Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
ddfb77aed26ca9162676df3157d74edc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddfb77aed26ca9162676df3157d74edc_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ddfb77aed26ca9162676df3157d74edc_JaffaCakes118.html
-
Size
6KB
-
MD5
ddfb77aed26ca9162676df3157d74edc
-
SHA1
2c218c04efdf953776dc801852743809f6b6afec
-
SHA256
d8987deaf18988a7c85ff879e93650e662678c6201c6fc91f2e1a6e43b1f4356
-
SHA512
37226f3d29144337afb2b5800ab7eecc04a90950ece2975562f997619762ac76e69d8f13f2bb020f40626e0ee143040a415a6846d64d5dadba89dc94c4346b4a
-
SSDEEP
96:uzVs+ux7PmLLY1k9o84d12ef7CSTUAZcEZ7ru7f:csz7PmAYS/Xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d211eeb005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{176B9B31-71A4-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004f448faee89e29f205b9893b4f323b93c8f5288a0870266de373a6fda9bcb331000000000e800000000200002000000095fe765fbe99eca406916c57ec96daa5c4eeb7b404f9ea7ed75b15d396c38e32200000000d7e6fd5427bb2c3ad49282d0c0d2f962e887dfd60000995141bc4ee705b02f0400000002cd52452f47dee0f204df71ee8ade7d44de34af832e266e597f6899f2e4cfd8d869f7d9399162f50fa2d4f5570ffecff7c162daab75d2f9e5e807f7a5ed27b97 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432375373" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 2156 wrote to memory of 1624 2156 iexplore.exe 30 PID 2156 wrote to memory of 1624 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddfb77aed26ca9162676df3157d74edc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600579c5a77f0e716adfb4d1766e9acc
SHA165e5bc66081223e4a08ea479386ece6f0f97ac73
SHA25613d15e344463fb6e22b84aeef599c7dc811359d2830c6ec19b79778a0e42693e
SHA51281c7c797c2cf461cdd8626ba07d5eaf58b9e540bf6c67037ed74a06ace6e280169048c8e515b5109ae7af1a292b4746340fef9a49d4864f3c2e06dc263dc295b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36fbdb8295594203fc7d4f24ebc89bd
SHA14fb71280735c572af71e641f524e680f3baa2e3c
SHA25655c5b5e79a59ab24fbd85d7377d35fade2927f6eda6ee511c1a0e7a33e8ad192
SHA512c9d06fbd2babb7a8f8eb808420ccd839dcff386f2665d95836312a124fb532e1bf6539d886a7c8f9d6709f995464739212fb8833ec8aff6bab8bd6ecf21ffdcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcea1d8c36dc7a0c87dbebc994d3dca9
SHA163307321c5a43135b318f85c79be4ff39cd6fa11
SHA256113f607f7682bb8d419282edae9a8c07c2d5e1d0c40bf44e086bcefad3f72ba5
SHA5125a37f33717d7fa78a63205b0f569d7ff951e63a15c30fd10137a2446ce39f45c83987eb7d3bcb691f59bb5fc3bad31f46bafb91a77365f88f8eed77c5cd0767d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50751357fe123aac295f501eb01b348e1
SHA10d824ea00f61c74cd90ccd3d9042a4df5212362e
SHA25673919f8e1d1ac43b30a0018f02e1a760f5f996e6df7a7dfd10d1ddda5eb21953
SHA5128f43bae03cb4bd4d172339c05c3e923498e0c17e1f3570b96d657c420b8b6cef13f3cfadb45f3c8498ef46faa15fd6905573ecfcabd872b61a9fea78f4b42bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d6585f4820bfd1db240877bfe9ba04
SHA17f73e4a523927cbb7904998fdd5dcc55a337198f
SHA2565f264e9f7e0e0ad3283a6b31e39f528329fc4a846efd75102a5291a80bc6a79c
SHA512ee02113e333c820bd37ccb6f1658100694c410c9b889f8448ed4df2543065fe353edea1c4654bc648d826ce5ef28c4201b6e6364835de7c0447b3080bd8c49b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90042f2cfa5fc1b992f2b0a59530b3c
SHA1366d5b3f2bff28ab669f269b6a2d5af1527dc1f5
SHA2561a241c10b0960a54169e1db8ad1918c089049441e61115a6ae7b8f21f57d1897
SHA5121d736a3f0824c735c5c8673b23a5aad4b8bfecb5237f39cdf64347db3cbdef3d71ba43e1b3388ae7e58e02476d6aece46b6221ff9a588aaf5dd7b74be5e999ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89d4eaeccd87f62720176350cd74d88
SHA11529bc59ca7684e83c0f4e130e206824cc87e4b0
SHA256a1350889d4a6bfa4b91c0ee17aa314f7d4ea0544ca3e6de84f6b78b16a0af7cf
SHA5124a48287fdafb83e7ee603da6567974669d4f4f1ae545faa835035b809a23ac1e347b21071a096ad3b4b0396dfe850932abb458d2a521c3de2684739515487e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87e87eb95443d4b1dfca927d5407f19
SHA1b9637af2335bd9877dc22ec14df9d83100855d8b
SHA256bbad11bcaf143dfd703beaebb75e65ce7f89d72564fc705ff22f8a0179dd83f3
SHA51225269551cea3e34a9378d30661666bf345211b9f37b75c33d0c7f0a86e51a8866db1b45118466c0991bac5f55c2c241c6efcead7a37d76cf8e5d8c0aa1d454ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59442902806dd5b6d6c0b3fcfeaf1f4dc
SHA13e37547c2b1ca3e0e01c2dcef7093d6a25006244
SHA2569308f0869b21c2ab745b0aa1bce7d00b17da39e409b871d87cb27c2fb666e79f
SHA51298003fcbd6b8f215132f37fae7753edc6334387758db8216e11f45511fed64e20cea2365e9aa6e1e052062f315d369460342f1e4cc44687db5c26804554112ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89fc68687a3b70fa3560c257a6fabdc
SHA12478868436b674f839b4d9e9654100549e5841e2
SHA256d8e24eebf493ebf36603d6f3ae9768880f9c60e516cefaf40a2955af52a1fdbb
SHA512210c10096e54efb4316c1e9635e99c9ded5cd9d007a0f6b1dd1758afeefd979d53bb7440a0e14c7548d57bb91681087c260a9f54a2f74a10fe179f765e1f4d4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ddb961ca0b567ef24b8026dae3791a
SHA15cf0f2481e58880171ee82c0d75a753b352b0953
SHA256c977f302452a61fabc8da31e51415b3c74055b4c4f0db8cf76d06ac6242f25ff
SHA512428fc6da17037a32a496bdea77cca092ff4be3d73ede2c527b2f2d5b469b4fbd760d702dbaff23af79395a52c1d8d00e9625207c6ed1ebcf8b4aac612f1d916d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c6885b7913e87ef02eb34f45c8f74a
SHA1cfc710c114bb5f90c66ef202e5204ad96e787145
SHA25663c5ff7804ac464847c482db5d5f4eb4ddafd7018aed81b7afb70e27e6ea5950
SHA512c4a0d653799954e3976e739a035ea1ff8e86020167478b116229cb039d787d6eb1b17affbd6b2390a6852cb54ad0d6d64e08978799701aa363018d75a4d6837b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd3f7c397d007298eb067b909101eb6
SHA1b8eee3b3e7067a1e805941965d29c4ad471b14cd
SHA2566afc1bc1432f22825cc2d5665913a877c87752fc37ba567d50896abebe2857ed
SHA51291d061c71e674cab58ab718bad57828a137e2f11b1fbccdc79df78cbf6116a978855272e4b30ad2b908d655a65837dec34ea59a74507d546b638dc14ec62f97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b97253a90ae1cbbcb1f109e8fae2256
SHA1277a27f3467479873cf1929a11356dfb2dc81be1
SHA256f3ce7ebfb185c8ffc29da433ffccae85a51e83f15e9281516455440946f65153
SHA51223a98850dbd2685f6bf13ea8484eb1abf13367965970994a1776f65672ad9f72e2df873b7d4b43f8a80537ba6dfe6e8240c71627816b1c56bb6e21732037bf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef645ea3eae3b6d583043d65c4f0fc7
SHA1cead0ad16faacdcc56e08a71ddb359aa4a8b9099
SHA256e0492116ec5f6cda3c533607efa586b31c4f4fef9310ce4aedfdf6cbe4bb5b8f
SHA512debec5d3f5cd5b4bf4840e4ffb05be0630db622ead40f5e2d1fd5a98355362d563683b3943b3e1cdcf5d9d7fba25b19e2247972a0e50d3bc24060b996c84fbdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512608a0cf46522c7d8283751d00995ab
SHA1487239d89ca2123c451d504eba15baef65e38688
SHA25660fa14af7e5fef63f935a9b436a986d8855079f527b4a0e491b5a60ed625a8c2
SHA51262b156f1e69f1849cd8029f27ae1ceb685926d312c49c5d68a524ec889410e1050842a99e877e0aa39293892b01ab2094a8794a3070448e6d58162362f746ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d61200869cd68787f6e2faf80d161883
SHA1ee9d2788e7c9312f731a84e67445f2aa88c3e349
SHA2563b5231587ecdea91ad3098e075ac289063c5de42b887df5978d919820a25fea0
SHA51276a23b4a237c6e5fe2d77fe795a7327b8b2c88a6834ddf492625859da3734ed6b55e51a7945b3f60f2f063e4fdee5686d132fcb5d743759dea70f5d09aa22b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5930d6187c48ebc7ca13a3ae3d9214060
SHA18f2a501ba4a39d892379b6cfdbc71f96b373c4a4
SHA256f32eef9089c7d05b70052fe54b2330fc8d706b7dd157cf3db3ec37eef669be57
SHA51222b48a37d402576ec26679473fe3b5a01df2defeaaed3061b6b4cbf7839b383ddfbd89f5b92a18a96771f661d6f50df6d326d7bb23907ec7596a5cac188639c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db31ff1059c608245b5062bf0dfbae71
SHA1fac4e42fa1d586960e0f5dda6dbe6cf323747079
SHA25689faa951209215080282c23ea4f8f6a2b94c4b6386e7f58cf1a4040d4f398b85
SHA51255c597b7662d0d662b6ae2a8e3458f5d8880f2aba7109c02e0f8caf33086ce1dbae1a118afe1d82a72b4081ada756a8994ec6ed62fc7c8e2f903d86a15c69e4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b