Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
dd790545cea19c6ed03597c0fc4d2028_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd790545cea19c6ed03597c0fc4d2028_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd790545cea19c6ed03597c0fc4d2028_JaffaCakes118.html
-
Size
52KB
-
MD5
dd790545cea19c6ed03597c0fc4d2028
-
SHA1
a09f4312644a89f1b32ffb42de1f8cc6a2297f41
-
SHA256
a404aca882e7022ce72284dde6b1622d6e247c1472a3a3927032a43596712e33
-
SHA512
c6bee7d11c899ff0bd93d9dd93f1c7f55015597a77cbb4c96a8787a7f1d543efbcb677a1bf484ed11b5d8a2d1e49e781cca5f17bc5dde10e86c66b0fb3df53d5
-
SSDEEP
1536:SAjXvEzM3NgqIMcQ+gUqIMcQ+ggYePNuxuJ/bH:SAjXvEzM3NgqIMcQ+gUqIMcQ+gVecgJz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c2d1868305db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87FA5401-7176-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432355804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004def91f041d3a795b490a0cf63460bcfe761b803e96783f4c5b6082c9974da97000000000e8000000002000020000000640101faf2ce96ef574a2f4c7528bf0cb58740fa4d82949d72b0d80e50144db120000000b28a8c7d45088d9eda26003ece68e0af5d84f33997e5ad99863a2fef7642eb6f4000000079b002317e73503e5d945433ed90a76390fce057272c179f4c10eced3ec7c330b27e9c8b820cfd612dc40fafcc40b46b8ffb71d528d8c3afb51b5b4ed3efb209 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2776 3048 iexplore.exe 30 PID 3048 wrote to memory of 2776 3048 iexplore.exe 30 PID 3048 wrote to memory of 2776 3048 iexplore.exe 30 PID 3048 wrote to memory of 2776 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd790545cea19c6ed03597c0fc4d2028_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c303fa8125c300eabce85bc89c56b9
SHA1e02eb33e1c08c8c7a6ca61cffa88cdd2f1f06bef
SHA256656a6af670863133dd19503d7bc3e5d0f83a6ed319da5121207e35839011733d
SHA51285e764142f52cb237d922717c419ab77093721baa8b1329d2a010794d0da7301d30476c8efd6a8b20d5d56ebb7f12b471f26ab7294b3a7a132daa7362adc0678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c101d2642fc00622e46e5f4d4f136e
SHA1f59a9bd491300c86d7c3ec15cb6325eeeefe88a8
SHA2568049ba9a48218fa0fb2573b5b8af665afc86906db06719cf67874ec23d7a4613
SHA512989df18d2ae3780fab891a629035ef7aa8fdf1047e9cb4bb1adaa96dfe635a15723be1fb7269ff39ed246fd87495318a6c84d69c30f5a29814ec646669be97db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2eda0c8fe9a7c9251cb61281f347f45
SHA1ffd18befd33c42a0588a21c11d9d8b5ddc259b43
SHA2567ed2ca20324465d68baa62aeaa33ead4f4baeaf90308c2cf58c536db2c8db167
SHA512dc609cbe2d90e1fbb915175526c9144d436fb0e7d107090bb317110b10bbb0eaa727d9d6639937ef4c6eea7a723e95c17824498f25804e9860e46b3656fe1487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f53f7ec145a9eae2115bb9787c09abf
SHA131b69252d5b6108c87659222c7e2c60c1e3e678d
SHA25694ca99059e10e972cf2955fa1d85588577cd39ca48f64fc0e60f25950ff27e03
SHA51280e74e782ffb54759cee89e21b0f96bf1eaeb6676bc410de6dabab622af443d2621eaac394358cacfe952111c7b9e7db566015bfbe2487a09bb3ea932805c732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819ea99d02ea9ab98348c132c0da2aff
SHA143bc693f25835c07b3a69f8f8a2ba2bc77273e6e
SHA256dfc6be94bd7e7923c8f74d4e1e289160a8db0ffc4f3577ce526f5cb0da63b27d
SHA5124ac047d87ff10fcbba3b431cb760065cf978020c954da480ac027a56a1882a7cbc7e360d51ba9b32ecb54fa9c755073d412fadf082443e05ea38bfc3406d935a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c450741139939be9e3118ef2fa859fcd
SHA14c9745d71e70ade55fc86db12c3ef3fa14162149
SHA2560630aef3f27a2673f2d48547e67e9e4ab61047d19c9595f241f5bb884d2fbaa8
SHA51207794691119934ff2309c3cdd8fbe3578a6c2a9d14edb2691bd59f01bd3dba87abf99ea009f2c21276a80fdfd7cd7b004734756e0d2edc3893d8685f4112e52b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f0645a9f05110e0931a74163e156d8d
SHA15b46795296c9b34c7b9429dda4a07f580d7b38b0
SHA25642e8f22ca6a093132c6f8c286932a10ae32e368ede04a37a1f47f017ba63801a
SHA512c49b24af54b40dedf487025fa2e1b4d74684fba1d0abb6b54c36a29c781c610266239571aac43d079d56ee363b968478db9665e778364675f1900dab7757d984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b867a11e522e9d4de9c68b91ec9d2d
SHA1c03844351ae9601c056930370ec8789262740fd4
SHA256d73653e7a45a345c3d3b2220312c2037a453cc8b6f977d3278a3070ea8540cfa
SHA51238933a2404154eda2adf16e8af5661b9fa0707bfdefb1d4cd61223718ec95bfb8d0c4c5abfd42bc93dea731c68c21dd6ef1fc1e84b258b072dd3aa80d67c5f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582969017db3c9072d8bd4d519bc61101
SHA1fc76754f98e348e7de263b5783ade427b85f49c2
SHA256f3d818dcad436bc81efc2f067f050b55b846fc60fa2a0643920fdfdf1d47de38
SHA51228381a246582e849f16b3ed5e4d49b1fba85ba6925dd754be1ff6af6d6d1df66d7b769fb1fbfcdf311caf986674b456483fb7810caaab898848083f28034cb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83822d24f8cf96a4ece939c9fa522cd
SHA133d1b104176cf34f09af683821c1b59a547b10ea
SHA256cfb36838f9ed32ae69ce621120bbc46a771ff5639dfccb76ea1c426f56fea85f
SHA5125d3d3818b3c3a6c8cb928617db2604933d477a38f7a455d91c24104ff080a3ab7c69ffc5325c9ed291f0f546dae391873afac37d040de1108d0ea9d9b890c9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d9c231643635efe927d20a89aa2d35
SHA10e7f1cb56613ddd655eef32a38bba236e8ef2667
SHA2563011e5c6061d086e7993a151f762a87138794c4fc22158cca2ffbdf4f31aeb6c
SHA512e4260db4b3d49ebfc7ed4c6caf80412ffcf69ad1004bdfcc2a80c48aff217311ca648824c17c39196a76328d2864732847928d7379e4e170758c8268eb31b440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9cc76c0ced8abf257d3c73f2e658d52
SHA14611c9f9b94b1d2ca92e531161bdfd1d52fe0795
SHA256ea88cafc4d4ece014eb39eccc68e905964b04f593a718e9c28a8705b0c8b14a2
SHA512f17e4fad5ca57d029f23c675cab599487688d443b9686ad1d3cd9401a89fa2e354462eea77e5601b0df831870ba40cf59eefe6b287e997144d79e27a4336ddc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab3729d073ac54ab1a306cbd1b0730e
SHA124c90095a181510af9177c7d836a2370deaf561a
SHA25649e6dd0015fbde48309626d111bacf31e359e5500be9a331c177aaf1ddc798ed
SHA512c2393453594b12d2a70676c0c433d59026600c51d707a8bc65b62ee44bf9870fb72d4a9ea0c6529ccbad6c9c01d3ef58b1d23b9ec18bbbf387bf0435d3a572fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00d7051c8739ee47a989ad392b3076a
SHA161bf454c9cd70d392c3adbfb9a51c47bf672aa8d
SHA2563dbf9b2d691da5f7d2d07d0320d521d0a14f13fb21bbb94c6e69923015c76c0b
SHA512385cc9021e993944ddbe0da097f31751f8983dab633a043c89e7d4edd5d21400df195ab711ceac5a697ff604064379ca80b03a77010ff0810de5da7c9635542f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276d773e3961abfbc8c58d1e0e4bde53
SHA1fc8848a732b4719dfa67d1b2ed933b193c5258cd
SHA25642d434eec1eaea8f3438aa9e23d885b99c7f42b276d198a2c3b9cfa38b9aec7f
SHA51283341b2f01c99ee87f6812e0c3026ccc6f1a3ad31e2a4a7760aa914b9827ab5d3b30ab2dfaa90ec184fc947f5979847a900eb39fe1d4327e9cc8777c1822cf38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef24e7e2a7f1606b2c8026452474bdc4
SHA1c0f6e42d4623e0f5ea93040af4028ee9c58fa440
SHA256b669ad640a59802b2eaa08364552e3077864506d9c30596ab5a5a10dfbfefb5e
SHA512b59110c2e2b1038061ec5c9d9d4236e3050a7e8ab4d362e3d70f9fe739f038f3d1ad9205eea7bc2bacce51576a776c47670605828b1174c1614cd0ccc7f1413b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8943d5160e190a47cbf7d253f2950a
SHA1dab830d24732ceb5b60d1cb51870e8f6dcd6424a
SHA256b7d2ccfa21b44586df2cceba942e8d5927f839dc1e7673137e914cd46a8c795b
SHA5129f2fed90c9efd5828bceccff5268fe5d39c84c543034c27b86d0d5c2fe74d58a87fb64420f81b3983c21bcba805e000836a8aea4d58ddaf03faa444d0b9b7195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d17e60cde6c7e563c8bd3fbb56f45190
SHA152d0fef6adb811adabe98e3ccbdfcab59cbb7e5d
SHA25653ef06a58a8e07689d7fa22b07c7085a3afd96104e5e498d284160df22e36e0e
SHA51270a9ff19a06dc8e962e4aa1ab84458c9e8f75ecc8304dc879bbe8f9f3f50bcde2d819d63492f06debe0a887e70b3301418ea0f4fac4dd57588a2025118042bd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59def70419e803f084192f62e86762faa
SHA165dec20b8a5871ca8991a3fbdd11114da898fa75
SHA256d9fb7ffd8b480746dd657c05ed0728985feb1cb86596e942153b0d784678c069
SHA512a605d454c2f057ee969a7d815da314e1159fcb0bf3ee4486098312b9e3c650088757553d42896d72da7aac3dc9e494477ce1ff990c1ec11e23c0ec262ecb97c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b