Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
060de9620e1b0063665fcaa2d9a62f2b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
060de9620e1b0063665fcaa2d9a62f2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
060de9620e1b0063665fcaa2d9a62f2b_JaffaCakes118.html
-
Size
21KB
-
MD5
060de9620e1b0063665fcaa2d9a62f2b
-
SHA1
1e56adbe642f0c6009b251c483f1161cc2fdef6a
-
SHA256
a5348cc5d1e4636127ef10e9cb6e787daad804e0e0a5eaa5453482222683e47b
-
SHA512
2d6730abe37f20c332a62d1ab1f70c0f70654851ff198e1200000ab5f33f1d1584a9449efd60f664a84704da6b855442f5d7a541b8992aaa95e2070c4958ea48
-
SSDEEP
384:S4ITz60B2LHsRHWp3lselGlfCQqGrAyXVTcchSW1e5oRAGvwP5Ee:StTzlgcbrAchY5LGe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006976f104f8305615adb8ee6a3d7a8baf72a4f787b4346399c6523e9f6271a58c000000000e8000000002000020000000c42b6212979ddb873bf608e0e71fa8e42770b1bc6535493dfcafe9739a80ad8720000000f1512bbf7209c7145cc1e5bda9f72f7980b6881c05c5c5736e35677f64639b4340000000de99ea20e30efad287dd753bbc856660050d5371414bdcaf4c9f22bf9fd66773f339f561640049238ca004179d184701a4d5023ae48ce968b748e8d82be3fe6d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66FFA6E1-7FFB-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433952189" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04b6f560814db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2880 2232 iexplore.exe 28 PID 2232 wrote to memory of 2880 2232 iexplore.exe 28 PID 2232 wrote to memory of 2880 2232 iexplore.exe 28 PID 2232 wrote to memory of 2880 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\060de9620e1b0063665fcaa2d9a62f2b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffb801028eae8afdad15516c200a3b5
SHA1010a9faed9458836c0bd07f47521b31a6c601919
SHA25662885f8d2dca7c28d681755a733dd5115d68b89a71f7e8118c87fc0c9502c084
SHA512b0d10df02c77d27604e8aa3816c09fa784437528193e23543580584552d08f164bf749a2be85cefbed552f18d3f129e8f197b809189b62ddb9269fd741288136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0f7cb80cde40c6738f65c5e753de58
SHA168350e34341be94fc6dc7527fd8f973728f20c3b
SHA2560f8990d05ea72e1963066c79b5a5ed9f40e9e7c33bac1b3b071feaaccb30c014
SHA512ba2b6ed807b7592fcfbcbce7e971d40ecfc9b3eda0208a691cc2b24e24224b7ba0bb3c73bd9dc828c76e417e16caabe8610155bef076381aaed576ab0cfff7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532cbae8c8fb626a1cdca02ef2067f800
SHA1834f156ded97b9b6b167316e763901be0e35804e
SHA256a9585d3ef5b7d5bf1047df410407d08e47bff0c507d23bdcc9028fb2eaaa8e5d
SHA51282711d61bb9f3df9378c00fabd6ff9a898b75faee9d39f8851beb4dde70068e79c2d04bffe80963ab696d88a59b07487a29d421694e4129d637b68ff938a25f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2478f955f97a4be283d6f7258c788d
SHA133dbcb2f056ee380941a9a3cd66b897e45355e46
SHA256f3f3374e369300f5b8768d02ce8ecb2ca0c85b1ae504619ae35e41d907d20061
SHA512fe0b37928fbbf08e037bbf80409c5d46d74573638bc03a65d685ac6ee6e375d5d20c2f87c2928d1a70199f0e777a358c7c175cde45df688266df460a7092aa2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef4b863e6d935947632a1fc9ff46b01
SHA12a0c18d66b547cc3602bf08dfb19b0e82fa743ba
SHA256282a71c8ec4ca50fc4fd4a8bebb97f125dc717dcb419266690a6c918db457fc4
SHA512c4349039496c8c75ed3deb3ec9901ac305019cb89d66f803351b7eb5f91a05805738dfc47d1e873f97a5850853d668cf626e240331fcc111483baf6b35d8757c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591990aa204b0eebdc5a3a410a68fcf7
SHA1b896974cc45d6c58bf5bfdf24d61453eef12dfcb
SHA256d5ad4912c34b75ad7afc09da3366390f0834568b8433d65dda478d786798933f
SHA512a68ac8de236de725b70378052a3ae9b73db6a0c5e31e2a97937f3c6057fe5d4ffb6b1ee2a44f23c00049ac3138b50d5fd6448a53a27a4f191a9934a0745f2f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01d479273285f7cb44bb8c2026501c5
SHA15cc9dbc6a035940b61762fb05ce5eb45ef2bd6ad
SHA256accc2b8d9bde07a560dd696f1d6f0b8b19a38022c5d26a3a7d009fee9d8c8fa5
SHA512105c9dbeac28ac3caea6e0fb1839c3d6a2192c1250e645f1bf9dfb9fc96589af0fd61d44ec697a5690bb2c11f01dda6e780afc0cd4aa56c783c7fceae3c0daf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fed8e348844facdb575ecc973a70d47
SHA1c35dc7369e34a2fd15bdbe61fee3b79afceaf0bc
SHA256b8d816b9b72923bf7ff6a8501704082dfc1675e1f66afc60ec6f1dd59f44315f
SHA512b534b1c44a66a64d34ccff6c07e4eee3117f511ef834aaed16e1d37543d1ec9337eaeb96ead1f463aba65e47215bc9c9bf947833699a67c8766dcead378e0d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d0f7d2d659bed5a18626088dc28f15e
SHA118da47948055f16c47dd3d0d6d4bbac17b2ee5d1
SHA256adc02b00aef9bf43f073aa1df231ddac374f9320856cac7d2ffae1c067081c87
SHA512edcc2624eb42858ae98bb9d3753f31cd77a6f960b10f625acc4a7e9e2c608b9ce8203982f710818892f4a26a0feaf89619b8f8caf329457760e2479f1d1be55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c575441712b879da369c96a066664638
SHA1f79523b191b43479900dda58579bda82ee7be2e1
SHA256338ad8c5f62ffa8c8b0af8683802838f8689e7dd130351b77a07be97a00ad9e9
SHA512c2f5f9fe33d91e108a3b8abee761fb5a551db52843bc3944d720dd82af05a8f09d4b1dd1bd74fc64f23dbac6236226a2ad2788a7b29621ad88b116c31ceecf37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50998388e1f5df8b8205c1955754770cf
SHA1f4c0a90311397c785e2c53784174438f60c88dfd
SHA2561414bc08215e1de0e179d1a02dff4ad3632a9b6e3071f8a49c6137f5f8c0e71f
SHA512ec7c41f84eb8cf7da1a7f67f5020a21d7d617884c96f9eeff92c488bb343993addac1d7480548cc96cb1ed7ac427f2d2a92ee4c66af67956c43879e6ce64afc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa949944060367352a6367435e2ebdaa
SHA118ff0d4c1a597040667c56aca55d6a3b2e9e7c4f
SHA256ebb0bd25fb67aa4eb3f2ff73edf784f62b017337c4dfb73cdc27bacd0a95b505
SHA512b61cc9cb58210ff7580bdf32e301161a735860356e2d69e9a10bbd8cb42efd74f46cfeac51185a7f5fbfb86fc9067cf49d1b3cddeaf16c185117067c7cc5e45e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a33f0701e0704f05f0dd8f7349c4c6b
SHA1087f79714449cdec6ecf62cb6e890cdbb8bfba66
SHA2560621cc856bcf547d819b451f05870cd0f5b889e58556bf5b1b09bf3c4558f260
SHA512b804c82a696ce33a4c2d1c5820169c5888ce2427964a9743fdca8878b892b60eadbb1fb49a3a6e1f5c955484654610f9d5f284d8d19e99583fbe7a39d3a633ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54550130a6bf6f7e9c273bed6ccca5952
SHA17c316b8d5d7273925ab567119957a6b0666fcc1e
SHA256a5b673feed9c1fefea103653f32c4fa7417f6e5fdd32b5e58e8433026062b651
SHA51217692e32e1c003d2d243fa97b82bf1692bbded1f0fdaab07e120101124bdce4f0b59719202caf5e8bc0e149914e03a49271432d22ce7381ba9d7c9414d1c7658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b04c517684030e306be83f8105ec6f38
SHA12071b229989ad9272b73309bcf3c1736c52d9b51
SHA256c77867500d71efc6068a871f00f9ee07324311fe45987d4476281503999acf54
SHA512daf2347afe7029d270f148040c376dd2a46e1f6606e1f7a93b4758e50b3169f03307776720911069e8a1c3309b658418ace886d7f529da6732c718b4db95c1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ecb78cc370ad7069b08a1c005cb7c3
SHA1a9bf917ad6161617c2d64d57eb06ec83cca6c00d
SHA2562f159eb03044955c3783a26e27a4be115e7402a624d8c7f684adec709c757c06
SHA512dce5e72f39498cee77d92dc131ab4a6e609b8f0062ab0f474abe061f371abe594ca99c14ba971fb0933f8a10685581886918c9ee2ec897ed1086cef21b2b5ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9f55568feeeebf622428453545c0ad
SHA1a31697e89b3e363f3647d298ca7cf409b58c7c7e
SHA2565da9b3d92251d0ad4119d334eb5a52bd3eb31efb3b9388e2a12b5bb618a1a3d0
SHA5128f74de8e5a4bec72ec8d7f7d201487321ad674c18bf85967b7ffbcacb7237df07d345b680f90f974ac185815363f6dc88def284651aa6e6bf2492da14b111caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce702953b4f2d58b822ea4f9b75b85be
SHA13078edce4edae0cf43d0725328638870e43e82ae
SHA256809aa8ecee8dbfb8c802a4a205b2a32ca0adda3e5f832c1531e14f36f49bdee8
SHA5126d8a791e29d77d991a68d584ca0a72a9ed1b40a8b8552442dd5d772510bba0738a72223e7ebb83c50662f07bdf5e2c6129df9cf1de207076dcaa926665730b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96621f999c3cc731429ee9ed7e1a418
SHA1dc52ffa3919ef066376bfcf0481b2c1870e8f62a
SHA256f4214c2a384c45b10a7804744d927fd85b6630f6474df435e080c8bf01319819
SHA512f9257abcd5c6bea54aaf522b770dcdabc8d70c7f7ca5e087654ee3c52df71a5a92d84232db6a3aa405be4f5abb599b0efadf336afda46373c96aca21a4d70995
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b