Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
3f5fe14b9c4c6dba4d0662f3a397b916_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f5fe14b9c4c6dba4d0662f3a397b916_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f5fe14b9c4c6dba4d0662f3a397b916_JaffaCakes118.html
-
Size
1KB
-
MD5
3f5fe14b9c4c6dba4d0662f3a397b916
-
SHA1
de100ad72bbba84b9896af0d4e28fb7e67911a1f
-
SHA256
818e8c1970f46378eee52174181b5ec4e17229976f360a06205af6a9effed971
-
SHA512
91c18fbca36c07136b86569fac242f87bcd3516ca6a0c9dca9b928abb9a04c6739a2905025a5350eb770ec8875bb59635b22f4e05d84b09a631b0ac186d7d9a9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e7a5f2cafa28a34eef6802eeb042f2862ea0cd72de830f98a52ee2e7ac10fce3000000000e800000000200002000000036dd4fa757e7dd9fcab601529a8bd1bf5f841d891d056181730cf6bdf3d6259b2000000021746dca2b434eef922eca5e9f3623dab3c33e9d6a39dd535471924fc189cdff40000000c17cd55048f99acce5ab9f052e40e744126a879a8b774a6accef544d2e00c132399f78266cdda58dc057ab13e2943995c12f85b513d93cb0b4476ffb1782fff5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607873265c1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{503A33A1-894F-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434977789" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2040 2544 iexplore.exe 31 PID 2544 wrote to memory of 2040 2544 iexplore.exe 31 PID 2544 wrote to memory of 2040 2544 iexplore.exe 31 PID 2544 wrote to memory of 2040 2544 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f5fe14b9c4c6dba4d0662f3a397b916_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e01ea400b04b807484cb843d431204c
SHA1982b9676e199dd9272a45c55b6e6a699b0fef6eb
SHA256d02330271e426e5388f530867aa295f515a6d40611e49c7742dfc25fcab2811c
SHA512b3b9ee0dd4dfb3497d88ab4b81dcdb963446f23741ea67509d2b6c0b8ea2e604c7c0063c8929f2e206534f36ab53c7923cfb93d04e1a7e3e69a51d075b83e32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bb3f64a1d8360f73453d9285fac1f3
SHA11e0c2724e7869ebd57f26c4b9f939e4b8a855308
SHA2569dea8346873f3df681f480cf8b2444ceeac8e3dbe623b159015a57ea385b9ea1
SHA512eca48025db66fc284c6caf516826f19357af99fb1a520df8b771f89a7e48fe9525dd75a46fcea914634c0c442dc1f3cad7e8956054c953f907facaff801bf775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d5ff58cf0e998df38ef04ab7162567
SHA1b904ec3a3fc2f6632a17169b3f42ea6437b4453e
SHA25632c6b1411fd8aeb84e65e1f01602a082bc6b19cce16050b07f3476d16d1ac618
SHA512f0b695c5fb912ae98dd19979564b6d88db6e7fe756dfdac9830d7d39dfd530c21587ecf9df18238452a099ce8ce5bb7cce48c63271393290390bcec6d22d0f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db3740b24ff335508bafbe9c03e69fa3
SHA16c95a0bb8423e1cf5df13d4d9fab32288931c768
SHA256eee22848cb021d376902e515d3f2d41415a64e9915fc86430b361e2d0866fbcf
SHA512baddb40e9f7970b77a25b4d3782674328712d42fa3e6ca21985ab87d56361e07151e0f848bed01ce8f9660d38da4999a11a19b474ecd0da7b2a998cd1baf7790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9c1afe1671fcc01ec3fd56a6024d62
SHA1e3efae7a71adb78e7120379dbb989dbfe1b699eb
SHA256789d784201487ac3fafe2e1f6fec9e9c7816589053067570f733afc65c55e1f3
SHA51216351eea023971a32af3a8efe24c10d5e8482a2b2da63cbe2d3f708130239b36000a51fb206fc6ff4a2a01ff422c6260f2f82487057fa6b9bd4542dd8e4b3b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb51c6e56d003c581fec3530ed34edf
SHA15b169b3599b8db3fefceda82dae56ed1f174b5d6
SHA25674d12a540cabfca18168d114e8cef1d61d73949d20f3bc8a9cd8e417c7d2f4ad
SHA512a3ef847b3224e48290e7f3aeb4a04af540f07100070834a23c5060e314ea3cf29eb067ff1b377977b571af7d322adad88ea9b7474e9cf7f568a5fa08a1f1dd07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea2d675e4211dc7735132fd95d8661d
SHA129eb74790b0c92966aa66069c884cc6fed01634f
SHA2565b70ba334bfda236d74c6efecc3c4505ca5a7bb8b4ff2deaeada7b2b0647af06
SHA512c85bf8f8ea65f641640fedfc0bd177fec6e939ff74360768b0e8844cab797af4654715fe2f03ad9638f61b7430f93c9e636adeb447b2baf0472271507fc7fc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696f9d5d766510b61a6bf9605f6e0b64
SHA1be17fe828443f136fe451a3df13a8c6c4843d15e
SHA2568c59ce1a77f4f8fa40c7c4f6aec6522196d31b19d357bf82e3b7dbbe90218abc
SHA51219abe9c5f35acdd4df497062d09726d891ce141b696b8e680c7d99527666726e0fc890086e290230dcab90e7654bde7cb73563346754e9dc66a997e83dacf2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8d95bc2fb6d4501e80a08a7c16646f0
SHA1d43aacbf5e7067b051401d084123b8c593805636
SHA2564e0c83f795c52ef1d51b1e67923a1bd4522431df70b82426a70539d12f473ea6
SHA512645f0425d7126d541b54c0be10e1be9705e256a897080906fe83b4cf413a8c2d5518a3fbcfe1500c1a862c25b29c823eb8eb748d94d4e69a1b85105674690d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a51fe2a3b1f0f7ff65890ad5ead718
SHA17fdde75414e5a844a722a4182c7c04da6bb546d9
SHA256fa2a771af66823969bba50610394a8cab48ffb5650d0ed22a1539102855ae82d
SHA5121fa7de641e1534d3d5a6025a297af5ea964ca7f4c97dffaf7a914831123defc276f7c869534fb3bc4ddb77d784f6f2fc6b539927449edd0ac0cb6211cdbd498c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f456aaf41ce4faf38484f326c1536a5
SHA134e60fc751e06feedf83b0dc8d958f1dffa39cf1
SHA256ee8cbfbeb9c985d5c7727afa2d6461f1a1676a1f2866caab1072eb115534ebff
SHA512df66259bc95805c193235acfd38fb71ccf6737c92460e1e190533ad8c1303751a84e438386e0d73e1320132e4932f63bcdc84a2bcdb9017013ecc4939d19b2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6267bada3469f7b6e3df4c7a3652733
SHA14594b2b11017f11af87abad1e03cb1967f579dc5
SHA2560f82c1824152d8a8c71c2dbb698ec5db812951f076aeda4231816b701e82a445
SHA512db66ad5cfbc145d6cab58e870c473d58158a08dbd4807b707df37c3295c7592a96a59387a7ead1ffc755f1c30c83eece124ce270ef28d2a5ce7fdc98a10b1a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a87e1ac5f70c82bef65ed86980acc8
SHA1ec2da2472e8c4a0b1a740e5d7871ca2371475558
SHA2566c19999b6bbc009dea08160912f1e9651e114cf87d3dfcc41080c961e097daaf
SHA512a8f7a285451e31aca649bcc1978e07de1f1065e30131a679c0aad8e65137a8df084cbfc2c4faefaee6379ba564fd4795c36c187696445f2e9f3c5e396e02e524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54ec800b1760d6b7197a1fc4f1ce036
SHA12b345f1ccff1398e4cb1381f2fccaa141d5b3da2
SHA256e1c3aab5a77093a86b481ab7af53e9c5f077e783864efd6ea0b707cf1255cf5c
SHA512c5ab11b585454b2e211f26c0abdb1eceb5aa58144352886840a827d49352059be52ba4320582bf11e7ab744070554ea329ed729e7ecea68a4e9ac56c235b2f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6685b890e0fd51b3e5cf5ba09321ca2
SHA137c5e1e4c73a1b0f2c6c58d1d6f7d29b1a9fd4da
SHA256441a513caece3958b426affc82c29e0c27cea94d4bf54367d1ad289c85b693d7
SHA512e6f12422abf3cc02423907b8215b755bcc554a490bdca8b1195d082da398c2cc2ace6e6a68378f6839972e46f1eddf7285b6a0fd733aa237affa8bc3e8623af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e43b8864cfa690a4793b5f5f4073f6c
SHA1db1251e15e5ffb8ee20adb42a836ddde05c4b3a2
SHA256d539d000b686081bd5fb1af376b0f12130bfb09479d7bdf0441f19c79f1f43d1
SHA51244e341150af8c18894549c13699eed3f447dce42fb205f7f26fee574a6efd830693671a9e95310deecb3146df44fe295f888d099d68dff3c8660e4f14244df85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c462e6f0ec53f245e622e591687625
SHA1c36fa379762ae1a52a5daedcc353c765a2404309
SHA256aa07edd9b64f3d93c565d4527866caae6a870b458c31a4c6c3e1721223268890
SHA512873b7c530d301adc2edaade2265657332d96b8842c875129c14cc761cc9023f4049268531a9996d87e5ac77f299a51c5ef467c8c7a168c02e7e7a6b5836927e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabb751c1788433c2b008091c4d06ad3
SHA18befe4e6ad1a2e986c05b6efb4e1f671f081d05e
SHA2560c122c601cb19d14eeed9812f12a6e522bf6742163ef59f1f441cf3c79c39814
SHA512bba62994b7125aea3354ba9a8c4b920aa89a0772dd5cd01ef403ea3ba29c282ccacb4d398c50c53a8d7c6a1c7268feb0b3fdd047a3229946dd37e3dda1286043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a92c29a1def828926f3240f03c883de
SHA111b2a4eb0b502c810e70e5fe466154487d270ce6
SHA2561bc45484e88c36ca138d4a54c14149cc23455730a17447b2b5afa08d51d02e72
SHA51209d709ae04efa7a1cd9eb5ed7c07096d3704400819113a9da9557747f1ffe6f13c1c941c15beecb3578e4e857e995671f0b04db6322909779202699e1bfcb41e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b