Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
3fa2a4c8f1c4c4cc3e1617dae4c873e5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fa2a4c8f1c4c4cc3e1617dae4c873e5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fa2a4c8f1c4c4cc3e1617dae4c873e5_JaffaCakes118.html
-
Size
98KB
-
MD5
3fa2a4c8f1c4c4cc3e1617dae4c873e5
-
SHA1
ff0b4737693591c3c401f0ee68630b1f5579a569
-
SHA256
7c1aa3a4e79fda3b424323d272c9a5f3855fa1f86cf9204f820bba6a4caa27ba
-
SHA512
bc67dc9d085d0fe5db2dfe3856916ddc05e4ce67f3c42aacd9bb186ca1e36ce1e9e978994758e0689937867d9854c6ea9dadf11070422658aee279e25c778d10
-
SSDEEP
1536:SmSVYzMvycAvQEmICszZ2wQzRgkFZWJRigGEFhH2csw:SmSRv9DICvTzRrIigGQH2cF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434981463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0b729cd641ddb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE0E8BB1-8957-11EF-8B78-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000065bd1870b283071776dfee3ee9d39d87b438fe86f40b3477874364f4a1d92c44000000000e80000000020000200000002e063bd408e9ab165f3b767d209c811f34e2e63c6992677bfe2db373034d64dd200000007c01d12abd096b6fe781b11a12499ab1cf1a959e6ee5552490dedc259d133d7d40000000247b87e325ca21efe0d413c08088e7cb4233be35cbf2b10312820a061028a4afa8a04604a72b733d8b7bcebbdb8ba1fe921a578bb92235b5e91fc0dfaafab4d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 764 iexplore.exe 764 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 764 wrote to memory of 2500 764 iexplore.exe 31 PID 764 wrote to memory of 2500 764 iexplore.exe 31 PID 764 wrote to memory of 2500 764 iexplore.exe 31 PID 764 wrote to memory of 2500 764 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fa2a4c8f1c4c4cc3e1617dae4c873e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22b8880783317eafc1619aa181185c5
SHA133d522e0c52814785ac560ccf89a5a6bb9e03e50
SHA256720edfac9fd5f0f9575cff7e18197bd2769285f969e1dfcae88d1c16359f3329
SHA5126ce98a5fff5578a6962b8607acf1be92acf8614b419481c63e883aa0f3970767cebb1d9056db2e8fa356f692e7edcffdc3a7ae41a2d9828bccdd861cd6986c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313ee6a17474f2cc6dc65510e923d05f
SHA12eb0de9fea06e0ce9991e7bfa88c2c68ed67042c
SHA256781a09eae3cec4011a39dd35b4849370087e203b505dda81d8acc4f37e261bbf
SHA512f2a0b680ecfffe728dafcecbb56b73a67f4eea1e60ae21efb87f3bb07f40be02ddcdf440326e59a985dcb3a8c4d8972fce4bfb932bbfe60dc0a86cea219d7f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54099455a6dce94c6457f83aedc2c1c83
SHA1967f921f50285b6b2bd404cc57dd62d678c55735
SHA256aa762724036fb16c75bf7c96fd8e823016940869c6e07f5b62e9b2f22b715979
SHA512e110c907c259e31188dfec46ba3889586463c82cbe7a5719364a21bbe38b349cd3558e5b0fd55f09704f26bb800511606fa03d00c8842d3b8bb79c89f8f73e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557c0965e1b4d580f6bb77ad4ad1b7be
SHA1ac53bfb54e67f9a941b12c4bd72f3e482b795fc6
SHA256cf31c53fab7c13c6f9ec400d31180708f3131e993671522279fb450eac079a64
SHA512a40dc6d437352414ba0da213f170df203b236bede773f1d303c8e4817238c88b8ffc0f6d16c62adc19a736b366b1e5f96412845bba4b31f6201e9fc63b29d8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59629cafe5be9d98dd9032e30c0741e80
SHA11bbea4ee79e008e16261447805c9f53e973320c6
SHA256a55244b7490b9b6443720b4fcb168afa4c7ae98a0dd8e730d24d22331a2d3358
SHA5123e84b5888697ff9ee950217eb63547f432872969c51800f3baa02b5c50abfbd0404fab49d85b00fcbc8f1a086d20fd4ae4e56a0836a96f8a1922d9965ea6ccab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ba35003f0eb09e5ffc7d3c41b654bb
SHA151bf8c8aedbbd4dc6193dae6b8a9b1a28c4c2b6f
SHA2567fc5c64cf465720ab10979cde0be94ccfd60637892ca4ea9af57301a652d4805
SHA512d548f9180686a99a16e75246b2d190330b2ab7630f6ce11810b9b1c6f4c4e8f9bff848e429a69ea8a0628d7ef228cc43e99a14a33509b1af7b409943816c8f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcba86a05959d382d6e61751c1e5dff2
SHA1b2be53226373e50cd379a8f1abdd9cf3050dc98d
SHA25620854268fa8c5ef662071942e1a881e2488c824efe0b4b3783e071161bc1206f
SHA512f99ce49eec46d03b27200ce4ed5a082531d662aa26f99592199d190531983671457186b8e8d749df48a102fc760e1d6e369429d5457fcadd17f6ec9af04d9d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc671f553217956c9dc802a49cc27ae9
SHA15b459e9dfd74ee6ea27186a3e9afcdfbb90b54ff
SHA2560680e27bc4d792b9374277ca74426587450167c32bd8b06526f6ad9d1246f1aa
SHA51213065a2c0075187eca18422c6ade0fea9762f29d0a913ff66b6dbe7b44ed682b3c2de78f5b612b50fd6cd58f65bf12681ce53979c56cfe0abd5abc64263b147e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be65c1b6b9260b2951227b05e1af152c
SHA164c11a19c2dc9d408d01d9f34031c9a868fc2024
SHA25615cf9bd28825185fc7b898af4eccd1eee24b878086d21f6522333780008bfca0
SHA51244aad73bd20f575f11c64527a8ef42a930fd790f9dc5a8e550d6b9d8a28aa8af33da5d1ff7a88bf6e1c1ef24df8ea71d1decec81c83b58e89510678f76b827e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7324afadf770d2732a224ae13335ec7
SHA1f7b302d7636ea679a4b09d6a3af7615b5aeefe4c
SHA256687380f95f749e283bfe35980c80643c85a0a0b769501e64e8ae67b9a93415ef
SHA512c763a9d546bac814e5f3f024543e14dcce01bdbda7a90d7beba5212f1ff17cff6ee9d501da5d8a82455b514cb1dd4c69e162cfc5378c09a5617da27144d47b10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbc5c8f4fdc4093a834df70236c6e54
SHA1b492edd829fabaab2bd06030bd51499953bc3284
SHA256a6669f2b74be87b4e203510a730b5af943f2c34053daf24dd2436ee7ae6888af
SHA5129af19286275f1dbe85cbead9b6b02c31852c2d7cfe346afa03dddf228dc727b0251eeaa8cb6a4df4f7bb1fb7dd59779f97215b3bc8e43c922a20fb4cacfccc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bc098b8c730f9812adeffc8025c63e
SHA13c3d9047a64b3230c0d263c16138269b266bc3ec
SHA2568c8ee7bab99582a345029065e8aa2111700eaf5969782b859cafab7995436a82
SHA51267614b05c22a6ff352a4666898e9daf8e8d1797e8460822c9b31ff817638704c7b5c4df34ec664669a11c70eca3d47638ed76c069d6c3c7c0c812902d8212be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580abbadf319189c4cfb8529681e81d1e
SHA1b729aaf5bd88709cae1b26088a37334b05d33271
SHA2569fd55fbe8b64cedbf071e97fc1739d4edfa943be18042d9e1a5fe1b81018c8a4
SHA512e52eead1789acf2cdad31322046e39a3d052c25381c59a48d6fcf4f3703776fa44f8925abd1c799ad5fe4f536c7621daed393da4232c4505457c114b200f86f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88ace8a1403e36103cec5b06dfd0aa3
SHA11d149135056a0b25561cf5d5ac35cf62ec1fc378
SHA25634c23e181e2b56529b735e3622507533fb2f03c9e6bb4907c98a54e9f2572585
SHA512fefc1feca6b2f0bec11f23e695c41f3d901696503b43326c5ab7a9add31711492d0b36b8f8650423762a8f466034ae12ebd7bacdcf8ca736b08bba5ab3f0608e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd28f74b1b08f6140ea22cd45c0f53a
SHA14e379601bc7719c748afc738a5a9119839995ce5
SHA25606d5a85cac8fcd28eee80a764be8e746261b52159f79ec6522e720dc177756cf
SHA512c0e2a6f7012d87c3ac8d61889c66d9818649c165d78a59ef2c7beb5afb50bab3ae3ab7a388392d848067e8ca2e404f5232b97e8a3656e8f417c9221ebf12307b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b0c3564a7bd95afa7cd8b5fa3a2ec5
SHA1b6a510613e0dd93ca676a08b37233d6c186b53d1
SHA2563f84da550a383cc4a5239a3c9af86fa226efd5054eb0edd037397fd406cb58a7
SHA512ab6caaccea0358c3749ef11a407631286692ea6dd4a9db132699d0efd963443e6186d8b7bb420f87e5cdb7b6c62666745d64c62107688d54d9c17dd20f512641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af5f74f10f6150c273fa154a46b7ae9
SHA177cb842056470e7d013c45a7dc9989d96ce42067
SHA2561a194886cba6f6a5cdd237c348cd3edade65fe12ae4fdaba8e619c80df28fd7f
SHA512592b3d56147438ab53c8a18aea8ffafa8ed304f2645de0379ba07ff642876768c0baba71357759e3b8155c0d3928298f6610710bf1392af5d370f98537d78237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57263ef7f536dc4b85b3153d9dd1b99a1
SHA16e808e6ced52435557430cc6d522e9b00b9ec587
SHA256e92626d285a37004f83b240999dd653cb7e62bbe2239d018fe1996d32865e7da
SHA51262eb5d6f7b1ad01c64e36a82e204e25efbfde1c6385d01c450897d0f481b29758d34750c92239d3b582e24cbc30e2db4a5e60c24d00155ac97ff92c065099291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e100adfd602abab78a1b4a5969c5faab
SHA1fb1ac8a1a5b9469145b02164d7c9bf62c2087a8b
SHA256a9bc5572c48e987062dec153d73f4760444eb8f4716ac5bb6535cbfaa667507b
SHA512cd74664b151da67d861eb29ad4f8e505d4ee99ed48b91aeb69d784174fa989273e844201483d1bb47d45beac899c883425bd426029301601bef9d21236eacfeb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b