Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
3f61d5486ecc15d180b5765683ec5d4a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f61d5486ecc15d180b5765683ec5d4a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f61d5486ecc15d180b5765683ec5d4a_JaffaCakes118.html
-
Size
10KB
-
MD5
3f61d5486ecc15d180b5765683ec5d4a
-
SHA1
0f866df1ce5d5fff9be1dd05158f7f4650e72554
-
SHA256
363117661087f482581b8c64a258f68ec6e190109a4df1b8caf072b81a8527c1
-
SHA512
580194c5197dc7e55ea2f40f2e88577d64c05b9980f4d0b692601446fe9e49afc1b0599ed98352cce61d4a657c8e51f8acbaabfe4319ac2138e4c9e5c507e8db
-
SSDEEP
192:Oxkl0EpZEVg9GtDfB9YXtxIo6qtxIo6EXA7vjMyDAaP0nu5nonM3qTYaoiAURXH9:OxkCEpZug9aDIO4OhKaP0nu5nonM33jk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{972DA761-894F-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000983f795986016d2218e078dcf00dc89b6c20606f1f7a0fda68e336a777e2627c000000000e80000000020000200000001b25fb1e57a74cac66ddbe3f5575d6114aad536509e08b478b40f4ca996fd6362000000080a3bd3f0f86846b11766224b11235d55d9edc2b4c5595504b05ae4ce5d0164e40000000866ea838fa411500e5771b35c56b6518a044ea81df1795d60cdcede169f957594264eb29301cc33ccbdca825c609a8a37b80851a029314e0f1bc82ed97adba68 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20824e6d5c1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434977907" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2300 2464 iexplore.exe 31 PID 2464 wrote to memory of 2300 2464 iexplore.exe 31 PID 2464 wrote to memory of 2300 2464 iexplore.exe 31 PID 2464 wrote to memory of 2300 2464 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f61d5486ecc15d180b5765683ec5d4a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53347c9a067821bcd3a200a291cd62bcb
SHA1c9ac12d071cd65932b75dd3f23de5591c3f117e2
SHA25647731884704cb64ea3d6362faacc8cfd493db25b8417e6457d1e5ed4f9f85afb
SHA512d9022bc815d6d8c49f8dd6b5831fc91cb02e9ebf5441bfe4c389853d0254a1dab9be16b201925a80095e5e9fadfe9869cbdb006fe5efb588b738e9acd915a17f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b5916ae11ed9c5bd146aafdba94e21
SHA1f8387f306bac6e807b5c20b045dee08a6d6b94c4
SHA256ee5b4d22bd1131969c4d7979e1da752ac1006b6ce2b85670ab36264f2a47188f
SHA5124d3e7768b8350ad86ad5fa02338ce7f3bb1326515565b426a0d173f75955bfa947bca78ecc3e374e784c20db00427f77ffda455786423b715c01c3d980e8f3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f0ba8e32e360e7f74d92647e40e485
SHA1faffb6b2989468d294ced647953c1804edf006ba
SHA25678a0013c68149ebfb0fe69d1c7434556da49a4cdcd935ae937ab4bb0b3cde87c
SHA51293859e8ad97d279fc13f411077c395e60134d68968c0448372be5a78cdc666396f796ef44aa93460eb004508b59ffc9ffd7bdfd34836170d8d8f74ef68a7025e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c41bbef7579620f816b93c7fac4ebd1
SHA10ea8b0428fa0d26d7c6ac34255aacb5144332c4c
SHA2566599f93b568d70fb509536bb183465dfe60a871b6fb9383358ef7c22e83219e0
SHA512101d9b46ab0cc6067100b31eb72bf5161f4c0e59bbda7a12d47be9ed8a138dc1e0ca427d852ffdd2b7816ca633cefd0754baef1b722a6dd845cf733a045d9d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65e2478f6a8be977d07de4795e183cd
SHA1a4380e8b5a8d9c031544d90f8e9f4490ece6653a
SHA256c372d5118b70a9fda10486fb387b84ac261e4564dcaeb1b65ff091df87ce77ff
SHA512423c3287019e680c207ef265a8b412e58069f87f5866ad399e28deda23f7598749dc983be4736a74523a548b369fbcb6cad33a36b174522e3cda28a584d46239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbcf3b50cf22bb96bd49af9c64d13806
SHA1d80ec098992dfee35e5a9f51df3919fb6b2036bb
SHA256a922ae1efc2e02947dd0132c63f573e214f7435cea372c6b1c0d329d8175c7e3
SHA512e16d5e303b59d8a78dc78dbcd27d54a06a7ad81846c3f8241f1acec5518f50f284b9a17d95fd06a2d5711aeb74fd8ed857e287227289e00084eb338c0b66ac5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a651151c3c16980b459b5e250dcacfbd
SHA1494c55e860ef4699713cf7e89832893cf003cd31
SHA2560f88cc396aecab2629aa9b922c8fbe39eae727d873eda264c9a58637374234e3
SHA512fcee2c87c62d2e727e74494a6bd2812c1402e5b5897a051cce638be8e54e1a5b68a93ab170d8097a6df8d50310eaab7137b5cb67ec250ee9f63f7ecc8dda9b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450f88885cf85b61195f8b18f975e6c0
SHA1eb5d61c3eabc0884cdcf0638a4806bbd9b8f617f
SHA256dc0191fe8f6700d8a95cdb13edb9fdd586fcc245798422a0e4f2fa597cb0d16f
SHA512372abf090d35b17263da430addf93651a9283bce65da0e170913e409b3b4e6b7f1fc1858ec9f6a2d0e32c4bfcaa58dd6feaca2772e861d5f9ae1b819c119e5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571084bbec0590b4e5343d25eae1a6cf8
SHA1f5afbcd457016b78cd34b41c26b746769164f849
SHA2564fc5a302c0a3710594fd145086305becc65934ff341ff0b507d4c88d74143ce3
SHA512596e742aa82bee0c00f7ecdce653d0dff1b356279f6521dd96fd3a4ed951ce4eb285bd76f4b1447535cf3b1ec2e820a07a1ed84bd64805068892d3dd7800a40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecd573de3855e08f136d53f0dae75b0
SHA1867fe958b45f953f11b7f1a61a4ba455087b48e6
SHA25633b228a2d8956b9dea6290ecf4ab2ce204aaa313dfc39a766b76396ed56e2280
SHA512464bba7494f4204fd100e0d6fdb000ea73e6385c758113843e785d242da4491b00dd05535960fafb55d020462585038c60c26c1f2c7f2c997782d8236a261747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc92ffb4487c80be9a9549f16e6edd6
SHA1ff6b4198f120be59c8fac2d06dfc9a01b3c9d27a
SHA256f1b0a7cacab736c7462a7556400b6cd6d19ddb720ec487c4aec4e32ef99b8468
SHA512f61d51fcc1dd307225c4fe3d333a63ce3115847a52ae920b8c272c054c84de2789d64bee119262138622fb5de58d3df4d42f3cf73b2f3e1a567c45003b317bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880ce3a34c2be8c3f9960a02eb21bd58
SHA1962ddf44458f46542e8199a0c931382286005ab9
SHA25658a10503639d88a7f82d0ca757f3a1e4c1ab67bc41aaae9222b7ad977cf202ec
SHA512073589514a042ca7a2bedfd3546102102fb47f4c737112f1767f1235109dd0b44a0535052e32d88f133e20b38bbfc2facb54fb5dfbae6a710c0a3458329dc5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510083c8c0fb5faf33857df75644f617d
SHA12768ca687c1df7d0de9f6c864a7246697acb41a9
SHA256404f8f1bf4eae4e757d6a73fc46cd6aedb343a3f135bb03c227eba9b6c30af3d
SHA5126f6777fdff4a44b22dac3556b37a3bc0023a73bb649836eb95bc5e01708510611d62db05c64465b165c1b8c9b5b1161395f6dd452cee662bcf6c5a76ec039bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a803dca1c811fe9087a38e6b21161f0
SHA12ddf3d0f998c63c814130bf01caaa87c4c657e57
SHA2560820f5b2f4ae057a7a75306f11c5f903dc77ed27ceaf0a94693e2d5e1265fcab
SHA5121df19ae7514ac778dcce590dd0f69a6312c7d0a8462923f9f8c91c9291d4f86812ff2ac6265a2385db0c167d77b385a4d6139e501692d18dfbacc7aaa7fe6eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ee343ca0b9d0885578e28c6fe83f53
SHA1620b6adf15c76276ddc6affcb611b4fcbe269e02
SHA25638b013c08732e15a18ab6b2b85182e26b46eaae9f4d9c81f4da4654c969a6dae
SHA5127cb48e6a55d9b1d671b3f8f08edc7eb3ac36cd88f636b014fe0c18b586de5b14813a0819120d7bb1c579bae57ec20bdf0972dd97b5bae54337b94662b0336667
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853f81f84178be92fb86bcc24822d15f
SHA11d12d256bb868272439c75dd42f8e235e1a02954
SHA2563f07891fb75d04987a142e239b5914e8ee1949b6e1ee6f6dd677554d58bc9206
SHA512dd11be2fb317469cec86fa224083b99475358074df27736b37fe89f5c8824c4d801709771218e2031e7817ce1458f7ca382a4eec3b62deb9b65c303bff0b0666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cddd76b1f1c51214fcaf989cb3c2d95
SHA1bbc7543deef9d6eb98611a39aeff9b33433a25db
SHA25685ec9b4354d82ed5b89c4b09aef19a700fbea1323f1ebaa21fbe7b2366c19825
SHA5121d76166c0892a5578ec4212b1fde067d52c1928dfa3df1a7ab36fc6fe22a294059a7a9cd66537e984f18bc694255f340a3196c126b4196e311b6951b4a03e244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c68a22495342fa6ceeaf2b625d4bff7
SHA1304f9bef7d8a6abd185415d744cc73260e65629b
SHA256afa8cc719f777ae032f39c076f365f4ee4d59fd565e72b55ffd414a108b8645d
SHA512712c71ee091e4901ea4cbd60c63b166fbd609ae23eab76471d6d6efc7b31b56a260feb5d9d91ec48becc5daf520c3cbae984aad2f185452096af0ac6295023ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b