Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
dd52f4e45b7350c9a64b80b88e581d90_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd52f4e45b7350c9a64b80b88e581d90_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd52f4e45b7350c9a64b80b88e581d90_JaffaCakes118.html
-
Size
95KB
-
MD5
dd52f4e45b7350c9a64b80b88e581d90
-
SHA1
e0f902ad7fc6afe6fd55aaaaa54a724a03505403
-
SHA256
24b71c71f1ca0e45043554e04efa31a1aec9100636fce1c973639202830a5559
-
SHA512
d0a2b51393612dab4f60f53c0087368c030d4ba305e67849ffc25efff838f4e2877f2acf68327c2d19de11b161691bc22a089b7536c78141d678085cb8bbdcd5
-
SSDEEP
1536:F7wgry6lzIY9HBtbKZlG5jNeJJ54hHvshUUrbgbrKjx:5Blp9tWdN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46B22181-7167-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432349253" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002f60a9a455a9e13011274918f22c8713d6745d58fa304e12530c859786ffdd6f000000000e8000000002000020000000d85df36a83737ec1c2077cd4fd681ace4f8dcdf8768544b2726a71c40fbefa0d20000000c791f8abc3428c77b18db8dc66ec8b2ed39c09c1eb1ed8e96d06f527b70f0760400000007b218e7d1cf8376d0a99f11d6fe12e3c212e46bad33fe14eadc32cb1ca45e266058101ba3af04f60c80ce008862810df8837d047d587544a4c3d263d81ec5dcf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007b1f3ae1ad52e03bcb1d7b021582997ba5a0cf46f24c99e56213ccff39021ca9000000000e8000000002000020000000db9eaa78f6d3775ee9f43fed0ba86a022292ffd4fdd65d7d93e40364fe21791090000000b0d233a6152dc9b4ab1c6db36c78e3d93b457ff8b7424beec5e7d0b0bb8224e3c26e2b6947df4dc6d7def33adff0b2290fcba13d3ebd416a320535429c0d8772169691bd09e5a893c85319fe19a51a663baf08965696d1843fcd17050da7a97f3152031ea600bc371c9079425ee16df4044490c7dc9f13d1b9be770aa757f8e0b7f522cc8e887ccf8a0637941e36bdb84000000057ee3c76842cf918e2d8b63dfc7a4e7c06debc3c0eaca77cc1955cdff3cbc406fc67cee1ebb82145c4d49daea2625a9af72c26276daa2c0b07957b242f68c422 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404ddb0e7405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2812 2316 iexplore.exe 30 PID 2316 wrote to memory of 2812 2316 iexplore.exe 30 PID 2316 wrote to memory of 2812 2316 iexplore.exe 30 PID 2316 wrote to memory of 2812 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd52f4e45b7350c9a64b80b88e581d90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544aca272b69106f30cdf8f3439228a7a
SHA14f8db068db922b92f9b6f02b83830d1acc2d40b1
SHA256c3ba3a6d60977bfca5395666362395051e80b0580779883e9d1c9922e844e143
SHA512e7cf211614349aef7bd928cb8d7087f9856cc4927d3237c7b9c0acc10bf372a659c01e385a232620fd050de90707dbf343c9db0d3eb5cd10697570bacc445d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab1147b19c04a17258517d0df39d8cb
SHA15ddb497f62f707148dcab1da73e7d2ed9d4b5511
SHA25627c36136bbca566bcb209067479a91b16322e5c9d68ef2fb0831e5a0f6439521
SHA512967af691ac6686ec15156fd5d3096bd1c3022c9a692b1d4ed1a6c94f3aeb1d1a5253ce66521cbb5a6c484dc7043f8ab76f44f7ecb84d03e6788ddac974135ca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f0936dd1fc5a604ae73ae662fe9fc1
SHA175f293774d25d8cfb62668658036fa6a390b63b3
SHA256177b397db2db1aae56fea63be9842de6b7a5450174746db7a7ff7c6e733b0a3f
SHA512af4936770ee41ecf8ba922b183084c61acdfeca01d52fea310edb9144a5528ce1e1f2f33962279f4624f10e157ce55481a4316b582bf67656957d15538250290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6d3905589fd83606cbd73cfa62da3b
SHA1e1a7dad9f6cfff59fa279a83367017f8937c48bf
SHA256bdadadb390902fd9300ad39d24fa8b1d33faeabdba8b487fe59ede29556edc15
SHA512d568f1f8a051d107542853e945edb5c66b9d82509a567aa1162f00c3c92f92876dc098248775e10761fca70ab1b7dedafb8bf3c27641413a81e0ca5e9de3dd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf67101420267ea02df12204b62cb2e
SHA1bf7e7fcfdb93f23cd653107598353d91c178c725
SHA256890032be5f1184dd1118d7996a020e0639220922563daa07d89d8e37518d34df
SHA5128c952fec12eb8fc94d723cfc17ecd28d2d4a1c5fdd79eae8c870270f1f6fd972f851749b4935376e6c49f69eee0b20f74e67fc52927278a4bcc6eebb48ad561b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c67c64682dd994c50556c81c28547ce
SHA1c63a5c57e8d814e88b97b10e9f78e83f301880c5
SHA2560930d7c07e363dddce262173772d8db9f68d32425a099d8f9d0a473c6bb86e89
SHA5124e784b3f212f99083889c5be551afee2ac51bb20c0b99d5eb677769ca2d9c28894d34f32653a9666da66db5c4bb241d2f1bc37076056ba6f12edb5de2fbb54c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56510106575375fd14af91287e2d4a635
SHA15cfddfa0df39428c3cafe65cf0652e744bc27904
SHA256ed91bd54e60f30fdfd67d86d7ca609926102db375b7a51222ea4e49493dbff9c
SHA51212f2af4611c75cba82dbd9cc7a0ef8c3659824fedaa42f24d10ea5331cd3d50d2d6edd921ba7aa1c3a6360fdb7c503c4890386c9fe011fa0a60f43055f2791e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14c12335188c6eda2b5551994198337
SHA18db3bb4699f0d44cbde523bf088efced3e9e02ba
SHA2567289ac94b180d1d4f89a63da19149a736d0c809ac6a89fba46d2b22ab0b503f9
SHA51246f879b330dfdfe4a61be3405c470d2f4e26dbba36014f3dd66e7a11c326efe7f7210307db96fc9d0782fc7524ecec7961387ad77d11c0227bb9d39f3c3651e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f989f8e4b2dca013affb6054013703
SHA133d03f726c02c7ba8f6b9aee9c04d4f0be835713
SHA25634b15e44fd714f8a3b060d9ddb650a0762811e84ad4d9e9be3eb8b178540ef34
SHA51287e4b37fc24ae5d1e49a91e3ba3933306b5d321f5849c4667e481584c0f3e6fc55560926d41d7e595eee53e483350773e5763ab8f7de41970e5200b2e27244f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cb14de0e87aba1652216c960abd998
SHA13b3edc120e98e11a61690a621662860af606e751
SHA25693e53f0baabc68e0086ff6b7ca32cdfbeb48e906629c8d589143528051abbc46
SHA512b0303ee5a26db4eb40d159105fd5aa4e9100734d0d8734dc9c999a6c50ecb94530d6581d6148d64e7acf50ba75436a5827b9bbaac1629ae3f1d075a301bcf280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996aa055f13f7cb745d3f891bceb6d03
SHA1290c2273d7be6a8cc5f6ae97a42909f8cc9c633f
SHA256d49406ce7d2d22e92450e76cb9485820740bf46af10c0f43c85d41093d96a5c9
SHA5128a0bab18d463269bfc77ed1a7703d28ea935189b20a103bf2d229d359c99254dacbfbf1a0f9380b08a30f32f7e4da6d6f458859f75f6e821d97a8be51e2cef70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6c7ff4effcfbc695206d8de768bb16
SHA178eb0f0f1dd14f46e432b2dc4748e8fa13705584
SHA256bd4f66762e8782fb8c64d248385ffb69837f32a17b2c4302504394f868a0a8ac
SHA51287efb7d0902b3e64a2b400d3d4e43c512695534d9e479296668756103c7daaff7b0ccca920f60a0e874b535ac54b5588b789904372c7cac7f70e574991ae42fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb0d1b7d6938b7bb9d3268865ba88ff
SHA184e3a27c81ac4388a8fd9fd5573383d82c1538d7
SHA25684db4e7cae0183b651040758202b58eda4910d9a93b9444a705c49927bacaacb
SHA512759eb935ecac8b35c112bf94426d381125daa87033db4a48ba1141e5ee8641269e8c4d3f4cf8f61a6db6ef00cff22785e4dcd8f39bb11c363599c1d2e97a0528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ef4f82eb1048b9593bc78c318426ab
SHA1c62dae739ad829d0d05416b5be5bc006415507d0
SHA256a092b5d95cb5204d0e881d192ffa8da33912f15b8ef4171616da2c481548d689
SHA512d743dc3ab2664e4e21e1e53b503746c144fbad49e9427225c826837768adab89af5e883da9b5faef1286cef0f7882ec7bdaadf0f357a9e6c45d9a53f9023994a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce899e6f6ee2ae5b9ca58fbf17d0741
SHA1528f4af170786fa42caed17ad2e36ca847bd8a10
SHA2569d6815a913ee9081d33e97adc514f1cae6a38e702cf48968237c2abba7418f11
SHA512bf0bc415f95ae1b921a3de4272749e9d3f0abca4f5bc4c95b26c5c0c388b46e5f5402e4cc7a921d89d5252cf5ca092ccc15aee758098946cf0cbb1705b024658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56845ff88d8b850e04523318a1006be4f
SHA18c3a8d3c86baa7620ff48ce21384a88a87eae8d2
SHA256044424537cd4759ac675a77897a200084e497a6cdd0071cbb758832821c92e11
SHA512822ee5ae010d04ade5392e3b4067a5bb2c3282a568285266f084d01c3441a3429332729b9e348321affc998daaeea05bf8fa33bdb1b11f0c95c62303c9ab1597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801a97cba2594c43ed91307f829b75c8
SHA1adc68a3e53ba207fc9dd8cd719a823fbd89de116
SHA256239afad2b1aaeb91a946a6f5e3faab3b07359bd506bba6019d2be7aa3189ef3c
SHA512a2c0eb3c0ee4054747736a7a7510eb2762b23f5ddaddc58fc3cf425729ccf2b5927ece6c0e27a16430bcfc0d7bd1cd4416faa4fe18ff6093a67c5b4bccfa9d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76bc7d81649d5bbe404745ccba39c0b
SHA1ca2819f1950e179ba3c98025b54b183d0c87a5d8
SHA25673d183bcb354c618efcb32310f9b8945a7ac9bf002bd671a4744d59dcf078047
SHA51277e8b2a0c817f1730d3a6ea58a473aa39a8341efc89a64e3a0fc6c610bed3fff6c1491e8c24d08ccf594c7494019da9d15979636472de487aea36a2f2370c5e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b