Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
dd2d0763c749156f33814f6d86e23f45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd2d0763c749156f33814f6d86e23f45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd2d0763c749156f33814f6d86e23f45_JaffaCakes118.html
-
Size
1019B
-
MD5
dd2d0763c749156f33814f6d86e23f45
-
SHA1
f60bcd9b83aa51f92c2dc94f1cead6c2940cf83c
-
SHA256
b568e2b0a9f369fe1366889b3a6d340487a78bf1ff318ba677cb5898b8bbf4bb
-
SHA512
541c41d71758058f9ed23873e5cf430339977e9017cdd5409827462a35c2307942058b8b998a5c4e139e25fc064931450c2a3e53ef26eefed8da02aa4810cd09
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432342680" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000002c315591acfd4d3d9c051bb23247c60e5ed5bea14f0ed928b960113810376aeb000000000e8000000002000020000000c83638ce2db035f50288f6e83d8f404a7225d10438e69df8bde169a5d0c6e217200000000e289550e62c8249962ec1275ded826c3659e85a0069ac5abece8764ce35d79540000000f484c5fa0b935c6e0686567c549b82a6ae26d5bc085265cc3296584ce0d245be2f128a7232031c958275034743acbc4bb68c4ab6a0713540f48de950e62653b1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0d000ce6405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F976C291-7157-11EF-A5D8-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000083d0fe418a939b36ed7a6e2e435efeb1eba4752b73c3251c3299d9e65ffcfe6e000000000e8000000002000020000000c243586220233c269f84d91d089e82c8b95de6041cf5dfa877d25a4bc2b1467490000000605a647d0b76f67f0b77e9bc96b1c4a045503258fb49ed5792881a8500009c2b6912c63860b303caa6eed61d3cf32fb1eb4e68cc6b7a772e974033b361257bef52241d9686cc0d7ebc7449119f03c9c202021462c123ee46ee71e7904b40a457d7b38d60d899cfff44bb1b3232da0bbbd47fbc243713eede06f91d8b86523838513c4942e86b2139eade8f2b1e352c20400000006e1a419f79191121aea73881d19d8f67f7d419036b7c29ff7792d4da98ece7c8d424cf639e0592b0cd66b79dcf6ed8dcfa9d62eb0a3539f9d415daaa1a77dcb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1564 iexplore.exe 1564 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2548 1564 iexplore.exe 29 PID 1564 wrote to memory of 2548 1564 iexplore.exe 29 PID 1564 wrote to memory of 2548 1564 iexplore.exe 29 PID 1564 wrote to memory of 2548 1564 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd2d0763c749156f33814f6d86e23f45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52552be663c3549d34fdc0007bedbc294
SHA1c6995a7dea2617ba3b075b5d5869ac76f5aa4973
SHA256075eb0c5a69eedc024baed4f7a0731b46c5aa22bd632b4ae7722caa9fd5a5f21
SHA512fba16fa221bca04c5bad5ee33545123176cd540a2d88fa22e522ed0654858f8fb539a977572ad04226596e6fc7a80ff36c00da4b826f902de26696557ff8484d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbde4bb1292adfe2ab0ea844906d08e
SHA18a902e2c423ccd3a39c43c9168e2e5de26ddd963
SHA256883039248f45fc637ed259c569f40e467b06158a18332ea1836f3c04fe2908bd
SHA512185e5d76ee20695069a7bc3c5840a0f4ee48d85b30aaa6ab98c016ccd53d791a23bd680f9ac930bb84c97c49541c6fea26f869c19ed5a63218fb2d9c77eb58a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa8227204601c0516289df152f14326
SHA1e5fa25277de40a67f4f44f1a48ff47bb312ca069
SHA256d8335fce3a92e593f51fc93db58a572a6d5c9760f989a30b7dda00d04b0c5503
SHA51279816238d2f7d8a0ff27a7f6ebf95f73aa75ae1f18e5e9040707b9296471308390edb0dd306cdf824ce5ecbc1695d62ac66a535371f9e2c82fe36f7108467011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98012d322ee6e42379ccf8a752a6242
SHA1df27f965d5deb263ba5fd3cd8a8d8a9cc5e7e1f5
SHA2561fd86c72c1f43756f4420b5dedc7de882aaa2a4b0d6923b3360f1c9ed7d9d24e
SHA512eb3cf8f4f65805926e5c337f332db47bb88ad3c90f03b4695fd0a25a3a6148dc04ba5fcb2aaa943268ecda02217e6dc9b2ffd0ad1f6fa56d709471d87e2e53b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e319e6baf2c9a0c2ad99431730a0a7ba
SHA19ad4b7f6022a75032390dad199c67bf93de268a5
SHA256491e1b6a7956766778b4f3d045e5b7560c0a59ecb7f99c8b3be591e0752276b7
SHA512072e2bdd273c11c085cdc6c633d1ab491893f5e344aa6cf0a1a2c8fca103125036f1d04d8536ee43774621958bea65885eaaa199835e0fbaec93784596562ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f017da12bfd5c35e171f18bd2acac3
SHA184f30459f81210662d2cd3db3b63077ab146120e
SHA2568f3393824131fedae46707ac17b23468efd0af70b27f5180550d9978fdc8fbb4
SHA5122f331e3fff6dc8399a63a5f47f6eccf8e1232873075dfd26673b06ea1a8afdf2b32c6892bc00a7845e54d9b7c5aa97c947c07875e02c9dd485ce1e5e79b8979d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f69757752eadb4a1b13181d3922282
SHA156b15108985408d6bb17fae4cb75723d3129ed27
SHA256036b5181d8929de266507914fd0a4273658a0099607901245d91034a80977a41
SHA5120757b988bb0fcaf7f144e9ff6b48574c6d81bcd3697c90855002acc9f42ba7f6da24b49e72b9f144e1ba87d02998301b047e60dcd244b6ee7e15236e2c495dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b68903c190abb251bb684ff2317b385
SHA1b4d8ed5d3525335af89be73133a36829f416d943
SHA2560091acd9b87350bba438365d8e25f2f16aa2462f96ab5aa52610fc4b78229126
SHA5126dcbe91fb42d582103550781694ffd5e08fb3a3dd7282def78bbd64cc814218ea0ff9b3ac8fdb427d837499d22ae6f9a5447101db210d3914512ac6057d7a4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ef23ae5fd7eef47c7337c5db87b087
SHA13e30b9be050cdb98b802bb57a2ecf7eba6acf073
SHA25636b2929db0af0ceace7c0c591f55eafa213ba20db0e4f2da3e7f44c47500e487
SHA512450ea7230c899cf300a6dd7c041906a262efc2d61cde36bc739f5114a9980da75d45e704bcfdb83d48536fcb6c465b3dfaef0887a5347f3617f64bbed03112e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f6d5aff5457f6207ea85344a998128
SHA16bbf6ef4ee2bccdc901016e62da2647345b6aa59
SHA2564560c742e1e79d135e5162aa288f4a6891b50a6249c3b6f20c72e239cd7c2303
SHA512aeeb3e36b52c2ef14725e56c72f8f871fa760d122318646163df37d6bb5f416c7b64b6c21e2f7486b4a2c6ee72e4ebbc27b1bef4cfd9776cace3d436e12f596d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e1f968eb4b48c0149a42a8676c7b68
SHA1f9716a66d16e81063e8e83625bb9a9b28b8ac27d
SHA2567828632aca5e0026b0ec4a0e97012abb0103072af199abda9422a267fd9e43ec
SHA51252d24c67d0f1ccb378d90a48da603bc905c81d1cd9b3b6ea39dfb8f4a67675085bd05124f55a4ea3e2c3ada062cf2cdd00539d25c22496a781cbbd94e2817439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed6ccf7b65de5c9bcbf355374beb2bf
SHA111135fe679b244bcb9dee90a7499dc2059041ece
SHA256d6e5f1524f78b9f8f88fb39f149215183dd15bb36be3b769226035d6a431ec56
SHA512592e8b92e06b9f06e8231ac85eaef192973fad3ce55322b153f3de6805f6603b69b63884227acc7a94c925d4aa9f7ad0d8a857561367e3f75a6b28123f61f2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7443bc97a4a9cd47487d6c314ca7260
SHA1a15b43e3a542d4f5b8ab997586351588b32edb15
SHA25687a0d774480d56243ac6e71c10514d621da18bf4b687b55485463677f80af60f
SHA512cc7ba937f18bdf2d1f109a11a6089cf8bc223de730c94c60f8459b6ae264bc3a8524cec82d52aefe31f0ea5a8a55e7a5f13b41d8bccdda80ac9787466abd1e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c474c4d3baf682b6b465d4922252f77
SHA199bff81758e3599b68ab6137a5b24da45c83285d
SHA2563c9269f06a40e3f5a3fa76c7b50a4ff57c281fc8489b5248fa6cdb9637ae8308
SHA512eaabfd44e477dc0ffd71f9287a5fa788f911904b61b38e2d60808eb518d2528a47366c20f7a6d50781ad407e988b8605b2743a22bd695223118f0a2027b3f8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f0449a9f876c375e462c12adc09001
SHA1f04a11cc67d1b646816188c91f63e29d1b1672f4
SHA256f8aa4ce03c686607de94daf208b146cb25dee279df7f7c957ae0f43fded49ec1
SHA512d9df857b809db98f37b5ca555076c2905494afbd9a3911b246767e5d73ed8877a77b1dacff6b44a4ad6dd14af0cb3c6137ba328fe1d3aa37c9a8ee2ee954dc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694a7d8e71e4c2bc8c0838ab2dea57e2
SHA1d5137395a02b2633b2def49a76e0d79729976b60
SHA2561fbce1e14f46a3bc8a0750070fd53311b9619b193ec81a251cb6d795ab01f45e
SHA512632e2babe7de881b47493d1a32da71fff7461954b5d619b5616975a0630833b25d0ed431c8477d9cf38bfbfb832f841afa6bca1a0526a162630e9d5806d45109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6b0f4d4f55cda93ecee6078c54d484
SHA174266a34afc1d2892ae95feb9aaac72f143b9560
SHA256940ab893783d115dd0549855e6b88472e0c1d6266dada1d731970406b85fba84
SHA5126ec7caf42adf7d00017cf070d88ae9cd683f3ab2abf62d3aad571f87ed42f5d7007a1a002d50234fb393ea83e499878a80746663af6ec5a22650e4f211cc78fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcc89785bf78095076bac7dab266cb48
SHA19a72e7c57af270173168310f63392090a36041cf
SHA25674b20679d34092b9e5d6df23ae28125c0e5f824b9e98ede2b856d6165046f54a
SHA512edd13a8b216c1b623284c4589a791a2ef12b3bed9fac24f19f05baba1768cd0d5cd0c9c40a2c7a94bc4bc4296d54acb76c5fafbdd078f98ef7c0d4ece2ca8253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb74615a52831f930b4ebe40132835bb
SHA16b8acd5ccfa27a4d4bf6254ed8eef2179316e55a
SHA25697520841587c71f1393fbaeb65b4f2a551252626706f74baa8055250ff53cf09
SHA5128fb7a9453de6a0bc2ebc6a3982ceac1c75a267c8278b5ada35018485b95f9264bd309b649c3d1ca1d89e5524e0b01bc7effd98599041e695f6e1bb203e9f98d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b