Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
ddcb8334514e245a6b2153dd48d5f477_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddcb8334514e245a6b2153dd48d5f477_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddcb8334514e245a6b2153dd48d5f477_JaffaCakes118.html
-
Size
52KB
-
MD5
ddcb8334514e245a6b2153dd48d5f477
-
SHA1
237198311023d11069713ad0ed7645ed9ef691a5
-
SHA256
4f028e4c382d281a0336e23b727873e384c83569429011b1f590d402aa17e4ae
-
SHA512
c866873cd189b778604fc57c3d42fca4675108f43f453af996cfc103b5c70f9f18e490b796d283f0864912ac567e24fa9eb5895631ea864f972f6e2f3c04febc
-
SSDEEP
384:ut31yeItEAjU5lntNTHuaiZq+vSEHZluus:uzKMlnt1ivSOe9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432368460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0528ad5a005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ed3cea3e1a8e0ee690bec21a155bd07ea911eaa5ecc58ea9fb3d43624af3f1be000000000e8000000002000020000000765cd7a89535ab097cfcc5add4e525e4f09336985804b3b5039836d108b1d75f20000000237e672bae55dcae3296a3dd744995dfa1c4c688a06c3d82d86c851e2827d2ae40000000713a9ff61c3f76b77283f8ab7e29e157692f5bf21f14a2a520766cf65b46dcdd6e996ccdb837167be7f09886688ab78db9a43150f2ac629094b72b86a08c8930 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FEF3D2D1-7193-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 108 IEXPLORE.EXE 108 IEXPLORE.EXE 108 IEXPLORE.EXE 108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 108 2432 iexplore.exe 31 PID 2432 wrote to memory of 108 2432 iexplore.exe 31 PID 2432 wrote to memory of 108 2432 iexplore.exe 31 PID 2432 wrote to memory of 108 2432 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddcb8334514e245a6b2153dd48d5f477_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee55123d4da19d2d67e8c2637dbbc8d
SHA1bbadcbc844cb51d425c4835e1c3eca1107770a08
SHA256befced03a65929b3c9aa53da01439bc68f76a1d16ec6fe8c4576a7443864bf7f
SHA512f56acb6a797cfe7690e85684bf3ab7afeadcc5b6f1156d3eab50add1d8a670b0c9b70e2a5c79526222878cccf05bc07e72332dc626636e7079a1a91d3d0fe1db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1c2b6377406783327086fa5abcaab8
SHA1cc1649f0f4fe30881b2bdcdcc6cf729d4c869502
SHA25617ffa4ee5cdf814af25a772f4c9e13450e320bef88fa0cd232552781e85f610d
SHA512916434e61c5e918f672e563e7fdb25a0d041d43db8b746df8a36a93e36609ba93e9d67b98e053e3cf72c8cacb2b2f9ff2b7bedf2c6cff068c19124fe3ea7d567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512cbfcef49458fa54c1faf305fdcfe92
SHA155f647ba69fe4c5cf1b02551e5d4ed727e8a5da5
SHA2562c73ee4ef758188668e60ca7216afb3818ed44fdd68f810f2a3da0b27725a6d2
SHA512815c5d7a515bd0b903001cfa5c0dcb3dfb4a8e9a748a05a46993828d73235a94736b0ccfc334ff7ed00f524552e9694cfbd566c65c9566864b26425099bbdc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cec1c180a3f325cd674a1c543658e2
SHA1275b35a60806ed4e9b5c2e9e8a9fcb936cd60a69
SHA25630a02b6e1679553037264eaaedc46b8c4da0e322e401b6182f49885914b1cd9c
SHA5128eb9a5f650d0b64a41d27bcece6b9b06b66494eeb07b3ada5201d13542f1709346376468a930abe2cc0816fa78339566e0ef1432ab964910dfa7a7771e429fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50278ef40615f82bcf604a8e81e4bbe
SHA1810ca071b22173e6ca49e880f3004e288242f77c
SHA2567a270f9809cce9bfc7ef3fa60fb49ca63cf678b281eb6788fb98040a1cf644be
SHA5123ddab41db7d2afcd0545fa6327bd47cb61ba0a69b25b00391624398a680ed26df0c8a252529190e5fc2d458b7c5a74b18875a54808fd82ad6c84bb98fcef8063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cebe801b48fd55f92bb06f4377356a4
SHA184369bb51353bbd1f59f682f1dee0f2c60ca2227
SHA256825b6f4d6e96d5262855557a79c9f7aabb7ac690cbc6e757c38363d48e22f070
SHA5125df3950c85c1ee4f12fd97b07625beacddc8bdfd586ad140b845afb08f313b7826463526a7b1ee78aed71b38cedbf6370c42fe178b10b13fe1068a68b50098dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4cb7534adf0084e50c3f84194386d2
SHA1a1f8a4f58ab191fef136ee0a60d9d5ba0ed588f4
SHA256b02c61f05f441c58de78197b11696f4cc4c5d02c36fa8e1411b7544a8f621498
SHA51227875ada42625e5b7c637a1d02a15db3782d49a6235e47bab883d1923fddda216a073fa437b9f6c4d21357f14a7388045f9b50806e649785939d166396484bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c6bee5994976af3fd5cb8c9964be86
SHA1fd81e44855aa43dd85d495a88a9b68d9277a0c56
SHA25690aa9b94c4bb74c590a5740be41cc07d6810fa499fc4227f7798ccd675361872
SHA512fe7c54c71e51e8ca699d464cfcb1d779be5900b0ad91f67da381dbca80e6e6251fdd42557d796d1e96f7a8f3434b5f6c5249608dd495858c21052b19ab600c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558536e0ac2d24440876f348cf6d22f47
SHA1b7476f0571c21077bcbf0dc981a3ed9d0fc85102
SHA2566cb333f9c966f1221d799c580f3047b882f1fb96e6955d9f3f0f3584b5d2feb7
SHA51208712ac3993df877eb2969c0303932f999defead73686510a446e1223f6e021e67805c7e30bfdb549427fbefb451bd4e1e005d5f01b4273959e081bf3ccdf74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4e1ec4cb7014f622b19f6e4bbc2276
SHA1cc9ce17eb6874d2d4ceaea98323c77f44188a494
SHA256935230fac7ea981ebc7cef2a9c0baa1b80c8861d4dc210c724eab6cfab861a02
SHA5122289e41a9fb36890b53612142bce0eb1009009a7a19dff4abdd7fedc3f0e946bfd00363998b54845fc2c81f727b763a70745fa51b3dde090a16182be6f3c1c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a2b974cd7c1b298021efc025a40534
SHA16000efcd5617424c84634fab3d5a0aeb296ab321
SHA256727856e778d9c6c3bc014bc77d758052d8b6ac6ffbf0a58b52f036953c9f1fb9
SHA512327f47b6bf1f824a5f4b02c1927f977b0e70f0e9642c7962b517a10f4e67f421891cdfaa92c6382e6ed8efee3c7c8e7acc8ccc851e6cf9f75cc9c9a7b1feef95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c4786fa4fcdbe6fb654d3f84dd8d7f
SHA1506ee23c40a2736be21b9ddb0816052b816ed94c
SHA2569a04174c5e0510e5e46a636aa51c54fae449d7c7b9c49ce7151fbdd4ac55e75c
SHA5122d39329483b3d7a1783a47a7b661e0097330753a05bb74e2ea4e88bbdca216e7479760358bd987f1404faa6264c98f28840ddb985c080a5bcd55a121949fad1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5267eab8b1a4f6adb889a84e002338d83
SHA177159142ef7bc2856a39c3078aea642d030d1bd1
SHA256beae41722d6dee0ee823e95eaaaf351cb1ce88c4520886a7b287bb016a6b9f64
SHA512b370b8da634a21b8a4cddd945a9fe73f3a176498c8871288eebeb14dd61bdba2347d24d998b8318612aee35d1a046d7424f7a7ed595d46f5d93fc6e106d7e71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f50003ade9bd5b9b7e4b4bb75ab745
SHA134793831087bd2add0eb20b7a8ba51f5598ce395
SHA256891422cca88015903a58da16bd81519a4ee268b860226febb8b1aee6b8f8a3f6
SHA512b2ece60efa95cb081fdacf73ce9df79fbbc7e1493651961d6920f0d97ac62d6133a7c9d016f3dd0c050edeaccd708bea57051f5929be52c4b4d8cc655935f816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90b61be864c9dc9b9596e098f823d8d
SHA1355a227a7e6bd856f495191991c670c608721f99
SHA2562a736fad77bcc7e05ef93759fc0b035d59b61a2a10b6a828fc38e3afd91a7b9a
SHA5121bf31b1ec95718779ebb42f0fa2fe6775e8eb31eb08986fa5c463d0ccd346627a11a8917c1b13a124bc847b6537aab606b582be68b2c873ab5f156f88740deb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc33edf9541749da0d2f7fbcea9e7bf9
SHA1056d214d357d796d1acdd506fe57faf3d6d7fcdc
SHA256dbc141f378489b87c779bfbcba5898c334a60641261699258efe92a23a7b7e1f
SHA5128a267609b8dcde259995eed263784496b8beb074a90dd15532fc8f598bf78ac011a9bcee489854f91c1f6b700fb9cb2effe416b36e29a1b42a9cc9a272c28d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622f07073d2913b3291c88e83a187877
SHA1bfa8a62bd1b2dade0512d830bfff7a7d00bbcba0
SHA256452a96117ff1d491fe7f1e06aa7a2300b051723e43a5000dce17ee471685d13a
SHA512371d0756093d2499d3780aae4f59975e22d60652bb15abe7925152726370f12c2d8ebfa0db86477f4aeb52ca339b6b0b8006f5125332c3b44d86568c647fffac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554490ef36cdc48bbf103850c93ab95b1
SHA1612eda3fa253997281fccbf33d8e56eb80ce13b5
SHA256437c5ecdc8f025548061f7e4159edce300280fb1385b9c7d037467f8ba1a5c1b
SHA512fdffb484edbb010d459a4429d22411b4802e22628dff168c5563deccd1bf9e9dd31548564b5ce850dbe218a0d3da1341eaeafbe8c8a9cdf3a9bd3306a795ffca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\f[1].txt
Filesize40KB
MD5695c323930b0bd0b0a3bcdd4de149d1a
SHA19ae0f39bd74e760591d1a300c4b65ca0b9a93d6e
SHA256095c7434cd06c5ca0854926bd318d4028590137087e297d8cd317647e2e10fc6
SHA51286318b15a9532063df59e4605aba1e387538aa1dbd9741a86a901135bf380d5899bee15b46d13bb0ea192ee50cfb484985356886d4180c8e006ce3243ca5fe98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b