Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
3f963470fa87c644271d8b852546318d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f963470fa87c644271d8b852546318d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f963470fa87c644271d8b852546318d_JaffaCakes118.html
-
Size
6KB
-
MD5
3f963470fa87c644271d8b852546318d
-
SHA1
42da7fb9904b709c9c06d74a15fc15621285bba1
-
SHA256
ab164ccb6646502d77f27caaf26bb8cb9ade6f78391752d17363814b0363bb64
-
SHA512
7ce4e53600e828ffb76461f07065888ae28aa504d938ddd37696df5e9e55b9ea98135d912e9217d43dd99e93f3cd2ed0b7f26732feed4ca69e81c37cbfa269bd
-
SSDEEP
96:uzVs+ux7OtLLY1k9o84d12ef7CSTU9V/6/NcEZ7ru7f:csz7OtAYS/M4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434980802" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cd4e42631ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{541619B1-8956-11EF-A5CD-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d824c1ffb554c371ad88559d3c283be359059a63fa259bc4fecfb69a75f69988000000000e8000000002000020000000a0d2a4ba08e11a979baf07e5c0b05036abb800fdf60eecd904e10a7a3bb8db23200000001c03bbb7607dbf49bc8ba54c7dd6be9b137d7138941e1671b0565a7917a8a6b1400000000c9b42a7abdb15f965eefd6a264e1264b0b6ef583b470aefae993aaa357f8890a2625e63ec89ae526fcd08ad5a9ad47c179190b55c8dfe4c63fa5a9a6fc0b425 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2604 2316 iexplore.exe 28 PID 2316 wrote to memory of 2604 2316 iexplore.exe 28 PID 2316 wrote to memory of 2604 2316 iexplore.exe 28 PID 2316 wrote to memory of 2604 2316 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f963470fa87c644271d8b852546318d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a67b3ddebb1541159cd044229ea49e3
SHA1d7125ecb4b8f74ad170ffa1881f088c437caba8a
SHA2563813256d4d99854bca5821dcacb80f78210b15b0f5f805a83593a640c013ada0
SHA512ad971938f5cb525d16549ecbce66c6ed8ab745aed3245a101ce5c6494eca1c904066b3355f641c5d59963b586c617f272626e4159598bf15080bedc20a96ec41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57727b38ec2b5b1010b43ff2c207a1ac1
SHA19b5a736b76894d74bca45da90c31fab4ba5a7c7d
SHA25623a1ee99662712ae1e42399d4e8e5f1976472a88c8d913317854d3172bfcca4b
SHA5122ea3313815e6d479b4b5f64526751cba03f3c5a8c9f464d9b83b7fd27eb343358d34cd7dbd7d86f44d62c8ae5fabc0a1d5919733dfe493f859aa24d58c15b7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02ab9057713a8be50a253823e4019a0
SHA1eb82be491311811fa1307550f984e9ae8049c17b
SHA2563bf9b80f7017d066b2ac10d516e64721e1d53b19cf95d5629e73a80078d0e3c8
SHA5120cc36ed1239ea14e8364cc556a45b0d03c67b449499f6326f43544d77f80f60ad6888e8a6836774ebca87f762c8aabe4f8d91f5255636bf13419af32d6bbcc7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9aa43a05f0743c60fe6deaab9ac320
SHA1f9dfb1e0a26f63f3e6521d9dfc7e1077a45b3280
SHA25671be256ce8513a5a801b6f18eb498355555822f029de684ee929a86b02e85757
SHA512a004c559511601577cf6e54ba117350badbb9bc3a80582f80ac243520634802be912c0bb77e1ef6641ed24a1732e84f419b10e392d855ed912be4d0039eced7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574feadc9e9a68788210a8c6cb6fb87b1
SHA1a39b5a1282ce4d7729e39e46a2f21a1d56e9960b
SHA256ad126572d87d23bb4e8ece2d35b2f9c2ca82011fd569bfa3311e7f10281f081a
SHA51273ba8cf9760a52a6d412c7cf0237653d5c193f43dfac7265035a3376d6d6166d02689fa8eb77fcaf6d9a22ba15584a5de52c750118517c7e31f18026e974be7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae880033a13ea152ec90549305bc6398
SHA116cf9be4e861c4e2cfe0b1dc986c6995cc2e2d34
SHA25684b1cad5c0c107e92bd67369f32693feaa295646dbcb5022751049fe20bb1ad7
SHA512bf3112a57fe5ec34c7135658538030e0ef63e9620c7dc24de2673264287bd527e4a1ca81213a6b2ccc27acb98740935c18073738b7ab67664ee3d820e9b62227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75af64342f5860d82bb4bf60d58cd26
SHA1aed2000b58b5961628c4a2ca645ba42c27d93171
SHA25688c3b98d58c3dd3e3b43b7f90cc82af2cae4048fa9fc90bfd1cf6c333a15d02b
SHA51201644c231c821a7d9a101d455ab65e970ebc559faaa22018fc60db5d1a4b2687fbbd645e19100cde25d79a12f40d55c7a5f6021894cab52e36b55bb4f0f909d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554ef61b38cb19655591915bb4517446
SHA118436e04044e187709cc7493a1d30cc374b17c17
SHA25692b9d1a2f99261096189bfde11c3472920f3d5927de3300327d18ce7ae205102
SHA512b11245d0a61f8851a2eebaa2d932e742ed4ccf0794c10b39dfde7e2fdec4d105b14f35ac5b5af52508abdd32c2b8094f04194dc96e22cc8f31fcd3871cbd90f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5000c5eb64de463ea407e809d60e1888d
SHA1aef62a685de061b9ae979aa1dd28b17b74bcdc54
SHA256f2f597b904c99a3ec30ff2bd7e3f94c2c6cf6ce968b90c1b3d1bfe98db0b9364
SHA512d8ea9b31809ad7cef1075792ae9f2fcbb06b144ab33512bea9cbf96f7a2bfab0673e3aa2b09ea1a22fe446ffe1062622b78d05bdc19763b16b9c0ad7d9a717c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f6c6b41cfb41a48e5df70c0b69ee37
SHA19cae7313c7c7b4eb227257118190a574bcfe2089
SHA256d9c6972748d04614ed4df6aae3aa5d05330ca7cce4c47442b3ac4bce3d03823e
SHA5124a47e725ca44496b839a2195775af7aea245a5c056858d8d75e66662840cfc63c317e9dd3790e464a9cabb4282c0209a82fe9d8146d93b42ebfa9ccd478575bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5f970004a67b827a4114ffe68fb73a
SHA1296b5f587b0898170bb02ca9bd1cf8515121d0bd
SHA256fe30e9b9f22961533cc08bb1db5bdbaa68cacd6dff4c45d9276254aead1b8b41
SHA51227be5fc90220ed7e4fe06ec1e352c6c66de7855d3adebcb267316ed76fe6d54fa8c8deb3fe0a70218c5bca071c3430a727db0485999c29e81d15fd38a1145440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bfe4e4ef50648a33679e32058a8684
SHA1c86c0b06af801f627e2cab6928ad2a84c75b6ac3
SHA256a27e1ee454d0f7954cc9ef14924c886f228bd83f49dd4de2ac1463ba6c7d06ce
SHA512fc3131ff35421d55406b1bbfd10a94a9b927353e1301d4ed8a7b8ccf660d9dd1fac7b2af9e233d6707300308a204c0e9866aef034df905ac5e051637b2ae2ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7804c3761d45815983dd8cef3f17a59
SHA18ddb9fc372729816d5cf269bb9a6b93783460b38
SHA256f8aefd7d30f213277859e0e5d02f5b49c03eeddb9150ec2ee4965476b2a6288c
SHA512d3d1f2788448b514428d8e69208ea5e3e4ad97b7b197eceee6432be99ab8bfc506792b2668c43848930bb2b953da203e9ee126a540da3b0d3a8222f51df1b35c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df9d8d78acd40d1e19661c375ec6b8c
SHA1f0eeac203a21edc290a8ce5e318dfea68b1e7373
SHA2568446fa299632945e68695419546fb01687f2b6c1f04eb31a7f4aff8f294891b4
SHA5126744575bb2c2306dfd9483c44ff010563770d3bad2424d5069eb229396eaf9cf0a65dacbc455ca2ac2d17bcd2d2e99b9a08a3218e227ef92f40f473acd48e192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a91545fedc5bd25c92991df315f6327
SHA17af08063d0e51f4181fca3dae3e7d4e123424abe
SHA256614fbe5e45a93bc73a86743050383dbff9ca368938f43235e4ae65c9080871ad
SHA5126b5d366019779b502bd1a1bc934e36a34a6da5245f127577e016bf9424a65f2608b92837b11e5fbb8360d99c1609a8de44d6306ab475368249d6a6525dbaee1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653b10c11028963adc96e0c0e263c1cf
SHA1ae4ff67ff1905deccf0c3a9db3cccf3cf2f02d8c
SHA25677e97651913e29a9b819785cb7882ec0d2a054b3ec26abc7cf1cec20807190d0
SHA512d100cd571a5326cde179998267b29afd10aafbb7d866ac4a0c7b71dbc3587626c87aef7fad891c1784bd56aa700cf4cb4d86fd4dd12ae7e38414cdfe7410fd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580422b2db023e37e1e89fac06402308a
SHA161adb6af66538a0bc258f5fc72050a3f9d487863
SHA25634be08113ace0fbbac0dfdf2494486cb5481b41e7aff6a97340e851dccf05b3e
SHA512458e8f63d16798efd1edc3f25a8d5a1471c86561fe27135c4ffb512fd0b47059e469bb7d14818a613b3b54b78653c5c6393dd631ca610b58fd61e45f256900a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519bc009217368d6a534c63ef18ee5936
SHA1c773701a1f8b50b5d87b3362efb8effc04f88015
SHA2562fcb148c189054628918bba3557f0458b8e8fe20ffbdfc15b6b8ad94cb821a15
SHA512149f524e30f27c1891c5e398929593a0cd08c3aba0fb1afa59413cf19c0197b5d84f05f3943ad9eb576969a3ec8bca6275317ddac36ecd830862da6059cf4ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59407309e347100ba4df8fe122eeb66ec
SHA1b8b0683d2939f9f84227692f6f60a26746a6cf6c
SHA2569850148a75dd8aa31b7febf8f00c7d43b8fb91924beae2fc73a2e2eb55f437ea
SHA512245e713f663097a501c41d97b0ced27468e15c666ffd753284e84eb6bf128f1f7441e4f36bd2efbcd24f851b2e464d61cc7f6258f7f5e3afe4fa337cb090c931
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b