Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
f60fceb133e0db4d4fc6e3b8231ce203_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f60fceb133e0db4d4fc6e3b8231ce203_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f60fceb133e0db4d4fc6e3b8231ce203_JaffaCakes118.html
-
Size
1KB
-
MD5
f60fceb133e0db4d4fc6e3b8231ce203
-
SHA1
b3f8e3f9922fe82baead0f89cfa9c04ae52452f9
-
SHA256
b703e588c80f2d057a7f4b8208481fd978399b9518398076b3a55341d57af6fd
-
SHA512
9478fca5628328ace8cdca6ff194004b2030650d03f6a16ac879e6cc2592b339a9f387eca53b44dc707b9a525d8c13f01c404dbf73243f7484799fbd45fe6388
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0afd0714a0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433430870" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000d78bed47b8163d7220d0e922ca018f28cad28597ba75fcf59c5bfd3b7c3db319000000000e8000000002000020000000faa9ca63a44c0e09e63f537564e2c62d513e8b0fd8abddfde1bf0b9274dedcfa20000000075d0d60440142a51edc990dcaae296a855377bd44a3873e39e9477540583ce7400000003eac91295f0cd6a09b88acf5986a70e43c5c759503843391633dd7739b78bb0add6b12fd7ebca5ec033682fba0edb2ad3d0b44a5d3f89673c8d56dfd2f8474d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C245901-7B3D-11EF-9319-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2808 2124 iexplore.exe 30 PID 2124 wrote to memory of 2808 2124 iexplore.exe 30 PID 2124 wrote to memory of 2808 2124 iexplore.exe 30 PID 2124 wrote to memory of 2808 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f60fceb133e0db4d4fc6e3b8231ce203_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1aa2b3d7fd9dae70d3263f2b129c409
SHA1faf09f74b0b8834af21a17e68032c47d60d72a21
SHA256c8c48d83bcb864b1c3a5bdb1fe556cdf3cb9effbec5c97eae23c1a9bfaead9e5
SHA512701b6d9915804821152f7fb4d69b874e8c5b880ed2b67f86974f5b7cdc8a92c5403a619acb83d2513abcb97beac33cc4f2a77f1839d833da6ed46715c893ed36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec50c5647bc269ef6985bb9e5659d9a1
SHA14eff1ec4fa4b3ed163154084b91662aaaea20108
SHA2563ff9393186501bb50bd22003256c800cbfd471f3fd3cbdae10bb4fffa5638d5e
SHA512362b0fd4360b56155aa64972dfd93eb7c94cbb3d0f8001b6dc92f97d482a8c2b1f7a042b8bd59811316fa0ee14a53e26d0d99f97d05a536e270cf49c3feb1460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef1de9a04b39c447b8869aeb158a676
SHA15ac7f97e4fe4ee49ce8d2b748b88d228ef504fd9
SHA256d281b6e2c33a86f7aad1aa4b388185764bc35eccd0f76790ae99cdb65c2d05ba
SHA512d48d889fced232c552ee75a1934eec7d9e61805ec23afb3e04dd0c1e7e686158ceb17915ec004c0565869ed4936aea5946aefa2a4c7d7abf2e93fb795d793d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22546098f506f0ccbee083bc13f0876
SHA176976c3579fdf36b7433d5e54941c062152dae59
SHA256e16c9bb872c3d9c67eeee3fe0bb51f6aed1eb9eb8756506eed0f4c8acc0d96af
SHA512377a01a340c024400f9191d8abf6d7b831e55356595e8685b375977bb53aaeaad5acb5cd0720a579f772124718fae250e2739f3ba6718b77ad2686305a40e03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47955876af3f80845effa3f43804e50
SHA1724d5e4210487d71f08f4a02c196bcc75d2fcaa0
SHA256ce129f0aa074ef9c6ae63839078d47c4a3215861505a313b016a825f9523612f
SHA512520c910d01a53d6b5a52dc172c9f37ed531d83bb25cbd3e9c2a62806be2d8aa95e5ac165979b5424f99091342727ff98c4dae22cc6cf868c6995ac88e2bc38ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca53b3bf9eb7774a4eeaf249e5a44fc
SHA13a47d3e77c0a787845fa0a405c6f26bc7480d31d
SHA256094a333a4e068dee3a65de8d80128d665d39d4eedbe02efa27273cc497a7a763
SHA5126ae50c15f3f026afb4bd5cce4d08531e2cbd7928ca27b7e2b5b7bdb4b707a8897d950deae514ff1bfb56da1b5cc092b2dd0f2de271164a6f0fc22baead993abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a453a6fcb404571896c732ef515ebc9
SHA1167360ff25bd8ef074715ed66526518d99f5f130
SHA2560cef6b9578c529b9a73b0e40e8aa7018852f1e8114c54a9b0fb9e257111134f9
SHA51268844c1fa62aec93b476fe54b07ac5b0bb293126821703263b4b79940af029917d8bd1f516359d1d0368644cc2b790783363b84e58f1620f2aac474dca17c26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb9e78c9314ae6d0827f0256e10da1b
SHA1d81c4b8d58370cbd5ce0d2e4d3565604574f7f66
SHA25644c74fa20ddbfaa351d26af3d75dbae624eb2a6930e546ae000ce8786c5d7c03
SHA512b78216a1de4564565a2758286292ca1b186106984e8926eb13510b790a15e8c5ecb6d2b9020c1134cee3b91d6ad4960128329cdc1871c0967b3238998a12d395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a784b00c625c889717d37cb5abb3a37
SHA11d3c4eb5e08c748fa43f16c538b3d56811bd14e6
SHA2565b874de8c41241a436abdab683f52d4738f1f808e8d55f05d29fba433877728f
SHA5128ebbd7169af0743fafa7d03d04dee64623af84c606b6318d6ab4a84cfe778df2b26b744ee327bd666dc49f176da4828628a41daa1e0a2d4663bbcf9c30d36ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d58be9194fb395f0050091a3eb4142
SHA18da0d8b53bcf015b8022a3f7787b660e9428584f
SHA256f09c21a0e5a9e47f4f0627fcc5966df33051df555301056b35255fec02338a29
SHA512d2077927620120e08ada637a6bcb1c2b1859f2a948af848435684832d0131d31a1dcff80ad8cb5909457a88bb1c87c9ea36de862362693ba31a74f6453fe5c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc36a3da660db7060592a1a54cd622c
SHA17607f086b7951ea81536bb525747915e471ba820
SHA2564b1cf43ee9d4641ba4c72b8afaa7c06d7d08211ae4f0d120c3b676a9e5ec3eb4
SHA5120c25475a553cab5b093d69c4a518a4a087835c9a984b6f286068756baa0cda81740750bbe33580992fc31e02aba9b1a9128a1a71b3e487af94f611996ae98848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500b5d82b9f4368266381c318b085c87c
SHA11787508f7ff374cf86b877766c3482511ca34263
SHA2560a4cfddd818c135d62044f186009343c0c513d1a49b840a00d6c84f4908120cf
SHA51200c33dd438afdbfb11063815063d082e6eee7f16f0ba7d7af2fcf36700c6ec4181562cead390abe423c764ab0c37bb067ed07f7330facec8adf212ddae18c39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8c48c95b4a5af77686c926114d0d6a
SHA1def29c0b4e3d4863ce2edc186020b1d26271aa7d
SHA256b1582e4ed0322f9bcdd9a52560f46daf33abf73ff7e3d853f2f681296f9a0a08
SHA512b691eb14090015b8edf83132c7f2363d19025fff984d87d0af863c49c1fe7644134f284ec0e11cde1cd6a463722fe19b80b22edd705ff4766d09379ce69e835f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5944a485b8f0793441ac4a49250a390b4
SHA195bce6ef6fcca6fe8965a81ba015c82de0551736
SHA2564885f3265c6020127bb7f88754c47b21f9bbc7f70016461afb0d98b5e59585f9
SHA512b2d3edd469cf998099811b9bb15e06745a19eedb5cf751a639203e56bc9185a099cb8057ccb144d715d25ab97ed103767725a5445765860656b9eae96043f7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fd6f51477921a16dda36dec3e4a20c
SHA175c1baf8c1cb5007457b6d07bd301cfec9fe8e5e
SHA2560da825c548e9d8a55785a7175592770bf0734a29fefe761b7655a08bc5bf741b
SHA512ad8e2c8bd77691d3bb23cfd54504097c45d236a4ab370291a3e7ed414ed593d25640da97a7c2ffcd505066ce549239a78193cbda52d4f49d64676c6c43d60dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58195e2e0babf1b2fddf4cb0c113a3cf1
SHA157f4e1200b4d740472c10051a580fc2faf25e61f
SHA256b8ccd469090afcb1a712a5c21a171f1f6b765d4c1563d6b284700dec0af95a5e
SHA512111a5036354497b0d1f68930e55c6fc1bb32a1cc960d4e513c5e998b389ca6fca3c72fca4c9dda78fd07a9763704dc4a0e1c327ba2687e202606d63732bd18be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548b974a9fdf79113793c0b8ff83c3a6
SHA1624137e0af211d28228853270a20a8b0fc8aa942
SHA256e8a0a72edd15fad63693b05774de8a86e424ee467bc9278de1986022e3935657
SHA512ec072dbd8b29195bca14a040228bd4d639391e9a456f352563d738a4d8272762cceebf27840bab647f670cea4f4b35d618561bc6691cdb24dcb0145a3f0f9f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b05cf1bde081bdfc20c93f73821fa0c
SHA11a1cf1d2d693d5ad824e11fa8cad5ede2984b12d
SHA25613c1b83f17e4c00e43aa6fd24f4c931de66060a904adbcd945c3f112baaaab46
SHA512f105cd54e60113497093584d19d3e36d927ef3557f9c0328029da2b8ad1326f031c2af9b1bc210bd85097fcdd883ea4a2767ef46507638d7758e68ee15094e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc3dba615214ba5af16d057f1aaba8e
SHA18f6f3858589628d43d372be522a67e3de90afcfa
SHA256849fa19171b3d0c4fa544d1cf0a1ee094ac38944b4b24c370348966b9d6ffdb7
SHA51212d964ad33e8ac02a94cd47fdcd3368e398f4028f77274ffc15115bbbcc228e8deb479c9dd2dbfd760ebd7a98ca77311e49ddb9bd9dfd92b4973fcce2253ecaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773a12c24a3d22588a050ca2fcc96d3e
SHA117ac0465710099ee628413a6f95e287b060c1a4f
SHA256381172439d6bebe1b1310271672cddbbbe19595470917145abee2971a7028e32
SHA5125eaaef9fdba5751499e28a3aef410900e5c8169a3b1b305fbcab705056e8c4e5fd13ba64d2d6fa27ed62afa350b9a49f754b66df90f856f86cc1e320cdddbb17
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b