Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
ddfea22778099cd5fcbb73991cdf30ca_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddfea22778099cd5fcbb73991cdf30ca_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ddfea22778099cd5fcbb73991cdf30ca_JaffaCakes118.html
-
Size
506B
-
MD5
ddfea22778099cd5fcbb73991cdf30ca
-
SHA1
c078b16b4ece3fc2507ad9a5d57bd69ecd5f59e5
-
SHA256
4f7017a959555fff348ecdf93c672c1d33ae289d4889140d8e808fa38ab87b21
-
SHA512
7d5a42727238cab871590a45b5a9c8c44bb09e4ea5a458263c43e0cd41e74730b0f767c2e8d7fc0474d07c002ed410fe3ee32ba7068d8444da6166f4eb1cc302
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432375808" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000073d45a1e0bac9b5f3946edfc9ad82fbc627e3968e5f61c4d83f65cb774943d28000000000e800000000200002000000074a787fb012e3b940af429a0a02ba486bbeb607e0080f97f4fde3cb1a0b7c197200000008b4ac8836612da0099c853905140fbb79de1c778ba24b78e358dbcac0c470bec4000000089cf58c5d0b044608db87c387d632a82ea87562360d4b6cab07da5d78fdefccbb404c78fdee10be94bf2e1caf252c59c0939ea8ca2f97c457b7810019268d94c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B3FEEE1-71A5-11EF-A701-7E918DD97D05} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c5c0efb105db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1648 2872 iexplore.exe 28 PID 2872 wrote to memory of 1648 2872 iexplore.exe 28 PID 2872 wrote to memory of 1648 2872 iexplore.exe 28 PID 2872 wrote to memory of 1648 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddfea22778099cd5fcbb73991cdf30ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58681989fb11e8f73fe124127317ea192
SHA1b000c0cf2f8a256b4d241958040a22774a773c40
SHA25669be6c23e034e8a48186be95f07fd1ca0bf571b7875c116212389a8ee92637f8
SHA512008aab4e2aa912fe055c121c052537161a61b1dcf3719239f45be156541404c2ab65a76f7e7662bcd68f6a822f831fffc10fd0237645c62da537b86199fcce25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36cb3132a8ad638173d5c062bfd272c
SHA1a3aa8715ed5e004fc6d0da48c4c0fc6bb3fb5ee6
SHA2561104c4f5bf9e2790635c1901c296241f59926c55e38ca13770639b9e38cb469c
SHA5122d873c3527679bbd5ba3659ac126a1b78c917f77bb15484e38273af8d5ec5fb3001d82def7d7549467ba389825941f9cf9c009c15807330b728e7393b702ce81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3f7d72d3bb9841aed1fca537e1094f
SHA1d20858066d814a11799cb5c0f0fc194c96ddb64a
SHA25685ffcfb04fed23be87f5fb21dc8a57c6d4762b23e35f1680aa396df59a785b74
SHA51208fff1af4ec6cdd15fae32e9c78cd640b03f7918678cf3025b760be65bc70676c57997b960a2401cae09e663e431a8ab2195b0b71c0bd83dac56d058165d94bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91408acdafee241f2116121ab543494
SHA109617a511eb13d36abfd62ac63916207157b02fe
SHA2562907f499b0013ddabdfbe4d4eb52a4867c8358d682a902bedbac1393379ecc31
SHA5127e88f5e8f1dab3ccd9c450edcee19745ac967bcaee9c88f3144f849c3b50e7f770d7f7417f581746c7709590f19488ee132b3696ce5c4f66b5b822a7502563c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b293fc471fc839c1c818fda004d339
SHA1bf80db3fac32f0c0cd1fe597a044881eb630bff7
SHA256b1c6b2d7c786cd8d46e68cabeb2512bc265cf20e42b17ac384029e147ef041eb
SHA51247f127961e6e797733bdff1e9f1521c832ec777fd32a5450108179229db91cb1fcdbd1e7aa355acf5419cc5267b4b1e86027d936a77dcbca7bb93ccd3494d6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59614ce99e1737d439799a9a7744c2181
SHA114533126a2f4b0937c4fb495ec5cd3a8cd91d0d2
SHA256998c8bf7f688de7ea21fc74053389634d239a1b1019944de3f2f07f53b009b6d
SHA51234940d44ce51a911f37825820c87aeb6418b727bdac17251d20390f3338b40423223986cc69e024373a638db525f4481719b7e854e39cca67f086fd7c4d83c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9d543afba26df50a107beb28389f87
SHA1a3520336e1c00e676b9b2f1c8090f36f01f96054
SHA2562ad72ea9ceb7cb8431c6084d9f86a6ecc1eefec07c283d91291d2f336b3966ff
SHA5122c48b7438ccaf9846c15c97044e75659e41f52a4207eb192af836a082613a9e3cb57fada457ecf71d99b9655f2672141c144b38298622f14a1858ee639d95ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a0a2bcbf42bbf8d9a581a37a001af22
SHA1df3f130ace55f00355bbfe13726ef65d7ae6780e
SHA2567688da81952375117c06686ca2daaf8ee711eb73ac9cdb768496685c62f527fa
SHA5120e04e91535d087eaefc84e869c51d1699fc4d39bc0c7f82fd59c037fbb799989910e21a66a35fcb7b92e992705b6a571240016a04ec6da2903b94e06b6a2fb81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999f92330452be80229961ab12b38abc
SHA1c121d3c40137dde5cf29e0aff32c730cf2b66250
SHA2568bdec9a6a4cd12087a84e3871a6cd37f7b5c13113e5de531cc7ce98368597253
SHA512354bbfd52dee58300fb747aac255ec9648413806104edbcefc3f77dc4310757b63ec3231bde54a4be69c7008a93387385d857d0feb856da8c6ced7e880ac7008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fb4302800b6642537930768b21b1ed
SHA1b23dec25524d0701d8b37019b6af7309984eed31
SHA2567077948a9ad0a080eaaaff58baef933642c5082116fd375dc7b6d860d1676119
SHA512e0c2f65716db8f56e8655e4db011ea49539b1d4561749d7710dc7ef25f0549a75554a416eaec87a776aefba57e1293467fe66ba5cff6409754d2500815a62aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613988f7844b09bf09e7766c21f329d3
SHA1b69a018178f13657a3183086989cc21aea32fd89
SHA25656cccfa321fd06b529eb75671f126f85c2c59af6db531750111509ba964656de
SHA51218b670cfa33b128d8da5b40329e19754c4c39f126002058c600f4755f29e0587c66fd639ce5145a06e4864950556f6e9c992c2691dd05ce1bdbaa4c868f3385b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ec6e177e47e0b814a508e0ddb59cc93
SHA1a1aaadcc6a64d1c79c14cb23268e2fe1e1feecf8
SHA256c66aefdc1c527deb9fbb3e27117d1c91267c5b5dd06410e8e36221a4cb5bd2da
SHA51251f2e9eaf1134a35e0b358fb57b8fc8090b6cd5fdf61e848eb746d21175478846e5fe33b3a74e1a7293b52cbb6a128a802cdc75adfa118b4319ce1472a485814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e66f4cd3a200438b776cac3087ec7d
SHA11213be17c46491b061a797a376901d9d3ad2c4d8
SHA25680243a3f588369eaf6531abddca4686d1e97bf378f0aa492944e559ebd882ce9
SHA5123d3807d14e54ec41c39916916d576f9ca7cdde5b0ffd5762fa1aa7ac6ae868ddbebc2ad5f03aef8618c40732f8ddb206a6164d2fdc72b694e3730a03f573501c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd621017e83bab7989cc8b17cd74596
SHA1a9a3f95f121b37d047c6bb6cce4ec26f6a8c03c6
SHA2569d8f76cfddafb28c0dc4620def8d3c9b53d94f9b4997d48fe690410c4dd1919a
SHA5121c80753c600d9581f8f5fc03e35d381b012ce9b356f6d8aae2ac9747a10548598231f4b0e19c66f3c7be84f9ccb239a1e60f0defab5766b1b3a17c836b9cd1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1c5834385a00d0bba2e782bc524bfd
SHA13df4aeda092d6fde191e29d2e4ab622d1a98b0a5
SHA2564ae97f43c7f88ab9f49065586f6c15070cc44c10cd0910ac11a93c98df879e35
SHA5127d5cad667061eb5f3717ddc299dc4c22426e245cba22796ed9b8c7284d9b4db994795069e99b3a8bb2a8a2c285e77570bf07883934f145fda6d8d75a5e257870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551586ec1079e92817f061997dc7e99bc
SHA199699b1d48cc4bc9d5eb3e2024ef5c64e6da15b6
SHA256fe27ed4d64f9fa39159434dd5420661078d2b3d7c4acc84a208aee0738fad2bc
SHA512ed1f2a3764d89f32690e2177be4d45faba370bd55c474dd830261e1bdd05b2c573bc961738d8028d1a588a9847354e3000d1baa46f6328b5891a6499353123a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f9582ea173c562804c6a1efa3c8059
SHA19144a97b7bb3304dd91d24ca8e6970c0c862f8f6
SHA2562d69abdfe7cc768e070a2381d2f29f745ff6187b94f368e5b6303a9965964bf7
SHA51259030cb02e32b064c025b4d1ade7db026e06981b9f85ad6b24c907668823a6b5b2744479ef5cf9ffe35058cfce1ded16f3e90a65c6cd185cd960c9d196862e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f652e2498b10516a34a1751a2fbb93c8
SHA1ca43d71ffae5b0313a188906e33561f66673d11b
SHA256d23392bbda489a8155787e4df30ea7339e382f61d94aff4b168382e1224ec29a
SHA512b9a3f80176fa882355e6c48c25655d621080502f0290b1d8a6165af79a898ed1dc3efb46047207691dde2eb54f9b046709f08958ba89665a822473775bf7300f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b49d8d426a4c162b245b7e945fcb417
SHA128e1c49d1819f4f1ae30f58688ab3d9231b73fe3
SHA256ae2c67cfef0f24db0fda04eb2217fbcb26c27b73321b7705f5c8657bd3f83edd
SHA512fffa567cc50ac7245d279abe365bae443f6114d97407869f5f36fc316631ecd26daa3096b5f304a53e7af6bd2eedfa8e8620cb3dd779aab9ab7f81f9ee579e32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b