Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
dd3f2f937ca6c425c34989495179033b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd3f2f937ca6c425c34989495179033b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd3f2f937ca6c425c34989495179033b_JaffaCakes118.html
-
Size
26KB
-
MD5
dd3f2f937ca6c425c34989495179033b
-
SHA1
dd0095fc89a199d7c71aa64c95490f454c113346
-
SHA256
d05902be89baded453913fff6dc57d46717e5765e30f42db2b6764e667448b10
-
SHA512
af320f77e7644b2f7654a7030907b614d372c5bd526197303eb3350b534659c59ff47176994a60e03908a014076054a3ad4d8bae80c55e923928950b68a6cc8a
-
SSDEEP
384:0fOb6dKFql83Dvqhyu0dWfFnRiCBh7Sx8FYQj03gI7U7/k7gf7U7/k7//q6lX88o:zmgEdhyu0dWdDRFh03us6/q0lo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2EAC271-715F-11EF-848B-7694D31B45CA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b3fbc76c05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432346106" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000986102cba93c6399b89e0be7ce1e05915f08f43389009d18a8eabe627f8f4587000000000e8000000002000020000000baebae4bf1c1c1a7f86ea637d631f1a16bcb8a1027ee3a8947a4f5649016b0512000000002334589dc219a72ed4b8f592ae57da1fcfca8959822e9286247c94e3d41b213400000007cada84d11c366e9751168d38efe651cb247f1f1a220ca5c1144e794bdce09227dfd35dfcbcc9a3f4000d62cfb3b00664ec43658c5ee755586367fd1dceb805f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2644 2748 iexplore.exe 30 PID 2748 wrote to memory of 2644 2748 iexplore.exe 30 PID 2748 wrote to memory of 2644 2748 iexplore.exe 30 PID 2748 wrote to memory of 2644 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd3f2f937ca6c425c34989495179033b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c938a82a9836e60be3e23603dda0222
SHA13fb8226dd5067e2a33eaf4ab782e97c22d7a0ec3
SHA256cc434070e7f3000a80040ed9b7067f7dacf0b860b8dde67de3c902afe758e37b
SHA512c1e8ce4385c4fef9bd49d8488fd552f263c9074738c30a3bdd8caa07eaeb2d1cc6776cc289b5aecd03b12737d39ba49ceb152854cb05a632ece88a0c7ab01790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17900893a3db9ae088fd79cadcea51d
SHA13b0762efa1fac893d6a25c451dc4e5ca805c1306
SHA2569c741373e54a5adf113be16f277a26e332d1e82bbe6f5679021428d7fbec4102
SHA51237e15b66b22209d74652d4c570dc376359328122168dcef7f5ace93b3692c4cdec4579759b1749b9502c233a51444df81384e21bc82cefa20310dd7f38f8ee85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6546c7d9c534d4af726f7c06b6db37f
SHA1e7007b36563c536fd0377347e363459d5215986b
SHA25649a4ed4eb28570b8ba61b1b929d5031d39010db97483e288389883290807f129
SHA5127edf04a945410123d733e1b75b17b6769e2b147437bffb2074ba941acf62e8f16449f4f55487d3ecb50d24c3af701940a57d949fac243e3589f064b389d92bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a66291126d4364cc3ac775fe3df30981
SHA1ec2a6f656da4619dfc883f6ea3bcd211a9af2c53
SHA2567101b04b610a0c8e4663cdb40ab9be1d6c1edcec9ee7634fc8660f0d51a2d461
SHA512ddf47717dc4192c533595b35e1b0164551068a9ca1e57b3a4bbdeba93a8cb624a54b04636251c580a7caadc5485279db428f93580c3a4fb9a1fd5229308138eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55025a1b34d2b260c7793761387c9d168
SHA1d0ea3930d39afd13b6cca60529962c7c681df3cd
SHA256bb6463e519ce1f58c3daaca16ff739d44e72613965b5ff8d19af6a9d6e24dc62
SHA5129126a7bb43bbcc06b6d17bf5328cd2f62301303aaa759f16be64f47ad1bcce1cf3f76826af018a196c849409558cb93c609cf1447aaec321ff3e57567b9827df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706fa565ce72b646932ca7b080d86f21
SHA1e30104b70e037b5748b0799a00367884c3e255d0
SHA2561054e008deb1cea9d076e556c1ede56f010a01dd633f960d7305dd996e4a1849
SHA512ab7b6bf9d84df78eef4680dd7fd55c391890323a3ef77d60c8d84cbbc96bca2ec258f1beda1980eb98461365a75bd2890e8f10f1561a63543b18f894644a462c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d9b342f1edf02475ed900b94f3f452
SHA189eef4d3734ba872ecb923d8e344a7c9607dff0b
SHA256292d1c67a5537a0646cbc2b7fa203ee404e1934d36a203e750a996f0fb9ccf06
SHA5127ccbfbf51073672b8956c9f3f2e3fbee857014655ad748e9e657bdba997a5ea2f82e8f586037b1970f15e59d924c5ab1f3bbb15c67be48fca4690da41656717d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801ec23d70c0551fb100b8031feccd46
SHA11b2227d30d7afcd0dec6248861a599a558de3e7d
SHA256eac79b851a95288e19feb51d53b1c12e199ceed26125f161c104d73f51a78ca3
SHA512ed0c28b69c1de2f7fcc564c46ee37d0f683784723228bd746dd366944a5c28c469694fb5602f99355a449103b2dd8cd7b00b6db8fcad481dccc52f90b458d530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e83cfe8ff023e20ced1e72ad7dd3c0f
SHA135c5341ce2440f8c7682f4fca871ef1161c6f6e3
SHA2563edb8031cad187d60f213ec69fd7d093a0a82d20a09e8a7523849ea155da420f
SHA512dc4d8c64d4265a1d9b89e2257205b3d9c6aa446083472f5ab8b18f6fac82bed802aae5831d6468d6680e19a732836f3557d9aa9888ceb7e3d853e765cb09c633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039cfe0561c35e47fd8be81503ba817b
SHA1bb7888e3c5c182c8471b099db0d4ce7982ff2f35
SHA25619fcd25150e984de20c9af94ef46ff14881b0b698e7013c0dabeda155af1001d
SHA512ea2e27af0fb26505428e83c70d965949f4ff38793b99c0d1c9ded2d231f8d3345d20cf448e35e7644df5bf0dd3e702c1806f06205a42580f4a68994fd093434a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177449a7c81827744928ed6c2023cd8b
SHA1416be1615adbee7a108aadabf3deb3c114ec28b7
SHA2568c0ae5c7f597a0e950cd5c84c4bde78060d75240e78982dbc60f694ba9e7484a
SHA512f01efea3e3e7f7c7531865541e14cbf93a154cc3aa2836e01069b6ff2e15e5320ce5a5aff0addcefc9aba2977181efa1a6afcfa72fd83d07babed99381537fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf0e7e6ddd57424e9907794f2f2f3728
SHA141db8bde341ea2302c70903f1c7e69bd485c4b9f
SHA256a28dd96691ec0d733bd5d1b014650e6c9498f27138bd32967005b8bea3ddfb7e
SHA5123bed358782bdac8311fba174e1b55a5c954f0cdc33605233e3b31198973b8533a3dece78cb3e367d2a950301c958820a1cd5d006f55877d51130a84c504b2208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e2b02b3e13cf587a6cd511e6ed4bb6
SHA112bfb752f8d6ac989f40d11b552c18bab9e6dbf0
SHA256f794b65fc37cec124cc3cf09d2619fb5246132192c88dde396a14f2b9b21e9b5
SHA512f0354fddaf6a575b1a5b5d7801685c08f59d2ba4ea71a6d7f0a7ee38c5de5cef552c0f2325d129c82656d397e0c639b14801f5077703c446cc6c780228b06d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e3089d77ef27789a7f322d3732482c
SHA19092d0964f04e8bc6297d221218b24fc891cdb55
SHA2567a37e7417528d029896969b9602452ec323e53db2c17483a758d2fa85772b97c
SHA51272ab6c032d8bd0a92217d0c61b229e6568100b1cb037dab1e531cd1f251905cdb4ca9543d4ab148c0903f94e5738b6956667d86893372407e829788d4934e07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760037b8647d150cd47983ff009f28ad
SHA1c24d1229a46b123ff87a416a67357bc922ddca32
SHA25622bed74b7d458cee1504dd1ddcb813db471ef770da1866433fed8684f31ce6e3
SHA51246eaac0b734e144f66c38f895677dd6f56382ca74f9031d0733d2d2e5f1e900c8b2cd390ce142836775eb6c3fd411722059c0cf21b8077d3c5e4c2f03d125419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d7152e14464786f340edececdc7c6c
SHA1a117e2dc8bf8f9a8b0917625b082ec78d953247b
SHA25681d808cfb2b5c732f967f6c1fd6c43db8b99cb9daaa6ba6834796bb9d7a63ab7
SHA5129979cfbbf477a057e0b770e64c71676776408e1e6a224cb59c07525dcccec890dee8a4743488dc573c322d3a2cf7bd5360f40c67f5e7f700690f37e3619be878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50624f6f18d15d3a5b8fc6a0c30fa2c13
SHA152cf936b682a53f2b5ce878f11a9da3ea732802b
SHA256d38bec78a36aa15b07f5d2e64881c2f25170a7f9b1324fbba6b5470c85f25d9d
SHA5124aa4870f54e60378def87c141ef89d9151f13fbb1e6ad8ee912b208f582e1117c01088eab58bb67dd74e746bf38a0b4e69b62a28494e919901e145dd4c4150f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357ec006ea7f4442ea30159ed04d5ee7
SHA1bec3672ffa06384a70246b605b4184957fc4fb24
SHA25638c31e9b244a6f24ee91c4e67af66c7d07fa9d110432857ac2f61c5e319e5e28
SHA51202cb5a49d89828e2d19c902e6aa60d7aad93958901af672b5fa6079ba5e56ee92ad7ae5a512ef39368ae1db4bbc9f3796e62eb20fc84282a57f6fbbb9d04c6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee900fbcefa82cf82d7c633fe85ea5d4
SHA13ceba8510456b0b323ed6329b90d9d3c117f68e3
SHA2569d1c3d40a5f618ec06e9ebe3b3062af7cc3a495e30da5c9dd8bd7c072cdd718a
SHA512fc21bb3d8a3f5659ebe1e5d4b7c654110648e3caf0111859ec66a9af0d855cd149a7e343bc128920fc27d532f03322223e4eb5e1d78047634447c505ad67a855
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b