Analysis
-
max time kernel
136s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
dd55d2cdcc903b320903304d36cdb824_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd55d2cdcc903b320903304d36cdb824_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd55d2cdcc903b320903304d36cdb824_JaffaCakes118.html
-
Size
140KB
-
MD5
dd55d2cdcc903b320903304d36cdb824
-
SHA1
b4eb4e37174b95206d677a1baad0bc9ac8b16129
-
SHA256
81a0e39b191b8f022a8ff0f12d1d86190652932f87f81da79c1a38521005ec4c
-
SHA512
386aa1c0e91f9cae4f6d9679ecba5f11a95410a9f7b179e33e193d282529cb991d23b934ea2656d155f47f9e180a825e513354b5d170337b2a53e4999da1d497
-
SSDEEP
1536:SDN9JrzlCyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SDtgyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07f026b7505db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432349710" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007af9fb894276fdb00c7c88fff607bd637e3ba017365146759ef1e872f4d2092b000000000e8000000002000020000000af6578cfb1dab24029aac6308392db56ca1301da3bffa9c80fa8895e6d9b3782900000009e151bf3742eeecfbe58ba7e7b3cc07e2f0146d591619ace796855ae3f885a8983d24fa9a9f75fee174150d2df0bc1973f9205e264ffbd0e44da84909aac28aca01d7ca0c9395656ee780c2d7e5ad36aacccbd3b524e9fa2169d51fc86f7cbafb7b333d05605068fd51a3363721daa3c65e36882863fd55040cd7336eac86c5c0e16d7c57e6a944a10044d6fecd95bd8400000009e74653adf17949eb774840fb663408e370d0aea2a444046a1de7335146015137bd5c271fca1134f6a01af7c4a600975030a449beb8e0e6166533f7c6cfd50b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d4965c4fa26550a3f99e69b5caee19b001a0537c19eb023d839ded252f3c917d000000000e80000000020000200000007b2fd0689b9b0bf3838f37a0be62d71965929d1e3866dc37adff1aa6df291b51200000009c037d4cd69a0f100fe501a8e595744f583d5d2772bc225648825e0935c770814000000043ebe42e2404b7212b9f3a8ee54ce13b493bb68a22aac944e433b81f985d04fb618fe9b08b63fe882d755981ea579d923a498824bce69cbe8cb73e236d135a5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{579FBAB1-7168-11EF-9B6B-D681211CE335} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29 PID 2324 wrote to memory of 2804 2324 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd55d2cdcc903b320903304d36cdb824_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a762e366d96f2128d145a4928493e4
SHA12bf2e99ccdf19168bea082c81060933228484970
SHA256a0405ea25d8b6b36af41ed6f3feca4d338b0d0ade086e556bf20331ce3080a8b
SHA512cdce5c4fb7cfa88a9b560cb66f890fc01070629d7fb6e453e4e3dd71bc0555be783bb804a8f960f39a31c8035b3bd55a0d4170c4ee8909c5242645738cb95482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589be20ad8ee4fd23c7397b51ec3cf660
SHA122c41ce18a516f8ad0716042f5e8c3408bb2bb91
SHA2568b2700e2c05148c3071a66769b6158f4faf2b4642b3909992e4f1fd74713baa3
SHA512f10c41a8d138b46b8016335f1949a92ce57485595d1c2e564e737855f41a4da474037ef3e21cb5325e2aa6fdda0f1c1b29f1a95b8b4a0583bdf1b0f4fd53ec15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ab8580980f8282221df199209bcb44
SHA1f5d7dbe5c1a3896382f874faa0f76b7ebd567397
SHA256a321ed44ece48bd58aa8970ad7d3bacc913c8e4f795580ef2ff2054f55a60477
SHA512da903cf62e8519bdfdc481f02f13224e591a7cedc8e46965b32017a2885762514914b72e3bd650b6114bba0ff3764ac2a42634e59d166ecf44b653d0009ecbdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef904264284e715213e225f988ebba9
SHA103e22394e931563440c1266ce1a9aa4023ea1a7d
SHA256570d8de9d1d2a439b4a2df1fc3b8eec6491ddbf3f80ac1665d23bdd2fd76302c
SHA512e11703319e23c266753ae671a58154f9f41e9f0a31ceb2d4dcad3b3c049a79c856ef64f37d95e847c23599cd61a2d8282aaaa4ddcb6b5d8871d5e93e877c57c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a7a3107e590573ecc4115a0aef8543
SHA18029b8798a9704a3125e9b81f244b07200e02b45
SHA2567fc3d28d77a6b9d64945dbcd09e2f0acaa56ea5cbad189e7184d3d8e703d2de4
SHA512b26b7634938246816592769f61e52eb5e350fbb9706b9bf6ed4dbb83dfc0085065f51c0d18a654bdf000e1993d7be167a80cb760cc2e0ff9b02a78f33e913bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564428e1e387b0e0be1ff893aa89c1eeb
SHA1640522995844af22680cde393ede71fc2a2e82c4
SHA256016a54f1151558a11b38d8e34afd4a1059016e621fa52568d9f411e94978c389
SHA512bb8ee6c6b7f74b5a83aa314f1a82ec99cad2b81636e00014d8afa757fb89c67aab3190415060dccfd139bd1126a30fe4ce86ab425f33fb75a8a15409211eb6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be993769d0139175ff23217f1b63b4a
SHA1f8580058bcd51a8c6de156c67fa9fd38e7eda68a
SHA256aeee9aeb94e3da475636a1326109ba5e8c9da9294793aa84daee8b30a0c2bc6a
SHA512f695adcdb53af2a31742af5aaf266f53b2fe00430612a65c36b34f548c186ec85670f099033fba0cd91002046cd9653e3f39a6c4c5ea3dbe8b03e243055de622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e79d667066e592a59e94ef56c0660ae
SHA196965a99f62b36639740199c8ac11170a4bc8820
SHA2566747d59d37a9a6873b224352c0ee3a988152c6954320b6bdac751d3bab8f71d3
SHA512458da5b7beb62393e506cad7326562ffdc519e2feb41da88329f45e5086f0ffd93898c0c81e52a7438f2a008538e85997dcbe7ea2127db3f87f3e0cf67b2601b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff4c9982b121981e5391b252fb2e6dd
SHA1205563d17183c38ebe0fa1fd9d5a31508bb30b68
SHA256c173a34afef584851a857d50f0ae033fdc59299cd7aa7ec26e10b8b57f1ac806
SHA512c3e1d7e4ea503ed1f8e030833c3777321fa16c8dfd7cce2c7197cd3b26d108c83787536a47b1e300b5fad8d0328ba24cac04f1bdb63bc116edf323752cf617c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5344262b20df2f7dc6801b2bd640dc780
SHA17b49a10fa86b220a989ea1608be8bbdf0c38aa6a
SHA256e5604b6a91381fa8aff5a9b9fa1b3f1f5298a408f690c75bb4017e6a5e6e53a2
SHA512b39a1e8ff020288a0e511c95808555943ee162d221e7b96ae1f5f41713154f33bf866cfbb4d348c56fabe6f0acd02cc32e4dda70d8a0deb678475136600d6010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547be4b6fbf888c78ed375ba25c578cd9
SHA18d73eff1878aded5943985759cf00a3ffcce5f0b
SHA2568caab0323fe8be0f56aede555d1364129189decc835d0049c3a75f86c2a17aa5
SHA512af0a86bee4b6424685e47e48b140edf1625e44cc0ab81640d26302528abefeac9724702c1b8693490b90f4b159e61ce4c37aacb78b645efc06f7d6b35085ac3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512465cd05e8bf620dea2eaaa726a4537
SHA19005b55d69b9d6caf85ba7e864ae1bb2f3047cf2
SHA25642f090668b0ae3a9e62f007d490fe4f315f488e218705dff4e42b6731afbf92b
SHA512c5dc4381e8ec0c8bb10ca1b3e333ffcb06c3c8d76ec3affc079fdedd086e1b48b2c06a58dcbddf1664ead7a0285f01e0f332316a87fd07568a9dc8a5f29978d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cfe525cce2ab4a4efcf567221de26d2
SHA13ec3dc900c7ba31969c84f89f48fecb21141be8f
SHA25682cb1c9fbda66ab4830cc6ffeb150484484e9e8727931d2e6266c9e2d1056dee
SHA5120f3cb6b51bb719effbdefb82266db7749967d745b922a6e1ce163a9e6458fd8aeff9ad6e62ad44a7630ce362e2330de4fb0cd68ce2aee872908fa2cd38754c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdfddfdbf48eb89d3a424b58f3d15a9b
SHA12ae2b8d39abf090c0d99e7d725c1e15d1b883a41
SHA256ba1ae47ae9fb3de6e1343ac01ffd9ab9e3a6db18306208c9cb34317c1e409a54
SHA512ae53a0929d015a43c56b446137f68b6ffcbf2c6e82d1e925b7f54bc3559075378ae527ced1206d089936014d0bbb27a121914964c105b45fe410ca71bb4800b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da7d5a03c545e589212bd245319197d9
SHA1ecf4c96a4f4dfa1246454786e503c55f8fd2cdbc
SHA256693f81fa27312aeb3c05505d57ca4ece3b50105a28a23190c915b954233caf72
SHA512f5127b1fb86d856140709f7e8ca280a87ed46bef28d69123c18bde243f5c543bc5cc6ffe481fc9a3f83383bdb128c07f03e6f4bc6b04e22695d27a47280eb209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5afa56618e01b2d820eca8655b3cdbe
SHA1072c1c245cf25ca0bcd348a0e9faaea7026efdbe
SHA256b9307dc428a8dea59e29390c6279a653379cab186a7e120fe2060fba07969c0e
SHA5128d6134d85554010608041397168a643771b7100f7302a44615397f92704f21ab684023a5172445c96fa2a2248a028922df43898b291f5755f909b973c8b98ef2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b