Analysis
-
max time kernel
139s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
dd6c30fc50d6250047f8a26b72c3485d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd6c30fc50d6250047f8a26b72c3485d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd6c30fc50d6250047f8a26b72c3485d_JaffaCakes118.html
-
Size
12KB
-
MD5
dd6c30fc50d6250047f8a26b72c3485d
-
SHA1
8c880af1457182267243132bcc04da4475504dba
-
SHA256
423e55afe51ef6132c46309de45d171eeb09390077064fb873e71109cc2a6000
-
SHA512
1256afaad750f65a3576ec8555276596aab6e9a6f1b1afa694f57c9f9d65adddf210310a90497c9a22a0b7bb30ea067703e74e9ce931f5bf76cd578c7d8c8e63
-
SSDEEP
384:s5lIcpVpjR6/gu5ByZqnujhKh0Psw8guLZ:hgBgwkxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432353310" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00417db47d05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8D0EB31-7170-11EF-B578-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000007395e0f12840bb3979e6f2a6247f10bb7647d50ab69863cae8527a4b2beeb0e000000000e800000000200002000000064d6c35e9beec981b1d3ab0435f27eb1275a84a9baac675634d6750cfb09fe7a20000000d9764dce5b8ed48aa92af3c2bb1acb1e2992f5b490590924f2c2df0f78c238e5400000008af29c0cef68406054b86777dc3c8f0b9b5f909e17c2ecfd340b22d3c60aaef0c55e002aa4bfc6366789e353854ce24d253bd40f7dd91cb862968f5d40126c58 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1944 2104 iexplore.exe 30 PID 2104 wrote to memory of 1944 2104 iexplore.exe 30 PID 2104 wrote to memory of 1944 2104 iexplore.exe 30 PID 2104 wrote to memory of 1944 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd6c30fc50d6250047f8a26b72c3485d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad129517fbd10bedebac2bbe5780b8bb
SHA16f9cf6960cb88e2c5f7aa7e98350f98d2131f96c
SHA2561d7f4adf3b303b16c9c76da3b083ad62f7c1b5baa3c79585bcc1f07ef0c00d4b
SHA512b215230d1e244721dc5998d73d59b5b26a8be59d3dd850f64a0bb639a57a99aae6f3a6ad654a8b75cdc27b03c637410591da602076cd83dfb17da38a3a98fb95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72d7a996652afd6f08dfa8d582d9125
SHA157a9119aba7a0d49e34248142418d67c68d6de0d
SHA25667784ab9eb1ecd0beb666882b8d438b601c88bb73e8b8333897f4d4d9711f462
SHA5129eda72d371260448a0a95fcef78ccd86536f5e8cba2201d0079defe9d750ba1d8d056fa2dfa261be5f173dc3f2a94fb567f38d1e614046e35a02093128e13d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36002a50bdc3b40b0006cc9dd4fa52e
SHA1af1951f03eeeb15df6bd12e66dbf80164a63e270
SHA2560e6a61612d48727739c8575a4ba9801b0ebe75cdc2ed54297a0f57ff5222e668
SHA5126bd98dbcaa7406e411ea3b15b21b569b1870fb90fa9a5274210ccdb1caf5ffccdd587875ffe1672d33276d39f52c6de4f28d7990a161b332a9fe6dce1f41e1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6941499c5e062bf6dae28cf11eeb9fb
SHA1901b2e4f2a2b1fecd81b12c9b53c031bcfc16c6c
SHA256f16edaab35ee8c7f69d072bd58be1d177f82a462430029626144a6786c019a46
SHA5128b38f5ebd396a1d6eb7e1d29a0efbc18d94b6258b02c4fd3104e16f2909c7a822130b7d48e2630e44862c1fdcb291378b0ba7cca1ad092151fb0e62105f3c3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2c1a6a2b5869958da19a97d380feba
SHA1b89624a30c6046d6692b53326578200e6eb08b1d
SHA25666a8f97b7e8d4ae5a95103f98b063630407fb8bca04e0287822cf995efe27b96
SHA512c7c8a1eabb991a8d069c45fd728b1aab395d4cf1cb30102ea32b45e0eb6020f7887b46f34c5e62140f0dcfa95f74ccabdefc825939dc23266eb8d43b199fe831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534da05371d2a1a3aa47386430d7b500d
SHA196859a23589a6053bfc120fbf084cf0f91418b28
SHA256ab3c55dd4209eb4363c349f7d36964531fe881ad37911cc7d0e965061ea2c7e9
SHA512484dabca01647db5b7aa543f00cf3358dcaf79cc603e5218c1fca63f3154fccbd0a716ded62d22fad7a7de1668d41b9a8c70a1d081e808ce4d76864d62c21c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336436f9e468d4387243e3f1bc15e131
SHA1f095f0e1273cb369c22bcc84b27545e0b6962988
SHA256c8df24e8cb19c342139c2edfddc86d3c15d1c096caf555b5859a070d52b54945
SHA5124e84b2786a13e925907f7a1867f84b9dbf30ef0e4e4c4df24850683470bf8d2b74d2bfed0ace6e176e5040b0e38c998273ff9c9c92cf2d9ca015b65237a0db5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277d60ef200583763edf446af3bb6d22
SHA15007f03392799377c0275afc6b0b3ef5e94366e1
SHA25685427ff82ed6fd772b6e1f558bcf7de6bd54848932ed138039a4d3b2be15c68e
SHA5128c1db27eae25453b4eb04e83c35cb336f0e39813b4d2ed62c245b20434f1dc283a9dd47a3f17948e36ad55440e8cb1ff24a914f1ae9fe0d78e66d02c598b6b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c427a588e44ee20c6049b801d8e64e
SHA184e3ac30a2e6427de61e23dd275d008b809d99f9
SHA25668f12166dfc266706d1983313d7213be9db2375743f0511077a6d4f7439a6b58
SHA512a8dbafd9ceb28440720d7ba2c9d1afda630e486bfa0239b34d9d7618d2123ad05e022a49b49e107fb74ccafac9047646def092f57b309d0f99d80fc7188be7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50801674f247af5918eaec7947500e4c2
SHA166e96ba3dbafe35e51718eb0120e52d84db90ac9
SHA2564a55710023ae5c379a3ddd58c8b86ca945bb3be399240f519213f0f9a43a620a
SHA51271bfa32a3a1537c12d7acf9010ae67f8ecdd95c4489d24f97a3a18cc768a27f64fd39819af5036921ae6ef02d4b51f7758c0c1bff88df656c01c81337565f0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fbc5214a134bb6596bf7904eae83715
SHA14aa00ef203d956fa9d28a6b4a9fe92f6d0d9683f
SHA2562d7a618eac6c7dfd6b2b326d602ea228f16b764e2d9311e040287ea36b98145d
SHA512bda9d2f187587dfece7bcd77b4c6e4c8947f762a36d74f2b1dfc55692d7a5bcf20c4b2181da184bc83d5974c8882d1818298b09924de0d88412405242458c6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceab00c9b5d1aa4aeb64da30d5df5767
SHA1b6df5cd77ac0307f5922496f89128e6799af5700
SHA256330d2cfa7ba6775c4b04b20391c35d1a7f0b73fbbb89742de78e737227cf4999
SHA512144fd31d519688b8e6a699190652fa97fc1ee3daf4ec4a1fe28e8402298705b72de150807ee9e6835f422a2c7f9324246ea3654ed310ef8266506d19e278f18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b227142a483d3fe0f5131603bf951312
SHA1a84d0216bd71a76703c4b198ba4f8cf2220625b5
SHA256579b75908ed7c71ec9ca78685e8f5f1ca548d306801cc79f45b570f2c54616e4
SHA5129e31a8e48ebd8ffe227365fc562208bf8da22aee2dec111d3ae96dac5f2e7d36ffbf944c7c5c187f34acede41377279f873e5fda4e8ad64b8501bd163c6a12bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53289dc4700bc9556f182df270a0c7192
SHA19562f327c035cf10eb194537de39f4e8e91d9c63
SHA256749698b8f53912a89a78f4879ec36c7e4b75982a1844649ec75a95887fd16c61
SHA512e0c4c6acd8fc7af6662e3e947af93f9802a010924f985796819e6eaa82b77217c7e9d5731145406860518fcc01f5a86df2e774e7714a935e65725618c35560e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02ed79bb4dbf2570cbdfe609a22020b
SHA1976d57fd4e8649942fdbb51db463b7b56b18ccb2
SHA2566b8c50ecc0a39e8960d3eab73dd2940d535445f19651bfb93b66ab260ef35fd3
SHA512e9aee9259dedce63eaaba72298c8c1885531fac43293b80ec320b728b23a3a4494a3110ab499d91cec8bdb88c6f7f8d6992155ad6e1c8ba8e49c7c1fa121a638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbb0ad883603392953d72d9ab6b1ba42
SHA1ec12aaf05c4d836b291efcdadf2fab0385e00d71
SHA2563f49ee05387515c325cd5e373db428ef939b4446381a937df51ae8f6a0fa5d66
SHA5128204d8aaf118102b2f9930a1829ba8edc5a48d63261e87d8e03c4679814218bc7fc1a3a24c66626a2da5ee049af3afeacdf354da1172020f278d4048dccbbaef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b078c5d30ddf3d003bf202a91362500c
SHA1279d22d48acdb0d2f1c214fde13309ece111f73e
SHA256e0c4b7e691a8d46d2e42e8710b4cbd88a0b51e6888a5ffbdbb91a99975bfb213
SHA5124414ff6dab1b1b1926602b37935304b1b6c556d66c6bbcda7b8700f747a95f573bf473b6dd5e8c80eaef78606f49a22f1a0033483401fc9591958cd14c945c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b60177c07968131f4e83b4f4023e55
SHA1e9203a4bff5b2433035c6b97e042520372de3bf1
SHA256001d22c6185c5baf40925af00b880f00e183d6548ec2262d9887ee8428b3f060
SHA5121f7fe7e9ebab221d5064112af56f90b7c7d98b93e8a6c65aa96e5db5397def496befbc5ada19238a168476b854614729fc7b6d25f6267ae9aca94c75392fbae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2f519382c018ba6654e71724442af9
SHA1e50ff3a620824c41288a74ac97eceae40938ec62
SHA25633ebc8c3ab5a17621b6fda7e45ba504636d26fad7600cd7ef6257a1963ede1cb
SHA51268b398085dcfc8c819bde4906b2e8bfd2886a220944deff2a6c72c1bf729609a08271dab8b7edb2b0f6ae05af3ca956f2ae88becda95dd70de09dbcfd3557726
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b