Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
dd06f43d7b4a98f8f3544532b1e6c511_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd06f43d7b4a98f8f3544532b1e6c511_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd06f43d7b4a98f8f3544532b1e6c511_JaffaCakes118.html
-
Size
70KB
-
MD5
dd06f43d7b4a98f8f3544532b1e6c511
-
SHA1
10ec3779b2d7be44b49edfa1036e0c9fef650d3b
-
SHA256
98b7137219fe1809c5316fe3251b1e5f04513b335dc597c21837c1bfc012bf64
-
SHA512
3a4ca4efef4fb4818b09b61f5c9a0ec7fd8e255fc1ae71c17260edf0445f700478211ee0d19c241085e17e37e9921e79756931aea7750096c81d03f119e9d20f
-
SSDEEP
768:Ji0agcMiR3sI2PDDnX0g6su63+ciTuoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:Jft2TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432336122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3FAC9A1-7148-11EF-BA5A-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bf13061d05bb90a810026e840a9a91a9dfd131912265f264ee6495281a9a2e36000000000e8000000002000020000000079345018f24c6adc21569af590defbe905fbc3956bb5a0095d2d3406e6d2edb200000002326457f5e985a0ef11fea2c7489a5659660946daa42c27f024bbabac28de92540000000f9860f1701e3f67d93ddae2a7e5fff1956d36dd4a0fc8f42d521b8288b3938992e04d3da358df703de270a306e46df6e231d2d08e320dabec003d383cb8a374f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8061488a5505db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2788 2792 iexplore.exe 28 PID 2792 wrote to memory of 2788 2792 iexplore.exe 28 PID 2792 wrote to memory of 2788 2792 iexplore.exe 28 PID 2792 wrote to memory of 2788 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd06f43d7b4a98f8f3544532b1e6c511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062172b436e1f6709266782a83b890fb
SHA15a8fe564dec7d0d2b3a6385efee5b00aacd23a9c
SHA2567a01b5e79e9de298cc0d5f3c741ad78d0b811034bd6701e6f01424d3fe4d2c81
SHA512a4619c406bac90fadf430984005dcba8cf52f833228136f45c6f4f9e7f2d0fda300f26554fcfcbfdc96ec7747a3c0927e622523c036033c0542bc76185011765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f562da27161fc9cc6289e4d019e1fa
SHA18882b9b6bb1c90af06c0ee7c09768ed659c82f13
SHA256b264d001009aea0ac4c2a36a15bceb6021c8c580e1ef7116334ee69f29c1bdab
SHA512cf79e3e4d00ae9ea9e62bb07ed796f37d54231ecd091ffd41c677564248f8893b4a3ce44546713c786f1b89d3b9f063ea1fa69ce0a45622b6370f4730f3828c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79b65a09b951f1d64bf2823e1773aa8
SHA1f69fca30c8362700f015a660b5f3ad3de1d2a978
SHA2560b8451103bd365b090742424e0168e3c69a162a5403fe955f0ba6b8964e7d24b
SHA51214e23c8e0cddf87f3a5e3ffd61f607a8cafc611b47f276303df2caeadf3018d842caa7ea9a2306c14367379f4402776263c4b7a1783ec6b17e8625077de5e6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2da59c8c2d1652ee4f98c51f5ba545
SHA155148baa7b9212f7baa9bc0c762e928e9af627b2
SHA25661d151891f17083784ec6fa47e30385fb7a8b5ef9fa354ce2332cd488f8013c6
SHA512d234c44a886dd85e90533b117a38ad43ac527ff0b14fc8fce615932e79728e9f32ab4c624754bfef59610d36b6cddd22dc7e6088e2902e0401bd64cf75b9b204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e43a3ee92a5843004b5d759a64d84c
SHA1ad27859f524967a601179400881c226d6bc3abef
SHA256f9e58f13b2613e2cde9f357c80cf2a7f8cab816e239cc87527b0d3595e7b1163
SHA5128e879ccd471692469977f195447815d4dac4e7206ce931728b63c4dc30d97f410c35281cbac5769fb6e7a2e341f8a7f72a3175aa51b69e4c858cce4d1c9a6b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec0f5474e5b1f1dae3b4fcf42163b726
SHA17afe8fe46a1631e1b20f4c10538b631e5b6a564d
SHA2562f4ce61f48f4363525526281b65cc1ddf369e12c50d7e49c305985b9280a912c
SHA512558f2433e56e1ac738c100480e947ef3e805a6ab48153bba181c2034fb619876ffe200dc19eee1d76a4d419977c7850d5ed016181c952f70ee23f1452d041268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a3e6ebc5c8c212289faddcbfd17982
SHA1971365ef0eb1a7b82eca165bc00d18b0adf9fa71
SHA2567e49c120e12f4c7cb6fb46fd3496d1455c530bb57ad9d48fe1797e40e5b66c0d
SHA5120fd536d9572099afec64c6884a5e01833e5f15864a41e5ffe156cdf784fa6a5e2abe1404c2060331e6d1205d665e976c03a499b40d865c228eaf71a3c3713e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51523ee3139ce9591351d284d12d1fb92
SHA1099add026c3b564323a5d0da500d2c7a65878217
SHA256e9735f6ea1e252faa979269f2e5a27329e1895372f637ce8d0a0ac51751b4a03
SHA5125d552097ec0f9a302d4f8ea86aafc49264bf1f6cd97ba516ea06bde9e8a29cac4bfd7b237f8140c355841cfc087129a325dd0a4368a8c6bbfbedfe631176ac9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07e04738ba69fc51a5df1e4a2a9e301
SHA17f6c2f73e3fc1c8c5385152f3a3f5bc6b93c1fad
SHA256eb12dcb67a7a51bdf8c739f7bab661b52379f07e5885000651344710e2c7aba6
SHA51229996144a95d3cc4762ab69064aae22a6fd936f02c8bb72be11af3b0db600fb33441fa0e50e5a218df6c14a3bb7dc294a8f52a35cc1b0b0fd12df9965d3de82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28b8fb041ca873bd5d3a329f79d0c17
SHA1eaae68bfa0e211099e874a6c12cac3a648671b93
SHA256808ee4b7f1bc1c389a10db3296bc3396ef45d0665ff41f9edd8ce16f46c1136e
SHA51240fdd5a90d2be0cd5dac7a337d0382ed4fe090a252774a0ba794d3d122d345c8d0da2692f8fcda94c983a428aa1c145b4673ef0f2ac0b5c09f5c1dd7db0a5b24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993e86d4b97c1782b308f68d5e3cc8c9
SHA1c9eb56ed04b9bd4545e0839d7cd1cd50307b0fac
SHA256091542b847336c5cfe4c9d98520e2f19f9728d664040dd50e485d33836568398
SHA512bc6d717aea178e07a7b6671d9c24bda0225d0fba9e47bf495c2560e2c3e770d8f2502b689c73f909d26e6dd96caec0a4efe388d63b8cd8f7bb0556170d80d886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51243308a966a9c6f63ee6234fb8a8814
SHA1d3ea3c63055810976c1c5900ae7719bc400ba9dc
SHA2569390effe0df542d9da25bc7ae2d8b3aab8014e2e432f7c7c65494c74cf9b4ebb
SHA512feef27281905ad80b816413f9772ad9edb2415eb905f54ad8306393c196db2c892186c51fdc66d7d43d4717bbde9f635b02160dafc09fdbc45b240992847515a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5928d0382bfe2eacfed2351fe817722
SHA1754e559b3b33c981f71dd600998287b5361359dd
SHA2563980ca4aaea5de623b7977b7cff74f1c457abe02c482eea4edde9aeee3bff81c
SHA5120c9f95ce3bf2c6a05ce69d6f3fc3c734d9e52b709f88e306e7d730c96777d07162f6e5b86294da9c0374c569849eadb60afd0f750c8986a876ee96535dc82d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e566ec475982c1441ff36b1d46f4e27
SHA134a483f0177788e8b6e9c36883696a2aeec8abd3
SHA2560d07abe8e891ce358aedc2e344e186faa4885d6eda7d4ddf07c0ba65d1b55079
SHA512db57566d93b65b40d070c67059fd5f477854c57b0109a955766e958d3addc5863163e5ea75f832c4f33526cdc77e730db39242051cc9d95ca4d80b70645c0ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41117ff7eeb756c4ec1c7a624e246a2
SHA1484061bf21a0db4870641f599f70b442f88a4247
SHA2565b14545bd7e6d60744249850f5cb6a302e3859425398cb753986a583095256c6
SHA512aed73551d859523c8a4ae759f8a6856eb014e75e71b50980b48004537c6941782e0b864f442ea0707d0d0090c9748c312a5d62b019cb5b853426d9dc9bbfd835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3f348260a56bf9e8b7fad572d5e8d0
SHA199ffa0b01f09c8906cfa175bfb77a058cdf6afa1
SHA2565ce4cb17366585cd170a6fd40db7cb081c6d0d4d8b18bd6cc0ec55a852ceb72f
SHA512cec806c7d5e2a3d1aa5928d189c4034cc63e78fb5db4345d79bbb8804c43306556ae82885267d16d2849e5f16dfc7760c99b5735ecf17b9a28ca3b4d74e5bfd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a39e00d84a32e30f2ac31cf7c063d04d
SHA1de6bfa1f5deefbb2475ea15bf42a2360c90d81f5
SHA256585a917fd5a3f0d3271d0c44d637f94e25abb4380b09a8d3d6119e77b95d2b75
SHA51262db27a47e87b6c41a133ce7a8f9ffdb2cef9ab8f4cfe62ddcea95bb71f534053a092bc11e7440aff3887fca58b4ee08dfe26718607fa6492f9f17ea084babfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edec58ff3ca4c5211c55b5cb9bbfcd57
SHA12ac964106f14ba8894a70def74f15d9a21bfe185
SHA25681ff78e1814d5edb5cfce23898e38a0ec9c635d6e48179f5a1b47ec4551edb26
SHA5121c938de15bda25c243636c1a7fe83c11a77a645ecb9e330763a9282526a6d4c14c256db049401e04023b9155943287748a40a979c2c60472e92a1d6b1f731836
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b