Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
dd349743bdb60b2be1e247a9525f8ab1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd349743bdb60b2be1e247a9525f8ab1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd349743bdb60b2be1e247a9525f8ab1_JaffaCakes118.html
-
Size
73KB
-
MD5
dd349743bdb60b2be1e247a9525f8ab1
-
SHA1
846898a57559270fb48291c2e68ffa765971968a
-
SHA256
83f7bfa82d2f4f954842d20e7254d4bd4f368ff370156b7e5837936e40ac4bd4
-
SHA512
942169046ffa13a38452db06cfc1fb71c86a55f34f16d57e2d8273daa2ea0eaffbe536a29dae9eedc36816e26842c0cd0cac198cfffae52ae4b1bbdb38a262ca
-
SSDEEP
1536:qZIxUPAFBWnhpjPOpSZTSdU2eVUDDk/UEQ8/NZwkB4uCouJ:qZIx+AinhpjPZZ2dKUEQ8/NZwkB4uCP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432344148" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5F027571-715B-11EF-943D-F245C6AC432F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006223b82a4bb88923136307feb29c00b177422bc53cbd7242dffa0a1eeb8556f0000000000e8000000002000020000000d46b317e9a36bcc65af424da3b5f948bfd9071ce1e829ff47d83722bedf70bc7200000000691b13951ae5737e82fc63d9a479217672547209e77c39a3f657f264e2b699f40000000a306ea4419986b9ef441cee97cf09d9b08e08b104316dd34ff6cca47f07b5b009250a5b9f381c47da017da062e481c74ae34be9ba9f1accf6eaf58d0fb40f837 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08e6f366805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2708 2712 iexplore.exe 30 PID 2712 wrote to memory of 2708 2712 iexplore.exe 30 PID 2712 wrote to memory of 2708 2712 iexplore.exe 30 PID 2712 wrote to memory of 2708 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd349743bdb60b2be1e247a9525f8ab1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58307542ae85538cf7e88e3f0463ef1ee
SHA12c8f246e54efedf4cea37a5769c9bf22072d8be1
SHA256f5102b37a0d34a5dbc158b6ad6c77ffc422b2448bfbf7a92f9f9084c641b76b3
SHA51270e19d981874dd173127af69ae544a32d720aced6b454731f100e08899780176ab294ad5a92cd726e5dc75a7b122eb1aba29586c65d4fcf9f7ea887aaeae49c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e4f249b0c60c1496a210d51c46f05e
SHA11d83b02819147f405b639b49b6820f2fd0d883ec
SHA2567f65f89b560ecb7488c91a7190307d98d4f28570d507f3c37f25bc0223686c70
SHA512af55884e35949c288b39ee945698db627dd0aaf28050921cd382545ed684e92cd6ba6380327c07305b0ffca0c4e37d5e9c322a74fcf851f0e6a38e0f8206bf08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a26cc86ea11512cbec3d8800d9a183
SHA16b8a949ff280d6fb4071b3b3794b9abbde3f636b
SHA25655e1ff84b27073ebae6c3d36720e46d383a9f08a557ab03248afe90efe6ffd69
SHA512d5693b654e53f644031edba6f1feecadf0e6c1468b35e4c7e4cb76480dc768f7a417d7cce52427314b50522b270c080f9d13c27e14a3e3d2299993f91c880a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0a276115f79c14078f12b73a636ed4
SHA1980071ba664ba8ce31afc2790a9e1f8d02e148d5
SHA256db87be3d185e121be395c604281687cb34b1e35a278b5dffad01759621c1ca09
SHA512f81e5919d1d37ff12cb50315a657ed6b5eff2936fa4eef89168ea893e04f9849ac9a93f505cf6776ca22d04d4591c42cdaaa92a343ca43a25fa213b5d0505928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa5cd17085cb42a67b1d1b9ec48e8ab
SHA1c1116eb9484a8e28ef319d473aa490f9f9cfd927
SHA256fc292468a7c2b1b2a416d262af6e604a803af142c24beab5802a11f524d562c3
SHA512561e4b962accb02488aae8f638bc7118e2bca0de984b8ea98d59807705ce7115443f18628c8ebd1c3b2f290335906568325cab2e1180c868bd4d57e9eaaafe98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9e820e777af44623916c5fc6f6690a2
SHA14e0e67521fd38932d6d6f6f6a3eefc299a141f0f
SHA2569806e72c68ad0f0bd088d20237570e21877f91f60c64e4228833e4be911e7986
SHA512ec5d84efdb66ea05f83f6b9ddc6655491f330847bf67709a899e48913ff19e93c1f5e602c307fd06fe9474501f4fa3df249c70333c96d55d520c72079261e9fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f204194f5a2a36141060f1cfddb8215
SHA1e7e0c78eff77b9b677b22c0586b33590b0414068
SHA25645a4ae8222793c2d51e32b4670e5d6116bc615d67fc618040ab3ca8e661e98f6
SHA512105f128a5ed38b266c22077f4754e16a674155b2cb407c00f001fc5a81d173d706de986fb60324c0ad613ca8e040b6cf75d9d9ed16c6f7268cb9e9559d73fe8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cdd2fb1cb7e3bc53259870f3a399c0
SHA1da762a65f91948949d3f026fa450fa8ee4280e29
SHA256e8a609fae98ec8cfb3990f7d8a8f6ce9fb0cddfae7ce2193cd3b765104328d8e
SHA51247387b33d29d3b1fbf70685274ad96aa8ce028f27d7cb27e7eb77a874a47e9e9bdc3bca35587f233a8bcd7f47ece30f170095d1d943ec0744e6794c7d40a3d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f38b49bb5f3a1113f781194f5cbf930
SHA101a3113bc4ce437c3a82cc53b535a059a1e76a9b
SHA2562e985403b35b739ee29c92a0a4eeedcc9089147052b9ba6cfc4e3b845db814a3
SHA512b5a0eea2960a0ce445a06e5aa296e46dadebe8c7a6c6bdedb9dae4d1ea68b4d0fa29adf895ccb91e50564bded23ab15fd4d60d82cdfd343d8db98255725ec369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b79c585441087bada281618e87bd1f
SHA1dd9d3189916efae306d48051136dc14752c0411a
SHA2569cb843be180babfa7fed533d05c82c00855d917ca6ccb3cac3cfceda1e66725b
SHA512385514385063dcd72d15e7b049ca521672eb1ff1f0edb0289666fc5d1e17a1689b3c38629857f30262fd914b32fc0c1dc0ccb373c01cf15e9b572db65295f03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef638edcadf8ba886c8cb7029cd6c89b
SHA17ce13a2ab2ce818379bfb930e988ba62dfbcf855
SHA2565dd6c30dfc502e062b37a81aeb8a3e5a98ada50b1f492f640186b7a4afb34691
SHA5126cacd9f8b9273641572ce4d72e198200e97bda7eef5f425ba04e6d092498e118226693d8b11c820e0e0644d848b825952837e7c738c757c701ae6b53f974453b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da6b6271acfa30203b2d555755043b1
SHA1f6316a71cef5f337fd7e982ff6e55e467cb06ea1
SHA2566cb4d121419b986abaa45cd8b746c6fccf9e29d6e5fb3f027c5b4a0c3836eb31
SHA5120d231d449f13d55a1df27a3dab34e78cd6b31cc7b817dcc7d366a3a03719ab89e1d0c859f8c355f9a4b2e312b6cb8c3e18bc03660a4b55ea1bbb50b8ee4f84a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c2de5c3298e6a038a4d9ff6aae8fdb
SHA1768f9efe594280e9effc22478e6ba8cfc15b6052
SHA2566c9e1755ee34f40e6dedd2109c81962199ba72a8d3bc430eea4231359573d441
SHA512a36c8813ad4c62c902c5b111e8e15bef42bafb1417915447bde28938a8695e1a3b00033b6ac41b815b1b1be586ee37e0456218ce9c0d6b5d5c3bf7b8f09d6b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a98d90f4a7702534f89b66bfeebffb
SHA103b409ff8dc314ecfe3348ed82323f3991d457ee
SHA256cfa93ea28c983ffd05a29e0d2ead8f074a07e1148fb677daed0782df25d0f626
SHA51295f5bb511eb5bfb7199a97e91da0fb23cb7d5d84d37b09a1186b06fe64256dd57c50cf84d80fd971cf7956ffe7368d1a93003e8f9469ddebe9e553e0b722f146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265e9aedd09e62154a9de1282113bfd2
SHA1f78873a91bc7fed5e09d6b15930ceb8dbb920876
SHA2567e063213883c8e33fd05c6384a1b5fc07e57db871dc9ac9cbea230ef287ba22e
SHA512a52e045f7ec74c1563424d723e09842cbab6871a1f55da26a2b6b09ef66848c907865773fe60d1e3d261a7f189632307e1e04634c5f34f244c347b2c4891722f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a204dab84ee8f82e339c9adedfeb356a
SHA19864f7ee6c987eca567c73dfdfa76487ca9a0663
SHA256d726589024ceafb11ebb686a9184245cbd64b015c226d773b36faa1ec8fca4b8
SHA51293a8d33ef73cbac217d88d0dc84f37fe29a998294ab31d6c007f49b10cbca3204a774dcb46ffe5aeec68ef0a91b635175d4e1512df6779edecac404409da2fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8552a099243052b76ecbe3c2c66561f
SHA15a47e9813cd6b2ce229342821b9f627fc91d9a05
SHA256c3bd570e55178c7ac1214e277249f52c8c97aae62bf9a63815f07378533b5f63
SHA512b3ee04bff76b150a438492f168f39bc5411f7a1e0b91ada30d87f4f592093ba1c4f5c4153d98a01cb1599732fa0ec02204eb23d3bace338881d6519aac8416fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a894f76b9caf5b84bc98607cb0389308
SHA19d7cf7a32eeee1bf732c95769850e03ff26c27ba
SHA256e8cdd80e49b01b6d31be67c1f539059165828ac556668b58a10b852a19de1389
SHA512cdc26ebda283fe6fe32a107f3e3c29573bf51fb55bdbe745b47903d4f75882be4913160eeba4ddb69df96fd89a17118b0b08d70723cfba174c3fd169b53d58ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQU8S4LJ\plusone[1].js
Filesize63KB
MD565d165a4d38bfc0c83b38d98e488f063
SHA11c4ed17c5598a07358f88018a4872aa37ae8bc07
SHA256b1320e0dda0858c87971f7baa0d53063ad2a429d232fd06b0067bda8b9eeb0ec
SHA512abf4c755d88193e7e05398b6f934fc561d8e2adbee7d2170af399e145e54a4a8a93988e4af4e28d6240c0bd1bda7035ae97f67a85a471088820baae8d89f3d41
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b