Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
ddf19b873b21c1e73f702acf9a365946_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddf19b873b21c1e73f702acf9a365946_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddf19b873b21c1e73f702acf9a365946_JaffaCakes118.html
-
Size
70KB
-
MD5
ddf19b873b21c1e73f702acf9a365946
-
SHA1
fec3c48a480135ca6a6f8c9b211dba7e1d0ab83d
-
SHA256
cd2d26c186e7630c09e412ff26c21e563210cd09c5cb94d21e1d1b79a3854b77
-
SHA512
7dc41c8d62ed74453717dd940ef19dbab7ab9826c0f689e0b5b87a0b2adb8a5cd882d5826f1413fb23b88f523034f67bd50688d2dc0b00dfe9e5ef0bdb05bec2
-
SSDEEP
768:JiLgcMWR3sI2PDDnd0g6egPrlYzQoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFt:Jn8RStTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD234931-71A0-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432373989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000e3b29a65cc37cc4d537e0a2b478d11c7d64292212b48a60293212ff7b05e1f0000000000e800000000200002000000002b94472eeda43d7c7e43afd2afbd867fcee8d077486bb5f8a6fb0e87a6b546f20000000d52c88cc6457b93fb32be9cb54fe117856948509892e24117a31f59412a044174000000077935b4a1568bfe2f6f517dcb6147d4870fa4fb8e54265be026b88a380a19241abdd9627c5784364833b0c0628fdfca059db01cdfbe39c3fd6e20362b5c82779 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08580b2ad05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1348 iexplore.exe 1348 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2852 1348 iexplore.exe 30 PID 1348 wrote to memory of 2852 1348 iexplore.exe 30 PID 1348 wrote to memory of 2852 1348 iexplore.exe 30 PID 1348 wrote to memory of 2852 1348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddf19b873b21c1e73f702acf9a365946_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbf68df1e3b197bafe68079a58257ca
SHA1a48984dbbad111fa55e88cc745dedb519142cc89
SHA256eb72d638f834e627a94436285ff9cacb6380e5d4dd4cd76e6d4a8abf916d34d3
SHA512aced2ea13ba7787af13ab2383cacf4fcd5cf87a41f3e7af1aefa365c9c4c866d7d6dc635166ca83ac199d417e6cfcbcf1842c153cda19a19fdf5082dfc4c959c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aa8ad7a9cef799c1767cb381ad45e11
SHA1d7023cdcc98b7547138fde3d6c35989a349f1769
SHA2565e22ed92275c61eb845b342b0243756917ee361b0d4bae8e0ddb577b7be6c9b6
SHA512d131459d52f4217148c7c6a1517a36b4cfef95a4483b6387ca9d73af2e39bea2458131c6b9dd9a1b8f6c8cbccf9d955795a65d972416ec0e63f81cad621eef7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a32aa3bfe281ca831bdbf35cdf097b
SHA16b58310f4080fdcc1af2c64bfd432b4700f2880c
SHA256d359aa97b80e90a41be1a0446f6a46ae28971bf22ad512c163d6992adcf59f15
SHA512faeb9b56520e41413d29886c6b4c7bbd2fd9f72a4fc5bc5a59f7a42b0f5c81cb5065d5a2f03ad7858037de88e08892c7b3b2a01fff3ef222e7f988259ce295ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbef7c3323f55bfd7bf4278d856c586
SHA155cfe05595c010c021be4677c337d8648aabd101
SHA2562083ff64f1b1e86f4565f2bb4454e7fe27fe29e81c8a7715abca1d15f1be619c
SHA512f229fa00e5765df81845e878c2c5c18843e97e3961037d5f31a81ef2a78b0c8aa37b7f80dad6ede52aabe0a7a1c1b641a7bc4686f4d89a107a3511c937efa7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab66aec21ab98597ba9a28c26de9b83
SHA19a5e6d4a34febc1ace51f6f160df2ff3470cd01d
SHA2566b63327fc9c4f8b45f411fd41e415985dc4763f115375370b5224b874bab0577
SHA5127420da50854b9f710650bf230863690d0c22b624ad442ca8e0426f8d251f9df392d0fe5c6bede164c7053f410080430db8d485c2f34871ffa94b1158bba4f72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527fc888565ec980c19070f708345df36
SHA15690c706076110d170adddc73e0b3d846eec0286
SHA256be9a674b32e4585bc7191cd36791efa235872f3a2c1de5a699fc8c0462837a5c
SHA5126ea2ffb9b9980d4145c8edaa7b58f0dadaa43bf3d7b827f9be17518b507c7367417bc4a2c14023bd1b2e6db2f3e3d01ba3a08a84c62be18c37913f05e61d17c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090b5993c4a591c48a615de1e230b5db
SHA13821b16a53be4c14c8bb1fc69640217da2162dbb
SHA256832c3636cb2a95dd63934e892f8f3afcbd237f44d8bc1a7c55cbc7e59cafc238
SHA512387deb3b6a59c5cdc7c652f19262bae31de63c5f0fe35dd976b73402aff52df492bc2bc87c2ad556359c07510ff72ac1cd56bbf449358c80886063e99a2b926b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d234408a57e7b99ca3c9130338d780a
SHA19b6338de37e49cd23063a29bb82a2d8bf9d5807b
SHA256e9ad846a78e0dfcd4543462f3e998d28945f25736b128eabbaaf36f0970a6645
SHA512c9bfef276c20cf63061415a1a4cee81a24d637ab0baca0a72536c5455fa780290edf0b4309fa297efdccd1022c27d5e37c28b174a2a17ea4c406b923821d6c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e80c6d3e4270b63b9be6d5f032fd89df
SHA1955973e87898576383d6183088e82ac1670e7676
SHA25601079cc3147901672fe641f6d7b2897a9cbfd3066b2aaf4a4a40ba8d38458ca0
SHA512a83f06e3f60f811ab7e2eb190fddc9f9320d135a6afcc88b22195b8349c37528f6532854bf3014ee40e0c7dd4d61472f3102aacdc4f76f4431427c1cbb7198c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67a704e138ff3ebe2ec016fd0236da2
SHA19b3a099cc59ffc9e64745d35a7c4c70e3b3c3a3f
SHA256ad3a860f9b94251db06d1f149cbcf7494f699b9fa6a74329bdbb158b60109e07
SHA512d196dedeeee896c0f06da2a15ba3e6da9738e7a0a90ab13e389551e2575e5b40f2a3accf17af2baa7af1543cfcef3987fab8f188f9a5de18ebfdfdc063698ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc5d1c130fb76a8fc15a8f3edb25d2c
SHA1891c386ddf064b50f04091a9ac341eda6d32b962
SHA25609edcf24e5666448b40d693158028c63017e786c366fd81c4c64305edb1976ad
SHA512f84b86449d475cc53bffee6e6dca81751c5c843dddd560934813c545bb4ac76e13e7677966f8e5a24d6fe5cb4e54d1ef94be2e30a34583d942a47a3678d6ad7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca83f9a557a3ce8ba76fd4982e64d2f
SHA19a242bf3f7934e8a23feda9faa41ff34281e780e
SHA2563a565606bcac1585eee77efefbe0f9024ec8ff70c5b76f0e9523d3c71f8cfd32
SHA5128146eec7a74c7def91798af47753db8be7537d867dba0b683bb613c286ae6b2b0a54bd784b897b946a98c3b0af0ef4e5b466e3593518fdac99e479fa2e7c87e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c229160141f5a7b091aa49c400dc4d1
SHA17f2209c162dd9a06804976afefece44652628499
SHA256f33f9ca96f4e3f31219847f12d999c326689cc85d39c4445a18dce658d3eaaa7
SHA512f2545854e3a3295e7977bbb9bacc78ea193c879a95c3984302adaae367005a7e639394c69ac3fb1016ddaeb7660adfe3238956e37bfa9a09bb4b23462a5cb109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686b443398fd5b357df03eade0ab2220
SHA18a3be04e99f37588b36e54b4653ecd04f96540d4
SHA25674f2ab1bd96fa66d71145804b471c63998ebcb1406d56492be3b7f142ed3a406
SHA5129517faa2eb686ff14665af4353a70b102103c41a890128ef30c4abe478f5e8e828e19e62ec872818b5e4e25141589037f7dbcc9c15db9ff8c46375e074f93dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53817ed1aef116de6af6b20f1580eea21
SHA1b95728d243c42188056cdab3f2392e07daef83e9
SHA256db259cb78a7360d12c6478a16a0080de95752a56acfc06044723c68447a155b7
SHA512bc8554cb693705c197d31d56bdf92baa9e3606a3fe4f81d0b3d5df9c20da72990ecd75fc84753bb43a5dad3718fb3e2901592774634d435535c50964697c988d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acecefd88b61f3f7c565a3ac70540065
SHA1fdd2cda027c0e5627f9f8cd6cbfe7b628a4bff4e
SHA256b367b63d789d121e45c4d86b8653364d51e4e93d0e7b4b4fe5b569730502599a
SHA51229dc7b42dfac72c0421143f655f3f162e4faa8ee0a9f47098bd04c0f5686e41f1d0ffc7dcb8d941473fcdc7042cd901eb97f966d184b324e80c3d371e2423704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263582df8ec8c6eeaf1e53143b84c418
SHA181b908a4b8fbacaef9810c3a01ce5fe5c6b7a9d2
SHA256f3a3481bc9788bacf8729299f90964657a390ab1bf0b9f62fff751f394048575
SHA5129e4ef807011725ed389714e6f11d207e1e7dc8df302d3aa5940da12e2aa542161820f54e1f178a5a8072a4ad48c0fe5cd71e72f7ab03fe5f0bc54ab87c15be82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b