Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html
-
Size
112KB
-
MD5
3fd1d763628f81f7c03229e23aa45e13
-
SHA1
0fb4ad97346d9f21480bf49c33254dfe7f6e3aab
-
SHA256
67931a690e857192e0af9f9ecf294ca9a9a3046f4b5b05256d6aaee4f789f108
-
SHA512
5c24fa3024978cf784e54ea0972de38d1ed95397f42fef3c41eb0b1be7c806f4240b45541257757ae94a9569200fc3e0526bc35b9955c33f8201e2954f273fcb
-
SSDEEP
3072:Gu3SNcSMNjpYwPz4ZKoa3Hi3Mu6yrRkPYpyzlU/lBuEm3s4GaP:P3SNcSMtN+DaP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434983933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C6D5CE1-895D-11EF-AC30-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2940 iexplore.exe 2940 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2872 2940 iexplore.exe 30 PID 2940 wrote to memory of 2872 2940 iexplore.exe 30 PID 2940 wrote to memory of 2872 2940 iexplore.exe 30 PID 2940 wrote to memory of 2872 2940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb219260be002639ece76fe37424322
SHA14448eb386f49916ded848f88bd371b95021cdbd8
SHA256e4870e0be3fef5d709c2e29b51b62e6cebb739d56cb5e7dd07c6578994727868
SHA512263d9a447ecbc53c7606e546e6e9302e3a08abae8d17e66fdf98d26afb6a6d1ef2605f535853c9af7c19eb557d293308913f1fac99b336e604840e0c6288741c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a2caaaba726318148a3a5ee43f66cb8
SHA1537f720b7959a960549fbc76e2bc1ceda60ecc1b
SHA2565f047999dd06fc2de158aee90bf4b08c5446e23937bc6550182f3395ec6b3dbc
SHA512bac3269e14bc214b59ae8ecaf45899e83a00bd34784223d6c1a2d6ddc04694ea82fe07d0529a8d8b37b35336ad407ef8608959e7dc1dd8bb75475e8f0119e83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5741a3c30245f1599a3a7b5bffcd1ef95
SHA15fb8a70fd41121090419f3574813fdcf8019a5df
SHA256e4ed0174709d8c233e43e96cb64fcf96c2409a30b430fb2a1f9226eebcfb54f6
SHA5125dc9569b45da0e532ed351c9beda82c0c23f15983985257fed30a9d5ddd16c184d0f973a20cdfff69e2f44c1ad21d73b83208a0942ed596367932445c3633636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55daf469ad77bb5e23a9de735afc70ccd
SHA1b5028680eaf88968e2bde492492fce44cf488818
SHA2569b7a4c44b9b59e5d5baf7847c9a515672c47b266dacffa7de7fb43f31e47a1d1
SHA512f0ba7319ccd8ae8503679e7c52a7f1cf776d9b68c3f58b6e82d93d842b67557cb8996654c1f87e52081c5a5dd5315c084ab4e75165c5cc75d93f8bcbfabb6052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50147335f8f96379d684bf15a650448b5
SHA164094770e3879af7c741638017295039a148b235
SHA256a1d3fdc25e1dc3d9389633a459b0ab39ded2a2366ccaf77164aa35bf6e0affcf
SHA51289ce5b048db5a90779607d7259c31bab3f50ceef1cea9f28d348cbf3167cb1d59f35414f4f1c421832a77a3e09ec0b3a4946b95d4e70ee65466fa8151aed10a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680e09cf376657ceb12962e99c6619da
SHA14df18d9439fc17885de36fa3a2cc508d62aa756b
SHA256b5b2e81956f24fdbfb99c7e0d0710ae5375572924718b91bbbbc2156f48dfd7b
SHA512e2c60f6add48ac6dd92820b0c246411214a5675e1e3bcf17b831a912df3578822d0223c4a08c96a5de1fe658fce07c3f0a9670225f6fbe2586caba15b3c29de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ccda200f74f761f4636209e8328ac8d
SHA17e593229e6975dff567d897549f2871782fbdfdd
SHA25647442274dce73979a6e5add0ca62681afa90da51142c2145e4210dff6500e161
SHA5123bd1e24884354fd8bfc5394adb55988cf1b299c7fe7dddea47679d68e36f9574815c2cf09c34c029fab9a0138705827e06e8195587ff74834c3ee3981c3b7043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cba89484257e112c17d07b7f95a5d8bd
SHA114baf2218e17e046b45828dee052d7e992665f5a
SHA2560ae4daaae67be1b92be874388a7a5394b245bc2c0248e9609d5c40af6cc300d3
SHA51264a08883776dbdf52fed983fc23d5f6aeb9c0f49e7ab2bab15169e33e8fcae932f388274856e4467d648393670ca8ecccdf84881360a5145ed587b0c8d1fc4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54add424592afa826feae9e1a4d081241
SHA10fc428e23b5491fa854b35f813d79f0a36c5e004
SHA256807b49a17517c325975adcccbf97dc8900cf71fe7bccfffb89d58c0a805e8a87
SHA51292c6baf906c1d70d5085980aaf6c71b8e5b35ac7547356989682fc743d2dd133e9ac4daecd35ffe5efcd3b18fe506f32c0bce18ac04c789b5c20171419d7a3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b620b8121e7ad50e6f74c04de0d900c6
SHA1cd102f0a39d910a16862b8161b14db962a7c1cae
SHA256259a93e98f1159ef0e5d15a362d71106e78d76cc2648dd1d3ad15193af3789c1
SHA51248f58b54236c93e01e6bbc7b574ec1a3ae82d4d51b773b3ca021e36e2bf96d5e55952413120098bf48d187045700916212d6ad3887e60436f21259dc7802009f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b882a08c3e1456d0a652db20bc3631a4
SHA14a0c0147e819d9a9dc87fad61c961696bc8f546d
SHA256f291d98aea9cd68b0f0eb06bacbd81302c6ec8241eef2ad184bb176f7fa0095a
SHA512796d3bd9307da15b0ff4464dff5cf041b6fa0d0b5255a0c1d78d056ed857055603c8712dcfc9684a4fdd1ef89f9fa23ecd3dc404048f3e48a3cd8f8651cef374
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b