Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
d60c3a27e67902b27cde3751786298c8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d60c3a27e67902b27cde3751786298c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d60c3a27e67902b27cde3751786298c8_JaffaCakes118.html
-
Size
461KB
-
MD5
d60c3a27e67902b27cde3751786298c8
-
SHA1
57c5cb511b9d31c6ff61d592d3a99a2c11183b0f
-
SHA256
400905cf496062511e7a1162fe7d0ffd1569a2d8d4ed36b8ec5be9126fdb0eb3
-
SHA512
823ede1cf2d3da0736e2df0d0b0dfd3ee302eae0c6e6249de853801d24de747e781d066d0c9654ee90aba70e905cef2bf442be2e2f91aff601ac434306ce0cbd
-
SSDEEP
6144:SLsMYod+X3oI+YrVsMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:K5d+X3L5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9734E421-6E8E-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432036284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007e0ede5b8ef865a581306fb62b96c7e93ead835ad6bc807630575146c55a864b000000000e800000000200002000000005ccf2435e86e81772cd61da7ad89116a02454e67812c0c3ab4e32e51ea4ba1b200000001e4a279971c2f269e9385de8508b9df7da4f7558eec5dabc48b38466f4d81a6d400000003c393021bf335e576a87d1b149276ed1d52d68ed52c520e58260c088d9cbb41cc43bd86b8f3aa48ba489184abec517daf39575b7154bc9f17a3df89127fc03ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80c3b36f9b02db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2680 2660 iexplore.exe 30 PID 2660 wrote to memory of 2680 2660 iexplore.exe 30 PID 2660 wrote to memory of 2680 2660 iexplore.exe 30 PID 2660 wrote to memory of 2680 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d60c3a27e67902b27cde3751786298c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859a63b28f3bedbf4ce03bed9f13fe57
SHA14520db656dfe041d6dd9677dcd0c1703df344f9d
SHA256fb743e3c6fe60016a33cef86ea43d8c94a9328a8d5bf9639929f743336de5575
SHA51223b355c43fb83c41027758ca2d528eb72e46d76294d4e34cf5fcc0a1b56b84e55685d72d50e1095773890a2fd3801b5ed79f70556b17afd2f70e2298d503f673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9db88fbc95280ffcb326eaa36531d07
SHA1835405cafa70eb0e10b46ae37e0c030d75cd9b58
SHA256f27ca2234513e81008a2c073fb6dfe335fdd90e21992428b7b9742bc2baa5ec8
SHA512d71879b432a7c752ed3fbf4bb41d0eb5f875f4bcb12f023e5c8e48143e17e2385ffbe1f13493f5d8d4882f0e3a3f4372dd36bd2d2e37875d0ecc0fcd5fbcc69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56406b2029556cbcc36f0dd6cf6e7e53e
SHA11926b0ace6fbe31d4a685aacc40a5938e6f7f59f
SHA2563eb7e0d113d61910542cd114d258a644f51b6bbca68a999d2ca60e0220653385
SHA512df0c2345df2defb16b1d19969e7b1add26394927fa3de9ad0242224824b04d906cc2add489bab247136c1796f65e52280248a46b5f53e464c46115b150ffcfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855736c92d2d7d065d67d41720de64c0
SHA1c39924e092833196f81f05d7ffe5b9284209851b
SHA2561b6bf25f8ecd32168a2cffb6a5d244d545602e72f9571deb26d84de527dd18ab
SHA512be074dd0720059c2e1a5b9af982391b827923b64268a806075600c0deeb58e97b63d498bbb7fdb1eb66baa0af6ad701d7e4c06e0bf9a87d2482c40b413519ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fed37e1a694c558a14a13c79ac9850
SHA1085373cc841f37a332b8c837520bf23fd6887d8b
SHA256f5aa4c814a0ed7e473c874ce22112a58a5f7abdcead21d3c860dc1e0f10f0b44
SHA5122c03033210aa8ba0aab307c63622b5797be2e659dd1cc4d4181b013a6fc63081d4d9236f16116930821021858d3d98a9e7c4d9abcf5fa95dba5f0d9f0c025f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2c02081368f8fc41d20c110db33b11
SHA10a383e2a4214c3414727f3318f065ac8907b5f92
SHA25682ac6aec3c75ffd854282f13d65efaf8313223731be8afc9f82f9b9cf711efae
SHA512ea20de4d1055225a185bec616444dcb86555af3e4bbd7aa9cc75b9b42fd08262258d1af3fe1820f13e2a8a0605034675f58171f9a63cf45af414542d9c91d240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ef71db57c6565dd9f446161485de69
SHA1102708456b4ec449d5be9511a90b54dcf85a3c15
SHA256f5d921dd4de1c9414941f7aba34c9889be449962886f3cd625213e63bd1ff15a
SHA5122e2af1dc12f2f4afa1b38ee78512e6374b2f30cde1be7d093e443c15a1672e04cff51ce98ff23fee4cbe53320609956adfd262e527d3617f0d0491f2f9a895ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51063fde1a52f85d4a48dc2edac18cd2c
SHA194d0300bf4200f528152c61cd03579e404cbdb15
SHA256e5625e2b7d188696ba51c2cc0fa5269c9ba175c62292df213b1cc2702d5d2b56
SHA512d1b752ced9be903665b07052741350454c2b5ac91cb3cdf50a572fa0fbfd3d2a0a2a27d85049ee2cf380bb254e3cd7c97f3a685e53fa160acc5b7ff701a96bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a704ec89da08515348e6acebba45c39f
SHA18258ce50f8ef55310b84abe829bbab5ab03c6551
SHA256d1c06b94dcf4b6396dd80b0cb059c13fdf73bb17d2a99bb8175baca5900e0ba4
SHA5122096133e4ac68fc2e523b387fbd4b3560d9f24b73ab295f1be6f613648afee530cecd2733e04b3a1a951e5fd1e39232fb55047acf0465e4c940e817ca9dc85b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54722eab152f7b9306a6965111d68edfa
SHA10f482ae50259ece4631c9e75c2109bc8cd2f190a
SHA25699f8f3e63a26cc0957d65291c6ceea6cbde114adfc19d7bbe8c31ce9da08b8e9
SHA512576beea7d6de223029ba92e4a4e0f9cbc6ff5bb05f8da5ce900de82f83e61e79cd38d29ae2956a08b3527c9b1d88b99f2112fdc3fcdea413366b684627847acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d545a176515843ee71c66d6191c2eea
SHA198e7f1602334500430a38da70503f8279235f2c2
SHA2569870404883259f509e146a8265acdd38bd341dd69f0a0ada1d252c9858181fdf
SHA5124a739cfb2e30d0b3e5d61ec0b449fdf46530109f5613fb7745d8d556a3a7442d1826d012c6c1791c5902cb09f707027a533cd9d5ac82fea7f1ff7f8a18e115d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec913a901d849cee5ad2c4e42ef1d818
SHA19756058a19f3764a6fea9e097e4c6558db35c476
SHA256bb76eb0324dedf04c384dede5027b2357cf906e8927068c329b05cd3c5c217ad
SHA512f1477e5a7612e26cd117621a759e0e87d39ef624fdd5d964f4f453e2a2e23173551ac2afe428f227f5408aa7c5460070ba0d4117e17eeafd85484a11f9c90757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bbeb6da6efbc344b431def8e54477a2
SHA11804ccff2e7932bad2ec3c8f2e1187418366b446
SHA256dc77c21fc8ad0a9ba40119b298524eb496cc6c1a7f12dbe1ced7c4b10a40557c
SHA512ad0ff773e9c2086a3ea116e29c145158e4332c5da5ffdf031850fa63fa1e6349beb93432e09445c10c7cd8e14010d4514515871f42824f84621a2e6718e63e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f4d0764ebc84d42871541d0bb72816
SHA1ec0da8cc836a87c8c177ffe2ab1ccc55869ae7e6
SHA256d3cca60d8af9e94c92a28ab2392776bec3f479a4cdd6d00fbb380e8cc3aed9f6
SHA512435c0ccbaa84640242f096889adea2e9cc45dc4a3746c491382e91a8f2d9891dc0b5eb774662a11701e6d7b480f48ed61f6c46c25f4e85113c10ce1bb5dd5a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725a0f6c002a8d2b827dde2c9f631cd5
SHA152c820fc92fa80f996ffe44ad1e8e8cdb1066896
SHA256c7ed56da707de6fee375a5a755e6446a64eaec909c71f5e7e7a2ba59f0b0e701
SHA512c4322a7668ee28aa5053ff616c853193375e79cb49454b343947c4f960e9cf9b52119b415041d819e0a8775f1c4806b0219de3c12a6db88ce097372e4abf613a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec59df0c5626cb40b2911a7017bc8e7e
SHA1ce849593c0fdfe5acad0501e05bd33341af305fa
SHA256270b23dafe33ee54ba6b8e2bc5433df62e0118ee2105b76b067e81c4ee267da4
SHA512a595b550eba0d0dbe7fd6953c375320012b66bcdecad24992a96f5ad8f6993c48d3cc485d7f06a8e496d850da022e3131349f3edb43a9fa291755913f811a080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50181c6a5e3a902380857e002db54cc00
SHA14f672a578ecd5138a3ab7aba2e32b56cb08c642f
SHA25617fcf5edf895743a0d18d1625a0ff9bd26603ea39eb79f5f50bcb4e6319c5330
SHA512509cd5d10b046ea3c3492d7fc19283f2d2eceadfb9980a94ba465c7a642f3f0b2a2e429f969ad7c16f5b923c2a16d8db30cfd00bd23b15bbf8682fdbaf588fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58569baff331417f34f8223fd27ccb901
SHA14bbf221c8e2a61611f356d90c82968f06ed6389e
SHA2560effd15075d8a0cacfcf538ade83e739152eb355b609f8495e9d7d81ae8c57f8
SHA5123c3fbe09e23957f1f2d8d6494609c1c3045cb7d361a6c7e5e80adf2ade9c793f2fc676554d67e9eb3c523788c0e062e0990a2dd503762ded9524ba7658f0c843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02c123592204978bfcaaccb9a5ec55c
SHA1f9692d8354c5c006e778983b73f710a4b5776efd
SHA2567716a55aac0865f8a0e134dad053739429285dac95cc704dbc8d5d594bc23328
SHA512ce92ef8955ba87b49ebbb071a8ec1f02a09eb2480e1af612e765dd9951804abe31f70e2ecae1c9d8053631b39b0b1f9c9ae16880d2b30793564b04252c162cca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b