Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
550dcfda198209f58729f3bc9cbd12e7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
550dcfda198209f58729f3bc9cbd12e7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
550dcfda198209f58729f3bc9cbd12e7_JaffaCakes118.html
-
Size
20KB
-
MD5
550dcfda198209f58729f3bc9cbd12e7
-
SHA1
b40debe7c64f88cff296d0650a949987d43c53b9
-
SHA256
933df3316c1008e547266f52b7fe35428c57c9cc0a9e041bf4ef0f7a739c15fd
-
SHA512
a8fddeea7d57ab5ce557ad480867a6440b79529e012f013ba6a670f0eb54e4bda64e771321221d91b9cad1afe8eda42169ca12cc7a97587fd1335671b3861b5c
-
SSDEEP
384:Sp8dwRPPkiem0hOb8unvu0uQuUKilpHQPBbMvM:S7emTTHQPBbMvM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435381409" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000025bd05d41b5c5f7cc138e274d4100113ee99bb7ca260e30f1632827cdf7960e9000000000e800000000200002000000064f4fc6aca3e501c21d27ada0b514409cb7df7b671a51f9194e19f140b23b70820000000b1bfd9c34aa3590c23e9ed604008ffacdd47f6d500effa3229fefbde3736e0054000000078aa0a909b19b4b6f2a792afeee3b01bf1da88b49f771306d9fd7f2cb8f1d6f3292096bf1692f6fb3539a09c22a088b56f00656e991872c084493760c18ce36d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c721e70721db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{107A30D1-8CFB-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2348 2504 iexplore.exe 30 PID 2504 wrote to memory of 2348 2504 iexplore.exe 30 PID 2504 wrote to memory of 2348 2504 iexplore.exe 30 PID 2504 wrote to memory of 2348 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\550dcfda198209f58729f3bc9cbd12e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6c8473ec3736b57fd79d592045668e
SHA123ee719397879fb171cd139d1c6135d3f10ebaaf
SHA2567646468d3e78f6e70173c22850ad88b8c4eae3fa99563782383a99d53bb5925c
SHA512112411096965895c3bf31c0df88884011c60269c752d3908dd4a3cfdc336793f0d2c694f0f4f44d85ca42be1460e4264838573e93dcffee1f3b7378d8a6ecf1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5e4a8e56086ca407f654997430d2f9
SHA174b1c0a5ed714420e8f28860dab0d7dd08e0fbd2
SHA2567bcdf2a8f6145a6538857db3a6cc153833fed1a51c6adf2a0b2102b2e5e9e746
SHA512af7547976ab0e6ab87450ad985d20e3fd4661e9ea0a2527d7669f309ca28401e56a5e32af21a309bb12c5a17b4e98121fcd8d7c4624da67e35578c241f791b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503632ed7f4fe373dc0878a668c87ed5c
SHA1dc46543a7bd4ebcdf8e40227a8236e42296022c0
SHA25667fe96d60e86e988582c0a21a711bce012c7c456561862f27589d2894d9085a9
SHA512e9f69f07b8454c9f53d2a61c91ab6d051ac427926d15ebeca41f59bcab0c2e972a307cae780c81436e899d361a469d4de2e9c9bfd975cc63f3a178112d69bc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38cc8c830e891cd7e77bfb198c341a4
SHA1c93e099a473c81c2fa32fe6610b155595109da12
SHA256f345d71b910ccae5d2ff9c0c9f4d418c10be26a34e6ef5e6b051700a135bde4b
SHA512f48a09878fd10a80700bfa94eb594b535d8f9f8a8785a01a843423e02b485f8bb0d54621d31897ac6fd60964cb96c09b1e1d4c81a59543004338c4aec7473f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96ab1a0e8dda47d221b5623b7fcd237
SHA155cbfca6aedb7c2e520e65c7c079674668352efe
SHA256d5594306743c56d1ffe46551ffb5035fae449ff34c8aaf1ab91a0e1892217e65
SHA51200a7656cad05520eb1fdee4ef05f1d78c1e1c31bb6a8a4946fe0c670cad5e901da6e976afe2685a496abdfd8b77ef3ff4e0c4ee39e3ff9f9f7bf2465db8f79e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59592011fbe0ab8d4a44025fe259b626c
SHA11a542c409fac3ebba6eafd137757ed94fbe96c4a
SHA256ad6612222a761d2deb2d1f252f7da4157cd7653c459dc5f45381e506a796befc
SHA5126ca02c724581598eb065bd86a49388bcbc8c148d04105e2463c9ca76852965605f4a2f2214605bb5f99bf0aaa1344f6b0944eac71e20af9a13b48ddc901ed983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6807f0a63a4f3a1821e5fd037939d32
SHA183a9a57b386d50b55c74fa1e1ff666234ce43ec6
SHA256e026f8fc76341da6203bdddb1af4a60716b1c65a57b6c94dfb96452527aab8c1
SHA5124ecb50e01926378f3656d2c9d6ed846171607a2568b3119da7eefae9c16fde3dd90b26b72d8f1aa6f501eefc299c12c149647ec20e2cc9e4f878dba7220b130e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516825b4111bf483900da1a5cb170f0d5
SHA1fb05c14d2d774d3e8ad79f33ca4055e550897fdb
SHA256f35406d6a7d281f9fb1cc57fb3641eeaff3f04c0d213a97cfc3942cae5a9cbdb
SHA512edcc797d9ad21e39dc701809357ae7f84120dc896558a9a5107f28c8634b1f4c1c4ed2e0afdab77428fdd19b2ec60ed6cf6ad32130493b97a2cdff5e33a5f741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3dd6a0e4b4d5711ae4a338f8a84776
SHA1a8385e74a681e8359a7585daea590a692775c38a
SHA25644b54562294c05d635e914bdf53bd7cc45134b14c64c20323f63fc5ee4d105e7
SHA512ce5c3bb3a389f2f2a1473881d33d5819a2a768167b952bae8657ae0ae9c58f86b205356af400fd1ec989dbb8d22b3c1506e62a53a705882867c5a88ca5955de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790c63eb2854d34d14da0380f0b1af2e
SHA19a76272322b7299a47294ac7bcc56f10f52928f3
SHA2564bc5b98e12a32ab830e903237a775dc911b383d2205b01ae9dbf294e4d7dfcc5
SHA512ddf9e234263f59aa1b90fce6f60bff0b19184cbc1f3db8e108f52b3ba4a5dcbcf0e770c269b3d46d6311947a765c0a47ca139e4fb7dcc530ad13b549ece982e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1750ff915db606ede96f8dfa931908
SHA12cda50aa789548d6100763164c5c8b9a12c932aa
SHA2564930e289ff065fcc3c27ca97f73244ca9797811726950bef806a4bfccdd34d37
SHA5126e84f72110b461b606ca1948b6b79fae5ffaf5f2d62ac129753580292f04aada8285235bcc8f9002b68f59e24b4d35f67d3a88a2e40ae4a9a972a6daaedc1099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e647d1203d546e1edcd186ee3cadaa41
SHA1f4f975d23016b18ca130a0f6d070037ea3e80685
SHA256f7f729f4b3e148fbd631e4ea9f11ae09e6541dc2454abc27ee9d9ffe501c299c
SHA51261283671b91c03782599a62fa5ba8951796d699a59a5abc68cc0f86689a8c311619055342f19a93093a1286c3f057300bcb6bfad6c37d4639734d20dde5a9eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9994fce5032cb7091e5e3c00962bdc9
SHA152fb4d14b4b7e07a0e33b97721ca638f692328c8
SHA2563ed56f70c52b2cd0bd1efd4919ca628e516f334f7a0734000448d01cc7c82647
SHA51219e347fd9f3131b1fb468cc68d36729f5f8369dacc183ab38b68b83c6081dee49f1c541ae31ca10f94b15022211bf8d6e534f4a3ce3a0a77a6af65e516bb2b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d07f3b9ab4f06917073b8aa7e5e10e
SHA1c08214416474903b2576a12a2afef669a0f979d4
SHA256addf96369f22c5e1c7fc2cd273a40289e9f4ec963f28d083abcbfd09ab9cad90
SHA512733ce21f89539ebc36e8012a8fefac9cbf83d94bb16c593307ba667d028388d4d47ebfa9905eca278985b3c33e5d90e23b0ae1a81be0086446344d714ecc80c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59990598fbd5eff0a505a9b5e0d570a8f
SHA13cbb0db334940b8cd23d6489d1210a2009dfa964
SHA256f50a0e453a9a0b61108e9c2a3a1d122ab28b7185a57e79411adcfc5dc1d4104c
SHA5123e1b773af913fdd64e06a5ccd93a3f4a8fefb0097092c2fb9884e5d1657fa3d035c8ed58069b90f16393f6fc2ef9cc099520172eaed8025f2578ab30ea7287f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54307b8dbc40ab9a66d18e3df6c3102e2
SHA190c8aaebf8b615c8be14ab80f377da1234350986
SHA256389308839a307f681fec8a1107e1a40debeba0edb4178438e77d199d0edebbef
SHA5123542dc78a6be47cf891ef2621017b3771c786fd01b086ff2afed8c294df7ab4536704d68cf274b34ebc58c37ab35c2d763faccb3e630a7a9c566face9a878acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff364ca3a103d18a97ba63667b79f8f
SHA14594977077cb122991e4e4101a41958a3dcccfc6
SHA256482bdb052c29f8eb0176e96ee9cdb6995c8cfb31305684d01349c6687f7d4515
SHA5127191696e452fc7f63577f8e1ea8b2647b7473d37dd5f4c5df1e4add76878eeeb0c101b8fbadd11f079a938d16b916e002b809c43e6446e496c6e444566e58251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e895e6aed330b2077594d32a4a7240
SHA11341bde7a447d27adde9a6db356c55b163986310
SHA256bf25a9e6c0b7d4be1f9920f27e968dba7e5904e7cef9b101141befa1db30da57
SHA512da7a86e3f00bf1101ea5462ac0e4717d7ce06d21b44b65cae64f025411f93d2b8bd06b0e019d5239d5a9855ef4edf84a32da02caf6c4240a391ecc85033760f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdee2cfcf92148ea276dfbebfcbc78df
SHA1032dc5501660b4ef988d0069ae9acc50bdfaad8d
SHA25694dac7369d77e231a488b158b1130747d1c31eaa8ca15d02ae03699fb7340053
SHA5126d73f9a86f42f3c813186cbbb7488d23361a85e02ff274a211fa851434817dc7f6b2196689a8589425f8a0c65e978b1baee6ac6646576c4a4160242fc9c98778
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b