Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
ddce4439f7ac06317cf67f3f613cbe04_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddce4439f7ac06317cf67f3f613cbe04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddce4439f7ac06317cf67f3f613cbe04_JaffaCakes118.html
-
Size
12KB
-
MD5
ddce4439f7ac06317cf67f3f613cbe04
-
SHA1
c8091905c37fe49b4412a6f949f053ed08d28345
-
SHA256
849bc9fddbc33abaf61cb8c5336704178f9398891bf2b1b7f9db34f759c5a7cb
-
SHA512
44ebb4a8643ecdc38b607b3e161787ae487163e5e905a98b149773ded9f20028f1fc2a5d55a0ef2f19f8e733c9cece4aabe070a3f1bb8dd8b00563dfd5af6666
-
SSDEEP
192:9xrzIxHqCSxSjSlSPpSRSIzLiH2FwIxOxvYI/j11TbU5ll8kpk15Wfc62xQ8JieQ:frzIVqSqzAW+Ikk8I6Q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e026ee9fa105db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000041e8417fdec9721c61de6df3b07a5e2f93ea3afe77f403979fd4b69f533cea92000000000e800000000200002000000015116834cca1e8d2171ee3db4dc7866a2ab77f46d018e227661e665c7337f4de20000000f452d98141ebff73d39c55c4834393628736e68d8f74ea43f349e259a95b9ebe400000002cbc8e2ed56f722fc78d04ad66ca5ef3316bcfd8ebd07f2e22ac70fe289cb872a74241484c31c1296671b5c794cf7ee31f631bc82044d4f6448af2f3fb181367 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB671E31-7194-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432368802" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2808 iexplore.exe 2808 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2248 2808 iexplore.exe 30 PID 2808 wrote to memory of 2248 2808 iexplore.exe 30 PID 2808 wrote to memory of 2248 2808 iexplore.exe 30 PID 2808 wrote to memory of 2248 2808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddce4439f7ac06317cf67f3f613cbe04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fc1c0a4981560e73694c970df604e4
SHA143fe55cb0a18fe83fb04c21f85b855f73e6496df
SHA256bf6c93d68c252e5ae0cebe0b7d6c8208c00b78fe12dd2f73235777f8509abd19
SHA5128efe91f71b828978da80b6769763af2620117c5e9fd02318974e74e2b6ab17517edd6b851be7a258ad3fa161b638b51954b6dc797166bf9acce0dff6dfadb474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df8d9ae68b6057d8e9abdbd832f8d9f
SHA1f154e59a80b74590c8c14d8dc26392b339421663
SHA25636cd990b768e46cbab8d5a72a2b47050e76ed821c6fcfad6b5ae4de934b647bc
SHA512d4fd7962d99d38fcbf16c1a2ccc333366070e843bd292a89219aba84c439f13a0d4b4f2d2b39a277b6835c5c2d650adbf90daac3250d0c5c3becf4f961ae6188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516e2d11da02ce473936b54de1a04a8d
SHA1b95eeca4a192fb4d2ac8005a22547590778ea820
SHA2564856f2cc91965106dd6e4b97b9327f47c145f9237826a66bc3849b6b08a6a624
SHA51209f328ea5208104383a5c005e7173dabcc0f60b2b78bbe62beb7b5483018a15d986a84bb49db6e44c9da0511abbbf5a615b8a0c497e087f1f7f8bbab07903402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423483f8377bcf242ba4816ec9962d4e
SHA1d60a7b0e8f6e29d368426733a29f15be20fb9a92
SHA2564fe521824f932af385900aa6e6b695fcf1b1a86199909bd3472eb49af3b819b1
SHA51225b6c9edc1903422cdadf96bf6df1ed8ac4710031494295022d2f674e2c2862626c6cb634e8aba4b01f373d7d29a1d20462d182a9610e9619405e85c5efce20c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9ac2d73e7e844d505e11a212b1e43f
SHA117fe741c6381a1f5b972000eec6af579e76933e8
SHA2567f2ebd7c7b42790a47b6c0fc939e53c16b6566b8359bf00583e20d9478efbb5c
SHA5129b9c49c88c8a88b7a0e5b36bcad90170cf10d3efd6f45f736f828887e434402161bbfdff428c628e55e35437c1b5aa5b1fb06d6b2e731b3fd4e60144229fcfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a2d1750465a526adb312b0b17e12ed
SHA1fb7914c421a2408c872d6e041de2941ce125fad0
SHA256389a4aba11cfaa318afcbf74a9602bcc45e9fa8d1c6d6474c3cc4f82497b4cfe
SHA512d26d5360c8082338c4d0cdc41100590b1b1566c1de203b97fa70444b775ffaaaa64e0480f857a357644b0a0951dd036025f2d2f75d82fd4bcc2fe83c31f70271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851254aa4b4834158e8084f6c6b6cae3
SHA12e0bd278be8d34537afc238d2e7d616ce5459391
SHA25697af3081881eae82a860d6bf8e362110a654308dba7bea8fa098082a56b23305
SHA512364b0641cb328c78f9f6b0a8876a063ec20db83991a8f5ecce852d013f69ee651137a582db1eaaf06403a1ec76531c5156d2e7b2a2070280118ba2761ebbfd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cce3378e26c044ba95c532372032da
SHA123e88e1f150b93eeed0f8dc3f192559b49fb972d
SHA2562333b4c43018dfd007b0d5f0deef3b55a03a9489b3edd0a1ae2921b14411c454
SHA5125da0e63c2898e8acaf8ac8d2c2e0028ed755be47f1c0a691db92f9e0890410dd73a9f60668aebacac8fbcfb66f99ec4ee767fd2552a92520eddfe9ed73dc076f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e749a40621af67fb49990766386854
SHA1a3a9652cb55d70257af242a78320a4feaa43a776
SHA2565b20918a4557ead93ede8619b5e82316a2cf867facfa97604fa0dade047b315c
SHA5126938eebd0ced0df23a430640298617e51535faa521804281f34be001505187a47f4fb400a80415b95cfffcc6c0e0b6521cc45c08f2f4349eb873f108e73ac9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75941f426d312956f9da033f0d1a353
SHA137c16df17aa4d654ed6eac7cb5e6031a03156f7d
SHA256c80582f3bab866c61e6e4d24f589f6f9eb09fa3d753bb215fc34992c51563b65
SHA512577c9d9b7bb91f7fb032e86484b6ad8d37e6b64d235671d2d7e4f035bdb5217af11b7c2d8c5279e9ebd46d7699c1e0c6560c450123374fd9d197ef5afc3a33a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552577e97eeba3e46e75056a54715602a
SHA18edabb02f19ccd1743143ea7c7f384a87a142d45
SHA2566e9066876e26c3d0eac5540a62bc63b97d58c6d1d4edd2ca84d97fc5a4581959
SHA5121f76ff1806cae48e530d6dc90b9d8cbe818b1811db4f046c66adaa877e81663831d2be34c98395eddb3ab5fa690b5f0f1fdaa2c9cd7e8992fb23ed530c503bc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5899f3e2a6b4f899076b39a8ce8871fcd
SHA11fae45dc9db51fe7c59971c65a79577f898b079f
SHA256a82b9ae68c7097040bb32e3c372a558d595b5b04ea051940c90b3640396b25c1
SHA512f665e85c911505f4c2c7e357d9b3c8c3b1558d7f879ec1ee95e8b3459d1aba7cae129a53642feba6830f0489cbb1ad82a7214041663cbfa39928877216c6f317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d346590880d4f4d5ec0f76e956cb27f
SHA13f051184f0fbdd26a594be23974ea31d37864380
SHA256bffb0753396028c9ca5a17d4423f9fa346d53223db4f2ee3c60dfded4444783f
SHA51210652e7b4cdcb40041591344a5dd52e85f3f8d2a7615c6711577d85189608dbb2724d818179282cf7af8547a2d82df071d71ec639c82f60225e6626c2c4aca23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589cf36887a2afe374275dc98d7ecfe01
SHA1ad2d08ebde6948986fb7c72626f8b04532f0f34e
SHA256bdf5c0279e5398220bd3a36d5e84387d5f3067a824a7f2f115ca63349b1d7de8
SHA512b10168464fb71e0d2f565d51cd62a51e5eac2125f800191e01814d1cd66acebb87584fd3f7f4d73ffcda2bca6a17c9699871e1648817f1044864ce608055ca69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5411db90351f3b43268a55c9ff65e844a
SHA146a71677d9492b32ce1c483ffadf0f626b074376
SHA256cd8e184134ef48c4edb00d2abc351b56b2b04a8b3bcb4a7de46fc24938bb600d
SHA51200d2ae10d498c9cfde15a9484b52a2adeb020fca02747b82b0dc9c9f7b53f921895e90dd3be0ba6b7a83290aa9a16849eb84ee76187b80871eca71faaa11856c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57248ccdec3e37c4d9565ae1ce7390d78
SHA1cd4f5c9fab5b326b62695062e0846eeb5615856d
SHA2565dd3178aacec6a194f2f029fe177d1f43d2f0d433901626fafb8bc397eac5c83
SHA512a33b1187b3be2acf4c1a7bc4a8bddc01dc6a66fbef11c83ada02c2735eb98fa8fc25f482644d8b5d1983437ce2a0f038df112d9fc09cd9d6f517b6ff15b17d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa28e2948525cd0bb0c279b02c7bf147
SHA103ad4df55a8feb2bbd1d8f26c5ee74530a311156
SHA256c6b9c3720c694809823a9999c96223624e5d87b2e88a99ae05308f7cf3f04077
SHA51270f8ec525777bb89912c6937e7079efbbbed7e6e60ac31137afa7776cb2a7be5fd73f747dd5da75634e2e0500ba0b5c5d0233b8ded7ded70c43712a6cc96d75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175f068ea52c815fe95ac06468d0cccd
SHA19b35dbca4dd9c24f49491536e91865bd663b88cc
SHA25665826b02398e369992a1c9bd762cafa3e3a69511d3b3faa807d0674d4e569f01
SHA5120aaa8e6fa828b09a7f67f254f0f7695f58f1d251ce39862577acac96a95b5ea4568c030edc929c8acac6ac6ea26c9217b01198c693416d49d6de2e2bce76fc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf6f1bfb9c29ef0722f790bef17dbd5
SHA10f728b835eaffaad881b6f3d419ec93db29cfde7
SHA2567c8e27cc14117ec89aabdff3ab3c34c65ac29598e40f18b67200a1b08cbe1bb2
SHA512ab08d21a1468e84868dfee98889a111c4ff655281a6d60c161917b0b45811ba905cffd6ac8f390e85dc6a1c058bd6c5463aecf3a66f0cc506cdb77abfa94b405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c901107ae667aa1e0237f13ebaf068ed
SHA1037ffa32a2c89262e84cd7b65991f38517419d60
SHA2564ef2ff2508ce5374ce7ab4d1fb62feee340f79fde09647e3d99f4a282c0631dc
SHA5123d63443dbd1aa6aee9d91376973e530a458d1bfab379784fc70e4361563bd202b9a5ca01283e4763ac34475dd83ed5a4a71d861a7ae7f2aebc2f9eb1cfa33fbc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b