Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
dd9bcea38b9f23984f67c55b04c57caa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd9bcea38b9f23984f67c55b04c57caa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd9bcea38b9f23984f67c55b04c57caa_JaffaCakes118.html
-
Size
3KB
-
MD5
dd9bcea38b9f23984f67c55b04c57caa
-
SHA1
bbe8726cd2220c14d932571aeea326cb9098630c
-
SHA256
82c6f3d446249c11b985a4c52eee0d8ef22fb6fe75dc8f13568e23cf621d2d39
-
SHA512
0fe64c68927570e67e16527ceab383878b3f2c61654fca209a3efacae4ddbf402a20aa470f098c5877b7e112acd4edd7a23dc8b5a6532bd5d57acecb11dd9b26
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908a2a209005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a32cd539470bdb8d69db8163e00e4c555822b0b48ea88cbdb1fee137f085dfaa000000000e800000000200002000000011ac599e65be4eab94c9e846e3d2194be1ac9d147baa292f0ac87dd5018221a220000000cd40baf9e4ec12ffa4643da3c3757994d41b0e874d8e211b4349826a46bcec6c40000000b44d0eff3019f8e6475f40134c09bfd707ed11ead7b33744c42bc0feefa0a614c3f555fc61c81139eb1d6b74676854336dff4b606b7dbf1d0751bb617d008ea0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432361287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B795CD1-7183-11EF-A444-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE 1616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1616 2068 iexplore.exe 30 PID 2068 wrote to memory of 1616 2068 iexplore.exe 30 PID 2068 wrote to memory of 1616 2068 iexplore.exe 30 PID 2068 wrote to memory of 1616 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd9bcea38b9f23984f67c55b04c57caa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0278956acc542d4573e5745ccc3227
SHA1ced98dfa5968d4d09fbda5a7f153b7bba8a24da6
SHA25686df3f309272f6d8a839fa85208eaef69e9aa9217f8e67ace25f265ca2a632f8
SHA51230c0e5fe9bd45ff23386daa8a4bdffce4713c994a36d581d8b337e4a5aec1245a723ba6931b90dde00f48e5986b78833dad23bb13e431a6034a9b5d2bcbe16af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240e3096385c29df14d191caa2f46126
SHA1e7081f52cc0a8996a8ddb0852c7d0264969b5d23
SHA256b1c1d67e16aa44fa1d741fafb035e8da5d31eed3402b8cfcab2c117910ba0f3c
SHA512f021b34f21670fb6eab4f46df13d1afbf6a29ab3733c313929745c001ca6e415e5f2fd05bd95b31a67774591b4f783ce8db6b44d4612bed42de7c21aa5308caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5241e072a27f65564efe3887737a4cbae
SHA12efadf51f5ffa3040d74d2d4ef5c8ed4c3895bc1
SHA2568072fdc560520eab1ac9771de8de954229fd2826a4a888713d5795934c7af5a6
SHA512ec099f36a6c17e46f1ac376c0cce9c8ccabff30cd960a8a3232edaeb2737a05533d2c495c6afd1d9bd41b8f093c3f3e509353ff46696e318b5df83c7874d99d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cabb7630b4332259df268a926a8b62
SHA15ac8c5eff45306ab47e1f59218bc6cb7e65c0914
SHA256cf880cb3ef3db3feb2d1e0aea8fa72fde258f0ff626fc5ea7c5208abfe4fa03b
SHA512acb7300d5dbc9cd8c483f7defe2f0e55c502ef045b89059d12146688927321dbb8bfb181e3526f9e54381bb2b12585ed323abec5890b7f3e1d74cb86d796785c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f6383ddbd48ab43ac9b10acc0c95af
SHA1d73dba3fa8758f9e60fd3112060525dca2fdccbe
SHA256f642e78433044be77ed1df914ea7303d3ad3f3befee75ef2e47e5255da32d776
SHA512f7b725c064446e797782dd1a2d42a141dfd4070e69979e9f8aec69db32a2458bef4f3e75ee7cf65a360f8fadab0c9c9ce0b45ff15e4b8e75091d99a09d2b7a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52df993cf9be87adc16d1824b471addfb
SHA1e5a24cd46aa23c651fe40b614b13a09090b503e7
SHA256ee42d04d003e2d12df9324e0779b12918be61c65e09cb29fb7d20b850af8c41e
SHA51203942fe0fbc4d733547062637eb4065d4a110a1a20debba82e46bf4c7ce6cc6298f61d8125b5d8daed203d64a8d2fb330c3b0ca06bb24ea8d94ae979292812b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58edb3bcefd1ce8bb2357e86b8bbdb08c
SHA1d3ce504e6361e83426ffc04d4b08ca4ffbe87557
SHA256e3815591693e00ec2e74e4bee879404a32630a9f86647f80eb2ad983e169cad7
SHA512a0c1913b8462ae54c78041fdf97ab4f3e532dbe4fe4629442de2366d9f99af74aec2aaec5f453769772f9fac519ecbb1ca4ebc0d7670e1a388355db7c887793a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d29bfce51b1d6b18df979788e67fb7
SHA105e58606c0c4c4279c2fa833bc06451f06c00236
SHA2562b5603e80152cd9a9bc7edeebd30f29b33843588aba3348b9e52664ba39f16e2
SHA51271492908b8c98b04df04bff49c43075b28331cce80cd384b057c24fd89861457fd9bf3c8a47855bfed7058726e3c284c4e8c422145f7be4611c933bd231e9ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539db5ffa2c3874ef3ed5d8b33b5aef12
SHA1491898d00321216814b69fc58032ce413770acfd
SHA256f8e5adf239267e979c03c863de1c403aea4f253aec99b42a41ee9822c780bef7
SHA512ec7d358e6548ffc49e7e5e62827ba3cfc9eafb1ad7404048ba7ca0959d00200fd4dc4593bc8ca5a6588cc8f8053a54aabfcdc9c418cc9f6625b680cd71f9eb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffed09529a8b790aad45f2e031d3b802
SHA1dd76010627fe5e94e56ec04405370384e77b855d
SHA2564aa26064ec83e29c3db7807d98d744b7f309d92b24f3d78a640a504921b4763e
SHA5121847d1c0b605af416682dfb2be8ebc9809260c8a9ff90fa17f7d8f0843b2c919f107195f4c70c4a1e7fa6362126d610385068846e65f3d433d864dd741bb0121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4e0acc0d02f8b152cfec899a6222fd
SHA1a32c7b6e259bee7d0c1e85a6f3bfb44dca1d3ded
SHA256408c6da8450730de8d031a0c219fb0402191a423d0fd19247752926f1a3ce105
SHA512e916057cdf80e74055319e1a807dc6f070bd0754bd12ebbc944259f707ac8b866b3bf14184f0994475872dbb173b9654294e4ec1b1cda6401bfacb9a86de530a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54227ab09b976a050f11ad447ee209e05
SHA1c0c8d3809cc9e05600f97275078fd9f6a1168037
SHA256d77c471f9a877859f2c475018c272af10c2822c5f9e0f22d3392a4c316f71b4d
SHA5128d29dd231ae7779c9cfad59672a7965df4ee9321830b69e584118aedda22032fa629c6c5ed80d55da022052cef7533c1f8a6d072209c004f3e10b4c145b4e3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515501a9ec70eeb6256443baf7dbe1600
SHA1c9df0531d45f8dd48d616e2206db6d8927ecea81
SHA256980d8f33a2150a5cae7ed6b8c73a5c3635a4d3f43506bca734b0d4d6fa322e4c
SHA5127e4d71f939f6ff9c0b2d447ffc4ecd844d1cadc1ebc254b78c19cfb46f86c0cc5159d9903a563ad62b74d0f56e6669545308d91a640ddf9388e2d25e6ff29d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8a27f51c06e481430a19fc3d660176
SHA1f24e051f16d029747091b263e75721fe2085d1d5
SHA256f626982c1deb4285cddeb690e4421597db9efda9abe7ff4f9dc911a44e460b19
SHA512d9af6fa3aca3ef4d866ba5094d9073c662b17253fb974e45aa77a50d1ae265ad62d654a0f2a00580831d18f3da0481e261efcc48e0fa36d83d02c9373f66c8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d0a00979158cbfc92aa0d69c1c7b6a
SHA14f89cdef5e5bfad042ca01684c105699c517f41c
SHA256b6ebea319f34408eedde21f2c6ec05635e694c09608d6161e8aff3d819e03430
SHA5121cb7c7685a92110242ba7da0b02f7277e26d2d59d8dbcbd91f50399342a22e35049b5310a7461a4162a68871fbd28b19fe1485abd551392cf8b99558ef2a78ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef72ef813d58c66b63c3bbf841df0562
SHA16eb57ce321b4c068a851474a9b8ec86a1eb4739d
SHA25629b2df12e311badf04a08e728edc28498d02b0bb40b010b2dbdef8285aaff276
SHA51279fe050fed0dfbcf5c3ed62d050df59aaeaf2d6ca70f06618dc312ad219d1708eb0844273028f4f26e5b4ce0da5296e9da5108bde6d42938a71973a81202269c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a37fdfea3ed531545ed52ecc4c137b
SHA19446a6b775830c7d8c95796d0e568e98be51fc03
SHA2562a523be209df7f7c70c14926a08debef14e5212f75e05120670caf6fbefe1951
SHA512025ff3b36c660422e5db2be46d5b04f3adca1c4c05973bbf367a69792ffd870ec8704f1d9e8f97d6cf3a3adb48c216cc3d2e228282f7727fb3d0b6fd3f99a175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd32c8cbd6fbe29ef617cb63f9e57802
SHA1dc7407295e718d0dcc4111a4fff03ba69804e477
SHA25685459bd84b78225434031d4bd5d40040b0f96b77967e3f66d2dc3c04eb37a48b
SHA51281dd3805421d73937f2f3ee193d56a736ee6b24e5004805ff54ea40e3d566e9094a2b21032852beaed07287c8809fd5586802d36112ef99bb3778002829e2c2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b