Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
ddbc1ae3ee15222d62f665ed54edd72a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ddbc1ae3ee15222d62f665ed54edd72a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddbc1ae3ee15222d62f665ed54edd72a_JaffaCakes118.html
-
Size
53KB
-
MD5
ddbc1ae3ee15222d62f665ed54edd72a
-
SHA1
748807c67de7f1e1b254eff4f4fa7e0e37712e6d
-
SHA256
971ebd86026a2a15e86b3bdf67293aca4e6c10799ba3f374adb26a4a23390bc6
-
SHA512
46ba1930e5d333920a529918e708fc36e0f3aba04274202881423aa4d366fd23b1561dc7d4ea21761034dc3d117c2b0ac89fb04d9570adce93dda92875c4a18c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUarunlYh63Nj+q5VyvR0w2AzTICbbioe/t9M/dNwIUTDmD2:CkgUiIakTqGivi+PyUarunlYh63Nj+qt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432366011" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BCCB3C1-718E-11EF-B40C-C6FE053A976A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000cd42216ed46f79887780ad9b26ad032c1470e2727511286e2422e63d90961e01000000000e8000000002000020000000710a1c62513070c7b77532831dbd0b697e33fd6776a4fcb8038fe1455809756d20000000fdb6a25f77f1522f670d32c2fdd2b08abbf04d1633b033e1f9204984971a3c1d40000000179bf994cc3e14658a4b76e0cb62081ceb061621c0c4a3385f81b8816272d345a3852965c1d02a0fb6ca04f13a90531dd1141cc612dd2dfde4fc3b4df2d141f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506425219b05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2628 2652 iexplore.exe 31 PID 2652 wrote to memory of 2628 2652 iexplore.exe 31 PID 2652 wrote to memory of 2628 2652 iexplore.exe 31 PID 2652 wrote to memory of 2628 2652 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddbc1ae3ee15222d62f665ed54edd72a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcf5fae74cb07bed1889f39e02e6b4c
SHA15127276211d747015ddf14831a88ffdd51a08dc0
SHA256942aefa2f4bb2626e412dce7b285f5cb73156b89b3fc5df747d4809a4464ded9
SHA512dba10879938ca81e3aa5f478c6588dccc55293021c695047aa238e8f4163b53f93f87b563a7ba5135629bddbd2eaa2c12deb5da2d30c49a211c7d1bb717f22b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf7bfd1f7d6c57f40b0c7e66b12ee66
SHA1dfb0523f5365ec9e970661196f2f930fb1ed230c
SHA256160ff05740f2d1060b2a6a6d202fdab1e8bd7cdce1ad779595eea2dec3fdd08b
SHA512bbe24f4b19e11f5adb4240bfde141052699812eeca59225f8e424016a96f17facdae181ad61cdb656f3fa4b8313c05f9c1ff7375dc0244c74ed3e12f4476acc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0612d1332c2bcc707d5570501822121
SHA1ab9698eec82e6dc66aef631be2f35e14c23fbf4c
SHA256f2901d3bce64de23fa648176d39bcc08178ab407b51bc397222e9bb85ba769b9
SHA512c1ffdd1b495049121674092b85ff05a851db0afba5157f72c13f45457196263b4ca6ecc6e9907f456ac759699c2829bd4cff7bfb75954c4cf96a9236e573c5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c6cc8e99b41a8b52dedf057d66e30a
SHA17a878d4b81f7e15feedba722e153fefc684271a4
SHA256bcbcbafc31d746b40b0617b0e13c4d972761dd823599e2db33f7b5f1ad843fec
SHA5124bb276b0a9e7ccdddfc90d53003d72ee798cc69b477e404eddc128ff966f769afefcfd75ada3d87185ffe9ccd05b4ce4d017a650fb7cbc00aff8f4bab8ce8de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1adc40f8ad90e07aee96fdeffbd196
SHA1fe225204fc336cd843f96efe1c51a82c03313834
SHA2565ad52e604183be64b2b1c0a945cc6b69d29c635952ca454b34646fb66b14bc34
SHA51224e852823950632ba330139e59f8027493bf87cc15391d031819dd6d3fbceaae508e7112253cd7f2426b1b3d33011ddc9d14286be051755946e432695ab07473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3e05a27cca018ccbbba557160e2b5f
SHA16b2aede1dc4bc7c1d101f84a2b38d4bc37f6d3ee
SHA25660920f82a3692fd12814e5a7ef7f7832face2801814ef58eab8479af3e636bbf
SHA512ae8aaf319a042a1f790091439a22c0de9a0230c58b8e8361c06924be7d464491e6c9a2584770fbd00bd342b813edfb8259fc2efd476e3a5ebc3e080bab39285b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57286eb440bbc5e2cc4520a546277872a
SHA1ee186b6f33fbd1f469f649559d5869ff3a837e50
SHA25626713bf17285bb6fae5c6f477d96e9a54a72baaefaa4f35766d63adadd9d1732
SHA512a0b85902d9773a9026dfc66111bbad73f1b43fc1e36d5bda40accc376f8fa3a0d0ac709ed711152df9c0eef8f1669ecb04d74a834cc3944b5f183bfd1024b503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed78c7f965baaca643b2957669c517e
SHA10588f14391723f0a835c82d2fb18b3a217fdc356
SHA2561fd7a15f287a378789488a2229f559ebfb3f015000a35c931ff547791feeb5b3
SHA512e6dca8938c1b762c37648c21ecd9b6062b2c82174e6136d7643712c125898040002d6087c7b2754c285371c1351572986ae46105fc6095a3da675a01a227991f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57410553d8490274e63fdbba50881b15d
SHA1e18667204c8c1a74fc2a2fd16b5f047c0dee3ae2
SHA256831b6dabe11d0c6082e2d5302da3b9a54965b3b21dda43d5a4812425bd2d4298
SHA512815b4d0fe19d352be5a5aca6d0de8b6789d1112640c430cae0d1f99dee514d23beffac0239b74a2a9b809d0c104e7c08e08606b0f5b05fb415ee7e4303acfa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b0587fef9fcb75ad497d40ed34ac39
SHA1eaa58073ee9b6c0939e61eb029908bfe07affd9a
SHA256f0e888adfad74b330486726bae410003f9e740b7bfbb0beaafb34becfe4c11a9
SHA5122e94c29697c05625ad4189095fc08ebce9c8a62271d751badd3a3342622e676922b3464c4ca95c72782ccc2c1e105d10e486ed310e6a337cae3f451c18f7171b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb5a0abb8326d099065077247907451c
SHA1894cf16d72326df74eb7cbf0dd7a0a4a2ae29af9
SHA2560acf98a0260eb134072cee789f219499e3d2669090feff672b1b952f0949b5b3
SHA5125369ce39608192209f170b3fe49fe9bb3feec50a4321eda2d3f1374affed114ae9fa167d7154476b206483bad94848f73270a6f19850638f41b34e4e28739e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51983dad757e025c35ff79afd21739d83
SHA15ecfe8ebe234351d58cfdad93c17ce3fb56a3cea
SHA25600c0a77c597f95f97d95dcc00cd4da83dd94add512984ab359939a76872773f0
SHA5120954b6ea6bc0aaac4a644081dc3d42826525e97877a2507a5204762e41e3c7d0de0e41b3e611acdff017415bc25e6b7bd4e7c3165dbf055d338e10341e10ee70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca22def9700715606cc76ea0e424b454
SHA1c3da45cf379ea27560a04cada3a6effe92ef60e0
SHA256cc0be682d3e465592495fac82d36b33bbc62aa144cfa3199f58047d77e3e132f
SHA5120e98421d7119580d75ca3f73ccb4269f6a964e1b0b4b436a5a9f8a65bd0126ecb0b5ab0a28d8088228db3cd9743aa34e6b1d4945571e433b6c13ff94d95e3cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c9decba336dda31fbd43fdc3ab5c98
SHA1753da5a50f090d0a2e1fdf3df6f9ed605fb59dd6
SHA2562401fa35a9332064775c839eaa4d7a223d250257d9903a1bc26406bf74c8bbdf
SHA51204436feb2ac776149f33b7a6cdf8ebbad8c9bf90b56182ab736e3df4c17b1d826183f1bf81c25f0f9edaa8af1266737b1d8a3991bdb554e30175c092f467dc1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a35d0b861d3f1941bf2350f337aa913f
SHA15147a75101964c8489cd16d54287928e76e9ccdf
SHA256e993a552f1f58a231c9515783da1bb5f08e2abe96c67b2a6d09a2d7536dd6bfd
SHA512bd43c83666b13b63defe123a6a73f5b60202e18b25600cab7e4bba52946870a3aef769e47292b4660e6c780b1e0307415094eb1de56991b4b716cb20d1ebc94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712d7c35844a5b4400b0182829ada3a5
SHA18171fd79b416b1259fbb1e59cbfd15ac1c85d5e4
SHA256b225bbe1202086852755927f6c951408bba4be66ca3c06394d9738f435f1b358
SHA5123e804a98535327bf58a0b909091c9772384e18c258ce9aff4e189e7f6ef1a16cb4ad5ddf89c1814f6d1954cdc398e3170c38df23d0ca18f54f0a22ae8f791520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654facd916add1d164f018c5994b9fa3
SHA19dd99aa1fefef6a7aea636c534c9920070985f1d
SHA25622c19789be1567797f35fa3024e7d271f3ae0e3d21455009c055a4abf98a065b
SHA512c30ebf96c3618972d949bb5d1d4ea534c24a21fcd22596939f1e7f0755ed46be20a269c7119d7918c3c2356a0cc4618858c9614951392bc11eca3704655b61b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c33af465d0d12dd102b54813fecbd7c
SHA1df8d6be663fe143a84815e1a8ba3b219c4bdcf85
SHA256e848db9c78d98d5f474bed369ab700e1da9925f93a17b2099177e68ec4ca34f3
SHA51268b6c2cee64f7687e2d3e5b9b129ef983728a023ae5fc7991181ccdcf4e8276d3299331af211e73f0d2766dc90e4cda6652f208410853dc2b0d943e8890ca101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d982694f1c4ffae45b5c3927176189
SHA18facec78c50e3c9eede6500e4e0a946884c737b0
SHA25606a6f3f72b7b9416b4a25efb8b8e520aae2e146e7a304672a1c2f7f5cfda8c68
SHA51256c7919929ac9db5f1748474ee7adf9176342c9196d38a4b2a9d8c5986675cc4ead5129c0e89f5d7619191c194b7dffc7bdd2dc94ec0f995b775abda6ba95d74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b