Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
dddca1df975af92b174d1e6a1a99d783_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dddca1df975af92b174d1e6a1a99d783_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dddca1df975af92b174d1e6a1a99d783_JaffaCakes118.html
-
Size
66KB
-
MD5
dddca1df975af92b174d1e6a1a99d783
-
SHA1
76df9b61b3131cd56a362826d8f68c1332b956e7
-
SHA256
031342940c0400b43c8880f10510555c7f82bb72ccd9562cb7d51d1ec28fae84
-
SHA512
3afdaacaf2cacfd27249ad3709a40d03d883fafba227a1b46095bf0b473a5445f957806c962c7d0121ca3ad05bd646c42b54f5935868f29f0b49cd780a487d4f
-
SSDEEP
768:JiygcM0St8tN99OIsSMuIjluMKQMKsu7oTyrhCZkoTnMdtbBnfBgN8/oycc8QFVf:Js+q4jTugec0tbrgaCcFNnzAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF0BE4F1-7199-11EF-A6F8-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d83e85a605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000f61e38a3c255b81322e0528c81e7b8f5929b6e443eed441b61cb51c9096b33c8000000000e80000000020000200000003ffddc14ab27634bfc2b4b706432959b3282c9377123d32c8775b99c0d13927c200000002b9fe9ab6c0ee783f10c6fd3373d62b28a39c5b7f1db971ab6e58cc5d60b7f4f4000000023a4574d226a962785c0d895fc8ff2c3d5fc1084802999b117ac6c236e86e34f6ec332abce5e36cbbe58c163b9e72d228534256093e78dd9312ca6437b724f73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432370902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 584 wrote to memory of 352 584 iexplore.exe 31 PID 584 wrote to memory of 352 584 iexplore.exe 31 PID 584 wrote to memory of 352 584 iexplore.exe 31 PID 584 wrote to memory of 352 584 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dddca1df975af92b174d1e6a1a99d783_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df92f62f42ee8be2dc149a7dd54d32fe
SHA1620c423aa6469ef306377794697eaee4dd77d659
SHA256e27c37eacaa186b556634c17f3ce4e6352bb9e4e9c859ac037e3c67f4a75f23a
SHA512c8eb40fd299db5cade1bb334447242ed4e169ca09f0e38d43cb9d33e825846812ea9d15f5e6b6b7ec5cf0ed852de09e4ac9abf6cec1ddba756bc5dad8be822cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511a238754be74bb23fe3fffbbceea36
SHA1b4c80148970d6c6e6e898e1040ccd3c048328ed6
SHA256bb7d21509f54dbb022a46db09eeab06aed1e358f3aed3798f81922e052b6c980
SHA51290878cc28ef964d3e08c3f37cf793b812892e1846425fcb99b0de97eda926dd308fc2a91b851c8b9eed136ad49b95cb8390b27d0d7ffc585d336f57b3ce516d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b889769ef5323c3e1d552b2bbb4d50
SHA10594b1abaf9df7c3b8b1c54b62f52029e25a2c36
SHA256b3054ca9080067083542cbd7ee21bb20e066f0b37f252d5ecc83197461ce0f33
SHA5123585a1ce5494ffbb78d3c775a21f8f5beaa18f525ebd5841eaf34aabd555c41422c1413238542a9c5829519f08f0e90848cd40e088c518f0ccf67c604a458e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c62f23353664fe2ddb62ef4e61285f9
SHA18f10007200621d9934f58d13f42c2745f96a65f0
SHA256ea0d7cf36825e1aafb6f68980d4659a408f3e55eff702149692a87ca825b5202
SHA51270a438b40f044a67bcc253e85e921733ff385b42db1202a952f02dc8bf25e3a0313ac7b84c99c17462586cd3ad8394b2c7aa01a65b34da3dfe9775c96da14013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cd1b9024d8b61814a09f6d546d01ea
SHA1daf2fd6be9e53f92119fa198cc56cbdecae209d6
SHA25612d8fdc0b19afff74a59e43ddfa38b75c4017a378dd6b1385a662f0529c6a347
SHA51261e5335f8f45876a1ae6ff8b8c0236f35f64c95d4aa824a889eec636e1e1d17e554d8b196f733321e419ffa1d63aa8d4d212e154c60982278bd96968f398182a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794f8869da4f476f29096aa2f335a072
SHA16f7f30ba614ac5f774a167c4830dbbb43bdad347
SHA256f6fc02c29ef41f262e4c3cd454dddde0b4146660c9e33a21d9d3658ad07d1693
SHA512c25eb79d59fbca56c8d98f2accca27bcf24c0fc57a0b6cef84d5a7870de175ddd8c82ee37671d76914eb579361e918f3c74366a8ef84db4132b0a9ab0df63e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a740c8dda15cf851bb63e261f777bef
SHA1e4df52212d4515c73a2e4144b2963c21739f343d
SHA256a2fe3217fdd4be4f1cdb28b9e18e6789ce80494e40a8617bcd41f6cc329e38c4
SHA5127c6673122824b6bb38e596b953f546e20746d588d544df53aa71291b8b9078539467404ff0b43e225683ee35846af597b28ba26d587beb84c2935e8edf40748c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f9cc7bd1f2a6a8a882143b0d893584
SHA135b5af7a117b8c2f2728bf9a9e85944a471dd2cf
SHA2562a85e94aa772d0f762aeef35f88f6b1f3e36193803f0229ce639d3d1aee9243f
SHA512f9bbff7e3b6c1a475b4a2d059cc1141799e7c011d1c43eaa3872b11ca886e06a719658a602a8d13ffbd41dfaa03fd13ce0e650f6d0adb2a0f5a1e5154570376f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65ebc5e75cf47addbc60681238be148
SHA199a86c09e8a45564c93ad8c9c73e95b2c1e160c7
SHA256aac0e72b1ca38765d91b4114afe6575af98654e87e036ca91b09054cdf5f44c5
SHA5129255a6cab114b55c54e33156dfe5c5f48f03bbbc8cead7aab781b4b9a2059d18c5c42c5a037b629d5bb3b4159c0cbc824f475b4b455c2bafa1097c7f74bdf5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80b5a0928845545a4bbc2acf26c676c
SHA134ba98ec113fae6d0d5a9d4be1dfa72dc7395424
SHA256dfca1219cf0665f47eb0fcb1e33d19bf879a5f7b602c4c5c9a4244602fcefdd1
SHA51226ab51069501d0babe82eb7d3cfd7a6b52f8c6d5b0589f6057d99d695bb48d1f3dc95c505a1b4619c6efff3e3cb0d4ce39b5052979e3e21f80d3e575eabb4699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570bfa5731ac4bf0b4941328a67a45c1a
SHA1c7521f45c4096f86d5bf1b9fa36cb0f1544f091a
SHA2565a0e2f47fa9257b585b0ed6460b471c91c80a7dd06e298e149310d8e9bd99ce7
SHA512532450f23315f3f44e436a76923081dc45fcdea6b7ae09acddd6caa8c1ef448c42d2c2bf395adec2d5fd6ff42f3ceddb3f03cb7c69e56ac82df249c4bed05ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc79046531b7b759880c7dee643a0a02
SHA19b9d3c6c14a0b413364df7374048ccc82169f4c1
SHA25680075ab44377cee2b0544be78b0ba434f5d03389df088b740b7c73fec3eb8c23
SHA5121dd26c013506746df50fcb9623beac92bb07e2430c33b7910735ca9d992ac245e67a3b9c304e2ed5960d516469fdfa5f1a40cfda5df30777577ad1e404777f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084d1999b1dc267fb543fc54a1f1c443
SHA1b9c53299deec9e12677bd123ae5db0cb58f39dfc
SHA25648e3d9909ded1c0b9d04d92f790620ee9ef06c9755de4e31e2a57c021d0d27a4
SHA512934cddf6c70adb4b9754de6f4fde9625b787efc4697ee2d7dab4b8a84a2703ef62933ff452c5cc95d4221046974199b94405dfdd8a2fd2657439abd00dffaf77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58f0da006aaba1eb7c2aa2fc2bf444c
SHA1b10241c9b8185accea88e76cc1e05ba05950423d
SHA256e0914ddc190355051d8a66a94f2af93ab691998339048cdf8cf59cf30846ea44
SHA5127591955078d84758dad6a5cd50d71e97fb38e11d1b73317c0caa3f7fa9cf657933d46beec7323a5adcd59dc0e05cb517c4e0e91e19d1b83aa18acffad922f901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c006999fca067a69a137f8481ce8bc
SHA1cd8ee238162ea1defec86dc3943ad42038099c9a
SHA2566f5044b6dcee702fd75d197d63663c928b12ce89188a6242732fcc7f80bc9b8a
SHA512efe60d243a8f38d2ea9cfa334c4fc206779ac7204cd5668edd664389f512de720c90fd3c623a8475c8b87b48d30e6facc91ab819b401938e5d558cb8ad1ee1ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9b52d3807293a0fda9201d674d3bc0
SHA17409fc704259330ff72a29cde830abb845bd1a62
SHA2569be379abbadbd144cfb2e0a52720012eca000a4ab957cf70daff009beaac3489
SHA5121826af74bd8db74b692a365d0bf6f84eeb8593529e20ce7cfb0747dea88157865b5317c5d3929212f768dc971c558eecd8eb8e88a6826787888622b56b0efe86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f14416b93418dcd664fe9fc4c11727
SHA1aa7a1384a5c17b05535365b676400f9b8649bf89
SHA256f7e8b4bc9898190cd4b24e26a64a20fccb04208044038b1a46f499b4d29f2da2
SHA5123c9f1d522decaec9b271f4bbb950bb266f04ceb57cbdd245f386b7eece68ed91fe8e5ae045b46d53526604e038efab43c007b3229741a0ec87e813d52d818575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e239eb3eee0489be2d72b01e4519cd
SHA1bc2114dc4abf4677c728e3c918700ef3c51d4bdf
SHA2562118f6303eef59c50e3651e5966afb8e4f204675b09a62787a977495483d6e7f
SHA51240aec75f623dea049270fd2e109f82ce04f48f865990624b8b7c9693410083c00df3db8fb089f7d9b4a7e6c4b0c853b5bca04d8537d217b91af0db22b202dc71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d1afa4fe27d5ada1d29bbfd37ed8887
SHA1ecf688d90064727bb75e88f8d46cff796e927cc7
SHA256aa625b7dd1e3125fb3b05e4c460ea187980a9d26c8690357aaa408c7d54d886e
SHA5120cc527b2aef018ad2ce4951764d101ad75b0b160ef9ba05d83fb4b284becbbd34976c041c001026ab1a739daad057dbc3713dd35ea799294243ea108791097b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b