Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
dd21ca34cf4877125f88bea99b03c303_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd21ca34cf4877125f88bea99b03c303_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd21ca34cf4877125f88bea99b03c303_JaffaCakes118.html
-
Size
461KB
-
MD5
dd21ca34cf4877125f88bea99b03c303
-
SHA1
af02c3165012cbbc618c118db4cd48586f81d1ac
-
SHA256
ff9c30c60d0da8ab66cd65a6301fa921024a2e0bb2d7e25f9673534442e01b08
-
SHA512
73edfa430a0c8cb8487588a6ac31d7af8cfc460f8b344b9f7507a27fa7a5239401a65f412fba6cf2febde3be3a4b5b83609daf8e7dcfda3094eb20d9e8c6c584
-
SSDEEP
6144:SpsMYod+X3oI+YHksMYod+X3oI+YysMYod+X3oI+YLsMYod+X3oI+YQ:s5d+X385d+X325d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101691e35f05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000005f98feb180d2fec943b33e9bc92589ae47293fdc0387dadfdc21d980c6e8a626000000000e80000000020000200000001a0ff80eff7e87aa1c35f7bce6a3bba1aa3295e3106bfce3374450accd05db69200000004be37d237a6340402c169b502b46dc877a5009c2616a5b0c8e30b77f6bde284e40000000b662b465dfe7e3d8210c05bdf6089c8cd2eaf37f86279872f7809ec7a47413a9e901314d967d55407fccd673ce156f7491d14ac64ec61d1267558e1ba28d7e48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B069DF1-7153-11EF-ACDF-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432340563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2772 2636 iexplore.exe 30 PID 2636 wrote to memory of 2772 2636 iexplore.exe 30 PID 2636 wrote to memory of 2772 2636 iexplore.exe 30 PID 2636 wrote to memory of 2772 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd21ca34cf4877125f88bea99b03c303_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574585024b74cd79848423ae6c0f65b68
SHA17a729196f2c4831924268841d4ad8aeb8f737170
SHA256d54459a052590450dbdf3284116db73bb2e6833cb20a262eb508666407a162dd
SHA512170a0b76db0bcbbd612d76a1ee72a152a9fbeed51cdaf7d714ecde4dd8af5ac7d607cca78dcff258076f6804bb9b87a04aa5aa0ea65ab4ee59c294064199df8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5985bd04d6323ed3f2c482cd7e0e0b8af
SHA1d0ca591758f4661220dc946319b245630deba24a
SHA2560f63ccb0691f626b0035998a0261523fa4b0b544a2b58cd35e3c66c229de6d06
SHA512a742d5d01a0596f7dae5e1513a79249955fb2e106679b936e7b0d829f82f1be74ab23a61e8bdf2ee57a34603394c7008f6ab5b28267fe872ec61d336d16bbcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e17d815bb532771af27f2f23c2ffeb
SHA120f998c457a4202d6a28a82aa4d5220078c18a9c
SHA256ee94a4eb2921ba451fb9a3b30c73b637b2cc1cbe94698215a58837699fb9b2fb
SHA512110a41ea9f9de193c591ecfd695a33e8cd82ad6eff748bc40409f80dcd905812bd99c68dbbe43e0b6483dcc09a2e3c2ec751764abbbe958549b1b5b80e91238f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506475b20bcaa2753631a89574b6f7600
SHA1f89a108f9fb0b4419237d907ca178325485d9b4c
SHA256461bd9ad97bd374c8f1aef73fc78d4dc3536b16b04b7f62d7c1360f55277bc54
SHA512db0148fca7b8e885f851303cddb3dcbd34e59437b12d54fded9bc0970a76432d2c78bac713a6fe6187a3ac33dec06af21db8473ee39d07bade5e5a721af40bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f4566ac6d559172d07e883b9fa10a8
SHA1da340d6263bb2246cd1c3b0bd5d529ab2227408d
SHA2567cbae1e8f17b9a0da9acc9a412f40f8baba5ac830a8013c355b5780a506abd01
SHA5124b29cbd6d7ac86cf6b008673f90b1d82003bbdb1ac509bf255f86cf7b1e57dbfb42d9e5ec78ea58d4e313558ed629ca3ae1b069a47ba84fadae6ca606c32a084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed80dcce118720fb106f2f01c63c219
SHA1624b75e2352be08209882bfad3deaf34e0545bb2
SHA256e1e6453512220f27b698ae1e149c78b4883b953f74d9a2cce2a022dae3ca0337
SHA51264fc0d02ff7b6d02f82f1adfc2644c9843e64bf54af0d08bf7e329bb5d6277d977100211252f5bb795295f597ac93f1b7077612c839fbd678984e8812975e6fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd43cc0330f91c1530cf74fdc13130b
SHA11344183430eb9de3daecc15b2d7075f7cfc21653
SHA256648afc21abe014ffe0daa01fa89a071ef11392da67a745543e80264628f8fd7b
SHA5129d593de2d08431d7cf4abc667f13cad1e74bc90d0d50ff27011a1868b9029984bdfc42ff5e3c89f6d5bef1d9de678722f736be15e963b6d89979446e2152241d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d197ff4ab5a9ff6ed5dcb1c088d1af
SHA126cd0c82d72f0e25a17baffe9cde745f1a056aaa
SHA2564056af295211791a8f5e660707051a94acba87039f614732c3bcab72af4ff569
SHA5127fab409de76f8b74ff6765aa716612097241ed87333871f76378012e510389a2f9fc83a8e85dd7b745b273a329d6cc421bfe721301a7c3f2c18d7fbbd50d281e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56866e9d9846e729f6ddfc14927af5ec8
SHA1f36ef40e233d87ed69a021bc31a836fdc0e609d0
SHA2562d6521dea0f8d4159d4302f562d393670fd2516bbe9411198e89f13e49b69080
SHA512b36776d364f476b961bfbf6d7a237b95cfed9dc411a2b9e1121df95daf06a6a82418d1459ead044ac08ef616c3ba0361ff1481207bbddd7c3952a9d9c8d59ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88f08bf795c75bb593a04ca27e15f67
SHA1f2109fa0c5bd1aff0dd0365e3e7c5650c066674d
SHA256861845685909b7d40af09ed3b3b1b5f6086d9b364efce2e499307ac2b9c5668b
SHA51215a2f4e7b389d48cc5112da6cae52922001abd0f35ab8f1dae3c96cf2683025972c874f48cb52d53e5a0539403dd532165ffd8c64d566bacd4e33787927bdc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f39acd20bd2938f8de33b0f9fd46d50
SHA1e29ef2e6afe8adced74f911575fb456da4bb3ce9
SHA25610b32730ba723f8cca8d51d5749b069058675b9d1001aa0b5278a60f67f7113f
SHA51241b77cea86ff5db0429cee0daec665beb09a416973651403168580af2e7531eb6235aae1ecd7ad041032c160e3a2e16f976cd3df64d77a1013ebac43ec2fd5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c108af0742d03fc6360efe35830bf4f
SHA1c9143ce173452841673cf5895ba71ebb4202dce0
SHA256d94495a9f01d1cc685e1dcdda49d925d063b10447712b8deb2fe8c7425401edc
SHA51290fae637db7a716c3739d592a25c5084a3962317340537c3a0075440251706b0f0d0d4b84c1a4ef3f97fd08cee70b79194797d91fa4d90ba27b1cb004b61311c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b7a7c308a013fec4f707f82808cbf0
SHA1de93a79559b339615b610e1584590a5f47f3e696
SHA256c9f0ca9334f0fd8ea1e8e675fa9f158b0f576d5c035637b4dedc7bfab76faafc
SHA51297759ab81a8ad058d40e17eb4db3269d48a68e80013873aa34ebf8b70f373347c19e86affa5e0008ddfac216770770c147ffce9255be5f70a3e64090ec27c671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5905f9217ae983936e1b0e3ccdb8035eb
SHA153dac40b974a0e0be2324d1298f9d457bb3e4132
SHA256e44a1507b372dc521a87d071719eece0f75d90f89fc283e67fbfc1cc81d34776
SHA5129e7063048a8bdfee7d47cbffb0fe4f20e9dc0703991d9fdc1ed18ef134715d964007863d4ebdd55530fc861c1a1445ebd4ec53f99120cd76c013533641987949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5887cbf912ab19214e619c8724bda1
SHA1a7209e7b37ffc48ca2fbf25c530c92f55884b39b
SHA2564801bc893a44e7b1a8107eddd029fd88d4d4cdff8799c95c60dede7102e1697e
SHA51299c0fc73d97f1101d90be4644895e29cc522747cb16ec146fa59b6abee47b45102db54e597367dde37809653269edbfedb839883dd508f8bfc0fe455c4aa1a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b547d7c6054e37b117e8e93ad5e2610d
SHA1e25c3e2bf4a339d9abdfa72e0c3b54627f331b0c
SHA256222ab758e470bfbc288babbf5f8d46bd8286e18089259f2bd73a5aaff7e0a826
SHA51237781cdbeabc7eedf26d4dd0a51290388a62eaef715d2b4a1080f20eb179cc69d7047ca681d8e6f4f58d63cd5b8ff5d2754d87bc3beaa68dea4f663067a46dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286de24dc6a8e7a6e7b506e6d69bcb8a
SHA1db393a2b908d4ad654e9f29b46217c5f18941475
SHA256745ec99feb5618d72e6a5b76040a8f2304374c63d352a8920f87c0576fc03bf6
SHA5122178978ec8e84afd9eb8fa14a7a00f9d41e2cb383187f44e3c1d9d4ee81faab0cc9745de6b9829f43b069fd91136bff76b895021754ae421df5940ac88e2e1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d263db1bc21ecb4d26ab3575bde7bebf
SHA1b9d4ea3e1779a5ebd05f060af0d4e82162ad983e
SHA2568e54f094e6904b6e81a3633716bd3f6be7fd61f3cf1f7d9e36a857c0513d4ccf
SHA512907b0d2386a677a4dc960d4ffd5fd3d7b26efa490a367a13bf9c102b1043dd4faff84153a9a5019162764144114229a0c6d0b58e10d89b86cb9b951726a0a67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6e891caf79d8ae8b6f6c8b15609348d
SHA1f4e9da635ae137f878a598af8688573bc99462e5
SHA25666a33bb3121c350eccdce7e6630c6398b83296776b1de50f0973a0e24bd070bd
SHA512138785a6ed40dbab5ee4c4de8e254bee12529c38066dbb519bd0f04096ccb1e780ecaee162d50ca1edb1fcfd66595f92c3b8a7a6f73769666c27af4a38630d67
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b