Analysis
-
max time kernel
120s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
3fcbf6ea100f9d622978ba6a5925e33b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fcbf6ea100f9d622978ba6a5925e33b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fcbf6ea100f9d622978ba6a5925e33b_JaffaCakes118.html
-
Size
58KB
-
MD5
3fcbf6ea100f9d622978ba6a5925e33b
-
SHA1
94bb677c48ad6d85dfbc14efc88b965b94bbf46a
-
SHA256
d7d61bd57511baeae36f69aec71020d617cce55e14b6ddac255bd066199ab47d
-
SHA512
4a4f7b26c3cae35ebe4f8890e481045a43df19b92281ecc64ef9f0b1fba7fbf6288412ad37eea47bf5f4756f40ad063061ad9a266790eb6958bf3f456301ade8
-
SSDEEP
768:wLtpHvvCIooBVa7svSF5yuzcy/c28oqS/x0FfnPP6:wTHv7o+VaLF5yuzZhx0FXP6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201a1e99691ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD0D03B1-895C-11EF-A0C3-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e1aa02861ecb5d9edb94d1d60a4949245135d80c3ccc0b59955163052af85da1000000000e800000000200002000000059e90a88f0ea9d68877bbf5da39ee84d3c038e2b40abd734488136078c448c5d200000008b1e2bee20a712ac14826d77f46b812a2ccbd07825a6784aceb83eb5cae4bc00400000002fa04adb57004058793a559045b994cda1809b01dc55a4779ba12a0553a75dc655076dcd74f8c34ccdf6a7b0d87101b0d1cb05258988ae8b77fc89728f242fa9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434983559" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 2056 328 iexplore.exe 30 PID 328 wrote to memory of 2056 328 iexplore.exe 30 PID 328 wrote to memory of 2056 328 iexplore.exe 30 PID 328 wrote to memory of 2056 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fcbf6ea100f9d622978ba6a5925e33b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_5FE95D49B80FAF65EB065E4DD6522D71
Filesize471B
MD5def0b99b392cbf309a48954ed6f765b6
SHA1938a9f8e97c364d857b2c0eaf6ccc23a6e6e2b78
SHA2563a6ad1489f6c472d5970e40c2fcbc51f269f14c4ba50960ad2a9fa996897b82e
SHA5122d2447366e503703f87743aa31e6f7041b2ecfe6e55eed1ad9ff2ad538f63b6a6052a4c3b6af7cf86f9a5e7e9c2099711792cda78b97bfc5ee95c12e04a3b405
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54e92e5ce538587d2935e5613f228765b
SHA11d60cce7121558385e43a1af26cbe0085a76693c
SHA256d3570b042d314923fbb6807badbeebd0ee0a7d6a4a12706102b7c74288990c90
SHA5124995db47fd5d0666225c1f0aa3cc9694964c62c5a787a74802b0fd3b221ae72747986dcb8e23665a91f4d16712b9c191ef489637c9dbaff4a20b0b7a148cb2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_5FE95D49B80FAF65EB065E4DD6522D71
Filesize406B
MD57bf8febff7e457e0a5c25cdc255e86a4
SHA1999275626c4ecb59425dfe663377da244e502ca9
SHA256b7f00f2d8a2703bcf15f47c203b9b10d60f1296633cc4bcbc31e7e308a522106
SHA5126066982cb3f2464e8a95635bc162a8a8ebee57504285a97b79e7a91ee632869014bcc6870c18272f964d8c0e10df51e8ac196992e69355a8236aed7f7ae1e973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf335c2ee47afb3b293fc4831247fac
SHA1768e0800fc3d6c74d9cf94c7be7d2fa7ac5254fd
SHA2569e553d8371bed7079ae1a317333caf595fc647e29ae8f00a4be98b2db5867bda
SHA512014981d2bd08fa28e9689481890c39df4aeeff70fdaa18f432667c33938b32eb153b27d62b2d452e35beb06b7ecfb257513b2b453b91a656a78128c3ae7cf6ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508252a113765429ca98867ce022af90
SHA121acaf12d04877ae41b83241259501f49f73e650
SHA256ee2579b500f5fb57e003cbb988c882efc2cd5157ab8c07cef8d1bbe897065ee9
SHA512ad569a73ea3fcaa17ac9732a583dc53d682ee92ce54e3eeda18ecfa98dc355150eeabbfa00c91f59ee43679f0ce145efe5a943a76b52bc6de1f9d6fcd4df7b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8bf768bf5d1100fff0be176dcb0ef5
SHA1188659a2ea0b6a1dd06337a3321f49f9a2373fe4
SHA2569d4753f7b8006ed8a1b61f333e7b12749e734644cd65357fb6d8494f508d9a33
SHA5123487a618eaacd6b6e75be5d979197be48fdd78199a08cc8e57ba4b05724e98903604082db2c862b6ffdb340503f3251bdc16857841a65f1bbca86101d3e4d1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1094f09821356b580ffe1d8f55c55a1
SHA1fe957e81706f9b9c30e48ee9ec09944d74cfc6c6
SHA256a94f5457d8026967ac50b4511d50bd33601d36e2cba3cc4cb28fbe6e4749d58d
SHA512484c287124c9b921ef473f47d2530eacfa4f99a92500366bc41d3a061f173d8873dcf8e546933510871a353f11d80b65f203225532496305dc58030f2d3cfa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50057c9fa943fd4a164ad5eb170b7f5
SHA1725c4d1128c73f4dad15ced71316093b2572f418
SHA256a839adfc5a8fe8957b059130bcced66072e4ee6a8d827cfbe0c758071a78e2a4
SHA5126ff3938d4f8c65b69e63ec6f03c38326916c3ae3e195f85f2a0f27648c5bc8a38c626040525cafef5719632066142cd79f32c9c3ea18472d68e7ae290b74f13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfe13f417eb12942711a7dfc64e1894
SHA1ec3d070319c97fb6a9abae0b2c7e9e8bd9dbde6a
SHA25618bb9b80fcadaf3292c4de53a63679d61333f5e9ebf1c56083c49bc25e9167eb
SHA512981d2f0c24395f696b33e5d84eee16e736017fff1adc9834f8db44165c78959577be7ba9892e41b3cb6b8aab7964229ba774a45122a87d680077967ea352c2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc6d5453b081b0184e91621a4068096
SHA190ab051457b4422ced798d789b7833de209a509f
SHA25632544b5fd5feffe80172638fc79746b4f0a07887b99a9b45348a82214c7e0c41
SHA512a6a90e5140425223e59b9c160248acfb2bc8cdcfb61a4cecb8c017b0020fdc2ae72556d4839b5e7ec350ae02577d30f1092e10bbffe91bb27a6724fb0bdd9f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8d03bb48e57b810a0a9d2dcedec492
SHA1f943cad5eefdc454896977637d351242bfdb0bff
SHA25607288e771fecac3b224661213d7b04315d6a9fc2ae3853e49e949105d16e1687
SHA5129fb84a62bc8853e1e52d518ccfe3557be92da7967579db319912180ebd1fdd3d8be2160e6ac7eb49a4b9132f0d60dc1b843ff3e29ee0590d4c785115a4b365ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cfe66998b066829de9ad89fb1d8032
SHA1d1cbda68dbefdf0a8883c2acfa6474e86de71364
SHA256d89c082edfc975171d410dbb3d6a9db0e1132a4f8f356046602da965935274e6
SHA512ef36327f9adcbd91129bc54a8d150d66ec93dc8e5cc61d0649a5a592cd9fea570f1ba2cd5ea6898fd2c3592aad5b68959fec50d2b6982ff5479b5a0037422332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c744a3dc9faab592b3140c9ed7572155
SHA18e438876ea1098de3d160ffd2b93c32137aae51a
SHA256cdabbec46a3ec6992be41fa0c1566ca06032680100c8959f27c29d1a06b0d71b
SHA512defb0aa445f97e7f80b47b5e80f1bfdee5cc8b7e6f11e8d1a4f27e9cbeedf26ee10d9337691d58cc3ce8f12be197b4b1503c7f9f600bf61c7ad005a30a9667b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f6d30ac5a0e56e4103fb0ff5ae3fcc
SHA138e2ae828607dd340c0e2728af6d6110e8d57d5c
SHA25699adc8afcec72570b7767e4ba4dadf32a788fbadd59c0e7d84dc97352628953e
SHA5120f27dcad39695a412aba2125c19f01f634d96d69c0dc45e92c9a34bfb716a30e88bbce5e62278e4c93e4323ddc376e1c1f33d2ca974bc397477326e05cb0fcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d04a2ae61f2ecb03f2a92de268d1124
SHA1d5daee59ba676713997dab064825ec1ea3e05d25
SHA2568c60d5569a975b32bb721b3589990d441ace23ddfe64e71f3e5b3feb69a5a59c
SHA512c7cfdafda5e0904ff8e32bc0da1e997cae5600089061360398a64b02758ec78306a52dcead39befcc32d53843ca30c6f9c9628261f7eb3afe514d1d68ba567e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6237a78cb4c8345d938a7edd33e2f2f
SHA156c45b6e06dca0c7a390ce7603d205fdab15403d
SHA2560683eca186535ca5969fd57037bd14aee39b6e2c9a79aa819d2fbaab4a6d499f
SHA512c35a3995806977f85286d620130d02756def33aa89e9d23c43fbd05e59e8ee88fae476782ebcbf41c749a717743df95fe837f4a10b32b8adf7e7859e745900de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5baa5c63ce19e43e69bf49636b1345f75
SHA1566e5bc487b3039b60f37c89d1bb46f023e37e03
SHA256e7ab18d2a0c295fb4e75ee72a1ffa6e5ea86d3bd3523306857de2fd409c96d99
SHA5122e064cb967a8e6b97f63d2c513a5d0530cbdee4786a2076bca9622a06be8d61622629634a11c5fec64d0085d997eb866006fcc638b794c213d0ead09349f3088
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b