Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e289397d996559c2dea3537aa046330a.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e289397d996559c2dea3537aa046330a.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e289397d996559c2dea3537aa046330a.html
-
Size
6KB
-
MD5
e289397d996559c2dea3537aa046330a
-
SHA1
51794816b004dba01abb2d2446add1b1a1ddcaaf
-
SHA256
4e7e10fbf1d13ed360140883daff2a401360157c2117983d44c0628b68b32af7
-
SHA512
5029b61338cd4863696b64d09c69edcd777c160b0623721c24b11649f5032e2d02e7613615db1d664b9101a5f12cb92ce0e3f2900c878f7ab27fcf5d01f8fafb
-
SSDEEP
96:uzVs+ux7M6LLY1k9o84d12ef7CSTUkZcEZ7ru7f:csz7M6AYS/Xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525977" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D4D2621-D70E-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b02e01e1a0ea5f4db81d9d92f73bf2e300000000020000000000106600000001000020000000041d62dfcffb486c91cc12a49753081bb01eff57df1167df83509c33ae601a63000000000e8000000002000020000000cf7bdfe6ffaf40d671872e67bc54f8acd70d7a70ee1e5bd697360eaf04df53852000000014d3abf3dd5d026bb3370e11adca8c5b93e661ddda2f6ecfb1574dee3ec5ce3540000000fcd71a7b3d28667ab751f35d0f39516d42459966674c1a2a231fe123ec6dd0200e8931a254f8469e6372f051a6cf17927a03aa64e2fe4fc3731d33b96aea6250 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bd4ef21a6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE 1732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1732 2240 iexplore.exe 28 PID 2240 wrote to memory of 1732 2240 iexplore.exe 28 PID 2240 wrote to memory of 1732 2240 iexplore.exe 28 PID 2240 wrote to memory of 1732 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e289397d996559c2dea3537aa046330a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4e11abb34fb2cbfa8f6ecacbcca79e
SHA1d9b6cdafa780a183f4c31ff52d746d39c5b05e8c
SHA256403353446ab4a8230a7ae6fe0445ed42b9d0c79d68d98966610b50d6d04fd15f
SHA512782248dbe207e0fa91a7f59ed9be74af9b697de52d64405fcf5b502478f9f4b53bcb12ce194d284faa76ef1958a57c2c4ab45917e7d478210ee9b14990845660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543090c83875467844f330e1100372252
SHA1cc778c006f7de969715938f36bed51922ea7a3ef
SHA25624dedb1c53fda757623b740c3d2624426ea104f234d0786248bb31901c89ab65
SHA512ac6175692808ebb32ba073550acfe826b91942a67b83f6bc9991f7f4163df2f4e9767fe2943141ef527b8d0b5cdf0c4fa76e6de1f493f969c81e66910ba76cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f6f4895004045f85ccba81de5d9886
SHA1ddc257ccaea857d2fe702016b6de9416a3f04588
SHA256ee9ab01ee0e983acf54b6451368ad68540b0f3ad6efe4d0187281a4899948bfa
SHA512fd1d4f5705589b6958eef16ea798c0e05f02f100c2061c17be2cf695ad555ca565d7b316bbd676b0776c4f5a84db44c804a62a1dfcded138652840cf53797964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6376291f5507fca7f7d1eb0f6bd74af
SHA1c6937656b83790198bb605c0b6cb7f00e207c0d9
SHA256c4476bcd079fb88664cf351950c6c4d758e568d9fd8a64e1889c2b49cc513b9c
SHA512c8317b0d9669ec0f7b0c93c94e10134731ce6dfa75a8f83f6b837541d05670b059a0857055a8a67fac224e69c688a341bb36a03713396923d0debaba9dfa28a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc837b82f1dd45286e1952e57793370
SHA1888ece2fc8304e3923c67c7372807bc2ac2e613d
SHA25608805dccb8f8f1116f575b1abdb865b0aa5d6edc14b26ed44493c43d8a02e40d
SHA512c8177dedcab516c9331bae3dd8d9d3791073808b6bb25ec8158ad229ee689343351230999833b65badf77d8ea259d475db771a074e5831a11a75c0b4e4ab6f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371aadcd6193ace4a4aca3d11cfc6e72
SHA1fc90ad8ab63d3730043b1ee58a022207187a7d40
SHA256fd4d2eb0d4b30ee0195afa3ed861ed3e29a90cb068f368bf581f4c82ffb0f225
SHA51266607e8044bf6b2af539ac85f856c85a1ac60fb7095b101b81044747dac5c557b688a38e9ff3ef42d121e74ab7f5e49212cca820b00a3c92fb26ff276c583d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bd4ba4a4a2498699d6f9e64bfa4033
SHA1dfbaaec5cfc540b6f3a7e8becf10034bac221a35
SHA256d0858ba533f3b73fc8b7640966759eb3c65ecdb423e1920ee54a86d411b5a3a7
SHA51284bbba73a4c1522a72653c88201f64e4a251674ccdf10ce41cd742a3aa7520bd094a8838b06466e547a045e3263cb997601484b242fe08cff93714309d9d7d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bde95cadd65c57ef623e03046ca7c7a9
SHA1e15d8f4a3807d3be85d765cf979a94ddd6ff96db
SHA2564b1776e4d20738bf253e995e5af7a4bc0892315c385efa0db3da02b8a63a45f3
SHA5129fe0137279c940d6c2364a4d986017d43da41f8fc59a3a8f58ee4e6e58cbce8826a7c45587119d11bcf99bb64925f5874e35c9294ea53f38988db7d20a7315fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721f7f18689bb0e4af60de015cb1b201
SHA1ef7dd86f3519d3f3c429df960b234064ff57eba9
SHA25668b2ec8f6d8714ef094979329653eb70d880a97e92a1ac75fb84a4b9ba2bac00
SHA5129aecf4c05b50658449885d87e5653cab9a9b2bc6c2c262f15a2e8d2c2191acf1704ec5664943b448bc2ac679d0cc7a35e336475b0713cd1a8827b9d8dab82fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf79316f08591765ac156cf0666f57f2
SHA116a5b302d3dabb4276557f90e9ed1f3ebf9f4199
SHA256cdcecd931d0d353acbdc5d435b614570b5f83c4bf3a3c44f59ab02adf69464b8
SHA5129d0eca8955fb194269f721c779bc2dd1a9f832bf8e31b40939d809ea181a0c2ab90922d7bab8ec402ec2b280498a928671b283dbb3f579c28fb711753ec5577a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389f4ddb83b8273ba08cc3a20b163935
SHA184f7a4e4669b0fa425899d65747133d305e4aaad
SHA256c45c29441797465d55354342736bd1bdb20b2eabd6e78935dd40607e94d8fccb
SHA512d88faf26fb0df1ee075af36914cc54cc660ab5cdf1aaa5fad22ce8d969907845ca598d800d923ce9b7c9c52ca8688015de20c7c9b85978dd8cbaa96323fe932f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdd8a80e221eebdcea4792f1b823326
SHA1c99f69d9fd72215de2d6a6804007fa5404f94a08
SHA2568f8ecaa45519b0fcc94ad462dd0b55865f6c9d5325e134ba08e2d3b2d22d5453
SHA5127d86c9b3a0b79119da903bc2339b9e3f759cae397c9b29d5b0556983914783689ceaaedb1392c94c0cb33bd684f71be8f2945a11c9dced51766966114bf269b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531d0ef2153cd572712872da764f1b748
SHA186f5ccc93e55d8de57881649b2dd21ab3ca86bb7
SHA256598e7d4d1d444264079441193e33869b1f110538730cd8f80f0f7f4204135120
SHA5127cc5833b5c36ceaad63bd36f9b5375f21e2f75c8ecc97fbfb8b9741e8e4fa516b8384103e6870a4ca64f8dafa9042452e0b9a4f37437ec4681e8e66f2781604e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb39acc44cb223c520a25f18a5b1d0ce
SHA159ac242bcd33ffd227339b63872056ed739cf839
SHA256b80fab22fce4591aa86de5341f142b779252b7846fde02eda3bbb498269a3768
SHA5123c33c6b94a6de8ca9f3d74ea70f87e5d845f99872a93f45695c49f5ceb16da51696a84b0320ec7a3ab934732edd7efb18a2f149656b3e88728b3df9dde5e407e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54627b85ca44a8f4f3f69a7531f3e03f2
SHA1e95aaec81a0c8fcab7df9a281049c331ef9111c9
SHA2561de6b023e0efd423b5eef228168dc3e5676820e677058a0b3e1e2d51b353badc
SHA5122676554a6c345d5a7c5c4022be2b670eaf3a6a595cda610b7beb0ced9148ec29f8fe4dc1ff9e5b1a4b3646dc1741fb0a77463114cdeddd9e880abf025d5d9236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df00dd9fb1c49302d38a7fbe63b93cd0
SHA1c73b5a6739be059f3c7cacac5191b173212e5556
SHA256f259e55f3978f21fe3d92e5eb33a4ebf04116a522165e3aa020e17ae9ea14ea3
SHA512dbb84e7d5a3a3153e6d0bf9f45c9dd077406e98afb3183c96668cd2800941757b1c6ff4235dbfec313afc4af1f7a1f2f56f317dd350db010ca99f71d5f5d3f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570220fd1da823aa0068443acb04a71c5
SHA1ed3b5f2cfdbd8c5f4b120603770a6f7f070d4220
SHA256e8d550198cd6838f7820bf3798a7bae5809a90757ce050c3ddc59af2e1670071
SHA5128094e575da92b161118088f4f02f4d3c61d7bbc492b686452a7ac246e45c95ffddf5375b98e093b702b864e75acfb0d2c8a275439e00263229af8778a344585e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46bab3ffbaa95cbf070ed7240b14a1b
SHA1674fe4062cc73b3870b7780562c54c1aad2cabcd
SHA2565de230d1c7b0c30512e7af23a12dba65193bd9e7f7d5fd91110f92268128c9a6
SHA5121c73ee75ecde68baf9aea43695ed55f15e1ec86db0dc33aa877276e1de9e2d9ad1d58cb90c491730e390db36cd304af950d1ce345ed1a8469c174dedff920bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3d5e9ea3ac2127c828c0101f9c233a
SHA1cdc7c484b95c55d68339dc076703c1d59a89e4ec
SHA25620400231801d170f26dfad0cda805660adf78f4d8d553eb9a65218996f7f8cba
SHA512a757c37401b7412ec2644adefb47e602206e8424c449072e86dcda02f26d8dc3ba7dcba863d7105bd140db3967bf5a8b5a68c0a183fb4ca64c65a23094620d32
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b