Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e285059ce9f4aeda0df1a94e9622c614.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e285059ce9f4aeda0df1a94e9622c614.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e285059ce9f4aeda0df1a94e9622c614.html
-
Size
32KB
-
MD5
e285059ce9f4aeda0df1a94e9622c614
-
SHA1
6f84129996fb8cabed9c2af435a6a1f473004f26
-
SHA256
69c1b9f8086f720170b0e1c7295f9e450f03df088aee6c0b5941df1118be4980
-
SHA512
0842c2e00bc8167176642441bd5d20225f8220128cee6055936ef9891175e1c2d14fed797ebc6f380e8dc4c7cc12f242d458d2543ccf9aa8a385b0b5edd7def1
-
SSDEEP
768:Zcd9QZBC7mOdM0qpC5I9nC46G9E+vF5Z9SaufyPd:gQZBCCOdi0IxC1G++vF5Z9S9fyPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525909" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d24bca1a6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4BFC551-D70D-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002fbfd83352391345b15be99986d21ab400000000020000000000106600000001000020000000d7887db816e7da11e75aec12352fb1a973feb067d4b371af77de53b6a3a6aa1a000000000e80000000020000200000002e5b7cbae0b81ad867253dad08735b81fd65ac9dfc4cafc02c8f7aa5202fad7d200000002f2fabd11b855db613a3c9fbcdfde0461a11ca3e1b8c6dde2772c0fcc9aeff5d400000000a35b58dd2b2b086ca4c1941aaf289c2c9c68500f1694ad8d1b1ccdaf6378e08aa09774767651c9f45553cbcd174ecd3e9d21cb8b829c226c10aed64b180ecaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1032 2400 iexplore.exe 31 PID 2400 wrote to memory of 1032 2400 iexplore.exe 31 PID 2400 wrote to memory of 1032 2400 iexplore.exe 31 PID 2400 wrote to memory of 1032 2400 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e285059ce9f4aeda0df1a94e9622c614.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb67a64e03c8199497b23d45ace5fc3f
SHA139a34642a4c84567b1e158fa3d671ff1d3974f5b
SHA256fe47d1d386d623835ac63d6e589ed3ac5c27f8c153266472e6ce0e7029b34ad9
SHA51275a1333d8469cb2dd9d5329baaf784c3a354b8e96ec0c8af6945631cd78a5deaf6404474e62dfa995ed8958fdde5c7ab7be94e4551ce3a413fcaa35be56b390b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546caa4c779b96fdbc475069f3a731e4f
SHA1de611a1780cb73ae0ca23d32ff7aee63e93a70e8
SHA25634cd533eb05240f1610b7099dd017ad2d9788a66b12a18d62e291e4fb3241126
SHA512ad36cd04bace9242aa40c72457c16783ca36ace60db6ecd8f80ef61bc062fc69cdd77e0442c317ee1ee1d0a595d59817646e9a80711d4802d3fe699c16012f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2ed8f0f01608e52145d28b01efd5a8
SHA157abf6c2eea80a449185bb46130281195361cf91
SHA2569bd105e769e2cfb2ab394665c216d9f272c0561d0d45ab7b6ec62879ff2284a3
SHA51230cdb0231225ba54747c3003d2b85c904286faa3c54663369231460500815f06818a8223e7fa61272e5ff0a407b73550625388f9b6557aefdc608c0db83f61ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53747e1299eb17588f96e8310eb934e
SHA1c13dbcf7cbbee1c07d1e9eb279b2571c7ee7c89b
SHA2562a502005cf3ca6312db1655d1243b5cc278b0781fa6fc02d26931e36017e4cc2
SHA51297a52b339b408fe793389e4d3b123e537558802d83597a840032b62dde9906600cc8027db3f885ec7307680aa00da3f57c7edc4149cb3d9bf5e0a5757e286de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea280ea33943176689be862a54d3b174
SHA146f92d7df15a9ba676a737a9df65f2e7d761a117
SHA2566acece5459f25494881d893e29e84973325de52539658cca06ed6daafe6820e8
SHA5125d85e193d81bc166135cadca376d31b84510d2771022833b3c65043dabf94e966a92190710f15a907b941cd43549bc63196a175815408821d3a581d0cc8d6529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7731f138502751e9c59382f60b2d2c1
SHA1377f9b7d6b836451a9d185c6c255ae6700db8e86
SHA25646efdb40528b4b4e23054c9f0827a5b66e18e19981ec7d86e9728f11c4238db1
SHA51255aedf69f27187cf2c41e6216f2db464b6a1e34857f9f0fc50fe7d4d7f0921f46f5335232d13cfdee064dff0ce908b620b8aaefcf57786347bfa074e8c8b0442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2a8f4446fbad5c30dc0b3a60d7a12b
SHA1e9d1eb958bcc4609eba5ede76eaf32b8068db0e5
SHA2568e850d3ac69d3a089c0d8b0afff9b7b4eb6f3ed7a82af801b6389aa9bc8f2b8b
SHA512af4cd84fc7274e1be7710fbead1753e69323778dc7dfd4dec845d8c3be1b1c136ed6ed7f7a41b78b2bd9ae4d1d3b641107a38d8d5147956c5c7a3364b858a2df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57866ec6986aee6ae7d92d78b7de752a0
SHA1be373a03a92192ad0e3530d96fc5aa24eb74e4f1
SHA2564da7a5135a36e7a87c905ac58a212d2a4de20a6746e8a3ac5beee30ca50a8945
SHA512d717815226c4fcdaa4ba1904c061a09ef9c0bfb3be8bfb3204a7e0934da6a67e8591bf91e85e00d499b77cd209b78124d8e783be0ee17f64be4fd6a1ece33ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ccfa52671a84cb91b5b1b4e5a8e7b5
SHA1cdede7755f452656b6b8052696796b4925156fec
SHA2566e3cd431bb8b0c2b56a941c1e309e69104b96864903e868877f5b97f736c2a40
SHA5122b5fd482600a028cb50b640e8e848adad9737d42ce759be7b8eea02240aed262d3ecb4ced11d0250b31a284dd07df3ded777e0c8eb9b91a0310645fc3b1943db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb53cacbe1870e80f8e06c1718532927
SHA1a384a37ded74c67a4d8b0ad40021fe72492092a6
SHA25646d60705ff7fed656fd7469ebfcdc7a9dd2064583895ca7484b543f428e388c3
SHA512ecbcc347b96b9fab5c150f38c377f51b8776fe995d0297a73fb6debd095b4a917495c3e2a1b9e1c81fb7fbe87438ac6717d252f70b79f20a9cbc6c992b25c9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ada2aed1af2f81cc2f14c61702771e
SHA1a10fcf85a918cb8c1dd2a8a1c8ea73793f722103
SHA2562eb62d678b97a5e3a60edd0e0f4969e6b1485da8718a7930a130c758bd8d81bf
SHA512694e2c6db38a09df4cb9aacf57bb6f7b27d37fa21304671eec0f11c2f07213014b3b5e9aed8f68a1d3c08570a3dd39145639fa27f77c74094d37081d33d73e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e17316db577dc083167bd35c6810597
SHA1ff18e3151ee41e877649afb512fde97f4b057df0
SHA256710f441e9ccedba4f47c91b51475543c18421c2b8db21588a405f67af7f78d33
SHA512ba1bd1c879cbc6003e9458e28346f28d2d3ec79098c9c85ca5a298e31abd886279c7cd838648b439e5ed29de7722ab26f65d05e6ce6bf4b186700062f9f030ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2598a6493f893724f4e5e61c2eb3d1a
SHA153837de4aa5d69e8be51ab0348f7f9cb07f86ec9
SHA256436d7452b5d113c5951b6d4e1184ade8fc625b6e0fab0d93a58404edf23505d5
SHA512c33cba130c24b89d63a737c9ca1f8d461e66ce36a09104441cc4ac102aab6bbc85968a06f4ed271bd4b2b89d62da5a4faaea99e92492117431d006cf0dc20f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530fc0a95aac42ba64e0e02371fd12002
SHA18346febd22cdf4f37d84dcd3a2338b947e50d896
SHA256e9693cc6e331cbee3ceb3a7a012613b8eaad45b1246781f99cbf4aa93081539c
SHA51270f5c80d4591de59a955194bc04ffdbeb17a807c616dd349f65e951cbb387600edd6611a8b599ee761a2d27b67d14877d3cacc615fefe0f441968f7a443138e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a090f893b1547d4045d77fd77ba1a53
SHA1975e6dc12746a1f813f9d9ceb1b79726266c82a1
SHA256531aa7c083d200e034571ebb4427b5fbd962e8ff8eaa85e4bd1eaf55d2fa5fd3
SHA512a309f6c19f56d33abf9805ceeed42b6ec1d2e316c1d857f87146472d17c7f7de3e9dce0cc7ba246dda38356d72eba24219ac0d9c06598ca15e8666f1af87a33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ac77d24ae78225e696da4823775fd1a
SHA11230568c0698552fbc43ef900153e9dad534402a
SHA256421ca9c12d23d78cedc30a18e995fd42f3b1bfd37bd8744b29b965d6ce49be9a
SHA51274edee0935017061625751de149b33fbc93f2f6e8b52a68ee48012bbdf77b4280309720c3eeaadb00f1cf6b5dedcd3b68ee886a4d9a40cbd6271eb11f95023ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593a5b50f111bb1a65350c9be41e2c34
SHA11112420cb4b407607bcc1cb8d3a566b17c7159e1
SHA2567777ee5740299b0b57bb0c7e835e943a5e541f6116281a7832607498af7cb8d8
SHA512c7c17d4329eb1cc145b5e09803e2a35b4101b39c247ff9f38808ebef626afe334d58ca3147e59ceef92516c8adbf997c74026c5805fc9a7156cf4db02a8bce3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45be4a8517dd126af6d49e3dc0f6ead
SHA1a3bf393abc010ca4cc48238d33c2b414baa67363
SHA25692c7334c1818fb8cc428c1452a872a7fd9c683c73aa223a7b69432038ea40ff5
SHA51293e2bd0cad6e9879d838d6511ab0486f6a5ad8d2050100c2b8d12769eeb2ee0e9cd363b6e34788d20876b67678203be1821f2635f255c7330eea2a75cfca1e02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b