Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
3fe1026f595f646018cbe6126b877cf6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fe1026f595f646018cbe6126b877cf6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fe1026f595f646018cbe6126b877cf6_JaffaCakes118.html
-
Size
139KB
-
MD5
3fe1026f595f646018cbe6126b877cf6
-
SHA1
ad3d52bd7e7aa2819822012892eddd7ec06d70fc
-
SHA256
864c434fa60246a9b98603073e5e2938fa3492bca8307a226ff0941aad92a9bd
-
SHA512
892596856b0d7e8ee4b3454d1029fc56fffa6a43c46ee5584766ee8a8b409e73f901257d7e3af0378dbdde085834e0e891913a1bc1cac65aeebbfbd69736acfd
-
SSDEEP
1536:SwN/JiC93G7Np5hOwl5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:Swb6yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434984730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000499abb5bc03a1516b460c1bfa4baff6e6303b6fbfa2688b4b0c19690cd55dc64000000000e80000000020000200000002453385160433bddc80d8624080cf469853d81eb2ca957a85eaaf0f058987e512000000006b442167cdb7762dc2209aae6569c011ff283182b488bdcd2b82350906dd1b1400000001d5bea3bb7d4cc1b0537fb3b1593693ee531bf2cacf5d25ad2eccc572c95d107fe1e4ac66f50a7e1a202fbe0d3d50229aea4cd49c9a0ce48d4ff41b7b6aee548 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000562b4e48c54ee5923434dd36a47a5e5a9a1237a5670fee39688a3737d7d97f35000000000e80000000020000200000002db05d3ff96cbef21016c914e9a55d3dab56c784ad5685af4e0bb6b89bed404090000000cb083679c7c1c4f9aec048a2315effcced6089e404da23d7336b00c0f12968eb57912d89e5c9d8af625a807392051ba6f69bd227b241b77f64d5193574824b26478d4ba79bbe8ee3c40ba29abc3fa4eb50c88ecbee4d288c65350ba610c1aa9cae2f8f0ec0f8354246b614a2c0086a0f3d289e28cdfc4bd0e1e6782bc70b41ba1614cf7d553ce96833755c6c0f9fa45f40000000aa11a8f5a6df471380a1f2d6cd5aea816908e5edfc1c18b89f4fe4300070875e7a566a927ea0e4c10a1b4c87cd205602de985d1ef23bc080fe563223851da8c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{779CDCD1-895F-11EF-A3C4-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f8c38f6c1ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1612 2228 iexplore.exe 28 PID 2228 wrote to memory of 1612 2228 iexplore.exe 28 PID 2228 wrote to memory of 1612 2228 iexplore.exe 28 PID 2228 wrote to memory of 1612 2228 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3fe1026f595f646018cbe6126b877cf6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821ecbeaa77715d409134d9a71eff353
SHA1768aca12ebb0177065ce3add69cb54a91a4bcfde
SHA2564eda6725737913f9c67ee78a501cc8c4d6f3831a3a12d1ea08f87d942863b416
SHA512cd8a7bd044d484040c02924d9c546f05dfb15a262be95d70c564a328eb82100c542eec95d927afb76860941eee1a3e8768a377fd42d2e062862308a8f11b0ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521816ef46322f8a633fe1bba5ab25478
SHA15f91bbc68d1a52c8ff727dde69de5a3ffc50ec3f
SHA256e4bcf1405fc89f5d721d5f37e9ea96c3483de865bddc85d293c6f17e95deb5ec
SHA512ab09f48ef9e9f6bc2d2346520f67a784d42b29ca08d7960d5f6b1947c0b038ae9bcb2e475ce3b642711a0844b97a470c7bbf59fb293bc299392121f9c1697506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537321d624b39a297cfc8213fd33051c6
SHA1e7ae11d89401bc7e058c5365cc8261fb9b39fabf
SHA256bb18f8e7bddb84e2956c137bcf167771e0477878f839f7f554e50533b75d1d81
SHA5126a3d8255027b8469e8089eaaacb25ec4dd2ce27fda6caf2394878bf32b69c396e4a37a5aac9b6670743fdc88affb0f56143022750bd4c67d54c0d373be73e700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc64f8dc55fe2a38d6ac0d5de90e267
SHA1c37e4e7e32093a76d1a14097b05bd760947d14ce
SHA256ca9df4c5abeed43bd74bceda733aa04f5308b2bb8fc7f6b306c1e1a8e574b94e
SHA512b8ca508e06ba3c5e3cf061f87ce037c418dd13d278b246b733cafafbe6730a2dc5f0b78d71746e9d5f793e30508a096b6457dcac15281b542e45d484d79a4dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55c3e5764da7d1bb848afa384f702e8
SHA1a575e1dd2a3f9cec325f54a333c50757e2df9c6b
SHA25697991245f706c5b1d8667ba4b331f2c698ac8fb1d34e823a73a865258170809f
SHA512e1b59f507f5dfbd6cd0e4e6913450ae4abab87d4568dcfe85bb7a4579432bdd6bd905fa463aafc6b14cdc3101dab955ddb9c496304934f8570e13835a82b97db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd08aa1fa856c203383c1d3d792419a
SHA165640907f7650b2f287f833ab4e0fd9ba81dc27c
SHA256f42cf4f5a49be963785517be938ed0d37e2a3c3c365c71bcd2624079bac8f2db
SHA512caa5530982a2127958b011361c2b793b18d9c75b12df799a303e45828bc396efb71cb3d0764d032ee8dd5565cc421faacf45b6b23226e0a842a421ad3979a875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1152430f8966dad6e7a105172d8320a
SHA1cdc951e9b8508cd971d46a16dc01eb49415325c9
SHA25608fcafa2ccf39980e9f1cbb466fd6fae76cf015e95ee5df4254917dae70ebe04
SHA5123d50247e860d2fbcbfd7347c5cbb7f7608134c42659c4fde1c048aed161ea4a6300cb1182872c2f4cf2eeef90751facf405c2288e04987d07a651b6f752d146a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cffc3524b40e3e8766b086c43d372a9
SHA13763b05e5bd83ea6218e214fb61e005b12bd73f8
SHA256dd1e3424461845f5690c4c209690e24b9e832d55ee2fbfad9716d9b19539eb17
SHA51210187036ea0ea92e8bf1e550b23a8c844e12317dd468c5ecf460069d9d9c6a578f695db0c6490aae361245304f8060f867cd66c36f555ebf1b2c4f2807faaa47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c159f7e1426e9fc735055adef5d235c7
SHA1f15a51cb629b520873eb758bf941d6854829b4a0
SHA2561e01ce0f09afa31ff85980c054e9d739c70ac3c329b63992c53c3cfe28f7de12
SHA5129b74855126c2ef34fe4d243e0119aeb871efd5af06a4d7169332fe3539466aff6cd9d0d6ec9d892bbbe8f0db5bd331472801ec4709263b171175e5cdf8847ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b7d46047e3183ef7a0de7bfe2a3d6b
SHA14592e5ad68a94fa31451d954ba71eb7d48683aed
SHA25637a797a30d28f156a2b839bdebcbff294c798b4a5519250a78f37cae37ac3c4b
SHA512a5642857e7ac3d1eda6fe1771fbc2d7b826dfe69018e4918c84a2c50f5e99a77b43982ecb993bb54a4d6f8c92c612c2593adc30065a39b1d0621e187856276b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75082bbe344403f9c731ba2513f8b3d
SHA188781bb65736017de1a36176b6c14abfcbf90d53
SHA2567c08e2f4806fea101c91de7a15fa327ac7f8c144336c4ba4638da7e368ca971b
SHA512b41a168833dccb64121ce309a87173b6464f7c3aa8901a01801d42d9f3b6dbea24eeb85dbc5aba722a4f835c9e12841d32309eb1d1b7fb153d9aa5d05618c42f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d8e557417e231875d2585a40a22f8d
SHA1fa2b4caa3b295987c8791d5acbfd01760e153a9c
SHA256ecddf16fe145a339ea9e1f16bb72177bc40281dbed28433772f0cb0eb113167b
SHA51211caeea71edd45a503c1413e65469ad7e36f89cc8f599d697f01057e2980a8bc8d4454c4993b8ea930799f568722e5206a8508047f0c8e04c50f8bab24882c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5316854bfc029542ab98e883d4c36f39e
SHA11e8e27f2137e24ff13cabdbe031f496cc8f3487d
SHA2567f7623c5d49a6354029de2019671ae164ebfa9994e1ea2b1d3c16b7be7e2624b
SHA512725b1f05d9b4caa4c2b1d8f5501f1c25b3e27639cccdee45174623d30a9b9e76d30c543684f92d31ec5157981b9de22c011b114fe42837427b8cba59323c9173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaae587260784c18cda34d95fe11d269
SHA1588120f189e11b81146741bd72d29421ee080b02
SHA256bacd5cd737a5512e39ca79dcb18d88d928aa75062c04af9de159e307dd9a7998
SHA51245cb2d1ce9d4058be22b19e56323157197f8bc0bc1381228cfaf01c71abb8e8f39fd738240cfdc903af645e66cb71c2db69c4b4240a5b8b1b70f0ab0b6ea67f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5547558015ec3fdf4584464d35d1e2686
SHA1d2536fb2f840483f6c5720beb7fc824daec666fe
SHA2563e8512bcd29524097e5b4eec3647fd7dea760ce8f7a0c3cda5f177c99a49e5d9
SHA5120711f3c1ca8573c409a3c59408c09127c7e77dfb203d96822fa7c75bf3359a950629587b221190915836eba52061c03450df19776050e891c516cc5c531579c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18931dc0a18f275bafd108481a29a24
SHA1874b6ab677de0da9ebc955489938d89b89039fec
SHA256a9bc19a43101f048ba9cda148d79b10b445c0e87dc886ef53d72586ba441a734
SHA512d1d0801ed4edd666d23eda0bb2dc5f3018d0b5928b1e0719eb75ef2adb81015e20f273ce5aa67f0880b01e4580c27ba806621789a37f4979bab678fffbcf941c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b