Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
dd8259a43b16cea4e5f3734c3fc175ba_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd8259a43b16cea4e5f3734c3fc175ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd8259a43b16cea4e5f3734c3fc175ba_JaffaCakes118.html
-
Size
6KB
-
MD5
dd8259a43b16cea4e5f3734c3fc175ba
-
SHA1
e2d2c9430f07fa1e7d78f5d942b6585344fbeaf7
-
SHA256
962097e94763d5a08b48bad17cb09dc652ff62b7a15a83136dbd401d2534ef0a
-
SHA512
f669f10d7f3ad241ba29140cec1c82f9eaf7c05bda4eccf38900c7e2ab1897da85d3b372f06e83e27d4c9227a9af874097570e9a9a269fe2ccecc5c927c005d4
-
SSDEEP
96:uzVs+ux7w3LLY1k9o84d12ef7CSTUeZcEZ7ru7f:csz7w3AYS/lb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000012e5d129da57275f17d0e76db4b11d6eec89bfc81e0454e4c25cc88fd0e22a7b000000000e800000000200002000000034f4068ad95d77c1556278c2227786b98122e5f3ed4fbbf8d8eedcd5f3c30d1b200000005820e264a87081e153d24408cd4fc8b87d2306b0ff7436046a9111394d8363294000000080452377c41895bb854949802c3d45fce1be5ab0de6a1022c23157a03420825d3c373a92ebe5d2718fc1974234903b5bc0db98562493f6f478b55c164ad46e65 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7018eee38605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432357320" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EF21671-717A-11EF-A817-DAEE53C76889} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2328 2412 iexplore.exe 29 PID 2412 wrote to memory of 2328 2412 iexplore.exe 29 PID 2412 wrote to memory of 2328 2412 iexplore.exe 29 PID 2412 wrote to memory of 2328 2412 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd8259a43b16cea4e5f3734c3fc175ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86cb4d0c55846f32955fdfbc8f7cc43
SHA149ea4644b709d15cf917c857336a1c0998ebe747
SHA256999f4c6484141f9ebe6db6eb9cf05a8090f346827a69aaf95e57313e9514dfab
SHA5124ae882f6eaaee8fadd04856d0aa8a153a8167689905a7b6bec03858e054fe1f8a38d9befdc1e3f3cc2b6970d0e806a3921b0f12e973058096b6a05aa7f437369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf018da8aed88f876288623882865fe
SHA1267ffc0b274b1c4553abdc7ffc0a714385ebb5cb
SHA256c68a2b64329842d2f7259f4d4c2ad67b2d9bfc9e5ac325f1613bb1140e23b44d
SHA51287a484c462a0e14c830f1e380dc20e879776e4d62d3171c7ed9c52ae0171f74b5b0dd94a00b3ef62f8c02ee6f436f1266191a7a8e3228a37b10c1b1ec1e5954b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a5fe4306d5e39724bd25fba5105609
SHA1d59840a1f0e61f889020bab900bd980d011a3562
SHA256c8e235ea2e4b3226a4d01d1d89fddfd0efa09392bebf3c52243a8eaefd250577
SHA512e29dcf03f468ec658ebaabe8f8cf2bf6058341242bd27dc8dff75ed0bd7bbbc6702b3be301b80f5adb15b275e3e56771079024cd2df3add76bd0ade367cc61a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85943fe33d24a48bde66188c14eb722
SHA1ab3907d565abab1644354f6f4ae4d65cfd819c82
SHA2568d0191751f4ca0d71b226d177d3e98bf84b8a903cc7c53fdc10ad9fa45aeecac
SHA5120239ddb8b65c2903b5ae4c18fcc2d5cf6163fa57be5085c4c1c514627e452d6b6f77f3b6b3acc5b1416664a9d1199eb55c35b34d55153295c27f1866a433d868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974e75f8a54139df1c2e7b64d915c455
SHA10b9ade72bf2ca2be1bfae5f663516c0cbfb986ff
SHA25623e0104d2f1a77769f4048714da592093c957b74849518e43ec55bcfe5becbf4
SHA512b3eae5a4fe09f33b6ed82f888352e0a22af8565d44e8fad2123789391a4112e6d331626eac50ae85ebdeed18cf212785db7a81963741acf5265bf0fe02110475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e632a06dc42b4de0d2b8259ab469681
SHA1bdcdced91d9ea4bc9966a12426f2e8b76a68f65f
SHA2560fc644e1f2874eff2f80fe4cf57b1a1a58d00c6b977c962c5f936e77897080de
SHA51284f967b5226daa536ac0eddcb57304dfdfe17e0e82fbc15aceeff5d79460077327185aed851900f05fe94c8250616148e7af660751002bc67ef66fbb69a01dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608223088479dc918abeaf86b2876793
SHA151a9c21afe6ff79a86646ae5f10dae2a50738c41
SHA256e36d5bd8bec86f22619147482591251e2b8548bc068eb837d7597f695a1e2464
SHA51260f126be05cf4296a7a6737cbf2e5f4ca6e056c6cba91cabb0e327dcf8d32e4f56d96488b81a9723a5baf8c0916a04a2be48d1193a955bbebb84e09a48b702fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be835b12c35ef7cbbe98000a3835de33
SHA1b0fa43a53be13788caacfa3946fb5752df88e2c2
SHA2560e1b5c7b14efce225ca731fe825ca9478d12907ea13ed2e1590ba2f0689afbb3
SHA5129fab53d18092073955bd2a4a0babff625afb8e675790a12bb354e1b6671ecfd9150b3f4a6a317f8f61ea592b900fde6acd11aa8b8b63e53d0c5a36c984db4447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e352ecde8ae53d3e252f0d3d96ac9ef6
SHA165cf6832443e4a4b959fd3e4a02c1b16aae817e8
SHA2567b1b3ff3ea23e7baf1661c2dd207a4404f4d563a1cdc0457d97d33fca3cf2e12
SHA512b5f6f84e4249cabc458459e8ceb94df044129ebc9ff5983e05879c93dacb4ac545f6a58531c6e4d11efc6f0d5f6cb9d04e87d2a83869e4172fd72617c1cef907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55699a5fa5c61242222a6c6beefad96b0
SHA1723b9c4e3efa425b73df628f77adb3f0ac9f0865
SHA256ae33839dc4136fb2e1a22e89840fbf309440a88bf2d3745035f34a9d7eafe58d
SHA512a0d1c5eec83a66e02a19b321519876ffa7c9c013951e162408972186463baa04d3fa898b5132f14b4d0f9ea3b675132d9c1467bc663bab2dfeeab0ff0c7ea3a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507b81c7c20c8ab0a9ea238a07e29535
SHA163ceb1bec4547b45ba21b229b8affd2f0a8777d4
SHA256243b4a7c78a4add95a7dd3056214229834c61f2ee45e3870af4832d5a1e7baa4
SHA512922a5e67e454c95ac36815533ecccb41781f38cd586ea430b18d63f393da9dbd5a5ef9d5a1a0078f98e1335cd639d718730a595022e13bfc5afdba92ff2a52c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86ac43778b96ea9ec208ec21b3db09c
SHA1735722d4b02ad5fa66ba7b3f7f04db6e0acc3f27
SHA256213e7bc31685d9185562b87abc03bebaa51b00415fb88d6162a8a212fe3d430b
SHA5128f5f26663efc455d36a0899206a40b3626413cabba86331748b9a176006c00ace5b7ca38cc7d3f68bb920d1da35fba37964ac2dd65a100a677bdf4eb192e3764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ba8af7072631e63414b0dd322c14ba
SHA144b6634b17bb4662833d01413e7f20750548fc5e
SHA2560b554069f32a7172910d37ff95ae7a5245d3ccf5356d7fd3d25dceb56894c11d
SHA512f2ce17aa181767d5bbcd0a9cd48687307c36f8d4751d228c4b7d289cff1930790a38460e5e45a7608c87dcf144bf12489b4f53300ffd93d4da005c4d96fedb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd954013dc7b3879e058d7ae5baebe16
SHA13cd668db835e5f153ec8dfd38ab2699e52615945
SHA256f3f23f62e1756e5c3fc762e0af942756655b565a4926662538c81b41f59dc258
SHA512cc3b12def02a7361f104999ef874ad328196201bbbff9b1919ce39f26188bf867ba2c4443a75b34da8646eb25a7c24fbed96f9bf1c01e815e5e0f5774f3847a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58742f1ca3189cecbc500e9494098e68a
SHA13d3af593bd652911b706c9d027a83ccb59bb2c18
SHA25671210ce22ea34229763dbd4b3e1c6d98def7ea5c4294e7084e2df30adda7de5b
SHA512a04c62afdf533be111a80c755d13a6d89a83ad7df603a211349123cb2e05f9cb0bb8a3d6a6fa0b6cc9bc14f4a4a905bb3492cd1f5cb93432263ae7c0d77eb167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a84e7b54404c0a2139d23f152eec85
SHA167455ab8f04ddfb57a333c30075ac255ecc6563f
SHA2560695e089965fcd32215c8f5ad8c7c41519a595711696c6af0173baab20eb8b9f
SHA5125e663af635870fa1da245aff3442bdf74d0bd778a415ffb5c3525b7025235318c9193a97aba9685ff6894b68a201462cc421e3daebb0d8e83f69431ced1a763f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a54e2fa665115a723cfd1a50401f02
SHA16b4a7d9cb58d6bb9cd008446f041fbdef3e5db16
SHA2568dfd32a30e4d1d9459fb4977e8601aa286011a90994a62b1c4f27539cf3873af
SHA512767f44782ae3fe07cdcd61578be1ebf350f83f5569fb9056692ea7d9e5ab69c62c27b15e0454d6085f890c9149116787d4559eb1a528fca28657df1be1ebea4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a22eadb3e3d3d66369eaba18712ced3
SHA12752621e5035231ef3e7297e387322e6eb400441
SHA2567f09a51963261af96936ef3fcce4f6336493b9901a2ab2f2fa7730df454c0b17
SHA5124e75e829d48c1d39c25b982eeb9673683a8c0ac71619aacdeaaa660ba660719741d5767d72a835a5fad95416170cfebc13ba42fa7795b010992110b6a5836f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe630fb867e9e66ce414e3165835e656
SHA1077d097999e0eab3acc36584e5d694533c0ec66d
SHA256b7f0c4b8685f522071cb07385dcf1f9766515e874e9dcf24e32698a4f9f97ae7
SHA512edf8c5568f3fa17d339c4a6864a6258354fb02f10588e6cd96ed6d4caebf97784797fd6e87d6373ccd5e214652b5f6d1d98f467893cc8b301e607eb86ad4c28a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b