Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
f60d8c2c63936bc83a31d55b91a9ed9a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f60d8c2c63936bc83a31d55b91a9ed9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f60d8c2c63936bc83a31d55b91a9ed9a_JaffaCakes118.html
-
Size
4KB
-
MD5
f60d8c2c63936bc83a31d55b91a9ed9a
-
SHA1
926bc5174afda5ae2a853f8afb34d560f8d0e304
-
SHA256
af37e07070bf2c79b04b27e1911a5bf45aa0ecab8224a51903cbce0f01826971
-
SHA512
94616cadf43049312fac160bd581f33fca7d70ba29d1c48eed2d4f14897b65a921ebfeabfe917ad145e4620d71f24de568b054b708e8b78620bfd0ffed915c72
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o6zRd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009cce4c74264c295b6172938a313b2b10c7ad6f82d4aa668bcbc999d51fb64726000000000e8000000002000020000000e1b36506c7a11d18f1ee513050ad741239e3c1cf99a5372fe71c53d91e9c7a8120000000d6e296db9be84a26c6b811367d9fce08b6f20d6fccecd86a986754e04f9e7feb40000000aaae6b4612751252427837687d33431a6193168486f1af5d547b43241e657e13e21b2ddad3af8ba64e8a46268a692fb3dd526d6751c2846f0e109ab9a58a78f0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B709BE51-7B3C-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1039408c490fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433430486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2692 2792 iexplore.exe 30 PID 2792 wrote to memory of 2692 2792 iexplore.exe 30 PID 2792 wrote to memory of 2692 2792 iexplore.exe 30 PID 2792 wrote to memory of 2692 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f60d8c2c63936bc83a31d55b91a9ed9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245602375f173407c39b1cf2341b677c
SHA1c37e5a8a0eac43d3a56fdb65186c0ceee2a54019
SHA25678605cc3880a6ed4388710b4dc68c51b26ff5bfb30d8e6a1660bbd6bbff3b6df
SHA512561e0adfe48f6f88e0bdf7930b61bf508befe87bf398e46267ef5798ed32ccb45688b9c845f282b1e3f86faa2e3e01ec006e03ad9c461408f80d0cd4cacc1d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dedf105bd1a500e915849133b21ccd07
SHA108ef4944a7bdc152e2b7c2f58193c16ee0a45e4f
SHA2566433f2fcb2374419262e1b4d48bc24d59938b575dd58d852c379bbdd69e644f5
SHA512b505f3398454551d2b8aa855949c520f09da155bbac2aa7741ef5251cc8220774f0189df27a6460bf9a7612bf444c74e317d093eed7d34bff0ab499867f6f801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82cf555c1c1160e7984a9738d882206
SHA1da299500361debb368293a989d8c644a2105d2a2
SHA25696d7a96c589151e6577523aff75a394028d68adb288ef5db261cca9f3c8bb0cf
SHA51286d55fc0f5b71bb4d057dbcf048bcd52f79d10d740eb7b3cb8158e346aa3368cfb1b0a54c1d5c9b0f61e769df9d37db60f68540728ba32c148fe521ed7c0c9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5626e8efbbefee84540e003e93eae09
SHA142e82d45cb0cbeecb3befed7a97335645cfdf3ef
SHA256f535f3a042a428b03ef4a8e2b62ddb66e9c8279d71f80b7da3ffc0bea29ec386
SHA512e72b01afd46a4f7f9731a97171e62c0a82ffbf5f4d02ca1e52244650ea0014ffe052e55b48e1a1d830dc6234b8dd3861ebb88780536411cddf3dfd4561806937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbab238e4c3e107d01ec37d1211081e
SHA1f92d88a6a0855df54e85bc84590c0f480ac9b211
SHA2566f3101bf95c258ecc227ed5a26e34a7e8f42f4a0780920732ad800b93c8a45f1
SHA512a85c113a2a8bafbf1ee0208909422f72988d431282ef6b527cd317188a0f937eff653ff8e12d73ba579557edc63afa1960fa49033e15ac3e2cddc55025178d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296424e9a6126895eb9fd41d2f6c332c
SHA1fc8d031590cde45500fd31a2657e114bab46a8ce
SHA256298e54455a2ed972b5fb57d2f08737b8b45e8fdd92ea573c03f642d42a0366c4
SHA51263ece7d21274d132c734e969cc6cf97330aa75122bf7809f3ea30ff168565ed25776d06972c0cca761a500f4ef77dc0faac29487b2b492b3a92c1ae6cadc9adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac61afa4dfc0556f913d5e888bf4a9c7
SHA18b0776cc8460ce4286278bf972fe8cdccfc92fd7
SHA25605b8e30f9e12e975bb20824778027644748fcc9f351bc52f896a5b50b7955a94
SHA512992808985f1e012011241003cb7d632eff75e94a6a17640a78b8cbb8ce0aaf7d8d3d06db259c153a5d1eb043c6a40c83d1af35f920cb503b2ba2854701a64cc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a1ae6c145870985635f9f4ecf56794
SHA1c90de55b380d87eeb88a02737c7147100edf8430
SHA256d6d46ba13768e8b3744259c4d2eee7068155fcab5d1e86e91c9499d3990ee2ac
SHA512307db0eff2a0e06b5eacfa857b12b6a3f2f215f38c67fa90fa8e79a697afb65d305211b903187f4d51893ea0f605314359ee7c6c41f7adc7a5f12e88e01d3cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677cbe7f4ce6377b7f0027ae58fb9047
SHA1a0a6287c08057ea6d111ac73f4b7bfa037ceddc8
SHA256f3c1202728dfce99f3741645ede9f343bb78f7885656b5739497498108239995
SHA512abcd65bce525a3a2c83269c59d16ca295a080a2e28b07476886eead17566a5b71f89a64f24614ea3ff6216300d35b534d0c2486b71b79fa46d2c525d2bc3cab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e365a21ba141ac1a40f7f8f0040f336
SHA1c1b55e5e7c39b44b97c8b2ebad0de777225f4ad2
SHA256a6423cc6530a68c15b539ec5b7d6c60b241ca026dd3f11d38112900516596b42
SHA5125ba6d78af0acf61ba6f1919d19fc8440be85cbda2e4f5b699777a796ac58feded13a7533f0dba21c1b6e11d61210f40ed455193affaaf76e76f76e6e279e69f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a269683d4d80b5c713263f2f8d9dedc6
SHA1f9fdc63a0823ae54c528d398cb31d78c361fa7f7
SHA25647b4a811d0dc83fc747c820f64a34b5cafb48de4e40d2129172bea66c7f3058a
SHA5128faecada51327daa8bcf0cbe3fc16417a1447238ff64c0f951a1844a707cc5dc7246bef8a0fc7f199aabfadc9c579f23191eaaf2d42f7544b4a4d8c6b770b966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54653f0521790af62596d633a355929ff
SHA1601bafeba401f7fcbe9651ec4171e48d39b1f02e
SHA2564c8207c2f850420189916c673f321218a74e2e8031685492fedb1d065f68a78a
SHA512c92a818f6d96903faad90569d9f406832616ec9af0e09540419f1911cdfa4e238d1c45b83c7cb8eb59f6b2de53b3a27e37274516273d088a748765bb53788291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584be9dca9ae7acf9f661d552ee6f708
SHA12307d726ce7cedf264285c87d87018a032a7e03f
SHA256513d2f95ec6a8a5d40f6d45cf7836dfd34a16cfff21fb0f2345df675404b2297
SHA512c5d9575ed1cdfa530ec1c2756f1c99f3e9c6c748a80c139377f51ff13f55fdaa7781addcc3795848052e27a463c705cf0d53083624a6244ae93f573d789ab0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c9cede01001c66c002246a142a2ee34
SHA13226d51899bb9cf46685908382f984471efb9ebf
SHA2562943ebb8b920a38b5cc4f82f924b9bf88f958bea1fc6d91a33db38b86883d4f2
SHA512da682c2231ff46b5aae58647ddaaf65c3302eeee0ad891b293b0630da9be757808787cb7069a7e36fcd9301cb2930a727976a19e02e0e74e37755ada64c73496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f439dcc622601b55fdbd241f3430fdb
SHA10a685a7e72825d3f6bfa283485c5cbef15be2461
SHA256bc4fdfd125f4cc9ee7c21993d398829400992d25d679314d09b49eb684c21b03
SHA5125bbecad4897a6c8e9ccdb86b19f628de95109a894c7071e4b0876c52dc959b8154fb1e771bc11f09832b90cd0aebd64c6ae9d3926d381ec064a204f2d1a3dd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf1033ae329c23c9cb47dc660cb28040
SHA1c15e89bf9255358eed037db2da9a07e3cc96446b
SHA256224cd62922b00cb17a5e88193c6cc0b60d419cf594ceee71d5b7b2bb31078f29
SHA512568429cbb83e850403fd297dc11bd7faa0efdc70fd400d9af541c0f44fed04e2bbd8a4f7f9e1b8992236f385d73b83419d0f9d02d6807c866c86dc911c079355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a608ac2eadbd177043f9771a45756b1
SHA1884bdbc7e7d35dac18d15950e58a2033368ec6b2
SHA256f26a9fe5ee7b143984f7a33b67d416c9e35dbe3842e399b1b5d6057f39554cce
SHA51230172a6d115a87322a9e2bf1addc4e3226b943d561391d8ec72e0c90001894036a10969751412bc556f6d56e345061a4751bd2877a7b34035cb9407a910f72f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d031497b41fbf4c4d0b2c763c1da49
SHA10202756e16ee0cb37cdabad1b878bec8d44e9c1c
SHA256d5f2890510c65e50c3308a25c5c26027bae9bdb5bb6406a20fc43fe702e2849f
SHA512ed5a500c406a0d6272480b5698bbb6c28a221afab5ee323b8b56b18282c61d3744aba2a6e18749c72ffa5379c73f46f026ec57e75cfb1685455bbff6c0aa6241
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b