Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
dd192b044250ea66b00cc845813ef688_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd192b044250ea66b00cc845813ef688_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd192b044250ea66b00cc845813ef688_JaffaCakes118.html
-
Size
12KB
-
MD5
dd192b044250ea66b00cc845813ef688
-
SHA1
b9d6a6a965ba966f6fb1ea07cf73a9eaa85b7bdf
-
SHA256
a00577d58000a42ca915c03e28b014dea03fd91ecda673798855f66ccdb1bbb3
-
SHA512
90bf28d27216687684ef2933a8df78bae31335a14f06bf5b34919d258317d258f0193c85d0e6f8f1e7ae51ff607e6aee22030e2a8d8dc8bb990f987dfd14e3a4
-
SSDEEP
384:EixVp5ir2K5UB+FtctaBrQ91TAyIqp0cYAeD4t:zxL5w5UBq6kQ91TAyIqOcF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432339110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b011f9835c05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9928691-714F-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f58a9e9e801e3874a7f4a796c7f0f9504ad7e3921448a8d25a246bebede2cde5000000000e80000000020000200000001f90fc3128adc086c64022a8bb57596ed2eb6d333c5f88ce468d0added44c69520000000fb7b52254a850e5743e139b8b0ad5b29baaa66c5cea39b64a2213dc06e5376d54000000069da39f47a6f828a784f10f90bc10c1f5cf9be3ad4790519cc2b176ac603be46dbdec60221efcd616524fae6a9d66aa1963be80c2e0a58caa801778b6d65a1e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1632 iexplore.exe 1632 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2328 1632 iexplore.exe 30 PID 1632 wrote to memory of 2328 1632 iexplore.exe 30 PID 1632 wrote to memory of 2328 1632 iexplore.exe 30 PID 1632 wrote to memory of 2328 1632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd192b044250ea66b00cc845813ef688_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f5c9b3b3d3a0f763fdbd15f1bd4b9e1
SHA1b8ae4be3fbed3a21def8183684795a09b49b3838
SHA2560c6be892ebb4e166499273545a9540c5ac34cd847ed50cc0390164a2bd0adbb8
SHA512d8cb2cca143ab97bbf4912743febfadeb22f4187d3799f8795f28f29608534abf635ae188bd9388993da19481abbdd4296f0c6cfb399fd2b0a439d2bb6bc9998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcaefcc19fa766713fe83c7afe53e674
SHA17a7bd7ba07bde057d8d639e7d84c02aba02ca2f6
SHA256ec09ba66a0462d302b98aea0d64edf842c82ce3b4ed904d81a84e137006c81e7
SHA51269f9ef0579b348f3de322e57d18f34cf6dc98c06dfc466b6096c9bec665174c242bece520f9497a380a1843acf76c89cd6104182f1152f2761d4dc09b6c18422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50065c198ff78357dcbd34e34a166f206
SHA1c1a03197fe6471e9567a3902691b6cc72657dacf
SHA2563c4ec7669e83f68b486d077b5ac0f50ba75712a271259fd4a279c6877c57c10b
SHA512fa46655ac8c06825e4a30494e0981ca2de81617715e216b7f9dde19324cc50b1de5ba9b2e6429194152d346f49a2f5ccf8ac7c0b29dfcfd6440edb3804671f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124d9352ae93f901b655273aec9329de
SHA12a875e5464df2b2d6f034acf6212d4b19d8efc99
SHA25699a2ae320b2d294a294197a7d793e982b8f4764c41a371a52d953f2317617b6d
SHA512f02c6219218d85990efb2e01d32568fae7279cb35eb99efff05a4db3eb92a478b7726e9bf4825555c1be0f23c64c2821e720f908753c679cd3a0a57a6e029ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb0fbad7d68b75af2227a3a051127f4
SHA12c2ee5c99c8f7b6a727fbd4f8125967243974fb6
SHA256a4d0f61494a4997890296e235c130a0562c888abefe701c6fe5e5f7f99cb7d14
SHA512e8cabd58662bdbc3f49bd4344339bfb5ed96b92c41eb4133ef9931d717213455548c0a32120ce0e981abb01f21084d8424e4b32267df9cd36cc08104cb8fcde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfaba8389b9897142bbcb85c5f1b4948
SHA1e7b7b1df6b69586ad3a930803a7de34aa484389e
SHA256678e8b4a2324a2bf0b86593e6d3cb6bfca2c072863da1110e303885d2af09bc6
SHA512f91d894713a085620b1111093e95cbc18d2b32ec8264d62460fb58b4a613e43992929399f6441032c9a3d941b2e12b7db5b0ecb472d90c57ba3d5ca1bf3f46bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7192083d86557ddaafe3602f7a40f9d
SHA1dfc76a0335ba1b4d936416dd1f8b997fc668fb83
SHA256344848c21b4a5c5b3ab6f35e0bccc241e7b06f72e06e3fba055a568e3608d271
SHA51296b2e1364a4415d36092796a192eabe44d29b2909b1ad407a9b63542efc597de5f836e5acd9ded9369c4a29dc6d99412c744e13d998845c308e2a301e3c7c284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e91e438b57a6a99d60b00a6f61ab4bfb
SHA15446cd9464246c37ddb9b8202fda0455459a8dee
SHA256139e88068079ad00fcb14df5dd6716f97e3ab57a16a22b0ab3d2896d15926eac
SHA51212092fcc5fe38437f2c8628075bd97e5c833a68d6933d8c3fad493efcd0f8c368e64e2114d1f4fe8e7459afa5a81d633ac733a0c597d07288ca4a2a2b6aaa642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93e28b32c2e2ce4d48422f79fb53325
SHA1fd287cf1625ba8ece9040fa58c52443be3411aae
SHA256255ac262a22a8693208dcf97d423c3f4e6449e2c7b6097f2800f3fa30106a49c
SHA5125de2866755c3fb33d6e7327f7b7a0e1c82649ed257a3929384b010b3c738bbd5b8bc670d6af424be421411c341eace447adb9a7d8b95db8e122f7a88aa3a7909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414ca60577ba55b680a15403ca542b7f
SHA1df3d46973fecfe280a9a02c5c272a4d86d171ba1
SHA25630fb0ccfa90169f92d42bb4d0bdcbf2dc08ef36d3a19f870a416459cdf478ee7
SHA512700637b1be6826c39f5d8c9462d6f94631a5dec645105be572f40fd12a92d1875d053dff5c1c82559fee01855d6cef4079b60353b5b6bb8c612f38b9ee190461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73bec48d86b87766f26b2018dbcfc1a
SHA12463ca160140d2d509fd47070a4945436ac5d01c
SHA25640f6a659c706df455a15a95a661879f1eb0d6f911787e541f6e826ba8df01717
SHA5124b3af957db5235a5a85ae39bc216c654feee8b8b70c084af1bb4aff88bf85e370bacf64b7b296b63525fd401cb544e01c0503dbf33ddea3544b4ce35515eef66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8ca330733cbdc390a70cc160db3f504
SHA1772620acdae8e82cea14e746db91ca1da0af5514
SHA2568d7d83d7d4819536a7f56e0ca7cbae10d477002b262f01358336cb1389a51d34
SHA5127abd72dd61596030b0cf0270cd8cc5b6d0054d31088b9cbce8c0941956fb58a2d41e7db929e10af89c6cdbf30a7d0cc83338c980a791ec277faa480d9b8ff147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef41eb63afef645e6228918d32e2ab3b
SHA114518c3b9a0097399d70607de8c3ee2766bdb6ee
SHA2564d97a63266146b058ae12d3ac424b8fc8cc927537df8f8821042e67b4e553eee
SHA512756aacee7a0c8dd3bea9f8e3668226c19cfca28bfe314681eab9925b373710127584e432da9aa8ae96ea1a0c7fc5ebd06a7246f1291203953c5afb912ead062b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ee2e7eb7b27dcd59f79857d50c45b9
SHA13d53e6106e87e2325beac4b3b53f90f1b84dddb5
SHA256a97b0d2b32deeea29da2c60501097ff0a468b6abfbe64cc406accc3aaa0f76fd
SHA512584e76d7d8aa59bc6fcabdb8a9210a41552e8b4d00e0c1ea33c600436eb703be20863c9d9f71fd09b2521a3a7daecbfa1891342a0e7785d7e71c21acf24622f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b881d26d6515149390772e800df176
SHA1cc1d8bde76585c75efc3383709b48c65697b676f
SHA2561fd11e18f776e8f26db85fdf2738435add0ac19015ad2df3d918a1126109d1c2
SHA512139a754461f3905ac8433454a28f2a6d27f8378a6302152091cbd60fb105b3ebe8b2d170eaab381f7e01d321630d012685c714204b420ec0912354246c2d7e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d343d68087dd87d788df103252d8af4
SHA164a024ee328152d462934b103584226dfd5e0807
SHA2565ba56ab4e436bb93828a59dcc596308cceed8b37b799858f828d115f1b4f2653
SHA512595852dc1a72624ecb1983d7cbcd480a3a234563b35ffd16649613506bdb039f15a92593d8af5d0ab6b9a09e0acaa5a1399b60a77d1d23d7d0128621a4fe1400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521728278a98277b7672f94fe45ea1487
SHA11b7c18fb2e18b368bb5f58cfae47f19dd9b6975f
SHA2564ec715ffec2565681d6a834a66e943e1cd98fad214cce34f0531a60494ce869b
SHA512cec8b6d584df6c2ea3c3f9ed9ab72fd2eadcd141ebaeff46d4f0912960dc0ae9fb3b7be5f514bd08006977850e37e29394b00e57a7705ad14a6e67e2a3b25a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44f44ad8c7451011ea45a6c747e5227
SHA169394a360c61a0acefdb2742d0e20cee27fddc2d
SHA2563e17982ee3515175bfabcd9fe29288c7c1e2e72935581c3f3fc534b565c61aad
SHA5128d5d798e50e88748f592d0d961d4a5c76e34fafe7b3f3858fe5fd60920f0fca8e1894d2771647245a50c6f23645b91cceb93b10d1e4452955a5cc11d9b449c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c77337632a874c23988f37c0458b23
SHA118a52daec75de1447a2904fd6d7a323d85b785d7
SHA2560486b72a8ae8ae28293d9f426cc93a82053683dbfde695388ae5ca9d63f5b4f1
SHA5129e55599628449c849fbd2f2ecf4bd5d4d518b3d55e881f997257476c808cf5c1d72a8123d8fe35f96a2ddf3143dcc99e9e0201888907b1f3a30eead53e1c0eb1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b