2563e11e95b84e74ae1d8ae98b0f16103e273912d9a336b76a33819b5771b50fdc7
SHA5121b8d0ce2c03414e9559039f809cd39cabc8b3873939bb2bfb7caf119e77240068085076dd9a96b23fa2184d85f89cf2b2a9b67484cf74c6a0a7f58b202102587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969b4f5ce2538355b05789dd2920a1d3
SHA13344f36b6eb3887d480231ca2b0512cb4f999954
SHA256ab5d2a457d6d9408b94dccd1d37b5d3da2c66604bbf3454502071294b87b93ab
SHA512d210c4e1de271914954c4d5db2f5be9ba4b86614c2f63339a2e0fcac8cf5ec696a8d2bccc8ca9b5e4f5ab03165f8fce02a2579c3fc09c5c480916c283185b6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad1068bbe121a84de07e872d3eb7663
SHA131acaaa031a3f55a62087b0540443f5b8ab8aec7
SHA2567db4bc647793978482b1c57f0b307480ca112de682c8916f08fa964799a0d736
SHA512d8d3dc19bd4df7e130bcef32163a9736375595af9bf777f60d4bd3e05f8283cac194a42b921a8ecac9cdb970fbadb75b14df81324784dfb501544dd95b7d78d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57096ee65d1a34723a11b0039bf10567e
SHA1403edff80d7b0ef83f87afaae82933ce6b7d91fe
SHA256123cd392ae65145dc76d781ad02a140257cda5521ba64b9503681e80350d74db
SHA51276d38fc90d845be8459ef86e872a0918250b24d3d308a497af0c9bad84237bb5d202dc3f90478e41bc4987a2b2e70e3367046728a145b512e0aacef41591d650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e819e84d896bc69a9bc2423eefa9eca
SHA1c35194dd409774e856120be247f9b77371601386
SHA2568dd5160f2e4f4bc70efa0eee3385fe6ea4e3332aa9a2cdd57408cf3b8e99eab6
SHA51267baef08a67547cd666211dee5ea07456bd3d3830abe70806ccb2c77ea8102f2a2748ef55ecbd43f5b0e19a35edf4917826ffcefd9e510dd33e126598e910f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594695d1af7d2448c0b234cf88b49f4d3
SHA110a3cb3f9b4a2f8106992d3fd2bb20f68fe599a1
SHA2562efebcf025af137b2634eed8650eae0ccf77f1b916c6a249466f77ad2e7cb8ea
SHA512704d1ebeb42952d49ed2e1e480d97a644d269ed50f93258a97ec8c53d1fdac7f787dabd5868f9bf353458d8394dd70b7a6bb7dcd55eab3753b738de9a2d4a098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943a2e92976ee1b4df7a626151eb05d8
SHA131c3663233fb6268538571bd446a33fa24047121
SHA256bf5e17c94fa6d75e6a55820c3e5990932d0e97718aa620ba83acdc673ec75be0
SHA5121e2474879a2f9b0e6b89d8c18295b6c8651b3698d31d4667196062fd90408c67097a4a6a52eba5a41b274f7ddaa4f7d32bb3094d651863a0fdbed196ed97d3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b0aa61c1d9b3f2fe131b9348103960
SHA1914a19bf1554ab7814501f7d9cc7d065f26998e6
SHA2561ece69cfc823dd405cade75ed496420a58fbbc9ae0e510110a5adacc5c19a65b
SHA5127cb4e842b1b7303b2f99b571fb3eb1c4be4869c1a7f95a618ab162cb7f7aab77dd66c260fe3f4799f09881499c8fdf0f32b1c1d01855e2edd28caaa74e7ce1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd700c85b7c4d324f9acc674c05efb7
SHA17ad558342df014295134424be532ff3555675a9b
SHA2566422476d1b93de99bbc2cc1b5ea070fb16f40a2d3dcbd5f7618c0f0f748251c0
SHA512177c65f3dac897c87c5404535798a862df0f1ebc61579a91bde6c83426499544909d60cdc0fac5cf820f8c4fa88a3266c2b8f36147d2bad9ffc6050c5c0a626a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7195493f737830f0c6c670131f329d
SHA19fe9d549788d412f8dec1477a51881dc97a5351f
SHA2562df25c35f0957000bd8d1e39f9b41905b2ca1490776c982959d5e8262847d5b8
SHA512cea7a20949b3685ab71af3c807ec85cbc40344569a32fdef24823ce356d9f62c3edac840d7a1f327407d5c04d1148a61bfd8bda4e974887d8789d00464bc7322
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b