Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
dd87419e2f2910e65408d51105095e45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd87419e2f2910e65408d51105095e45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd87419e2f2910e65408d51105095e45_JaffaCakes118.html
-
Size
213KB
-
MD5
dd87419e2f2910e65408d51105095e45
-
SHA1
77b2d0871bd27d37d82af02010a3f5cb34d98309
-
SHA256
e33b86141faf4e9764ff80c524a094b03f265413f7b261a48c7da422e24f473c
-
SHA512
8aefd18c143524927ea3cc795ccc351d242e92de378a436c51cca50d0eb292328fee23d2631f32113fb80b94ac3fd244f23b99b504d519b4421af63884f26bce
-
SSDEEP
3072:krhB9CyHxX7Be7iAvtLPbAwuBNKifXTJA:cz9VxLY7iAVLTBQJlA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432358026" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000004b6990e6b56e33ab47db018da798a34abec12c2831364a435be887786f389301000000000e8000000002000020000000f7dbdec621c8f96ff0b0ff51fc05357e7b07a3ed9c2bba027dfec6d6f6581bf620000000eb404e156e3f38a275d358b792b2087f67c80c56ca58b4035f67797ac400166740000000963f4e3a6d02d9b419807d978fcf8e6de50f2ad8fcb877f71bc74ea5a842b88344b24a1b49ddf3534afcfb3d5079fc4b953aefcae89dd81fc132b0c59159fec3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506b51888805db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3CBE171-717B-11EF-931E-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31 PID 1152 wrote to memory of 2868 1152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd87419e2f2910e65408d51105095e45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55577b571516c171fadaee88778f92286
SHA1311d94827238de411bc8e6a0436b6cb82cf1a87d
SHA2562d245b29d14eff1798d14fc96d8e5f3af1299fe5165b27fbe0fe221c855cf2bd
SHA512a93f973d657caae5882c664a4eadf4a6899832284db56427b26bbf9734b14630a4efc02273bea31ee0c2c1ff684ebd3835ed82839934457a8316e83e856e03c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbf175f13bdf514a9db2f5e47bbb554
SHA19a47948d954d664633e29ce819fef46f7cdef446
SHA25636f9605187f8b92f316dd819af2c24e0bb33f0aeebb3fbc078c9a84da67a9208
SHA512449c9b889bf0c85f9c2ca68739880cd7ddde3888c5714fc5eac0a2ec3d24cc55b150d240a07694eba0290d049196df44a92a07900187299b66d6461a50e5d103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792ddfbc17bd32aa99089f0fd1d91bd5
SHA1badd2eda01f0ba959c4d4c1f55a839d33b33c8a7
SHA25689942bc343f29923d1c41d8d675f604bca5e31b892658124de7f742a77260844
SHA512c45cb1d346d79991bdad8280f4d960f665a29e96de7b3d798d5a21da9768f467ded17033650a5da1f311027e8f5797bb02373a9283a4c0c1542f6858c5c73639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552b9e5eb357a23ea1c3d2d838689a0a2
SHA1bad071bb6f3318c4205b526547d7eb08cf6b8272
SHA2568fa04cdc66128ede57bc70a2d22c6c049c0743aa6ed2e8d681fbbaa6af2abf9f
SHA5129b05b0dd94f0ef6afebc39c67184a66b0dd4ac96a203458dba0b603877b939e3aafb19efae57b53302eecd4dadece546f79fb628c5d05d07fcaa2e80866a62aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc85f86c51c6d1bad7167f1eb71203d8
SHA113803aa85f8062efcc5327fd64475b08b90c0bdc
SHA256e1c28a747da012b8638399f1d7095daa0f442b79a92b503b07dd479d09ee828d
SHA5122cd025083aba7df414b72b9082133fbed568c5f34905c5e2cc46dcf3d2f3f3148f1a7c6c7f1937bbfea07ce7a48e5503a0402d388ed7321a6110a272a8d9be43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd516eccfee73044a9692f40134a552a
SHA105a1066d6bd66209f4d05eb54dec4bf28980646c
SHA25604fe460dcf36ae6d94a1c4572dd03549b9170bc8cad7d5a65745139fbfc25b68
SHA512975d1628e456c18f965e8f9a7b867c1fae80c6e95fa36b7cbb36a299f6f6e975efb31d239a2c4f1efe6cc195ee5712fc336abd503741464a2f3f33296e087538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c763fda4d8cf35148160b603588f2c3
SHA1435990b3bc39e90ce93bebc81779efc235db9e4f
SHA25662d9f6be50bb1ae0ed91223251c839d164efedae4039a0dd100eb9824f194a37
SHA5121e1b50190bbd117134305b76cbd96495ac96a2fb10ca61997a9a9309fe78909125009a438fd425fcc618895ac2eabdfcedd3d405168cdc3392076f476420d629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d41b4a5ee9aba1e109c9f8adecfbc4
SHA182f4255f3258d092a2f6a15d336d92def9f9e6ca
SHA2565ce9804fbafc4a6fafa5b44504f12575615721ef8fd7100f73752368d7b2378e
SHA5124a22728bfaa4b691b3b38876c6c95884855e89460a417d6f4a3f68429eec000a287309f39c49eae49b9825c4ad3e34d3c2c2c4dc12b930b57b2cbd61e61568d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54001ef55a813e32eeb2d70349ba4301e
SHA139f701c1daf8b679786ab75e46ba1a0428bec683
SHA25637b5883ae6ed94d1b01e4e75fe8baebc0c35329a825664f8e54d594fe75c4d59
SHA512bd38b908a92f8f12f8d246ae895c814e50807a30bf6004e31a4a6839608574ca3c051ed48f99b8758a795f5679529b30ccd58414fd7b860429378bd9aa3d3234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525fc5545b391721847f1f4b57565cf18
SHA13c4ba87cbd61462a25cc0fd3454189a2bc41c434
SHA256522e9c4860671eb9ddf1b1299885152386dd67b3232cb77c70325f8c8edc69d4
SHA5121bfb399b86f3b854a488f6a3de220e2a9fcef51a12c477c5b804cb1600ab1df7eee34cf919ec6caa9fea4289e8a7156a3ee2172adf14dd59b2806d4dbed5b144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc44d966467e3e613961297e99176a2d
SHA1eaee2b1b2f04f930587dd2540e64e7a71901be7d
SHA2560a900e0f61b6574ee2d053798d03dbeaae677e1131f7e14528fee6f1bd6d22d4
SHA5127e0b1235de6c6c9eec47c20c3a34566891ffaf93e2c3d0619d3d76fde0fc516f739431efdd19ff3e564fefbb10548216a5bc9e8fcdf1f33650eeae7a13c1eaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fec1d714187a507f253b2369494d1b3
SHA1bea6a2599d8681bc06bb3591d7d2bf4956b43012
SHA256dc4bb26ace8dbd6f024fa6f8f704a55a742b6500a9db47fe4e43e166811c63f4
SHA512ef9c5a65d45ce2146a7a12b422507c659bc75f7a6e43508f2494aa94657072f6c20d95bceb325ba0530b00768781feaa01045815cbf55bf7be8c8229141acfeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdef2161f9e77f1b0d41d2dfcaf458e3
SHA1866a5a4f670ad1d886729359c8bb9ba9e509a752
SHA256bfa0bf33b752f691587023f90630d226fa7b5a7db9789a639282cd02a897d03f
SHA512b46af3e492ab031c4c984e69b7d818ca2547a59e0086da85b451804e41f044d357dcc519c3ef5f43571f56c210944f9ec89b8211e3eeb7c97b3c8e210f955cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718f46cfd87924474a49acca650df23f
SHA135e1df02533bb527b196f17a4d22f313bc679dcc
SHA25651c12c265e11e01882c5ef2fd5fc41ba3ca68619f8bab62afe7969038110ec9e
SHA51238234369e45a6bf18deff01589daf1f364aafaa58393f083655bfa0cf310be27bfa566351960cab85a82b20a2c1c257513b103b0e89e20133d88ea069b6e34b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dec6818b7a6b6036012d78465e57fb
SHA12feb8729cd2ec105dcfe9780748e4353f70858a0
SHA256e440d85c951db1caffe46865ddd1c6bab6eea466b0d04d53f4efd834783ab495
SHA5128d0efa36c845c6d62977bd2d350e8fcde956ae2a29776382106adf5a9a59c0c7dc168346f86d933c30a6516ea051e190586ce3e16e80e7691f9b8106d37e9571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53697d1f7dc18e536101a9ffa81925e67
SHA146f38482f07c9d5220fa8dcd8bcd6173345c5475
SHA25699aa03caf9eac39934614e883e74f84e939b62ea66bbcf9a5debf54d9f7c4e1c
SHA512b735338500a191a3ad9dc11be0ffc9b6c0bbc72bb27f7a1e2f3ff55f4c596b976204f8ab255a19ba39fa17dc3471a75a5304a820379b27b1353be2f8c4365c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539980636fd14012de01fe600c471053a
SHA156df05270c1ebef7366502dc0fcf801d613a0ba9
SHA2561fda17cdaba08460ec229846fdfe8f893ab5c0b88cbaf81c2866523a0a6ff8d9
SHA51248bebc8c67d5e3b503a06732809ae57c7195a49609a136597cfc3d412fd1b367966b16a2fa9589adeb4208e16f3a1ecf1f43661fea0e4faaf1d893173860f49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedc4063aa85bbab5cc78457ed6058f0
SHA1f18ff026407f9e4e7c86373c700bda952512d176
SHA256afdc40c00dd19abafe1628983c1c4a43a3d8222775a1dba96467c78edce587c3
SHA512b07cd2c10045174d238f43feae5f68c7a7b6105e579fdfbb3fb807f413652ebb5b4ceae7bed38e9ad74eae6460b3afc6c9f74ceb4dfb6ce5ea6c3bb4fa916b60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b