Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
dd623c2f6efd9ece8ad7879fab7e25fa_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd623c2f6efd9ece8ad7879fab7e25fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd623c2f6efd9ece8ad7879fab7e25fa_JaffaCakes118.html
-
Size
11KB
-
MD5
dd623c2f6efd9ece8ad7879fab7e25fa
-
SHA1
af99eaa9460a0630887b06e9c4344fe74e85ec87
-
SHA256
5c034bcd44159e4f69a4c2e0030eeb79bac1bf0afea0eabaf2464d4359e930a0
-
SHA512
31e0ad7550017e15f4c50597d9350d49f0b8acb6e1a48b8a4dc13d7f5ad34e5f010b608cea601f5bd5ad1d0857428ccbd0e7ac19fbb4d30f5785edc33fa9418a
-
SSDEEP
96:S87s8MPv2inXNS9Dt04gbMc5Bx/udZuj3uouaHne9ORhCOVZZv/iy:S87sXpgDO0IBx/udZuqouaHe9M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432351729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01454e07905db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A7B1091-716D-11EF-85F9-DEBA79BDEBEA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001f9926b7b6c5ce873b7012b38d1e1d1b0c32f42a0c546880eb3d96723ee56f0e000000000e80000000020000200000002d24c110a9bdf9011d59843ba37ef9ea5b1a947d5b30048070168db3d48a28e320000000c4386b079462c1d04dfc5bbcb6cfb32f151e7bd811b28e0a043c01a1b232fa4e40000000f7a128a16bbe0e9ebcb993097baab4113af364c88b7ea7627c0df48210d0936605113003a30c6bfc76472626717a3852a758ea5f746814179f3bead38e609bdb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2732 2188 iexplore.exe 30 PID 2188 wrote to memory of 2732 2188 iexplore.exe 30 PID 2188 wrote to memory of 2732 2188 iexplore.exe 30 PID 2188 wrote to memory of 2732 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd623c2f6efd9ece8ad7879fab7e25fa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3401a8ab50430de88c8de9b7f55d7f
SHA1b902f06c333383ca1b662a0aa817dcf8cc7bf347
SHA256d287ebb0abcac4abd6bebcd900a3224ecb9ad580c86b035ad1711a2886a5f4c8
SHA512333d9a0c72412fe1cdcf88015f4feff0538c91726c12febfa05d9cbf4d99939e4123d777cd1b0a1ea86a8e03aca4f64db4aaea26dd83e46f6ba0f8c7d9961bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebe2d20c9248520b559f9a5f74b5e80
SHA1e183d6c9d1dfc9fb3d59e67fd2bfbba2f8d52caf
SHA25635459320e6304a0213763cf6386d41e3cb1564450b7daac451fd9460934e82c0
SHA512562501ec6366c1faf6e2ae8a8365631851a62c4586067e22e1435190debec3651f40af43137867e6aa2b82d06985f579acbd8e712d5683ed105aca78105b3949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576387f50239a21227f3b2c1197956072
SHA151bc5a9ba42c3a40e392ce9095631aa7447bcc14
SHA25675d3dd5822e8052bfa842bc372b44f8c79732fd5ed0845874c3a44bba8378406
SHA51225cc7d052b67b2a262b9db10765dbd103ae483cc962b324a895b9a99de349a0df995f752b192a2b0596365837fce7a4763727b95b9c7c90653bfdec62542237c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a553f6e2b9ffa4ec1fd41ea9c982a943
SHA1911278a56afbf1677887f88215499620e39ca783
SHA256c71bfc1f09803ae06e758c898113ec6596dcf7026b55d5e28772b8fb0dcd8b44
SHA5121c5226fa03952349f0b59e0dbf96d7d67c12ce5417add252e5cc289cc0a52efd84602b99e5f52e7f3bb654756461fe7b04f2350d581c6ec72433327be7154643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d4789fa66196a4ce40e19c1b5c2bb3
SHA193bb8467d0bce3d89ecced5e9ad9e36a0a2677fa
SHA2563e3c977e33ad154a3a3d935e7b8c8c274b2a74ef4ed1c675852d2fe5cc6ae6e4
SHA5124219dc14c0ce24737380f8db86ac3fdb0a53e86890e91109d8aa1a108104ab50ced1351353b01db55eb65f9f6321ab27d3e733fee470190fbc94db252b150294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bada621e68282e6426169752f70c8b67
SHA159f8a71ca8be454e357d22960d1f2741d7370b19
SHA2569990e072fce4707b034f5b644e98857906a57a5b6539fb357d55e3f31946b85b
SHA512a83f48139ad0f2d418982b268ede350d35f58addde80d426aa796852dee1a38e6923abe146372341c31a958e5f9bca00f344be4c52566a26b565c3f7c2ade6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160eb8e58098c210eb035b3cec4860ad
SHA113da903cf355a6829736d6e4a835effc2eac92a7
SHA2568029d05498ff2f777841c76f8f7f2c41198cddefe3ba41a2d1cebe51810da4b5
SHA5127a48e6dc0ca69519d8cfebceb2aac0b80b4f5305b80f1b79ccc4acdda699912bdbeddc0aa47623398c6793098fee2c994a2b6b50df98edbc3d2c4331f4391217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338b785bcb1d495683c7caa108be2b97
SHA1032894b20412dc4871970d11799133e18913b7fc
SHA256d68e34ceeb7c4f7b5b33b38ceefdd7cec46261bf5b2a6276a93f6fc1c2bfbdff
SHA512cc6b67aec0c9e2a03288ecc4729ed0fd84c278b53bd965d93b1c04db7917e85eb2aac39eea8c733acf31dac88b67306fc479d01d43ce30f6e3bdc3c975245ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90377352c877fb41f3e11a0a5bc5b8f
SHA12bd3a585e0c062a59bdf2b4ff4c7d523364f2c73
SHA2560fcbd0daef78cd8cc3206503922f60ad354ba9e1b06e90d5a5cea4534cd49804
SHA512840a5fc31635b81131aebf2224f6555530fe05e50cccc391c040a9810c7c3637c808a83815c9349090a503336047fd828311403383619280b01c208fc14acc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55069bd86e07c5aa423ec02a6a0652070
SHA119abd4ca8889dcca853b6b8149363545ee13a84e
SHA256ac1da49539679cd44450db94b005a6509594d84c97fa0644bc931c0d09460ee5
SHA51268ac0d015099f2c369a8a459079e3c1bdf99606e45e995943569892def0982d313580cdce6ad02cf247569549e79617961d06a793a913276e0229b5d584ac640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519311926f20c410720e7031c0adb110d
SHA10e78f25ac490a696082aa0684611c39215f77433
SHA256b3a09b145fe99a058d3dc4b0906ef75770e217c4eaeff1f5d23db1d6272d1106
SHA512e23105d7a76a98a463a6e9ea9a0bd4d5fe985c44ed4f14612f3e7953cec6d99f21e6d633211216f1b760a085649c935be26957fa49c282dd480bb5d970ec1c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd746866dc0bd38aca5e18e1ad469a45
SHA13f202bf3f367d9219a50312f3eee08c1e4c2abca
SHA2569a5ad2d490ba33a72d40871a47e0b135fd2a41193229c8c9cf13609b5c0ba521
SHA512238c3c1fd080b0fa16c1d5db86cb5879308849512e0716d0bf12f1ad259b70af065c20314db91b591eafdd955eb670511afc75faf023d55c4477cf00912c6df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b2d47cd648f741372eab19728f8521
SHA1a0ae67f6240a010fb539dbd52709b20dbcd6592e
SHA256aca41ab29e205090eabcd5f5b47f96d4321ed19cb1da886a5fc0aea344f14452
SHA512d000ad2b1a2ece7e325b73cd969ff216954f8b1e9c660cf554c106295f2572fe75e7a09f289285ba40266b459971f4c2703536b86f9d9f98dd5d40161d8e97a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55091aaa4966b8d6cb85a600da5c25e60
SHA1f96cc00c6cbdf4654c0138aea8a51962eefa0406
SHA256a1b289f9ffde4754b433653b61629b68a3a881667d50aa7ea72c5507cf8436a3
SHA5127c08b32b2bb9038642e334559662ab2f87abf7886bdce7ec0d5c823ece9292bcf67267e431e6fc032199352db0093330032ca1db4b3e83b9845015166652b0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa3032fd8cf9dd074de00100aa2bd33
SHA1265aece808f1b272d4ce66c8bda7d24940749ee2
SHA2566975a9ce386327a5f1ed21b6722f21c2669e263cd0c61d7b601fd71e033d2686
SHA5126b1b3789e70f246e93a035159926d54ab656ba6255a16cd688586cc9f9a436e415dcc63db0c497d550fd08e11f56c178aa313faf4fbed8d06a6973bbd5b80b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd2193488592522c334f65f126a7bb4
SHA12bef56dcff5d353fd74b045ba12de4927f94a017
SHA256df0bbfe8b39df82ac1ef0672e09dfd0c1afdcc28963aca4625e4b830b85b3fc5
SHA512111909a4a17ced932927b433377e1e1b408c973a5ae37600ca3b314678b48522fd54cbfdd441fd2b47d4b120cd23b5ed522b506d5d8210e0e93cfd9a05616884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a01d8a4e50186255426661786c8ae8
SHA121b84ae32650e17e298b183c7787886211a344fc
SHA2563536e55cc4cde61b28d42fc489da0d1307f814d88f6817c48f076c19185a0148
SHA512d440ac15a792b96c6490f0668b186d94f63f72083121928f11292d7e4ae72d6237d26c4916c4456901396a8baf1fcb8ee7b69c5a81ee86798c4380b9ec8c5647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7065d31ab5cb0d37bb49a8d77d98af
SHA18fa26de1a17952da7cd5ec8ebbffd7aee87e5153
SHA25615dd1d54e784accace43682121419036f7a894fd78c614478e4311ad3ea2740a
SHA51205dc870c9c18cb4ba9ccd906777d0e00095d7868ad2a5672f3aa99fb54ed59bbb71a675acb8f18933c29f6a1d8e809d899884ada1f3e5b5a709f078b4a995d1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b