Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html
-
Size
139KB
-
MD5
3f66a2275bd04f895540d13bb7de21ec
-
SHA1
de2e2e29fb1e54d02f7413f2f7703d51a0d0a826
-
SHA256
e4e3c83efbbc74af928a2cd5a12ee7ee3b144957159239901f81ff54f627a4b3
-
SHA512
92bd71a7f0f38f72fc588654f962ca828585a060db677717003b96a5dd861e28679f9912c2e0f4b74afdbe0f432c478ef648aaae7372329f81e08ab59b6ec60d
-
SSDEEP
1536:SaRpJCoSG0HlhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SaQVGcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23C54AC1-8950-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003983db4b05a0374ca25f61bd5f9ad2540000000002000000000010660000000100002000000004ff6e045f884f485339aa40aea90e8148ff44dee3143e873553775d34763621000000000e800000000200002000000001e625af78e811fbaae573d83434f79b96796b6817bef937aa5490f9e2c24ccf200000004d47b3539af5366619d49a9cf26f06ba0d45e45be3e4c1922945583df0edffbf4000000032eea0147b29fbef2ba6627fb84a294ec94681292a594b946ca6fc5ddf7fb900800393ebc638f010853763337d5ad5196dd4c925d61b107c92908a681788eae7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434978144" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104977375d1ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2752 2480 iexplore.exe 30 PID 2480 wrote to memory of 2752 2480 iexplore.exe 30 PID 2480 wrote to memory of 2752 2480 iexplore.exe 30 PID 2480 wrote to memory of 2752 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92192c76beac2aa9cff666b7619ee6d
SHA1fcda9b8fdaa98a7a238271f3070317b6a833a7a7
SHA256334d9f17eba67377849a6cb214b9f3d84d104b7c4602b95d57b4e3be46a93360
SHA5126c0071ee82c77f08e53560827840a11ac5aee930f106f44d7f412a8fb87482d9b2391b77adc58c203155e97c7b0d3ebadc0e830a8abc6ba804690c6cb23ade49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62c1035ad775aabcdcc13d7e4ecebbf
SHA1fc2907c5dd7ef4620500f983cedf421e9d30625c
SHA256847ce9b0bbb919137aa5c37b2fcbb321097c7bb9ba839e13c2535a3670cd56b4
SHA5124c5d0a1678df573794f97fa83c647bd5d4860f809fc7ce8dfd9c3f941d970a276ef7f6211f3e6b58109b27c5d685b732a86d8936d30c1f05a4541318f7f60c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082a2104db6ce679da2983aa27882f0b
SHA1d3190a3d1b47f153fa67852b9ffb51139cb74d86
SHA256c00d34a28dbc84e9d3b016c776cf04ae7db2450a121a088c21ad3fc96d16af77
SHA51267ee70a2fdb9f8b428535e7f651818f4b97fe10796b379146048f38b858e92848ae28ef316bda6b6be845536ae6bd13682f0e6242b186496424d7cbc4df78d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d42cb90b77cc39ba8fe9c468d91c37ca
SHA123fa9ffad1a6e18babb0cb9f363c762c6143d3c4
SHA2564a24d16cea576f86a798e4d056a42d6d9153d94435e92ac2e05995de72fdc120
SHA51202ca54be86ebb9d287d264e59185d1166621b81a1f7e29d02a1f2f2e292fb23fd722cd6016caff672b5b0e4a0cb182fef0a73b5edb0cd0c488fa0fc614ceb47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50074cd7da21e979ee770670e8ebdf673
SHA13132fcb52088241737088f0e49511487a7a993c0
SHA256d68f0acaa21c847c19e82f4a5c7278f92b6886cd9874daeb4aec9b5853c986e6
SHA51291ab985ce7e4d5a0e77d7d749df808ddb3f2a493bbcf10ecb7b6604a3be0b34d4830ca2128a60f3fe8c775ad1e7a4a060facf754f68b5ce444d2759908a279a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6126ffa0062c21e1e3f2363c4991566
SHA181068af3746f37f852f2650213b2fd31448b5ea2
SHA25643b8d61f4f7286f13ef12dd8da4f98eabaa671bc8b932a35194c021e06f0053f
SHA512956389f29be6f12794d939014f219f9bcd5d2675e3041af2b496e17064d7825511ad64f848dd5c01757259caea304f001a257e6980872d8776ae54d8a614f694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a732e250cc7ef673aadf9d2551ffed2b
SHA109887574fcdbf9012278a58208792071a8ec62ab
SHA256889498866cdb200e8b5903f8e02c5f4ca85e7b9346de480532446686aafcf2c6
SHA512edad3ffd2d38f5d77c23d09ca1d1742d89eea44bac2abc683c4a1b35574866c79837881805b85c46c9718bda5fdac908859d9140e7ba1f603fadcd1eb014ce13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be58f6935a971a7c3cd565329d070227
SHA1f7fdf8f867fd856ad6052880effd4464f59f03d3
SHA256b7394e88dd7e5f57934304925bb7642a3730e84ee31a8e19cfd86330491de8cd
SHA512dc8f7d1957e3f3586318b735a32de35e49e363adc425112c97e8ab75d2efa64d73b5921cb9dd23f4ddda58231a279eed8e8c4420781f2d4e47a3813782ba535c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c00236307e418e79630e1bab458074
SHA1260b2198c98146a81c50b880de2db117b63187a9
SHA256e715b9e72543af43d03253d908977121f8ed736b375f879b5c983c8ced27e961
SHA512497fa2edbfc187a064b593c87bbc67fa31d745edaaf019e1fdd9f71b49862724a3bd25438d3c26f6f807aac7cb52c5d8b38b7f479fe1c1f0179ab004dcab8962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fce0660c048ea675b7a0d11c3742262
SHA1ea61fdeebaa99e51b104f7e4a2aa0b480f7fcf45
SHA2560a6df2b4342de0360e2376a07cc2ceee7c6f9e7a579bb8b5587b0f9dfff5abdf
SHA512ab6092c7d2919e6261d43100a2fd024351cdf8707cc9a00c234471606c12819dfe8cadfd1c38f838801bbdbc78072825b0f5c44a1ee15cb56c4796490bed8fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eaa0e6af59495d866c8163a29cdcf2b
SHA18634fcf4600687e3af71748b2ce0f27d3c764f85
SHA2564b01c4b953063bb713d9e724552dd44e4c4f51948f836e662563fd617b3dc02d
SHA5126018dbec10c31277609c5dde29ad157697a98793e0a50a6a8a0f3308a687b5bd53b454d1d21eeb0791f1c0cc816b92eeb69c0de8924b3aeccb42cebf994494e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf3b49b2a5074a102e317bd70c093bf
SHA113aae65260b774d907f7521b63fc5253a97a5b9d
SHA256cdd2773101337799f168794ae50e541ba7c7db7d77fc06d8bbe769fc6e5cdaaf
SHA512288c2ca46c5b62d4e0d12ed648506ef4120ae79dd7b6df3ee446b5c59478afc28c55932936296334ac491e6f6c3d701352d8bac0acffb4f6a0f537c29228ad6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e40cd3643390ca1a20f45e53ab759f6
SHA1e628cc1010debecd1e7c1180960853a9986c7b8f
SHA256f5e6b7fc1b89dda67bc86965ffd3544c57d0baaf6725cfe0e96d5d8f9b3d851b
SHA512b629dba3e9a10e9b98bc96da78a1b62fc7e8724745673e1234c4efe56935f2332edf19c5ba8795a1605f177bd6219d6da79f79386715817dc4aa3b50424a76fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51880429b8204d4b2260d1d71397a8dd5
SHA19a3f6d20d8cf7d41e89b8a5d74b9af6927349f05
SHA256c793e1579112653383fff7d722457ff8b27f0f54271ea46d08930a55a4258c21
SHA512fa7669f453415f706324f3b94e4ff2836d2b39753db495493c5e64d4ac3d3fc818acb4e5576d19767ae90dac37ca2b697edda26c8146c183513e6839d74bc390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58967a4e83f39d4707020b782a6e315e2
SHA1f466958c991ccb029af92125e57d07e5bd06ca14
SHA25659255387e17d9b7f6a7c6085df8fd156ffb5238a618252487039101238e2adb0
SHA5122a2a421dc84ff38087418ad91c7b5bb6365d159c775b6f105062e44227e246113b9e87fdc9cc453b898892a1ea3f931c547de12ca6abeff327be9b489a1fa506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bcbacebf6029ba6de8d0b9f7dc2c665
SHA19f6931995585e059f1a4ed4725d47a6792e0dc96
SHA25630f50de0c35242a889fdb2965f2077433e1a9f2945cf6f093c4800f4d82640d5
SHA51286419316f7c48030df0a229fb3cbe3befb0bba0f8e8e644e2efa22877d584d1d300cd7492592552032f0262277e28420f718cdb1209189fd3a95b3cb3790fd7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590656ad1ff6666e928ea4d3c80858f2f
SHA118546539e421acdd23427e130e564334691634fa
SHA2560a3afa883c84b1227134eefa10772a7e586ac81dcc6ecf78335f55f5e074cd69
SHA51277aa6211f5dea6a540dd46a3c7ebf93e9fb95372d6495224152220a62d8482361292159b4cd470afc649200de20ec722d13a6418c70b8301a991799799af4ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2d5deb714ebb58e2ea36faeb49de4d
SHA16e80714ac8109f0d7252afe106635fcce80fa1ba
SHA25670ea4eba0ec8b7dc046472781d4710a817880a51b88f896fb6f9b2d16d61d570
SHA51256b12febff9134c2f8fe68cb76f091de20e387f88a6422375946d052a5abecb2ae6cd323b37d0f0c49907b8644da45461fea65b9d7946043a1b9f4edfa2af923
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b