Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
dd1585a4b1837eea539da4f8c1002235_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd1585a4b1837eea539da4f8c1002235_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dd1585a4b1837eea539da4f8c1002235_JaffaCakes118.html
-
Size
23KB
-
MD5
dd1585a4b1837eea539da4f8c1002235
-
SHA1
5212108f550021e392b352ef1d3f1b214acab697
-
SHA256
1167317296cd596ac11f7694b76530e3aa493fc63f14104f6a50dfdb8fa74896
-
SHA512
c8920d517982f5d93e54694690d464a662f89909c6bbcd87ece45f8fea9cc8820f8038c85ade888875e4598ecbb0239cbbd7a314eb0a37431b49e9f64bddfccb
-
SSDEEP
192:uWD4b5nranQjxn5Q/anQiehNn2LUnQOkEntGwnQTbnFnQPCnQttwMBBqnYnQ7tnn:yQ/kLSn2J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b034f2e65a05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a69995d0316e8a5beafb29934728d9f2c93bdc9e50c75a2a8cf858aa597df361000000000e8000000002000020000000d2f58771a98b5059001dcadd77e9239dcef666c31a8b3917a8ba3f0729c8f85120000000e1f43ce1079d431af9ecd834cfc3173afa94bdc5cb4bf316ebbdde5123adf1f740000000866ed5917c509460b3b270b5c2fa210ea70c050954618839e01c2c4e0d8171cb7d8f478007aaf30923944d601bd12d26811d91f8879623c52ae179ae8c161eb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10B64071-714E-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432338425" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2176 2408 iexplore.exe 30 PID 2408 wrote to memory of 2176 2408 iexplore.exe 30 PID 2408 wrote to memory of 2176 2408 iexplore.exe 30 PID 2408 wrote to memory of 2176 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd1585a4b1837eea539da4f8c1002235_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568adf2d888f77abee808901fe679c627
SHA15f70fdf9abc57ab6370a954edb1775d5a225a2d4
SHA256d48d11dc30be41d8104c3c7c85e51aab43d3b42cfd323c14d9b21d18105c62b2
SHA5129159438dda12be51dfc8cfb94637867aef3b53825055c9ae471e0a8fd11fda66a0e6653281c4deb74087ea2ae79696930c6c6567274db23d8652c9550561de62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db62eb275321bdc5a95136c38599da9e
SHA1e2a54c4deab287ff934ac127c66e29583499581d
SHA256a86b6319cef29e5b68304f2c85fb2d7787b3f5b7c6a484d44788b41d36be71d9
SHA512ee23775b685fdf2ef6ae3e7c0c7acaae2a77f2843479bbc08b1abe7d198f48088b2a37d3472c41db415e87a0287aacb047db30e40af608440e0f9c4509efb6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5845b9dac0716f1fdbd02b567fb92dfcb
SHA177caea9f93bddb327ff925f4b4822ad3eea06d67
SHA25649af43b118cc85aa2fdea44e6da2c56ff9a5b0818a16e76ac2b7de7bb1637141
SHA5124c24f9c3017d788b5af8ddd272df2112e24eb034b293df40fd5f2edb698c33fae81d46b9fef206a86e6eab038edffa5132952a526cd4cc441be93753047d8600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a889badb0fec473e5c48c85520b2774
SHA19bc47687aff86ea37d57dfcea9b6ea8dfc32aa76
SHA2564e04bde0a58cc6dff3d7e63dd933fbce9041129690c5feac72b73702517fca39
SHA512eb36b29ebb7c0836d732d017fcd3dd85b53edc7c5f4220f17425296cf1e34411cf0da52a351f61d66f2fa5f4bbb33ebcf60e38a8c41dfb3efbcb4756a346a029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e8874d00ded4409dbeb1f48b158ba9
SHA18487e517c34d9c181201dbe27c7817ca5c530a42
SHA256c41d3c3cfb3ddc35bc9b4ef26c512c0d93b8a347888ec34eb0b1108eab483a55
SHA5127ea13b2a0ef9019abf931b0b5f18a419abcff3d6a5eaf1bce38a7f77291c60ec178963c8af78542ed8ccecccdebbf7a5492bbb9f2a0aadb805011dd7fd5f9f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5842aacbf8e03cf58bc74c74107712691
SHA1dadef0d2a69481258e1d97712bd10c8250f3ddde
SHA256bf42ac805392423ecd1e26f91f10d3aba4237161a8f3b1acead0b0092464d061
SHA51295e2fbdc4d0c792f42db8726a5251fbe6c1bb3d91e93aff00829ef5399178b9fc3205907de5b16870990eb3baeaf3ccb41731ea0c55dbde2fa9083d8b616885b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e346f2ee904fd07904d4dc03324275
SHA193c3cff41e7e1f05c8cc78e15b0767a8ffc77ab8
SHA256f83cd32cde21b264e7a7b59c75b922b037c0c983f33e9ec8263323c40b14122e
SHA5127f87bc672e4b02394a2bfe66d414e24abdfaf550289ba9d0f74859ab46fbb40553031ef9b17441a49dc860bca108aa253ce0113e20d9705bbe6cd5a25f0482bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58efe9f48a923dbf8c6ebcb01412333dd
SHA13b9c9854f6fc0ff506f9de8c109fe226fc81ee1d
SHA25671dc95e9f40338b77a2c86fbcae8a64cfe1277e7e75c4e999dc3f3b075b5aa80
SHA512a6be2216b799d3e151f9caf89e513474f5d75a75fbf781e2a943480ffc9362343051aa5518270dd4a7383bb0e14454fdc0f44a49fc42affd2965af69d6441ce3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ce1efd6ea900932869e699b550c45b
SHA176bde8e079fc7683a70f63d474417d8cab6565be
SHA2567b3e217ab958abf02cbb7f7a7047bbe521218165ec408aa95d568b501def90b6
SHA51289004ae23cc4582dc042a96a66775ae478b0932f283289eb22b6bf8dd824ca4df6e04fb068d79faa0113573f9c04fe4ca755ff5f168d4c7c7457acd979605bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e19c94eb9219f0ee18e456188757d9
SHA179942b7c4287fd2978f9ee897bf45e66c82747be
SHA256d63ba3bede0099f908eb9da98dac3d7b389e9102a47f53faeed24ecc6e4852f0
SHA512a3514ca54f92a982123c17aefd3224c6d270d4e009057b88e866e80c40eca98692b01bff204b8d90fd476dbde3b5892f085e26ba5ca00669888f8d232de311d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ede08e60d844a0c91ac11425a4e74f
SHA1b34b67c3ec52795ff57aa0358fc27111cbd86f33
SHA2561000ecbdd36896dd7c95170cf815baf0d79b3bd410d5920c2c8c1268c0e162b5
SHA5120c6e16ac3192050db81d3c396524bbd38c4b7a24706aaf1cca200ed6d8380f8c50ebae2c36e9fa7d6b5afd1cc559e54218d27050095bb2f58d6b120dc4b00e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c42ace68c7faecfd39acc14518eb67
SHA11f7f3c57e03edca19ee6927762a2b85365970c29
SHA256728696dcf09c245ee4aafafcc2f0a73848588f25647ddce730d813a93e35b5d6
SHA5121251d10c02814bf026eee53ba5c24e4f2c3e700f7770a8ed385b2948fa31f9703d764f1df22695669df2875620da9e27686c641f142938ecf4eb74534b97e7bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104c384463c7e937a29f89556ecf5fd6
SHA1fcae436a50bc4893da3f37ed0afecb7a43df1595
SHA256f1fc66cfcb2fa11a4a0fd3eb6d0c11a98f0a1a9e74258d997d8f4160e35522f6
SHA5129a0e850f3665d9eb9704a6a722b762100d9932a7cad13e57674c9f77656992a4ed3509b6b5b901ecd02218dbc1e034cfe090483844e5f31b168edd912f128cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b819932ed986a2ba7f15edc929a49e
SHA11cf8721edb80f651ee9cb03f29b7e6fcb7d11ab9
SHA25641c33a657a0ef39ce47ff925199cda2dad27aa8297de9f78d906ec3979910fcd
SHA5126079159d618d0cb6fe717fa5460799e028ee235c825b741bfecc1ff58de74d65a3a6257516c3b20ffd8d5f5e994b0b975f4de89dc49eb0c74bee9dd458f3cd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb44128502b25f1514de9a564494f017
SHA1a5afbbd2ff268bf692ef1f3d472cebe7a6b25e60
SHA2564884dd3263a9e7a228d4d04060358ca2cde43b0867676510a65f1ac7bc204792
SHA51209a2a2c859286b4f2cdcc0149a790a017934015a811dcb63a22435b4fc51aa374435c271e501d9f3098175544918e86731538165c8ee43283eab44778fc224c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd574e3b58d815b64870dcafcacdad16
SHA1392a7e2ad09d32cc8fbc60de7f01e74dda73be4f
SHA256625b3e66c878b210e4f160b8b5bc563bffa806b992d5aad949c85825df385b69
SHA512a76800a90667936652641c32dceb36f2daf84fe45b5f2550579d406d083c0be9544bd9c70181d93336bba6b27cddfaca916ac91387e477100419dc40a61429cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b680b7e487a3baf9a3199f7a0021fa9c
SHA148b94371396747591844c3e133a9c1113c1b7140
SHA256f998b048644e9bd575ec63215faaf65bb12d0f3f9493e85e6ea0708e100c41c6
SHA5123afa76d906c53078973e83a8d9a771be35ab8032d163550b34dd1a1f52473b37f5121bdf1b610b1aa66838142e4873856b12234ebb1fece394356941c6aaa7e7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b