Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
dd8daf32a470e7794b4b8e40af1f8907_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd8daf32a470e7794b4b8e40af1f8907_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd8daf32a470e7794b4b8e40af1f8907_JaffaCakes118.html
-
Size
28KB
-
MD5
dd8daf32a470e7794b4b8e40af1f8907
-
SHA1
7c4c0d7547beda1ad35e9b870af924c490935ad2
-
SHA256
271f49655026d735aa23a8e5aec2ec4980332398fe030cc3cbd357cb64126cd3
-
SHA512
3ca068d87136296c218a45ad2c430c95753cd9d363144073c5ec7600db412eef45f1fdba50784e3670ec2b3c9520eb636d4aed121b37232c61cb62a4c8c4809c
-
SSDEEP
384:T5pyIzvFRpXVQ4NXVXQ/cCJnQOcbemq9eiJ6ajxvzmzIPpTTn39TjmTS4u11CNYi:30yeGW6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432358989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e7f6c58a05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0747F41-717D-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000019800c449433fcce4b2615d44515cfe050a315a389ead58e6d54b169abc9779d000000000e8000000002000020000000bc4a50c727f6edfa723bc71fd218af7a436bb872ee4073f2a1790d357735ca1d200000001356ce1c10d31e67c22577e5e50e7326f597d7c067abdab90ae97aecb7888aef400000006e79628342198f9fabf128361a1d9ce251e1f2abcc3f7030d2f53bd0d0da0ca89b4d149d90339988d2a3b818628c4c561485972c345cd4e2b89750e8c5ef38a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3012 2708 iexplore.exe 30 PID 2708 wrote to memory of 3012 2708 iexplore.exe 30 PID 2708 wrote to memory of 3012 2708 iexplore.exe 30 PID 2708 wrote to memory of 3012 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd8daf32a470e7794b4b8e40af1f8907_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551dee1588807e435909f57c41cc9dc6a
SHA1041f755048d1de3cfbd4e7bfb9f294a29e4b3b45
SHA25687eac95fd9d2c4a8e5e9a472c799a6ba3ccb72793d220c2665ade46400843ad9
SHA512dc4bb6ef047076b4564a76f525ecd74ccbedf7ce6aca830deaab330e7e2c833e6850191b59e7ef1a14f2e1c3ce4d3fe4778e8f5fc88ade03c70bdae4584f6574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ffc67bae00de30fc0bce1685856e07
SHA139bc61d4f07656768b2f1ea4046f3762ee298a9c
SHA256cb468c26419fc0442008ab83d98666e2d9037647611171d628c29649c0505d79
SHA5128309fb7cdde051a06b8ed523093658f53ff1c3f31d19b64ca87da4e2a442e20abfe4ff5fff60fc95a5fcc6d86ec735391b8536ff3b2c35d9fe23fe1424ad6e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4ffbec56f87f6edb5122a42b43256b
SHA1a98d99152db3c8e35df8b4f79545add45fc1871f
SHA256026e05d2a798d2c2421199398a5f5efd094b1c735160fbb28ab1cf3845969d95
SHA51278896706a1140c96ea553cc683cb497597228d7f6245edf6721c9292b0f5706a222d32614aa27cdeb0462ff70a8d6f4e25571ad964d44170084ffe5e93b68e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c900c95a34c315b9ebb211bcfb86424b
SHA1b08ca6a17f374bc0959ebf5c8ec107efbac7338f
SHA25632292b86f9154d7b9aaa50028cf78f118eda2198759002456b6a459feecb3588
SHA512cb6ba2614635f74d6e469468d2e44b20e6bb26d35d8cd5dc27a61e06d9160e109b0d096f6d763f20c4b2db3b9c972d5b8dd5dc335b388a08dd13927945c458c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5954fc455c6dd353e8070d74f8ed1a0b1
SHA106ec3c7471f3493e81f122f9416ba62905e25a78
SHA25608ba1351ecbdbe0c99277e36ec900b7f5bdd625378abfb12f5b2bbfe1890cbbb
SHA512d4c5978b531c4db32f6576f09863dc8878a89fdf5b10ccc69f06be47a1888a1941a3b6111fceeed8570805c429b1b15b10a7cc41ea3f00fcc989bf1b4c5e9b8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4e5988b74ac4e689c5f669a34b1ca8
SHA111c6fcdef2ce89538c24a9215b1e5019c8676554
SHA2563afaec8f6c403f9ef2eaf88be490068bd9eb8de649da004464cc976250a209bf
SHA512d6f15dd3e3ff801013d6d7a724057a223cf93a1a12282e322f184a7410c8ca65bdd68f14a8fa011a5ac8f46df624e518194b46557ad3ae42bef12d14b37a5c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b6f9220712c2d16cd004de8d844c65
SHA1188062fd9adb502e1854a48b0f7fa5209e011c14
SHA256060b42a74d98a0caf3eb7e4c29b76276fabf99d2e8164ddffdae145890898d02
SHA512083a2e2a3087f51e09f1a3a37228a31ae7ef9938d61f8741ffff519cfbe31069caad8055a252edf3a1ee8e45a953d6a10c382f8dd55020c652988906f8543ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a2da3bc0aa761427eccac5b044e3db
SHA18fb28c82320ecfa5daf0f2e1c90b46ffe04e8710
SHA25658b3fc64d75930dab56c9d8a7807a028836c29a6181781da9c2ca94d833056fd
SHA512654de9e6d5e1d50758c4e3f593d97f7cd5fa21165bf4e166bc87f276a7f3bdcee181fb50ee3c41213190576b47cc069279c5e9cbae4f7f1a20380d3bb8b6d2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447993ead1176467ec28c68f7e4bfb8b
SHA132e6dad46c12dcf56ea3b90e7ada8a3386a886a0
SHA256114fdeebd886c13199cc644d7e65d0688e58d2e57c9c2f797f80520e922e4bf1
SHA512cff6e71ac19035f90b208950eb1bc5889c16c926cae6438e6ce0622d488f851be70df166091dce86537a25d08eae752e20a5a748c31c4ac56eac0811e7a61a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54731e86a907aef6f33b7836f6931c9fb
SHA136c21e7c9c9a5fb6970cd22dcf612fcfbb6fb29d
SHA25663dc1da303299789c9efe9e212854bd2d7909b2702b139e0eab93988aca08051
SHA512a51f05fabf8498b9ffef478e9e523660ad354bc8f0093a94c99c584201c16c0d873b25a55b42f77721d927d7edd34d8d7588e8663235e4baa10e45417d68825e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c72a1320c71a3e60cc48b84b386fdba
SHA1c34461231b1c8337296ccf2ab12ca5bccb90c66a
SHA256c1882ea551d13c79ba447e757fe58fbb04f7c46f1fcdf99fb75533ab90e867e5
SHA5122781a4f55067802b967591f26702b4c144406492c338adae1e68e4b1ce11ad0466900333ce53c6bb56ba6a907fc60c551799d56434f558022fd0a09d43b9681f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc670c0429163037fe4a0c3cc29191df
SHA11bef827f9e454773a08d645b3f68825cbe218434
SHA256a2ee00dec32dfee39bc47c88ce8d92eff6f909840c24bfa4409005673280d981
SHA512efbbdb630d6dd418bb004091a512bfb06d97a5cb11149504a4a20f0bb56f9f2eec576a346973b48e873b4dd2d6ee8ac72470625f3ace6a83a7ca5f2f1ad54133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4282d95780fbf86778bd3858db0a05
SHA1aa05a2a6c9afcf04b9555e6af2b7464a11222b35
SHA256add4dda5b9ecfb725bf6494423128995a67f80cea2917289376abc6f13e47cb6
SHA512398547698b9908995d954b0a6269014995d75302a5b30169eba15177a267da081dc4006c90467da04b3be0b4935760305fb73d2fe1573b2091ce2b364947a4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aae3b500f700fdc5270f3ce27023559
SHA1bd188d3f264ebed08ab1e9378426c4bc1abfe54e
SHA25610bd2f20f1ea1d330dbe116a2b796db5767a698b319b14b2a64cf1625f95bdb0
SHA512de542454cfdaedd10d72fdcad86134d06caf8d473ac8be3417657caba3a24061ff0b330edf250deb9d5b0899c4c1f92490191a2257033fc313d14df998bde5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389d304545d18dab4dbece155c73dc4a
SHA169a05890fff2f25cb09c81872652b168714f5b28
SHA2564e4f0beac89cd8edfe226d45c7a6eb3967940491686f0b62d6fe15be186188a4
SHA5121bc129061521d4a95f2d8953981d229e2770cd4b343dc51258e81f5f07411d6a53f292d176e82479f0112c366f9f2a6619bcce4d7119ec57e566a2f98258cdac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b90acdedce9975bb9cfe1b49186c87
SHA137557df746b3e195c848f91e6d4084bd9ee8a946
SHA256ca01b9ec3899642915064a2fb6f9d1027e1fd0a748a45033f5069c4bb7778f1d
SHA512b617a9528cfa4d4ef391420aaedf446ec0f4b303978576f5da70298e71f006ce89f8d083138a9c1751c1a37f7409da001f095debd26b9882d601a160bd0a536c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a3f57b053a5f2341b59cfab4811f2a
SHA1505a077c4915aaf822f08f7864a586baeec58e4a
SHA2565a46c3ecd4f64b0202616bac3c69edeaf61cbab030bfa48eeb7ca8cabcf28543
SHA512d6ca9785676cda5f5989f01cff52bf7a3d78bd5efd554522bc8b4d78702ce693fd60ff45d8240d04fd6cd825c070a23d2cf61da8346a287809471a7bedc83a1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b