Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
dd04390c9e26f9de110a8cd543330921_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd04390c9e26f9de110a8cd543330921_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dd04390c9e26f9de110a8cd543330921_JaffaCakes118.html
-
Size
3KB
-
MD5
dd04390c9e26f9de110a8cd543330921
-
SHA1
48e50a426406205a1a0c4bf382a99b61bc63122f
-
SHA256
be3eef461617759d180434bd9c19dae57abe46a91229b5d5422548b39fbb3f76
-
SHA512
af0091f8c1e2f0a22f3df0ad3fe4756adf38da839fe879a3402b388122100489da8277221b69f9d81699a6ada39e46778acb7a44119fcfd4e3cc114978537cc0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE513121-7147-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432335683" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000028a0add2c0eba9b43f42c0f2f03671341a8dede86ad809272368bb3c4d8cc9fc000000000e80000000020000200000003e0ddd739ae53887f9a055c60506ac60ea42b1f9bff3e06b67b5503f0b9b3df520000000f201e17e653c155f4192bfdf9b2d043637d466f3654d736b97df25bbcafecdc240000000a856370814ca0947bbdd2b7f7d09d9d7d5c2028d3347a7f92373e83093ef28de7444c65a0cfe380b35e688da4f01a0894c029d519d65316c276594894e3c4b66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bde0825405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 620 iexplore.exe 620 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 620 wrote to memory of 2352 620 iexplore.exe 30 PID 620 wrote to memory of 2352 620 iexplore.exe 30 PID 620 wrote to memory of 2352 620 iexplore.exe 30 PID 620 wrote to memory of 2352 620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd04390c9e26f9de110a8cd543330921_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57276bceff58b28019f1a680682ae8785
SHA1230e50cfdccc131016af223cf1186a6616ed1a49
SHA256f11fae371ad1c06bc857b0d28ad1e8e02cee5abb1b00505cdb000027caaf98e5
SHA5121a9fcb6d06386f7c5f00777ac9077b5806eb223364f673bbd49c1a1fbd6828198dc39e0cd1951285fa94ec040142b068a31650a11c2fd33180454b972e54d6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f0215852af49add9eb9bb357f9f9d58
SHA147e99c0e0d33bdfb55f9beaa54b9f111501445c6
SHA256739f454cdf9f81184fcce1ed7838702834644509785c2662b3388613e2eed783
SHA5127237ccf20feb83310268f675a30a49b083d31a54ef199d2be9af635dde472f9fba692f4dc6c437d49715fa211113d9d37a926ce1819b22a0393f3f6b5ed892e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f38d4cec643dc3a656cc48e6e52d3e
SHA1c3b21c3828fc4f599ed18c26de40ca66952b125d
SHA256b80a44e33ad408fec3e9c782359c5e2e27de53edbbb17d3f7ca7a6acc5e4f228
SHA512104f020df0af880cfc5b9a601fb4fd59a02c8e4c02fcdaa98b98ac40cff8345003c8995e8ba714a5d0922fe80d2ee99bf20ef5b538d69584d291b2b73b94f479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471b5c5fa788e69508147988609e2492
SHA121b13dfe3bcd3048510d97adb581552bbfb3ec8d
SHA256d75169fe926f2c6b9dd96119db2efbec0f72b5bce05d1038100e533237724257
SHA512375958184de4265c00d2a14ba091c58894e08dcc7614c29bae7e07c2398d89c546746ada49839c380b46d7f79fffe4d8afc758c2d9ed9abf54fa48dd854f848a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69027e771542f2748ab1a3fcf42537e
SHA145b978c5e69d07a9a8df2844bc38389cb0256d34
SHA256e781561768b338e3e9323cf2446cf670de364b4bd2e6a496645c689d0e3e2521
SHA512a41b66bc0e3d25b357994854f924072b7e481f232900067c7ca7cd932070fcc5e4296ff6932b3a4fbb50b643d69fa7fe972484367232ef0c059fd44a63c2f3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f694ed1cd400f2a8276fb41aef82da0
SHA13a5b86ae2fb18fcc0f2159ec2c823819f6f8fbbb
SHA25698e793750a7cfc92172ab3522c62f5a63cb5b9e48c75fe9640136c71320e87d1
SHA512e8b4a3fae2ef3eda78d91ea5cc6da107196d7313da5d0dbb31eb6dd1b30900c8bc64eed9caaa0a0a0201c5a2d143610458960ee190621ad426862a0c3b13bff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e711d67f22494d9b4f66e2565949cb9
SHA1cc7a23a217ff41ad68d1e0c7765cd03c0f27e240
SHA2562a655bbc3621b75b407702c65c66d5620ced18ff5c1620b28cfc86e6374fb5b8
SHA51240ed5e2338274c4a130bc4cdf564a4ebf13d259fafe93fcc49d1023b92179284b89de72142f56ca53687724116f6afefde1a520c081e1918400d21325eeda308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba73f8544648a4b5fe5a85bc31ce8059
SHA17fdecfbd98f0053f49fb6a8a5626af0eaf35859d
SHA256c29b59a3473b22b3812b4c2f1a43e110bd55e1cee8cc7b6d26c6854ab1ef405e
SHA5122828730333ce800cec04a28fd8b96ec8a3f8adf5b133f4d9a85e6910299bb38a547e81522df31739d848a2990a12ac0973239439e85328df9de6925d86350a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3cd50fb8eeee39200d980a09e371a6
SHA1fa80e698c02068b34bdeda541ec88e2306f9e08f
SHA25617094bc10fb447bbbd2685b2f197b774a0b606c0f5252d45520fd00cae17d477
SHA512698a0b449b909ccc38af34299d002d6c8b832ff8720c2a8bd081dfe14affdadd4003ccd110f9bc2c784d16938f7c068520472ae85d704ac266545d084e6bfc57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cd13fbe2a924dd6c6526eb008b39b72
SHA1d539b9a4b445aaae509f93e64e50c080fef523bb
SHA25666985b86d19a11826e1edff33d4dc4fa759c8b62effa856320b1d9a15f813ba1
SHA512df766b436f56b9a097e73c400de57fe472d595c5afa1ee682c0dc88b7e33e77f1a82f840d6b9dad3d95340490dc111ae06bb39d411290eaeaeaf87c9453a52dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f626ed37baa209f66c2c3a89a8cd7dfb
SHA1cd0b50d5988ffe65cac96e0e0a426da0d2dab056
SHA256c6ec2224e829d77cc035d857cacbb8339fe8994cb4d4c24b8e2c81d8793df276
SHA51246fd055bb584ef204fd335e9384bea71272f4ce073bee6c5361ab55d2d840a635726306590183243a8668259bf8a45bcf0b32a44fd80e1529745b0e08a223640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebc910f93e2f59ce1a610413f594d31
SHA1d663f6bc6052476338a4a18dc97b1b3ee3b5b8a8
SHA256c1e2d033fe2d8d1d4b1de1ec15d05ad1887560da8278895077c3e5ce7dfdd05c
SHA5120496efcb92dcbcf8ac99c49506cadcf041244d34dc5b15898a3cc341846528eb51e8f7b58ad55b0fdb3477236c016310c4872095b653592a973aee1040bf4ae8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b80f6a8eb3b324e7d69c336601ea80f
SHA13ae994bc554c563f7f476428546357c6041c00ea
SHA25679fa71e61477ff18113eddf7fa9b3ccda18eca7a533ec2c1a82266fb538ac8d9
SHA512e42b999b2cce4ac6a200ab93518883707284844567230083234539f3def6436b09249fd7e3a88ae9302fb744f1a3a433beadffeab02f5516322105770a4265b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5697264a40b0881f0d4faf02752b85e8e
SHA16e3d8c3e32125156ceb93509893c1ca93e2b7f03
SHA2560af9717b1706a32f01959e7d3b423d0b443848b63ea0e4c0687afac17e6e0109
SHA5120041b620102c796a681bd3a5dc06e339196ce2c4ab85ce21b5131c7f693cc0038fc7899fcb50e79eb41e187bbac01f93eedf41fad389db05c7233d3b1a51a023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba021e7b5e4313a5a03575ce76e7d755
SHA1dcdf2ac2ce270d1e7489d36d23632c7586efad75
SHA256669a17d29c69b4dab6ea956304fd97c19aa842e3ac16c36421cdc2662a405ad0
SHA51275c845bbdde37518f43917fd3b53728392dd130fb63c8cc239724936a81a8a33c851269a2c50534f3fd95e117148bf4ba9130660cc2ce5039b2e8684fed56d88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580179d309d9cd1e710a200d9b1ea474f
SHA1f1068ddb9cef6861ff60f39fcc8acc0432529d9e
SHA2563a804ea25ea0fd1ada2e062ad2265e9514ef0d7a5ed0aa76a9a5b2fdab7ae472
SHA512ddada1dae0a10a54e0b90e67698ee4a98dcc756f29ede03321799a0dee16e55e472055cf7618ea27b789d034054e1a5b9e58b10dfef0f2cc999cb1008848ba2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51046dc568f709eb6e3119bf787f35230
SHA144686aa5d6d0c7c36a110cbcd5a99fc46ce0bff7
SHA256346c67354804206dcce157e3664bef0795e5e87046f1ba882928a85be81ddde7
SHA512da03657564fbe305a4a60f03395e6d362038c40f39f213d59327a2490f202c30f0dfaddbce28cfa58e82b886b1b6231ca7462b39c0c0b1dbd201854f0adc245d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ab6c17189b19966c8f42e5f543b35e
SHA1b818f3858e6f254b75629163ad0e5421469fc814
SHA256150120c3b78130219e4d53e491d190cabdd7ddfb99598843b392fc6bd69302a8
SHA512f8faba6771d51a047bf56a552a7043a7603706bb9c9f6d222bba8ef7fd187509be2fdec0c9187a188797d6ad2db04c0c07a79466c4ccbe90f3afe5207c69e330
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b