Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
dd2d2122f4ad3ec4b26300782b57a2e0_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd2d2122f4ad3ec4b26300782b57a2e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd2d2122f4ad3ec4b26300782b57a2e0_JaffaCakes118.html
-
Size
21KB
-
MD5
dd2d2122f4ad3ec4b26300782b57a2e0
-
SHA1
68ddd57dd1edfda12300e7071b383f5c011865b2
-
SHA256
d50f2b53627970b845f831c28893165dc389e485a8e69e0ed7363e69b7f42b9d
-
SHA512
fd3cda6e8a570f97a273e48adb087e832bd0051f37926cdbeaf4e6a96f5f7ce3caf190a6cdcf1cb7622de55215a0071b029e4d946a0d9a2298ba4a1043375ece
-
SSDEEP
384:vab4GkPSQTHTv2egEQuBzCkarEwKr5YfNTbu9Jx/pPqB0v:vab4JdTOegEQuBsrRnOx/pCB0v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000d6a3c8a3e13522c626e69be0115ae57df7ccfa5e7dd85c8e5b997e6d9f772f9000000000e800000000200002000000022f2749a83994115d1d31800092c29578c5fb9b8e3714776665a63cf9cbd0a372000000004aa931a5b569993ec18f79f810ff1e8f1e8c3f3cb7adfcf7198ea50b9103b4240000000099f38d276ea84b04aca76eec15259a00ae4bea81c6e82466e33f64c20e1bc8a7952bc9cdce28e05bcd885a9015a16b6bdb79f09ca84301bcf17c4deb8f886bf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A21E931-7158-11EF-9B6B-D681211CE335} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304134d26405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432342709" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 560 iexplore.exe 560 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 3008 560 iexplore.exe 29 PID 560 wrote to memory of 3008 560 iexplore.exe 29 PID 560 wrote to memory of 3008 560 iexplore.exe 29 PID 560 wrote to memory of 3008 560 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd2d2122f4ad3ec4b26300782b57a2e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51960a3af6c7ec4ee12c37788a42f80e2
SHA190f88c7bcdb446c933f8157d0909208af4a5a587
SHA256c2060cbc00b19e87925ab982fb15b36270bd5ad20da775c0be2eb1d6afce7e8b
SHA51238f5c1c2f8e82469914343b73044f79744094d0366e25b626eb77f08d091ada9dbaf91faa5ea6b68d6f54f6c323c76adb4c81e6a37805462dc1340946bde4d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a44296264c333c0359e4b81288cc38
SHA13a89d1f68113a4024ce30d5e208a326e912556cb
SHA256ec890cdcd8298ecc0bc3e9113cb022a652132501b4d32b475d92a16264f0d4a6
SHA512bfb7574b87e5b238ca2c02403bca0063a855362b96ba6af4b5e35a4e8f5b18c32ded2f2075cd9045442cebeefe30c49ea66352c3f516f7be642963a772bdead6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29bbf3e8f4d4646f94618b0d88ef8cc
SHA1166bf77743ee68349038a9dd1fe336a562218550
SHA2562696b6673ceedb573ea6a1df23721865e1dd9f02843e416f15115a505ad6e4d0
SHA5129d3ebb9e36eb3a305bca2b6a1d644e088530ec9cebba378f9c20fad02273eb7281b07651bc05007d7dbeae557225035098cda35492d85b2521c4460ad1673147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad07b102febcf9de7233c122a11e370
SHA183b39d87e5a847bdee645c868ddea8580557c1ff
SHA256d1c7d75b5cb009925b607a9c29a659c341aaf1595813667a59d581168a08596a
SHA512e8536eb8ec90ec3feed6f954eae1c1ee970cc70e6610e1267f04c2488f115805a9accb2ef9220e826c5952c9dd051e37b1f35e8f4d12b3c608dacbe1115c6166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d600d6c2a85702fe79fb9fcef1054070
SHA1202e1967730c51d4ad3497aeb21cf20dbeaa8c09
SHA256b199504152fa8c43f8309a084bd2bb329eb04c79bc665ced9bb6b30d7f9660db
SHA51235b0de73bf841c05da362885972543ee49ffaa2bcff33042c2c86df1e746d4a900600333609fd147aa3e6981f702eb5ccff4cc44e9ee44117d28e3a2a2ad6fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f189d8797abe1085749b2ee66adb1528
SHA17ad2f0fff38fd4c8459308dfc678729430647b9b
SHA2561a1b7ec5f45ba9ba8837b2757238166ee436d09a4d62ae2c04dfbd0b8b38131c
SHA5128c6db5387244c8acb97405d6dbe957c4a679c702dfcbd3ab636859bae46d40f42759e0831401a35ef8b1a592b21b7269850284c81acbb4240be554ed7a15ca6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de73992c3e90075be88aa5eebff0db72
SHA1fc45fd210f535fe3d7b738bc18784132468bac9f
SHA2564d0ffcbf8a329095ce7b59ff02404bcbc4aedd8f51845b3d29125d4381d16b11
SHA512f47d006ca09bd24873521e3b32d2c71e58882f882467cbcf54ac00e1b24464b6d3df557f75fcf3178f8eaa03a052a34057785a1ade792d9d60960213e278e7f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e40ad3809c71f1b060d43001cb3252
SHA1a0cc7e3b46b20c20858211bf1ed81f9751842bc2
SHA256c0d34208ca72dd4bff2d2b6d98506876528e314945620a35fbc9fbdc41596b20
SHA512cdb4abea2ac132339846910d395e9ad1b3018c5566e23a1c4d894e4ab2e76cd32157743e110e9311525e7b8dbece3430205172afb049b7f425f2a60e215e2aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560300d0fb6d2098de8dd3a12c45da8cc
SHA1c894d368b10ed60faca60dd4b19ac1b5ebbbff13
SHA2560560448a53c4ce62fa60aa83c7888ffd02660100f5fb4e1cd03987ec8b27b90c
SHA5129a44c10aee9ad8847fd036fcf7e1d19bd16f637a8cd523523f76954c3386b370bfe2c64e6b0a99f4a38d59745f196083a5fab9ba1c1dcdfb5667ca8355c18692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d231d56e8dbe8ded6998bb56cf1bce
SHA14946ea44f5b22acc577ecceddf4ebb6e45a374b6
SHA25658ba7b247e7eefb46b0703f207bdb59faba54e3e52e410248fdf3130c67ed6e2
SHA5125fba95b465a3e80d1e579b2b569b29552782a4e55000f3177c953cbbb0e59d2e6fb61426807140b953ab85cc110441bd5a12eb62cf073305f615817db5a9860f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8365b631e0372015e5089144d097fd6
SHA137cf9b419d1d18562a4eb320896dac95c06a3f3a
SHA256d2a80611d005ff9e064115554a11c9cd91885bff6e0209089cd53f8a7f7a3a09
SHA512ac4ce0cd7544cd94a76be3f0e974164b0f345cecc0844cb7b69006ec56176604899a984b2fb08a38f636771deb12d2cd15eef1365ae72881240d4ca4b2ce0c63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b