Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 16:07
Behavioral task
behavioral1
Sample
40cc3ca2fef82a8a66bf8cd390e317a5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40cc3ca2fef82a8a66bf8cd390e317a5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
40cc3ca2fef82a8a66bf8cd390e317a5_JaffaCakes118.html
-
Size
5KB
-
MD5
40cc3ca2fef82a8a66bf8cd390e317a5
-
SHA1
1b3071704f0cf46aa78fd6acf242cc9eb9a195c0
-
SHA256
7d341d9e43994c15e8b60c96da89390bea190d3748ac1e082793b8b0d6d8bc1b
-
SHA512
3b3838fbf56b1d462569370d08f52eb0ce8583f9486f82748df30c49dd6a5a7aff488b204d9ba916377c5d52bd680ae90dfc580fdc5e084f0dc09f920ff5e147
-
SSDEEP
96:8y+cAl5azln+DtZogzD5hBniKFe8LDmQIjK:8OAl0z8DjDtqKYQDme
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000099e6c7d686892b103f1044c8b9f651b4b8efe90bd3c1fb6cf5b7bfd13e56a867000000000e80000000020000200000006ea2f4afc52f9ce93558866ad27e375ed5dee39755d3f3eae3a39b9b0e655e3120000000c8406797a4967a7ed70868ecf7a977e18926d30f5ccdaaff7cc6600290a4b7f040000000fb3f42664ee388ed28eb25d73f8d9835d73f355387c6c78785de87e4164a9d4f698ef9aa441328ce3f88c565ce0804f57ab073b466f9841dc95c8dd267937ead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000001c443b807c461d9a4d5e7970e770f449483ec6ae708c7df0b47237333e6a1dc9000000000e8000000002000020000000a07a58815d958538a13d268b6b8f360d6227f891365e56b3615a9db934b3f506900000007f2835a31eb923e1a12e47dca59d924e28fd4f25d2772a710fc311caa873f9f2c16e3331cc76fdfcafe1b5e82b22485ce7f671746912b634bd10a3eb3846c94d272fe29c22bd8f4152798ee8b2f3f6967d446f7497c305ffe83307b7b6d0cfb9b7b2753c80d88a1129c3f89344737263308663a72c8859f53c2cf74d1766554a692fb55879a79a6852f3c95aba011f124000000084b5f3527cd470dc3f7e3214246073a636747cfa6bd104724b19a9ed5f16779a0d456a52b10f1162ca50e403d723decd7779530a6e5f666b23bd0e1d7a9d06b7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434997495" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F8BB101-897D-11EF-A2A1-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cf11048a1ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2392 1644 iexplore.exe 30 PID 1644 wrote to memory of 2392 1644 iexplore.exe 30 PID 1644 wrote to memory of 2392 1644 iexplore.exe 30 PID 1644 wrote to memory of 2392 1644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40cc3ca2fef82a8a66bf8cd390e317a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a1c5182c3e32c691d53ba12aa6b84e
SHA17ae2bf6b0010a93b2b1fb33922e557a4e9238639
SHA256be34e3fa139829acbbf7dd6367d92c337f6bf057a0a4732dc3c9852c0cd2b9d2
SHA5124f14afd308143bb5024ec74e2ae85647235db65b12b98e49cb81c6c795de5921bc25aab9726476d66e3a825c682ae1417cfcacfe2f5b4882e1caa4a4af6aa5d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e410f399187213ea84fb64269e819381
SHA124bfbec58f8989e0e44bc13f9e046c8d01e85539
SHA2567e83c94bf9f8c6b4f129c3013c3367f03eb358eef9e8109d3bf28e14fe308d75
SHA51209220723ce5b4100140a3235148c6c5c6f1fe77072119a49afc54f9b097856b11820c6e80cba86efade1e387f725b7ced9327ab6813fbf90507e9c15722f5c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7360e3b17bf4b41830d2a88d8149a7
SHA1e87b2aa7392477a1c9b663357d0f80cf7f8d7aa9
SHA256af91acd69f610589fa3ff56c139feeb8329530fdd81e0bd280341d285b6aa9dd
SHA512512f542e3f335ecc033fe1d0701852e5a0b176e958706f0f7eb11a344f68fb0ccd446184291d856301d4bce0c6741a79c5f18de14e93bf8794625225ff223172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9a44a28b6700d4b3850923f1ca54bf
SHA15042b0fa2eb46bcc18e14a4457d1051acd3c1995
SHA256661e37168e9621271874bfb1db41f9f528e0af54d07ec3e202c400ba2b633be0
SHA51281f7fa4c144b757f21c77f7fb6f09a2af21442a135046b160c3e143aa687c632392e22ee62da39fd50d6ec502e7fdbb19aed7cd4c1806fac51a32c4aa85ae12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3cfad669b4bd5cd682bd78a811ea271
SHA18be8494e4d41333d3d614e2ff5a67ea54eb43d1d
SHA2564dabf1a9afa3fa1bfc9d472839ed7158d9daeedfd7f70dc7ddf24fcc83babe42
SHA5126c41460cd842db3f2f1a0f7b657a9b39a64546738be4fb3cdcb98822a0bf88f15f9fc05a0a90a009f749daa431ea67b326f0cc571c78fbc59439a15d62e3aa4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cabc487d80628cf2ba9426cf0da0a4e
SHA151f44dc41c51adb011eda8d38ce14bbc2451a5b7
SHA2560ef61ccb47b284210acbf1d518f0ed3f1503491b0b967e1a641e1394fe521030
SHA512f83b8dba984d864a739b38ea9a52d08a479f8bb29d0a1b506256144147c98bb06eacf4b10c959f144d98e25925b537389da362598a95e343a9205ec684bc9574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc2f1a22f5a159d1b72c225ce194ab9
SHA13070ae55e9cf7bb2c8b0e24bbf7e51ce0ebc0d75
SHA256232eb4570e89c9731609452c36f7059be72591503061be5a5cf4a169cb6efeda
SHA512a930f27fb9c5b049a66a3635dfad38b080e339bbc881107b6e30c0a698aa7b1f8d6c348b7ca4aa37d34c7188f39540e39025154f2b55ee7674b21479d29d9d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773d1bcc2df5c2274f7cefe31492202f
SHA113fae30103c3d32a542235ea282f62789744d81b
SHA25620dda837deedfe8cb381f46f952414c32c21fcdebe07b2ed3082041fc92ee733
SHA5129c639a4c1dbabaddb39215c5641e02ae24281a5db979272259411a9d0100840389c8f79e96c11eb9e9a65b433e9469f5be93d4b6fe00e5522682b55e3db898d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b53bc3a13007887c5aa713c97f7f2ac
SHA11699300a2d8da468ff650761a2839909e6b0f826
SHA25638044013c1e9737222c2094dc29061c08d3dc25280e0348bc953eb2defd94b07
SHA5124ab084c414928d992d38ed712af602b152ed5ae63405a5333fb8dfa1de8c5b2dc26c2880a624e6ebf4304c25d9de52015f01e947921939feaa70dbb1d2deefb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b