Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
dd5bfdc8dbef6909aee54d9febcef2cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd5bfdc8dbef6909aee54d9febcef2cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd5bfdc8dbef6909aee54d9febcef2cf_JaffaCakes118.html
-
Size
139KB
-
MD5
dd5bfdc8dbef6909aee54d9febcef2cf
-
SHA1
b79106649feba12bb31502605e7349cfaf75e521
-
SHA256
86c18f19bc64dabdff93cad1a1168175ca87229084818d99e5cd987bb92b1fa3
-
SHA512
ad1548b4b2003f41e0dcd267e6f1232aa3d84450280b7b0f87ed0e9143ebcf68c5ebb3f2cdc59e6309e310d447a638a3159693bfdd7b3559f00341f8673bcb6b
-
SSDEEP
1536:S2QDpN192lRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S2QcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005e538bda2e78199040909ea5c70541f86526cf673065f09fe17f47711d3982c9000000000e8000000002000020000000af52bb59350d418cbaba91a2e15403c95961d5fc28372edbdd9fae9c774d400920000000beb8bdadf0f46f9a21b627ef7ca78c8fbf71ad5bb5b679feaa82311f458ef7b540000000171a1d236e926b913f1bcb381ad97d12468fec54ac8ef14e457cb01b28e8df6a3b99fc43e30b9b86628d902c481f3d1548b2a6d66943d673acc611f99faa4d6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0806011-716A-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432350719" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202384c57705db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2328 2684 iexplore.exe 30 PID 2684 wrote to memory of 2328 2684 iexplore.exe 30 PID 2684 wrote to memory of 2328 2684 iexplore.exe 30 PID 2684 wrote to memory of 2328 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd5bfdc8dbef6909aee54d9febcef2cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe2df18a1b2d0619477693d229a673b
SHA1e6f81a318c3f2e03d1805b29271d6eb5a4ac9a53
SHA256d4ef8a6f2863d85cb3b997a2f830cf956b6de0daae7c3455b5d813abce6d68c2
SHA512832c41d00a2b31feae620ac99393cc04ee844c305c8156252e494ea6eebe536cd78712c0dc84914d54026ab86cfcf79206074e5c771592b8c641ec89451462a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5524ec0be0da3bd2d2cf2e3163bd3b9ae
SHA1f2e1b4166387c1267f08647185ecf906f3d3327e
SHA2562b2950508202832cf18d1787e675972754e11bb5b7d4c357c49dd5cc914b24d6
SHA512d68e7c0932a4921d14bdf086410065c735b72013cd247844f05a9fd10087dc40bb1eb77323c94f289f55c17a9b66c035cc0de02c4c7185409b9a789cda285732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557330c5f7c577a2e51de53f350e499fe
SHA179c4af90da0e0ce2cc51b273620329d15d103597
SHA2561b987382e3c0e320d5c5829bf16237c5247dca1dfd874870035d0c2951db681f
SHA512e853df7951068d58edacad1a61e11c2746e4c2402533342a0619f0c015e91704c702eb59c0a750f521ca342741db8c1b3e11a05cce786c7e0fa07540cf272a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e951ecc6895f790fcc450540f30f30
SHA17cc627b48528e9463140d9df0cd0c7340e5a3a5e
SHA25618bb94d55556a80fd6b34eeccdce46f24737dc4fbbcdafc8da6b1edb5dad5438
SHA5129b5b7fd5cf6f98edbd2d8844561b59e4e51096f0c67fb4c589fd55eb1881b248a87edee6c098dfbc9b766b696e7cee2f6dac12d1da36d9814d6eee455f965944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f997f43d081dfcc6ec5ccf4b990f05
SHA1e7d6a2cf95e8d998d0f9e87bce8ddafa0274c93d
SHA2564c028ea961b0c308f68c2b715cf80b15ff249888f80252881f8afb1d8c414cd9
SHA512b59e22cdbb921161f52412e8fecad19c6fe6f09400de80f46d57bac10060b850b2c7a2eeaa4391d5ac9b2e3a05793bdbb563ff3f0d7cc2f01095f9b5d96f237f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae27cd84e0d677bed2c101e23e149dde
SHA1dc9229c123ace554f142e5b24c2a8a85424cc8f8
SHA256d993d3b143a1ad39cba1295737d2743cb311904fe1359a9b8f434135fa1a2641
SHA51282cb1842626efd62e47cd32f4f0bbf15abce0c29f744cdac92f6d10df207c95a0c90258e5969cf681f120ae14eb538843f38b2532cdc1aa2c5bd0bb088852d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a34604eb15eaf11cb2570a94c40e1d7
SHA1d22fa0084209c871fbbfcade15f0ddd11c31f140
SHA25613d58ae1c5c49486360758d088316fa8f9fc37e182186afedc55b059e433dd9a
SHA51292dbe587ccd3cd317a25ceebc2b616c0cbc9272e7bf11552404784e1218042633786f7da4f40d186c4feee2b441d948b1ead27de9cc8b6726d60057bdfa17d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595aa820a8468cd1ce082008f187953ce
SHA17fd52d71d24fbb410e67d85451fbb879bd51cd3e
SHA2565e0b2df0e2ee847ae26ae045e51cc5073fe26ac7c8a9aae4ed79e78444afa348
SHA512a95c4dc99c8932f33d6998aab6edc8cf6b14a1eb7af37151fadd554d1494006445cd31cc31db642af95b6d0b20b36a18c5eee0b3cc0648af0d4786ee9605dbdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556439e653157ecd70ea91daae3014819
SHA10de1469a59906f99e2dddddf3e6811a8ab014472
SHA25655991754df4aeb87b46f776f2b6cc2885dd6a73ff689c1e2b8c644b19399be66
SHA5125f4353ab013a9c6fc4a2f245e4730d2aa6e6b7f0571360b845c7125eca020efd6317b570ce810209c561ddc4e92fb37882b8666d46794018a568f20aeaf378df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5700ef1225ecc7f991c15c5c0cb6d6
SHA136de8ac3df6e98f19f4cfcded271fba33b030e13
SHA256590b07a1c023751905871df2c682f71dde7fe9cf7ef83d0e09e3d35fb4c2130d
SHA5120fe9f58016d24b638f20168faddf2d848c71ff5ddbfc728dd44212e63a2820e35ca7814b4ea96a4c287c099ecdece975752f91f560cff1161c0d906a754c94e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ae965341ebf1812fc5e1602938a23d
SHA1f749c7d31a4a8c05c20f3152e42390ee61eea5d0
SHA256b48b419a126600e12dd9e7ddd9255bd9a902fc6ff2688ad72bb05b5b55720b17
SHA512f980a54847323439c3cdb70cb60f3db64910141f85ee1496ae01bbb523aa2e2e99432ca5303da754f8f9f899cd206ea763de8cc6748d02e65d2c3f7498f619eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c024e5219f89920a62b19b8fa8e1a5
SHA124afec3d4d6646ef7ec58d41e6b0433786c6baf6
SHA25614fb3502b79a3f54f7b5f7caf87d773749ffc9ca09b160f877eb1eba10f296d8
SHA51272e2c7ee935e19c221414120b931d621edc269c092ad034b98709a2973f6505e45a1e9017004518f65ed0a086d63db44b458fbf020ea548adf6198c67563f7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f78f3b4d3c274d4622249f62d82138
SHA1fbc6a69d65b8b44dca3a8863f4a757f7b09e05b3
SHA25681ae3caea5d5677a8486f7f74ac3593c088aec1f6648afab2804438cbf344cb1
SHA512c28c8a8b7a5951325054113104ee855bcc20019b73f3d6b2c11cf07dda3be0ad9258878b7d711184e3a9bf6ddbf7aebb27ad7a924d4488fcccba24281363aa90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51600918961c1fc7715db464ec152b9cd
SHA158500ab6f77c171f5a18ba02d95e8643a0904710
SHA2567825f49af22db8c575c11e8fc8ce9f4397ffde18c27acd8d2d38a8f8d9263d1e
SHA5122bdb6185c5db056cb2b1882e4b958581c60cdf9d6a77680b848ae27180b02ea5a84a55d775f6440839d7cb728c053966e3c0d2ab608e443b95ea77f14de7c651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcd5edbada8889cb91cd4742664ef8e
SHA1b40d2709d2993217e2a47d1ee82525484dd15279
SHA2564ed96e63978ad42828c0d963a2e703f17778b28c86dc9aaf97593c28f5f44d22
SHA512a23db56f38cfc357f950320b71d1e725c153dbd24137cd1616364be1aa03a37767ca6b7059e57ca6c61a2eece3b5fdd6e2031c6fe522809984f25ab5861e0041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da7aa2c4bb8d8e244af7a4d01cad8c00
SHA110ef55e20171b7e744dc2eac774c008df2fb6b6d
SHA25693f4c5199d2bcfb32dd01a9d02b3741a53e3f507bb06c2b7fcce81206d0560aa
SHA512a79453cfedf0150ca06745cbe0a0a6f32d33404249c76b604476e6e401ad5ce11bfc30d57e2fd2cff062443a097b0e87132a7d4298383c4f04124968d905c6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d740c5109131c4a6923ec9d7e43c80
SHA1d588a782a865386727e828307214db0354e6f065
SHA256ee29d7a2531752314f8342f1f51ee01b5a560038c150b9721d52be53f967fecb
SHA51299f4e112b46bb80faf39940370666e1adcc851a574b7b1ad2245b4567a178f09269de04d5ed7e847fdfe501710841f8aa6cfdf77ed7ba25b663dedc75392a534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187cefcd37def14dd94f8822078321fd
SHA1a2450e72e04a5aba59a2aaeeedf8238247e15bc2
SHA256659ff23ca94210f47504cbffc4b009c1e54d58c1adeb6093bb7ebc82aeb2b918
SHA51231fa7ace670acdbb0d953e062fc03de122612c1f14c64781eebb4d8f6ff112e1eb8b86114b1f2e1c73b5db579755839e66221e535353560584cb5ac29100bddb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b