Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
3fc1aefe8a4986a23c30148f740b955b_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3fc1aefe8a4986a23c30148f740b955b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fc1aefe8a4986a23c30148f740b955b_JaffaCakes118.html
-
Size
91KB
-
MD5
3fc1aefe8a4986a23c30148f740b955b
-
SHA1
088ab2327fc81f58f88185c6119c3135b19c0f8a
-
SHA256
77a4ea185718dfc03870f111975530f62ead1cf23262efa460c6b5d48a8f9d29
-
SHA512
0dd53fb8ad1c9112e559fed9261abfcc160db892886375624e57e56b3437048c196e5b7c22fcfd5f6c428cf5403f2f2b8eb3ce7fd67550d201882f22938e0edf
-
SSDEEP
1536:gQZBCCOdy0IxCVD8kJoK02vWMU+GOCWppRj8QXT4gt7tJ2mj0wo6AhgBF2Tc5tEY:gk2c0Ix8Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9139B451-895B-11EF-95B1-7E31667997D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000003ed9d99f8388e31ff48a575d4fee3001bfe57af13f4b71a56d2d44928f0852a4000000000e8000000002000020000000c2a38940425908b0b66018217747705d6cabc45cd219f7804e812484336171b1200000000dc0ca7371de64f0ae39f60ecd01c4ef824448cbaaaeb7ad9fd94e1f29640d874000000087643a7f68b446e18737566b7579943f02644895218a0925863cdca6651e4aa52de5f891f614aadd84b724c545fb1a4dd6e641339a495e38c3c8148ffad56504 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 703fbe66681ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434983051" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2820 2224 iexplore.exe 31 PID 2224 wrote to memory of 2820 2224 iexplore.exe 31 PID 2224 wrote to memory of 2820 2224 iexplore.exe 31 PID 2224 wrote to memory of 2820 2224 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fc1aefe8a4986a23c30148f740b955b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb81c24b7f83eca12e409d1200090bf
SHA161f489f1808f4ed00d971acc1b67850b635d4c9b
SHA2566a54ab173589458c17627ce1ee41a7242d12f1e7f2d923c195bf9d8ac3c69f09
SHA512358129bd7ef7756082feeeca921f56e3db18c954336dd5f9da1538c4335b9d3c58729c12a7e996cc1df4f854ffe15b1fa7e0d5a80b57caaadc6bdef7488a3a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bb8d9f21a31ebadefb73a11333d555
SHA1bbf8dfc40d219061d0ad4c18100412a9c211fe49
SHA256d95fa1465bca296274db4b1dff307d15494477c3c622a7a9ae08f5027f724131
SHA5127d568f93dd7f54ffdbcc502383b2ca93d16f79264e6008a638af77c39f528ed2e8602b105188daa69d4e44c727ee7f6238753b8b46492824d2aaf970ac9bfe00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0b4ad0f853c564a8297e27b160ad324
SHA1399227d29a8bdba07f9c211e8df32b8382679eae
SHA256f4bc94ae373dd6b8d9f6499369f5135827809312bf9c3ef75053fb9692fa99c2
SHA512778c49dfbf75dca6588b4ced300239f294e44b61a175f3fe206c3f62429a758c26b5aba887e0e9c1ef1c6f3bc4ee798d90b20841825281ef50c0bba77ce67bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569480678d3f70d41a19265338eca98cb
SHA1ae35b938e4587721665baa3b0b692addcd55dba5
SHA256eda0cf067fe8a2bd592b98ff822ffd7b4b78e5c7674565f05f5397d182ea2242
SHA51293697a5d95749f058fba359bb49d19a0c4bbfdb5458843baefe7d7b312434d5c647523cee7f1fe983b0257d50e1620e578494f588c4f438c347d34ba50e1f75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb13904bf036fd20c7b19dc203e1b49
SHA1b0960606c666846071e2e140bd3d5c1b7df4ad6b
SHA256b3ae0deccd4732b46a6d34183935c8debe1b406518af130c1d5c3182b70e0ce1
SHA512f8ea57fa29a9cf7355e27d0a884e7e744e1df6b8bc75de169c84a88c8cd9d5ed9d252c3d55a6102fda224b086a51f8e030a43be89e3243ad5003f1e4b3059d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b143d010dbdda2b2725932a90b70d35a
SHA15e42f84f5a58e4b55f1fd0d08d197991f61adf05
SHA256243e7cdb39aac06adbb5a73e4401cbc1b001f0f7b5028515736b1bcd22d87740
SHA512c370fa184e58a2c266ccfc41fbee7be836011509d19aaf90a7997db5aee3515206bb25c168a81a60fe5ca9f5587bbe98c863ddc86aaf7888e7a666ebebf9e887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3cb20e6d4023c5fe97726cfe87a27a
SHA1833fc069eb3cf15587e12626fc0f8aff50fdb7ee
SHA256c9ef642d5ea63b8e6233bd3e6f25d2c383aa3d86e7b650c2ea28b3e26f095e2e
SHA5121b32b00163c899ffe532ba2f37f14845d361b4a7183ad30efd73f1207b05b024380a24462a1effb76c2aea1b5bb2ddecb7d5a5aad8c02726aeb296fb7bc18f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578936a5b865d0db7f9cf3badf73e3a78
SHA1ed8d0b48c618e64ea3146e3d177bf25407da937c
SHA256b2bd67a081bae60c8c038f9e810b51d750953aeffa7e03198939bda7a78eb7ec
SHA512d1c4f467f9ad0525ce6cbe7e26ae7fc56121959b4311c5aa797715d6c3bb9bc4c465ed3cea59ddcf06e74b3bbfcb023ce1786174f4bc3475b97bdda9d9d46beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20a9b737cd77cd81adf86e1a360102e
SHA17f7eb89a9e125232991fa9511e96edbf99a940b8
SHA2563ccc6e38d373557c5e983aeb6f728a5d38e02d3c67b05cdcf137207b747a4b5d
SHA512fc541605e3c597e89044c57bfb3d7a90293658667c05e3ac36e157d515eb6df6201a9e13bf09710fc8fb382d7de97aa0c2dc4d1030c63028ef4397b52d6776a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b6673fe9315ef0d30fd9100173c9d4
SHA1990d9a466dc223e161c121c3a539a76601ba9001
SHA256d58aa7769cde7b77f2ebe50e993d9c888328b625618df373181e7b10bc122f31
SHA512f2e4d2155e15d4402a2dc67f26c77621c02b1cb818f7fbd01f202b8e71cad15f8b73168c1892a0d6ac51ef52bd09196f3f74a2a3f29a5da43e9589dd7e8244cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef77d7a1b5c8cfb557aee924d45f5300
SHA1a3c156af00003feb5ca554982372351cec11355e
SHA2567d8d29b91757a8df9a6d165d5466b28e6bf9b99e789ddac9e48d434bbb871752
SHA5129e72fa13567780afb51d0411a2d85a5b5d3997dbfec05d05f0905c17e790aa875859bb4502442f83967560bcf016dc7fa8b333f19ae5aa2a3dcd79741dc0f545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecf8c4cb8769720782b01215dced27b
SHA19344aa459ebb1feebf1d25d37ec61f2507320029
SHA256e1b5e165e268a86fa9d2e9596cf5705855bd4f0060836ffc322020073ee3e82d
SHA512a6495828e62d44865df4d5b1968ea7c85ce80fc627cf0e063f25258fe5f76b485e521a1e1d5e4e59fec1e052c01a71a9ec8a90f92b120810786b637b042962a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5988ff0f56b14addcbc9d5bca578742e2
SHA10aff4f61e0c69d5f7454a6db2870acdf3ff2c9c1
SHA25630453fb3b225aa2002de2148a8feba6b75b3a82bb887d60d315d41e5e4202806
SHA5123c3cc703cdb576737cdce28db81524b0abf631bbd59f6f0ccef3e488dd11e3e7f9e0e9dbc17f7c82aa6f26a75d2a9c5af4c557044716a90506e13802eaf42dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f847dab4ff3eaf6d5ab17347318baf
SHA1491ea63b033e81e8cc15458945923f9f556a0b8f
SHA256d0a7e85db7d8f2452d81e015a8214d66845b5a9b64281cc8ddceb4a5a5494eab
SHA512a25a11d5c7a57d3a23be9643a00f23dfb8a37a749be10cfe5fa70d738b66de1b79288faf735e6f2b594fea725adebb90a2acbce3ca1596b97daec52184e6d799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ab00f1327e9ed36b37eb0de2c4398e
SHA142bb5eb0c8ce04ae3b48d090a50d09c988845a6d
SHA25643099841eb2bf02e4c1c5aee4ee29882ae8ae6db9534792b93afa0d7c7944181
SHA5128ffb8380c8f272d97b25a5a636069c4bca7986db42d5ec1e97f354de373bfd1ea979524cb9eece1744070949ea4e07f0e5e35aba250a9243d88dfd849be843cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650070574b4915dd2e61bea932511e55
SHA1ea8c15070d62a0f04b6bf097c0cbb936840c8326
SHA2566785e6514c8447ac16af14ffaa478be9c3fb770b13259abae0766deeb9a8856a
SHA5128ba738c5a68b1745718dba1598a00a3feeb2933629935b7d3582b9e9340de1d2eba699cd7b02c6a9d35869e9c73e49e30d83bb1047e723f987542372407cf3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aff2d61943a81ddd9baa9c4285ca0fa
SHA1bf1a9fc7377a958508018f9071f0de4de38cceef
SHA256aa6fc834092ba4ae990db62fcc84d01fde419bc28bf6fdb0077c2d9691954c2e
SHA512180818e48388bb46b58d706c25dd8b0fca2321812d4cea72feb77e65bd4e8c743f94eb3eea5e3226c33d1b92f3b2ffa18c018e54ce09c9d52f71fef5be916f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57487a0555b22c7cfcadfc1136e8cf288
SHA1d8e5621e32feae9cd536dff4b6efa4a070d41a22
SHA25654cd06b934b0e90376ef1aa2d8ce3ce7dd4485577d6e631407de973eb3e5b86a
SHA512168e63f15f33cfa094c4c50ca6759ae7fa288694f70f8a94dc3398be449d5d2bc1f55453b34a42ab4551f5a771c1755e80c452074606e48ae643cc5fc4474aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575cdb6f7872c85e78a31e6268ed2cf3a
SHA122148280b83f1c0015562758d88573f16bb5f90c
SHA256a261491cf19000ed3fd3e5df73a40f22108f3446958ce702d96bc43f97d8da6d
SHA5129b5c6a1b5ba440089b8bea1a78c9b34dc4af017c272f8330d8e3ada0e39034b1fca04ba5c33062416763e031a07adc6c87679698f5db1fa657877086c819f2be
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b