Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
ddbb7ddb1f3ffa4e0f2ff4ba4ca54bc1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddbb7ddb1f3ffa4e0f2ff4ba4ca54bc1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddbb7ddb1f3ffa4e0f2ff4ba4ca54bc1_JaffaCakes118.html
-
Size
124KB
-
MD5
ddbb7ddb1f3ffa4e0f2ff4ba4ca54bc1
-
SHA1
9f27cb307136a1ce28863e34267bfe14771df928
-
SHA256
3635c6df4303bb41709faf534d84394c1cb18d424a256b237609ffb0b3aafa11
-
SHA512
8b18c3a7b9e2bd09b673e2c882cd8628163777780b6f7b1a3a0edf7d40297c1b3a096d844e5ec566cd7a3c102669b4ccad1225cb2bcc92f778c542e7722f7cbc
-
SSDEEP
1536:O8i17FbwMX4dyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:OJtXSyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432365896" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000a74ae2092c7e5e398ab78151971efbf1aef56cb22ba1430b7db310bf06907ea8000000000e8000000002000020000000d78385a0e4af7e130c80e46c94d2719119bb30b6c0117e850c58b3c9c020b992200000002f8b848fe38dc2c602549d2c8cb87bed2d232197b36dd5ccc61d9afab0b49bad400000001c9bdebcdbcd4ee04806a18a1eb014cddac8714135bed0f690196aa70d5f55e2c699c81d141e81e4ded96d294a52506747d8f12f31cc5af3ba106403f8ab84ad iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{06AE07D1-718E-11EF-8AE4-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207ec6dc9a05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2696 2544 iexplore.exe 30 PID 2544 wrote to memory of 2696 2544 iexplore.exe 30 PID 2544 wrote to memory of 2696 2544 iexplore.exe 30 PID 2544 wrote to memory of 2696 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddbb7ddb1f3ffa4e0f2ff4ba4ca54bc1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c0361ad8a0f467bb8ec5503c4841c2
SHA1f62fcfe62118a79c135070d70874753dd59f0116
SHA256fdcc6b9ab43c7968d3ce05e91a36f0d466f1557fce63dbe27471735cb150495d
SHA512a836d40e472c43cd46492a6ceb173b374ad2aaa6de50d6533eff6f604f5637047a2d2464face382f9fc1866850335de648224794e985ebd30616ba4441d0cc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0df8a4835b75a22273a7d71b1a77bc1
SHA1010a6620a86bbf852a7250ee1fb5ac8d3a25304a
SHA25647d4bc3ecd13e2ed0b10452ec01561449444d2c7f88e3194c24ce6128a6de1f1
SHA512a05149e4166597bab6bb62e417811125cdb0bebbd67d0051f75976e540d8089d764313ce93384a3e6a9dc0b0a6dbc971e59163155095314cfa7926aa814a5577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e034902befc4a2b9b081898ce58e843f
SHA171c55359d6bd1413ad30fbf50fd42709c73ac4d0
SHA2560fffed305776c1923e090f40608960e898647c442476a25137ee266b908eeb75
SHA5120b1cddb1ff7470ee2aa71c98f4e6efb2c072b8d3e4e2291aa42a19b0ff15abfdacb672289f4007cccf16e730444519eec7c06c75deb5fa632b504e06d23cc30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d339a7e791a9b978284d03d48becdd6
SHA1166c194836e60597820946c02218ee7b1cb3b7f8
SHA2569e7a4552236f677c9d3718186904fe1623f3fcfca68839c37293870b005df43f
SHA5125a63fb1827b4e0abbef76392ea7b5045c13215c03b5e85766c32cb07ac0b4770fc8b1aa67de9c57943f5811da117122a9d0c22d6af14418d736d4054bb875f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a15127e3d2dce9680ad1ba439a8c9f
SHA1c0f1d128f70a85df75c39e362defbd2e479ea70b
SHA256c203d3f776e75be0d7af85982df7efbc760c286623ea2bd32cc16963580ff56d
SHA512a5c728b090b017151bc05628ba46e51a1c4c865dc4ccbee680f0b0480eb5f3587a98ca6a11811aa4ea36007a6e93a68dd5bbd0a4793d47fb2b9b7212ca359fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb33c56ff871b99d6a6d89c8ea45ab5
SHA164b20aabbda8b55909e45898c13e740d1818e89c
SHA256b72cb96a981e40698ed2c70fe67081a72fe64e5ac6302b0c51255f35694cf5e2
SHA51279befd8ca5db610886aaa1a4c86f3b6f8ef685111ba9b502a9ee77ab8e2744b71e67ae45c20db123a4916975f739824babfedd6869abab0ee2d659d55a2a1a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3a1b0a845c618f889ec3e6c4768d03
SHA115885f3769f2b449213976802103ca704c90f695
SHA25633e46583fa93ae33b67f02f96bbff3f2c8515dcb9273f0c6cd9356a615e876e3
SHA512a97daa552a2bd318db0730a7b7c8bc4b9d82b1cb658c2f7f3ed3ed5e7e1d4ee079f3bdf628738b7c2348a73c56323c8188d9c1ba8d7b89ffe3c39f800cea2a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c375ed415e9cb5e898b024014633be
SHA19493a37aca7c9a144c4410f2f7288c3e442afb61
SHA256b3dccfe57d333a5579dc8b954cdd0a7b001f96b708206da03c189dbaa06ec729
SHA5125cb4986909dca5292c9161440d84c00dbdf7e0d6cf68042375a8cdaf7f7dcfe2a086f0ba03f3e2ec50eea94d7c8183520d3cd9e47a9bb9f0ac51e92d6c003417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fc11541124827aa27dbf06f27765e5
SHA1a2de674d8262551789c7984bb08a0c3fd6ed5352
SHA256b043b7b44a21fb1aee6ba4911e5f10eecf31bc229ba92b9ad67f9793e6815823
SHA5125fc1758a8ca56767e222f37b6194d27da08e580650cd57899a654632c56e41fc60170a0e9a867cb41b2c860590f51f38846c385c69b2d037a1725c6971e1db09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59385b9cb030a66216f5fc993bd89e6d2
SHA18d6e4cd669930caf6c0eb04809ab9d0124b4b3c8
SHA256d89d3a630f4e422a2361d22108c29417baade0630d0f04231a773190ef9985c6
SHA5125b586d643b736d0a61f1ceff7578991ac28e7ee40d50db57f5fb8cc94e28b15b6e763522b05367b352d9a476a706b5648c01fcdf3ef956eca359e45f8d2c817e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eacaadc3d7dc0be9767df3c0a7f4ad9
SHA1f9b7b39351f4993cedbd264a27f0644a4ae487aa
SHA2566df50f9c0992113bcce2d44eac6136b692aaf7dffcd122e20602171d71b572cf
SHA512c203d07ce4ac14d42a6b500366481a0371439c1986feac2d41d2b7c2897f8e65f3fcde4259961b6f1f5228d9b9fe5b44143146b75f70cf095f17f8a99b49744f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e97c6966f8c354350596969ffd8789c8
SHA19cab8dd0990e9cfa22bac999f1fb3844d7172a1e
SHA256570b0eec710e5d6a3ba07daf74fccb9e5aa56fed8f8e32856399c628197ed932
SHA5128f5a6879df180d5cd316ae28a06a9f64d35b8be1531773d80cf40faa63375ebe524b4897de537c1a63ffb7cee32163cc50fb82864cf5dad35e521c92cc363eea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7dcf215abe688ba3dd88a102b16138
SHA1cc9e843f5d0a330d352ed633f6e6dab9d5aa4866
SHA256f68a8972d3aad0b566e176b47c8600224a83d93643602fcc2b3a59820c9e8e9c
SHA512b029502370c1675a0f75526e9ab949f435a01d0309ac526ffe74594a306b0f8c537ef616393e164c719c4d5415558183f51b01db6dcfc41ba1912aa6395daeed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59919cd728c588343ebbc9efd80110454
SHA10ea92ab854fd48b593421af1b6e717e9267013e7
SHA25689f022163c218b2f6ee6192cee458987bfe2e89781973cd2a8387ad0f92862c9
SHA512f9d75b8bcce90b72545c020d00500544170713ea26c8076860e07ddbef04dcee7d150879f494eff5471cb4353d831fed7e53036dc5e8be3e5226ba17dfe3f533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e01990774fe1f2f5362b27f44845a95
SHA16f55ba68d6aee50c4b10003fdc3eb10a7cfe633d
SHA2567e2e6cad9e2e3f0fd227a3919ee9e52c481401e25b40bb23cb18540a3a07a8d7
SHA5125671da76e7b3e688862e8a4f3e1e7a7050b871f0a1bf8c5e77fe2a7ed9732566e2987edf51a000c3da3c9076629a738a4014df1d09baf80575cf36a12a977885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570898cae96631acba8f9884131520041
SHA1e427a694ae9f791410e03c81ee3a5a84b2d1d8b4
SHA256e4886834775a08fc6959327b23f96385b5afc7adb2b9b59c77da526004da72eb
SHA51279178962f1865f55c5582618684a711b5e96c8540810f9854948ec0f81223050c7c5238af847df9a89ddcc921195f6eb25ad9a9920b1fee418cf4bf0d916e713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51adf044cd7ecf759a33c87b661a85e09
SHA17a931a463206e6df496cadcd91748762c17dbd64
SHA2567e6e90b3cb4693d123f885d59c0c4a53daed084c1fef1bd75ea1527445f5cb9d
SHA512d000c838abe6a36cabee60d0e2bed3558930843f1316f9c7a408121027d45a97befdb3f408afee681e6e816d7ea83dcd73fde77b0af976098946e7127000e814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c20415bcfc873e07377eb4543f5ccb
SHA10ccd024c36078f6094bcf0b27894701734e869e7
SHA2566a507005568b4c90f6416b32d65f3f6a7130f5dd120b1cebf6eeb76591198107
SHA51240965e6f4855cb36826a8f749d7374112098a5726d490b139bf88b515213fcfa9e9df18cb7439ade454caf62293e153b318bb230fd5ee46c85ad101e612d5446
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b