Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
d4ddc0d2e60c6ac46ea91a0f66c48d56_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4ddc0d2e60c6ac46ea91a0f66c48d56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4ddc0d2e60c6ac46ea91a0f66c48d56_JaffaCakes118.html
-
Size
6KB
-
MD5
d4ddc0d2e60c6ac46ea91a0f66c48d56
-
SHA1
e2d17bd266b12fd52ee2354cce2b2347db07c89f
-
SHA256
91d6ef39276b19d0a5d6dfcd1cc52431e07db33e8cda1b5c6fc40bd51db04217
-
SHA512
e0cc8989b10a87258e50cf6e00072beec9a3c85914c7ec99a669b24bc9d36574178fdf1186c4b3f2367848e53a6b51e8324d300cbd635305c2ca71e3bcaa7e31
-
SSDEEP
96:uzVs+ux79FLLY1k9o84d12ef7CSTUrLcEZ7ru7f:csz79FAYS/Qb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81333F71-6E05-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304c28561202db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000003da833bdfa7a88d638ecef2ed76e0c2fc4257085efa1a0313098cff9943d0294000000000e80000000020000200000004d6307bfdde733387a74577690b79d183267ec8a3cbdfa34634b6cba09ef359720000000663b17d5c05392b25e12374510f88af6e17308b0664583a491a6756a64ce6aac40000000da7d2b0a068a55f49daaa871f71024c4b78f5a479088b98f015f2a44edc0eaec54d16133c6c16f4b28056e55de1d71bc01a64dc021cc6ae14ba18e4ffa5836e5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431977407" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2820 2148 iexplore.exe 31 PID 2148 wrote to memory of 2820 2148 iexplore.exe 31 PID 2148 wrote to memory of 2820 2148 iexplore.exe 31 PID 2148 wrote to memory of 2820 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4ddc0d2e60c6ac46ea91a0f66c48d56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550cf13a3f43c88c69c3cb1ab85060c99
SHA1d3e8e20d5651b099f627c4c00c7b164a2ae6e0e1
SHA2564f3fa1f0874847735d3f3f23c1901613ac0ef10aebb3501c1536eed73af06b29
SHA512a4528efb2f7842400daf8e39c6acb61eacd355be43c789f5f6b2a7ba27150ba3b7398a36d5194991d60a7a46515d43276eaf04da209becacf8a348214538ceec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f4727904d96e06a624ed72200803f3
SHA19005ae564cdc631c427b4f9c1f134916a9e02b63
SHA2561553792ced915c46206550899ee8cf7ccb1d2574c1857bdfe73572cc8af2c845
SHA5121472a3bdd8554c852ebe41e6b02514aba8a1a46d1b564168dbfbb7147816e46b06f2b791a7b0a49901aa3baff5fb8639c9411949d717cc43a5995e96b17f83de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54665877aa947f5c945621187f3e8fbd5
SHA103fb57c08de64e3eec1a013f253de0783f13ad67
SHA2566d4a9947e133980a663e48070ff403f7516e514002425aa936af4c0386ee60d5
SHA512e9adde1324f77f314513d52482a837ea279e6eb6ae3f23a97043dbf2dea886ba331340b29befaf31a2a5ebc0d3e2d4853ae7aad670937ce49b24b436ce692a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7b2445a27564f0238ef9e3179981a8
SHA1f8cf21b6f26d971ca38567ae2fea27818ca676d2
SHA256984213a192d62e5b0568a72b9501954f84af0845fa37862235174f898883f9d6
SHA51236c6bf310c7a0dcb5e1aa06eb5eeba44e7417da4c779581ec7691f8a0968aabf5e7c141c1499bfe24e3b6dc8f9326f1647ecaa47d04f2037ed5a7f8b3fbcd9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a8702913bdd413cef6663412757450
SHA122a5896cfbf84bf7d9aaeb49e3fa01de0b32b066
SHA25676fcf7b19e2c426f27c712ee8e6f3ccdc7d195440097d9155d13f6936bdfc6e3
SHA512df6d11f9613cd13cdb898e9731f61828147aa35524f0ecba0066762378d5abe61c549adb9c0aa27d422c4a4f8f4b96ce139dd3e58f668c603024b4c4000846d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aff58b7f26f7a370f5ab44b09977000
SHA19d0736a1162d2668037d0b621ef4cf95814cb3df
SHA2566ac4dd4337181a2c7457d4560c006ba5bce3d5e2140fe58c258ee571e62ff6a9
SHA51214241be25e2f4ffc6f3fd02d6268d58472ab8b52f5cef57f28778550536c00a0d6b8a1bd6c29f7570e2cb6c4f7d8a25ae2f216bb79bdbdbeb4057082c9f85b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de0ce0eafb00a45359f6b9bd93997e5d
SHA1e0c31b90209975182e9f752817b32a67affc8e2b
SHA25634e359246c6d2db93404fb23bbd8547c6762b376473cd90776608385ca65b5bd
SHA512520f9a65faec7038e83f5fbf1c7ae2bbc7f9217d9fcabfc7460b381a4d2c8c8878f5ba074a0db087b7c768152267e5c40d2518f698351fc83249b621e0e5576e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e29720417b8524bd5c2e3a089a2b73c
SHA1fbb53bb578fb0baefc42db5146ce0a193f8dc9c9
SHA256f552712459267e485d902fb2ee0665c3bcf1674ac9da46d2c8bb45842c5a622d
SHA512a500e2b2691bde3a6037e834e550754c2e36076c9877809620221bce216b25f8af670228ff91cb6aff4d0f55de09fb609c27e8c35f1f737277fc055c7dfdd099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547504126ddb3b43e2e8ec8e7048ef3ac
SHA107feb3f4d6b4e0154bb21596a14dc06c4c4abc19
SHA2569f161eceffc190a9498d8fc08142efe9dda2c3214bbd70c87876e5ad4144bf94
SHA51270eb5a6ceeb4c7d9b3ef8bc7e17689a41ef4e0e00d148ceaaf655a8688f4ee2faf90547f10b2c4130822bb86e829ab789af6a0437e73c7767d9fe56e87092478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc8883b6b854e0df9c8e3a003ddc1aa
SHA1afb9585b5860dfa415af26f9e3e82f564a5e4a53
SHA256ee874f90c5bc0cf4f12d739f9c6d8e935f5e3e7b79d305862cbcdaf4835d3256
SHA512ba45509af33d5e67714bb7bc19183469b1990f64fb1b457cbfab49bd68f04ecd3f4aacf0040aa6c5a3ab86d24e7878197e9db696e77b44b2563dcba1ff301085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f392879d09f4d9c6d3400dd7cb4cc37
SHA1166f6b654afdc277d463f9237b87bb41fe378fb9
SHA256b5ec9cbf94cbd996483a6fa3c73c88e2ecdf1ae08263731e04b06748489f267e
SHA512b12d405b4ddf9eea1a8267046dcd88f3dbd8e0d40f70cd7ccba147c832b5b81748a9389424050544f46d2fa687a4eddd6c8609649a07a06f72669ea744727603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555532729bb60fac2b5a1e7afb4d3f971
SHA1ea650403e663be991b0c7f1f360a2700541799c0
SHA256508031d4a12d73a1aaf195f0cf01182afbfbeff987d5e28a869cf621a39df541
SHA512ad500d3013b5de95888370938b1a69651c1851b801774fdad272c3c48c354340c6f7af0fbb845580670ce0d7171848ccc08e92aa48008b31d7283d5255ed5275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9601caed66a32277b4542926e7d0067
SHA1631fc9fa4c89050164a221f2e9bd18600c9b6c74
SHA256c46c04294621f326c70c080a3ffba3461d14657c5c717f1866e12837999bb576
SHA51297219f94ed201c47bf1b60881ffab249dd7b2945ca91ed2ff2728b2039ce9a32046db33baf1cd930725bca8f096960884b9abea703ffbcde9eb8f3369e9871d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ccc58e1ed0610b3c46dffeb3f5de8f
SHA111e22f9c3dd46bb125848808f7b6c4dbac26a1f9
SHA25608c0d463c02baba2bf0b84a5b5d49dd2285502c275d1150120029a801e5dddcd
SHA51200a309194e03b9471134b73a3fe74b0ded55fd27a925694b9d636c966ab055902ee60d5c02672f98f4668d1f79077e7e2aa56889415dbc45337cc149f7813fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec529fe02eef843232c8047f4e6c0d2
SHA1b6d58832d84d108c27c34a8af87b129f33fb9447
SHA2565ce1654300f45dbb1940cb9ed10a8fa762100ff4f2227c1555551cb40ea63182
SHA51297d3af8326f6d50135ff787fcd2e99b4733bbe54bc24eeb8789162b4ab2cee5c7a3a71b04761585608dff034dfd88e32ab2a3e4e7f76536fc8345af41867242c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a976c7f56b243a0222626730f194df
SHA17331a725c8db58a33a8f338e7506d33444141631
SHA2569f5b5f3a50925652b079cf10d40f6c3a20583ca474e5180bebfef8ffce592b6e
SHA512a501cbce0e514829b143b95ccf785b665be549c46f88b985f5568f5f28adc12ba85f5bf592152f0664cb7fdd8c0bed3c9567889159a5902d0b13ad109f455ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58110df5a926923d593f1c7dbc4fa57d2
SHA155e2642d2a856925be7c4748aed3f33958c6bf7a
SHA256ce72eb213a55f618dab77ce26f02a91073c15758f1b7e5954ed7df814b72e6d3
SHA512e7334c499df0dbe2960f452868e9e2cbb130c07738df5b2d234efa1d443b24e2a80b3872cdaa5b482819f11c0f135ca484d13b6b3b35b72f13eb13704a9b2193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a51661ab0d123cda0a2d498fbb8d83
SHA15c927f2192ef019722f471a468bdad3d7bc115ba
SHA2566d3d092924844c8e8c6ecba03b23128dd082d68b38a29ac6a8a90cafd8be5773
SHA51233a2ed528b32801ec0338ff9cf5b5257141be0d1b86af690c2fb477a3521f0da5b43b65001f72bcd31ee1e6e6b4612a99d77a8e699478afcd977ec7a623593c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b