Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e29194ae802ab2ca3dff8b54ea7cb637.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e29194ae802ab2ca3dff8b54ea7cb637.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e29194ae802ab2ca3dff8b54ea7cb637.html
-
Size
11KB
-
MD5
e29194ae802ab2ca3dff8b54ea7cb637
-
SHA1
e445bda971c019d4c84182d113ee1cffb664ed8e
-
SHA256
4c0c9d0b02d94cf689badfbf8bb82a9f840d02dabd8f999ee90d1305b856399c
-
SHA512
fc99bf78614ce324d85ffdf8ec63750396da7b5373f775ab1d22ee9e8d46ffd6d70bd647c879a7e42715f885bd4596dd2df39b123e373bed6356f1ba44a03740
-
SSDEEP
96:uzVs+ux7I6jLLY1k9o84d12ef7CSTU5GT/kDGpwcFGCU6JFGCUTXOFGCU5FGCUea:csz7JjAYS/YIwFdNwAPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bef660a737141943a3f14a7b9cdc33390000000002000000000010660000000100002000000085119b03ccb6cb0974d3bff24a97f2fb72406c768495312efb0e44b6e029353d000000000e80000000020000200000003ad419879d6b508b3379b62ac3783a52cd3aa602e82fe8009141285c4a6a40a32000000037c4e66fe6c45cfbf096bce5438c755cc32d118299facf912ab814669ec6082f400000002e7c9f747266a64562a95ca96dfd5d2720d64e2e68e7e50be4ec9219f84f9228192b1988bf9e06ae4e7e5f90646474fcfef3f55dbb44343a36888fba84b477f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e2ae331b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D215BE1-D70E-11EF-8EE4-42572FC766F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526084" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1888 2684 iexplore.exe 31 PID 2684 wrote to memory of 1888 2684 iexplore.exe 31 PID 2684 wrote to memory of 1888 2684 iexplore.exe 31 PID 2684 wrote to memory of 1888 2684 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e29194ae802ab2ca3dff8b54ea7cb637.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3aa816d21cca57b74169f70a5aa68b
SHA1de0384bd8ef0f1a7848f2b358028a7805ce68ffb
SHA25601727549aac626000ea4794ff81dd2ebb371419450f280e928a4bc6ddcee2240
SHA5124e3644cbc984a74f65af7737aedcb9d78f6eca41412ecc0996bf0a28d68a49fd4f47d8c9129d20265fa79f81fdecea75e132885fbe32be190420ea1daf00e056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d0ffc1d0d2f6f76f55527c4ff5acd0
SHA1aa7aac1a34daedcb4f5b2a76aed8121cfd92656d
SHA25681a27c374e69308a8aea56846ce67851119a023428eaba746ac70a7064b78f9b
SHA512e55ee7480d006546e5203b953a3e580f6391d2f2f6740e217bd869877c524e73767207e329e69cb3c3eb671727bc506415bd628c992ea5e826df6e57611c096b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb60da3ffb450bde606c17a68cef863
SHA17e26d195f790eeb0425219481532c50caef1bdd3
SHA256a1cc6bf2b010a0d5f23741efb1e18f3c85b58b2810b8ee12cbe44a661b1358c7
SHA5121070937e741295291e215f7a4c842a473f037bb92e940901e5f26488b6f55ca694672d4c5f8d6ca3428043a78314a60eed1fd1a881cac744f4a7b4658a022c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ea9ac8faf41e1fbf5168b29d963bfc
SHA17fef1b298797618d98d0e2fe58c93c9e2c3f89d3
SHA25671706b8c36b3f0b5d1f7ea5b1e715660edb514cf95fa7ae0f8682c7fdfca8899
SHA512edaec78c5301ba43a1e23ce03b9aaa5c7661e98047b0a73ca28d334fcea6cd3b6c8b800d0842eedbb5ed11788b80985c7e047030fc29746bfa4f9296790e0472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f7170361b1fb10fa960a040fc521c5
SHA1db3dfe86d124faefe5c0e5fea2da2df49e12b63d
SHA256e46bb182a75e5c39143b4a987ddd309e68f4a37591edb5f86ca15dc1c5f8f9b0
SHA51206f05533a9e35899505580e8b879eef0a82e696ae8c10637d91d2742353f152549db9275d8b19bb95afecec6cd49149155849f470c713d147ca36bb0875d0338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50baeb551109b29b24ebc47d49ab040ae
SHA110ea175310626efb6ffb4633cc252293f73a32a4
SHA25635a384521831ff7d266d2cb47fa5a9b98e25af430154f1859b72de5792508618
SHA5124f7be585fee03d8d8e4deb0d3bad6a2f056fc10700e74b63db3eb04d62386788f49602f84810b2e28aeee7da929cc62715f40e01a46cfb5cfc34f279f726acb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafef40183232837757dfac0a05a00da
SHA119b4ea8a805828c023680d98145dcd4a60295620
SHA2568b8c30ccbb35ed5b852cba7534a7ccdc6c84a1a253e8a0c23276d7c89dfda71a
SHA512c56841aa2d654f15c7956eefd163659fd2d7e984745618263e03886c137b96bc424536c51e48575931d007e26799492b8c81ee52c34bca8931a87169a1cdf28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a806f546ace5165d4c10aa5efaffbe79
SHA18bd7af6408d6039942983d47e4d3f9e80e7b0e4a
SHA256eaf9c39fad2e9f8ce70b7c98784d7bfb5e4b683982caf7e3a422e908d5ff036f
SHA512ecbd2c1da630f546ca1efca517fdcc9cc4cda6456585f77f49cc9be8fb1808f863d0d1ca6ff1efbc46e3f68a793f982717eb90ba30f9002002242e041afc149e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c33983fd7f6debf844a8ac03e644b4
SHA14029428e030dac288082529fde3630670bde800e
SHA256e230b01dfcd60a75b72e62aedc3b5826fcf631d56389575b84c4666ac06af2fe
SHA5122cbaf1596afa4f184502f539fe8a8be9008f192ee03e7fad018cbd8c6cb8e2c052683d9084b1f4d761222ca417f327d2f441e96e8327fe3f02a46b060c2a7047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef7a46aff14855d80fc6d877bce43a84
SHA1f52da3a767369155e2fc6be8e3a91bedc162ed8c
SHA256013b41af804d014962da4ccfbc5795c73664bd1f5fcf954c641f907badc2e456
SHA512483632802f1961cea9e5fc74112eae190ca3b32ae7b5d81785a353e7cafc6dce7957a006c612815973fa65276f6c80fea1d90eeada079d4d4b6dc63d9a1bb813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fc8deb64466c05dd581d261f4abb1f
SHA1b2cfa10012adf4d31a785c1fad2b92835e86d12b
SHA25695a4e69e70e960798bec2108b0d61944d9cd7226e3957f2cfa66bc8315abbddb
SHA512794deb48c6637fc694c652450c5106ff05203f7bfad029f90cf81e966b2a30a38b0912a463bb6ad22e211f365b01b910530eefada91fb60b1fa41bc9a87779f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b11b34d4a6d3c1db28e44853273245e
SHA174c9180f617eb1a842176985771c3165b7696f72
SHA256a5511cdb8b05d8a61bcb24437fe2b70d44a1ece77a75062b0fbd10371e0911ea
SHA5124c3050611b3e8d4b9acfb6ddfc2fc2e9aefb3453f2af32b61ca6ee1264a758e5fd1c4a000c0768d1806bc5b4c54be1f64d6096c1a8d39f18d49af164d564a2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473bba5ba0584ec92b1a285708f51ecf
SHA129ea641018aabdf847508dae47dd774f26fd01dd
SHA256adfb50ddb5daea190a5cce3a334af704ada600bd26953bf89b0552736f8925ea
SHA5127560ee72ff30fbf5e7c683e8f9b7665aebe5633b45590c871ac6240cf0659c7cc0287ad251f501a5d047aa46ec37658908b5d5479f31d64681dd644bace34b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe397a9c455811e53e90c5a469710cb
SHA147819fc9531b1f3fbb430444bde21a0904a63d09
SHA256dab00763efd5f2fff943844de1da51a9e8c249042b6449fe58edbcc0a858cec5
SHA512dcd8c9239c81d5d9848872eb2876220ea2205204bf408f41229aa1961eab7d1e417daa267f7691b05d5b44472e25005a9868336fec4480eaa412a40b8d15b2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c675fbbec300e347d748d48c479a8d5c
SHA1cadd09f993c2109e7870ac3369a96a2eecd6abe1
SHA256ce7ac4681ddd99ea232f7ba03da60d010f9442642910ea5a833ba81acc42a3ae
SHA5126217fd465276244d2015f5728a5dd3c3e9ccd0cf2ca9577ab706eb54ad8625db0e2dc3be279c388472eb0ff8ae68bfe8387bcd04c3122e535337e1bbc403c31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43342adebf7e33f10e6fa5d40f18152
SHA177d1e849febde1b5b108197d3d00c158fd561463
SHA256f1da6031af935dbd4b4833427bed81d36055b9757aab50bb2fe67415bc96e38b
SHA512237c5efca23c65edece1f3b04b5b74d5a9c356597dcea9b79d501070d67d5dbc8bd1246264014aa293be75ee56bc9d7a88c59c6d4e9ec0166c85155555cab870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbdbe0b008afe97bc27032201d74ac3f
SHA17cab8431609dd96ec413746abf905fd2aa18741a
SHA25696c1d739b0c82bb47f85f901f191e55c0c1aa675641c6e6225f657839d18537f
SHA5125c90306ce233807d0a12df017f17f0596d17a83a71d65221dc43b59d1f08c878342879ec5a408d828480a5f6c8b16a67b475357dfbed22bd4aca34ab2830299d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc9ddedf1edc39adf8a6aa255b20866
SHA11299b2ca70066077cd4329475bd26cef853d517a
SHA256b9e85177080c5cf5881b73b9c492a59f19305084e8c03b8eb00ed010d8851986
SHA5128468180f3da6f50cd2c790d96276c73f57cd3b4e4e521cbc00119523cc230d1850eddedc23de3f2f5de9bff639135cf4b1d619c1678c10f9c8f20742fdbd5ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516622ba84b1fb469839b2649ddf08ed7
SHA16acab575b7a15284dde57bdad408249829be67d4
SHA2563f9f519e254cf1b2c624169cba170215516b8ca41d6215660c941b50981a382b
SHA51270493b6b1813813446e4dcc248fe736e94245ea1beb4ff3bce027a8a4e89955cb2f4014ad2f7a760853e9289cbfa70807816c7f6bb2a11fc56c0aa6d85e01ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c43c04bf02b08f558fdfeef77334d63
SHA1faf852c869b986d75b3bb426273b4a775703e7a4
SHA256987f923ea878a47c075f45601ef06991abaf4d0618949294191ecf4f3b148991
SHA5122a827f9ed06a8cb7b71dbdcf79a2d2858f23c1c16ebb76df868b3e2eb34134a9cca180738d211ddf8594d7ba7b9de86cc5ba7c137cbf1834a8a276187ecdf72f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b