Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
dd4b7ecfd7bbad81779499e06efc47d2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd4b7ecfd7bbad81779499e06efc47d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd4b7ecfd7bbad81779499e06efc47d2_JaffaCakes118.html
-
Size
67KB
-
MD5
dd4b7ecfd7bbad81779499e06efc47d2
-
SHA1
755688ba7d191088b69ef5a5a95a07b1815b40eb
-
SHA256
14b8a20faa5b6a04c5eaf6832073b44b3f881340259700612b449931da1cfc28
-
SHA512
a2bb891437d0bcae724377738d8e41223751215de5ae8bf185f439ffd7b0d3804673556fe640e380653fb3667611898c4c6310de73f750d20f15fdaec36b4222
-
SSDEEP
768:JivgcMiR3sI2PDDnX0g6G6Y6klW+PW4/oTyJqwCZkoTyMdtbBnfBgN8/lboi2hcc:JZ0mYX4gTk4en0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432348075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000449ed3f571105819c0d0e68db2b904a1f2bee0ed3659bcc16fc5a37cc1f1143000000000e8000000002000020000000fe57f6ae1aa80148f99241bd649fb1b28ffe01b18019f1da013f539766c98dd5200000006b1246fde4aec36534035fe34a12ee626d4a1bfafa2b3a1b7eae321f476022284000000024ee65ac66bb9593ac9904cd6bcfd695b9bf791e8b4aa6c9b1110bd4dc8cc6db618c8357948f25355bfadcba3ee9d76c9ca4c9e71e4085be0e6d15b1a91876a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{889773F1-7164-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d44a5d7105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1772 1724 iexplore.exe 30 PID 1724 wrote to memory of 1772 1724 iexplore.exe 30 PID 1724 wrote to memory of 1772 1724 iexplore.exe 30 PID 1724 wrote to memory of 1772 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd4b7ecfd7bbad81779499e06efc47d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ee8a912174b626a4980996bbb4e8e1
SHA1d90b1e6380c9a5b4d074496777285432915aad2b
SHA2564eaccef746d11cda59b6aa3932ed797c21eee169b50d416fef1809fd354f5b5a
SHA5123c79d9f086d136440274cd1c72710a98d61eaa5b1683fb097468be5263c75370f1ea279cdc314aa431fe28541fbfb0dd8ab7df72c39dfe3637dd54b862f11f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba38cce2e3de8dfcb75c014dcf80b92f
SHA1ce78d1e172daa6f3d2d84306558f8a078a85f387
SHA256bababf88a9726c7e291c0854c766099208dc0e9d08f261a980a9b1e3211fb2b5
SHA512667e6108a46e4867a99efa67596c4f34c9be509d304c8003cb97b3e796f5b1a5d0d25ff321884c82c39845c6f057220cd56f6838661eb304825b7ab4ce4c658e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a32525dd1d348d919fb2dfa1ef833f
SHA11cd9b3280e4db490d83cc4b73839bb162c65a1d8
SHA256020f8370ce2fae479ae454d2e28eec9bdb08e2c2f9184d01d90529adf79682cb
SHA5122cf1b80c8c65e48cf55496ab99d997452f374b968228efde16146c15daa5fbb933a16458ca6882f2e6c79573958e3914da8c480d14f055bd64c682007b23f1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a407d365baadfdde1a3c4aa3ac47ec91
SHA1fdeeaa7e61885dac7c1e50cfc3e7a793ad47be83
SHA2569491d5f65f0fe96dccd15a4e9cb7bd7764b91ebd5ee6e9d67db53351d4fce945
SHA512167ceeb6af711e264abb298f28f6a86e224a0e42bd3d69ba7535989b8629a9eee243c3bd317b9c0645258574e32ee2cf1314883a62bffd684006973015365808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a37a887932263b0cdc06d295b977f4
SHA1e763ad4c527c8fc8e3652c543c944cffa810ee45
SHA2563f85edf6d17463f47322f44cc8fc871962c157c4ff852b1ad9b183996de66dd6
SHA512522e47fd1a6934132195cf0a0954e348047bbdfab953dfc78addf8e21eeaf9dc863273e8d2e182cd968d9aa721fd121b0542fbc5c81b7a23f011a74c2a340786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b85add87310c1b84c2250ae7e3075c2
SHA17d8cbea170dbe918e28926ede2344865a83a3dd0
SHA256f481069c2cb3fb5294acbfe1be715738b474cc3421a6126611916d2aa6f51d00
SHA5121861373b5abb5c615d1a58b070ba134d3dd5801b40d6f16a8f5b065cb48f5ce4cfd341dee1abf3cc245a64dea7b99b2625fa48b47e5710db6b9dece18fe3da79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572163c1a4861fe217b40a7bd41e52196
SHA1ac0580b740a45187ce2b3346e4b3e711fb2f6a29
SHA2568516fb0da9271a92f3ea75db6d821981b2eddcbcf0c75d05cc242ce33d3aaeb3
SHA512cabafe2519a12d834715c86c78dcc3e568fc040c96d9dab1ccc1f2b0eca38b589b4aaf72e6b1c79debb2b304033f3f8d293f12def8eb791bdc985615317a54a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc6af8bfaf4537b77a0cb54c1505364
SHA10110e9a22645030daa8d9a25e2195d4c08f6619a
SHA25686808e3bded53174d420c4366abe70b80fa49496bfce2f274dfa5e5508950784
SHA5129b2f1a80e9176c77aac28066310a670b57f2c99f1e14063b05bf85dfef43ccc97d1a4516d268397f4cb2e483665ab280172dfd88944a81b990d204f540f3240a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54fa517e575322c7801583d130b7b99
SHA180bac50dc0648cea5d615c0f7ac8a8f04dee25cd
SHA25636a0d61443a00c220b80c7bd11f9f64ec28ac440573870d296b807e685eae32c
SHA5120835f312ed89b219d29b6ae4f622d49047fea44538175286674998e4425c650c84bec4a7e77fcc4d948f28077b4634da820cd6d9692ea46c2cfc0e74fe15c69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369a51891882971f7e517c661d489a44
SHA1689c7454dcd8831963465806eb638fd226d38e6e
SHA25613182c7f95a28e70fb5b95c6eb4333df406c5d267effaa2bc2f4eca600e25bf2
SHA5122fb8a1b9825f085d56e1f42776402258d3cfac062a657a440857780f31ba9ec12ccd45273deec56ac9316f221416f8f16e23e4e7190da4d619426d6c102b36f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3aff2d253e9edc95ffbcd86b7176b2
SHA12e4e2819b7fcef6f2372df3b77af652ef4fdefe3
SHA256da738ebcbc5890b4542828540f2c4a825916c5f449234f02091cb694cd0a2832
SHA5128baf74d2b84fc4ac6ea0dc5d7193684d3ef2c2235975f55640f950258744b97702507da508fafc435b311b2a478ce221a3201fca69cceeffeb74c87a3524e2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19ad2a7a15e47482d8aab532a6dc3e6
SHA1e10224cbcc2a7f644ccb60ba7925761a00cd333f
SHA25668033392e9c517494780b6b8a20732b520fe08349305e8d115c850d2c5719475
SHA512339b5700e071130960659f729dd9a7eeffa857eb368e5cdf2ed1c7df333d28b93d543a4796df321410dc56da819a4fdded367c92e3bc78b95fd739047ced24f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223b1ca2a4f032eec80686c004500797
SHA1aeed03a4d04a0c6a976c954d11687a9447a8bf81
SHA256335154b06ddc7495684eac746211407125999826e22941b9eca195443dfabb1d
SHA512f20b41662056cf98c4a3e61b72ff3c99c4f997932706ef2f798ac600f36c04b0cb92904bec53e9998198c8ef2076662f12b5d1da248f82bf1360e5de9aff063b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510cd114f6fb79ad937e58c76ee19de02
SHA1088abc7a4f6a2daf1600167513dc79971b625886
SHA256f2a27d75c0c3ac0e3aa22d21b7fc9c92d9093dc93bf670e516e4a356d0a46997
SHA5121cfaad20c92fe1bf0bba0958a458b790cb74e458cb4c2071998a5151a40c306d3caec4f200024844ae0acf315f2dde6b14aff54465ab8b9a474f8ed5d09f83f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cc3c4275222a9321f548c374c0d56c
SHA15fcf979bee678c194f0cf3f8f292e03f5f3138a5
SHA256dc657c10df317df8b76f48e5cab6d8a7055ca3e5e2462c4c136b707de5d90ba2
SHA5127fa7c786944704ea235c68001a79474a44a8e26b1136d1b27ec56189870cc208eaf8ec312b92fef509c5d20d1c425fe7242214f4dc605d4694065410e3b58cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576ff7cbbca8d14eae321c0773f6d2db3
SHA186e158e2663bc4e379abeb33dffaecd9d1e65fa4
SHA256cc2bb15ab5fc4423d55dffd394f2a6f9056d65ff8a819b8bc0b7a21df9b3661b
SHA51248a1355b29cd8c40989aa6f1f2d4ed2a3c4fd48f6a65121e650197ef629ae1164c8c79309bcd5cd703e90e011125ae9162eed16bed15cd102d2fa24003c683c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5036e99021da9d79dc9db8f5b3e997c18
SHA17a66b2987ddc209241c187c2edce39a05f6867e6
SHA256e6a8641d0676321a1b6a353b4ad7a5c228b82912f13fe5b7403754ae03de4587
SHA5125291a14d8afe5ade20b0981b88759136040524ab4266ecffcaed42e4206b36d1f3bd91d47b3a25c43798358e559a7eb63dce4652d8a1616566a9d56e24dba886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d9ebfb8fdbb1affe0205231832c001
SHA1323168b25ece68cd50ca270ac07958735c0ac0c8
SHA2565fa495a1e81415bb22e2275cecf2b9f7683211dcb4e612d2e5b70522544f6692
SHA512d3f82f7125557542baca15862b09e4db0d1703444cf361835a288f7e92b8e9f6f4d63be3ef7b70de0a02aefa3a23338ae31e104c4a1b6688b1916eb47704960b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b