Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 19:32
Behavioral task
behavioral1
Sample
JaffaCakes118_3665b4b93e023e691284c9a548aa5574.html
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_3665b4b93e023e691284c9a548aa5574.html
-
Size
19KB
-
MD5
3665b4b93e023e691284c9a548aa5574
-
SHA1
f9fd042d0532f327840ab29c8b5cecf34927a584
-
SHA256
70a2e21d0e3aeac3788a12936ecd65a1ebc4451d3050b6b0b27426a168c2f96c
-
SHA512
de11d76313c3bbe18e3dfdd8f19bb7c348e9f13adf7914ef0b77ea9f8e46e7c6e3a2b3f02dad6fb2802d39a1232d57fafdf59efd97af0aabd76762952833cdd9
-
SSDEEP
384:zBqtZRsVuEc+6bkuOENbsCul0LgIssbQbDwiTkBFV1aG/a1B7rl99Ye/ZGr1h:ItZRsV2+6bkPENbBJZYDN4n+Gy1Jl3Y/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442353797" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008293182d45ad174881d7af25dd34564e0000000002000000000010660000000100002000000048c82d9c065eec83601b3990b508b05700a7f4556479cc980bdba9cf50d37afe000000000e80000000020000200000009ee0d47cf3c03d3f24f95330c7cd64e78c54ea8fd517390c5958be94bfcb47782000000067fd3f3bb459d5588cc546c8ac2eb49ac6cc462b5506423515a4145f550451ad4000000017bba1e9f90a0a6aea0c5794a96f58c8385b3de0cfd1a17d04489468861ca1cca655a9754893e5940dcc2c4b884298f5fba4c55759390ec2fb84d0b5e1b15544 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5078e4b27160db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB0AD3F1-CC64-11EF-85B7-D6CBE06212A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2200 2432 iexplore.exe 30 PID 2432 wrote to memory of 2200 2432 iexplore.exe 30 PID 2432 wrote to memory of 2200 2432 iexplore.exe 30 PID 2432 wrote to memory of 2200 2432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3665b4b93e023e691284c9a548aa5574.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b314348000f03cd0b9ea2c731f477768
SHA18c76f8bbd04e3dc6a452b03a9c2f7ef3e07202ba
SHA2569c16a77d268d5527a9220a0c191c537ada5f706ec81caaf34fda3d087353dbd8
SHA512df2600f4e7534594b753a1e2a1115f479e93c96d870007890fb5f81e0420b98ac9b54f2ca9cc98c1f96be023e843ea5b441c6188ae26cbff24ee288a0df39e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806e0985489587e33980c7086ec851fd
SHA1054afdcf09b9f0e4928b6beaa30a7d7c6854f698
SHA25661fcf3acdf57c0dafd38872c70d58ada79206cea3276ffe2b3bbb5b9d3cc9d5e
SHA5126c95737de3049a494e4e5a7df8ffc62d4e69ce7eec25ce8ccc741c3669f1c793fe80444596a1a3c1b5f956cce3750fbfe41896898062ef73de8e9a487331d19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205d50d3fc12e8a45ba3db33192d4bad
SHA190b90ff81be20b8a7153d54a4b92a56f87295426
SHA256642d460eb1609f4ead03077375d1eb0a6fea9f33e0339f5519a1aa5d9b817281
SHA5127ede93f3c2dc3a2089e2357c7442e9961aa361597bde8cf0054dde40a26e54f210ac61f2028c391bb9f0c90d56de050ee0d4a14f448388abdcff0c498b85db82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d2905aac6053731d6944a5082da6ba
SHA1b72351d024987b56e171a5af3915e3f80598158f
SHA2568f946187909f4d3ea9fd28e9c352ebd68247384726730e150c8d2afb47dc33ef
SHA5121169d002480ef45a29309f3ae8b0b22acf3f577000339d650e814c33775ca11d197e147052b7d5320ce2ebb3a73e5cac362ab99ded35de7303514565098f6c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2733b4bb552fd9c7fcfa219683f163
SHA14bf45700fb96b94365447de073638b1c09e4e4c2
SHA256409870ca7139371f2d77b9568e27a53c5ae917fdfabbe0f37e367a1359568ef0
SHA51241426f0f38a6d07be4ed8d365c6ba985c573fe247e1f47cb95a1bef38781bdd5fa5f64cbfe62e6499dfcd815da52beecf05fb908add972989932ae54e342ad4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c612c87932a15200192a6c0459aa32
SHA1baf4e82cdde04a4f9bb85e40f3b6bae42b530c93
SHA2569f5d1e3c72b2123b1addc9b5882d677dd22eb710254b91af8f91d49acf02c10b
SHA512ed9f8924ed9d1149c419b681b870af7f081e3ec6e704c488fba9925db4286a0e0924b24a9a578837bd3c00ed44ac5b69db99167cbdf0d0b85f0120c62489d1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ec7a1121d9474ef8871209da4f0868
SHA1af889fb2fa2d63fff31fca92ab441d6c5d130e14
SHA256e0d59e9a87b863d3b9178c4c92178f8637d2569bac2e1655ef7b070de85fc8d1
SHA5121c198704c8c37a854867efa6fada22036858db6af4930a2e81633de0a5961c72efa174b352859bab77025d0e105affd870327dc05b52fd1cd2ab704629bb3759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836fdc2d8e46cf7be930b10ef2a897c0
SHA1ec2016e9d5187664fc21807ca68080e5135dac7c
SHA25619bfcb051c3260af979e1c8285e1d443cc7fe95b74491cf4001b525ef3675577
SHA51284512aff1e17855091bef25600b56265b17c6e41a6ddb065005ef8f6349fba605ffe6208212ea680519ee4a3ec31d6dae7e63c79be040f489dae3d43ed9450a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7f97f000495ac61e4ccdaa04c685d2
SHA18cd35bbec27cadd07f6276899d599460c323d63e
SHA256ad29d40ec6157b90f5309b581cc6a046019434356a507dd0cfa702be1bb1eee1
SHA51215be284c28e1bf448c2f52469624df2a47f91a44a5bc9f645af23915d7186c79dd45b62dd9abb2bcd0ea09f54ee34ac58c6939bdfae3707e0464a018916c8bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53812e92971cd16bddd171025bfb04c2d
SHA1784639c0f2eaf277d2e33a08e8b0de048e961d74
SHA25625a1ee10126ce435a0855f765bcc1273a8888f6cf696a9b3c77d35b2e940e24e
SHA512d0fa4a6e8037927cf478b8e828a5bf3a745833e8bce2d8bf8041e970c5b1b45a21b940db2c2bbac7422146bc0749c9460d7603a83f4193e157b1540b52b154ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fa5ec51f789ed3591da14aa795b5cf
SHA1056e5cb9ac0a52ca27b50512624d3935b0edf8ec
SHA2567a254ae88487301878b29bee416ab3db87db160263c4f5ec3af0e514b638e8d6
SHA512f3865a02eb1a8eff4b4de8dec1ea95c1f727f3729aea59780a51b71f61f62a80cce4a8cac390456db2c14ee9fa78bafc889342761c3198c693d9e5cb97348b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778dc6a029072c710fbbdc0fae3507ec
SHA1eeec68d297b79100d0eb39379ec449935fd0dabd
SHA256dd4c5bef653d982b3a242087fee1034e66dc09013f14675da0369ca4822f7bbf
SHA51238ec4b28331533d0e733256c8c8a6149ab1fafedf7509e159a79d93c702e136cf71c48d9e7e90b39e93aa4cafb2b9988a264f5e0cdbaa4efacd7cc02ee4e1c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83d0fcc749c40bfbb5323df4a5c2db5
SHA109e1f1215e6930353f9da05c6aef712fd90fcdc3
SHA2569dcf440a5228e9b1ebdd92dd708fbdca13312e40b5fff4947351394f877a5ec3
SHA512c874ded72cb487edf098fc26bedc06a5ccd8626c5e27d3d3ab11e26779b8cf917015767bf5682c51f484d5860737b687b03d4518b1a2ba6b5af6e56c99607447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f7e283c050d01023776ab071bb38f0
SHA1c0088df0dc26d2366931576c32328b48967ce669
SHA256c7d55812f7df636e9aad4011d88934b588bcc060b74912eaa19a53d9bc92ddbd
SHA512886a77f8e8bae7d741e9873a6f96e1062b1c8ba72421b39b06f008048dd5f6b8c3f8a6eeed01506428ce925100c082366ead82df8735078dffa079777632f607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333b30213818f33e5596580947f13e53
SHA1167bbf66161ae9f7551879d5db557551be493efe
SHA256c06560657af54dd13b883297b540f6f601aed462627108765a6340e693b58396
SHA512de5950ad106dced0a92f75a13cac1c6a263380ced40f00c2768e4ed2548ae219a6ab9727e299a30eb8b87e55a39bd3731151585b8f64bb1528ad91f6561e04fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f1668e749dc6765ff1f7688dce5de1
SHA108745f4063601ac1e0d8bef838dc44c52f06f246
SHA256307077ef106ebc742f82ce2c6e139c076cd9898a642b7812076e00f2fb73864a
SHA512da14ee8f72d32459edc0553681927cd0da6bbe494f5e11a69828a19c0919cafae52345b67457de858097170d4b64842b5b231c29c48e51b7fe68872fa9e938d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d06e94c1ebf1d01e3750c4dc3db5efa
SHA1730228b49f78a512567cd04b508ca5ab798352dd
SHA256705eca508154b5e464489ea46ca995a536bd8e6cccbf52f790f8fb3fb1ea65df
SHA512ce0a147ded29336861b58d1b93610dd33c37c4f6b9e320bce3ba012ddf1e0f418c1ff6085057754d91838543f097f058121bfc77ca38bccbeabc4e3bd02b2271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD529832184e91d5c9360b31a801e394081
SHA1c18c82818dec19188d23c03e02749f0283dab4d9
SHA256831e367ab3d2d03c30d7d3248b8633b0cbe5ea248bd7cbd308f52ddd21220ed6
SHA5121d94f600f40e0e204cc83062d0c1b2be973d6ca7ea60f4e158e112782d8b00ed51f9b8472e6b3e8c20272ba31e592964c82c6cdf29914de7a2a5b6f9875d138d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b