Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28dd0294a2756c4db8ef592e483bcbe.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28dd0294a2756c4db8ef592e483bcbe.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28dd0294a2756c4db8ef592e483bcbe.html
-
Size
10KB
-
MD5
e28dd0294a2756c4db8ef592e483bcbe
-
SHA1
4f5b37500da59e694c2d67a046f8e35f8fa48d24
-
SHA256
6910bc3ec66a209c5a09de4fe005e5dfa3a7fdcf682a82ab45b9b3880a2971ad
-
SHA512
07b707710e27b07eda3a17dea9f869302b1bc07c3ad38273cdd96980987884751c9a4f7fa4d387551dea9a24f04ca98a0210d394ea20da4f64bb9a736e5277ee
-
SSDEEP
96:uzVs+ux735LLY1k9o84d12ef7CSTUcGT/kvSxp5DnQ7Yog+gQ30lVHcEZ7ru7f:csz735AYS/VaN6+n1PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50e0921f1b6bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A0D43C1-D70E-11EF-BFDF-52AA2C275983} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002c50f999189be84e8ab5d0e0fc102b8c000000000200000000001066000000010000200000009092f4d6b693b8c21c0d8112f6d107337c0c63748881cb584fa5bf4cb0e6e19b000000000e80000000020000200000006d2f2b0199a78a19cd9437e6a10117c5e37a26a02628f35a037e0fd3463ea99720000000aa74fc7fc19ba66d6a67cca1200c3a43665374b84351fbc345d4157758c4a83440000000f901f798618ced0f23941561e749cc428b5a0e6cd72298bcfc92b10a23ce6aea45cd25f1376192a875d6af0300e5d23694f3f786812e8c2dae81a22997a5db0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2744 2760 iexplore.exe 30 PID 2760 wrote to memory of 2744 2760 iexplore.exe 30 PID 2760 wrote to memory of 2744 2760 iexplore.exe 30 PID 2760 wrote to memory of 2744 2760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28dd0294a2756c4db8ef592e483bcbe.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc30a7fe3bff2cfe2edd4d702506469
SHA1d1f926f979113e8c5e179bab7e5fef5b75b71577
SHA2566b37af7e83c5cf4c191b364ba69fb569e6e38e6e36766269156fff9558e1e40a
SHA512bf806b49b71fba521a0ea22f0a1eda834dee57e49c0a40411b61c55ee7ad935b142568665305cb9f9b5440ca5d0756e81196e3e235fd89dc006a02cd401ac200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152a811aa68ee805aa27f99f158bbf94
SHA13b2491f1715a5c91e6058964781c0253497207f2
SHA256199366c588f57406fe56c2a8a19e8b52c8059b36c75a2cc2762316aaf7098f6c
SHA512dd93ace05f2e699fb141d1a28a03615e3fb4853af5ed2d5d3a1f4a120b19899ca3318061b5cf9cf7ab4a3df24d7ab4fa0bda4bf989a5258e4c58a37c6408bb08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c97f354703aea4c47f47b6ecd2ac79f
SHA1e2517db8deca4ccc09a4d8db4e4cf3d9a79487dd
SHA256a1955c04f4da78fa9e6feed8045dc95623b222e130d0db934db6161008de0a39
SHA512d8cd9ed09ffb577e75faff3383983796bc6f9b1897480408bbd9434bdc5375380756f7c0043fb394d25f9a6df044eea34efc2330920fe8da1b6b920feabc9832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b1678f81f115761bc9ab056b480788
SHA1f9e21b08e3c2be8842238a708ef22c534deb28af
SHA256907b04762d3fd6f1134821697fde929a6fa3230083d0757190214c3e3e8d68d0
SHA512ad85639faed8bddaddcbcf33d35907b40243e1a0eb35a6c72906c9d21a5a8bbd03e2e319cba1ac4930863b7f224af34df1af6d5734c756a45e5f0ca80c79e4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e538ab26f8af831833afe5330cd2dca
SHA1a1199a6a337c04c8a305a1000d7342dd3a0825b0
SHA25647d8d068e8c4725fd0e5983ce77bd3f980190a47156103859a5a5585e5cf54ff
SHA51281e8a8b310fbf8181a10829e6b9c511f67392a8762db8ecff6c59f2c27c96f77bc11bf2fa398b045f8d0563300970c52d9b1ecbc900652f3112fa7625b69892e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07b3fd060aa118059786487db2f3f3f
SHA139f440fed3b271afd5cc34f34cb4e4eb65b839bf
SHA2561f1be24181a73113b9450cd55320e90f550ffd62efa3ab81967095de2d50c9af
SHA512be535908ff9d7dd5929a9efe2aa1a8ba8dcfbd23908a10dc34ccb2fc49919aef5b277917c296b364244f5e29d009f20a5fc923382df0f67c9dea6f1009947d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd844a2a64dea0d5e04633f261694b57
SHA12bb3623917e47d2ed024d87f95d0b841c50ce2f5
SHA25674c9c2c71eccb7d6fb08c711687028524100e36b3e7a0ba793b423fa9e4ae4a5
SHA512d1e35408f165e59e1b57c20cf8660a07d84235044257b9b4f6048554b73bccc18615148bd25b70b427709f5eeec94b55ea76407428780f7134fbbe3e102afec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ab0e43350e35f8ee663ca60209311a
SHA1b9530951bf6e49fb0bbc35ccc89aa66a037eebbd
SHA2564e801bab8a27c2b914688daee75c1e7221fe26fa3c92924160859242b3698822
SHA5125b70e8bd883f28d50076ae34ba92ba163d6c090efd820eebff0cdcd2eb24754b4274ebb91325d3be1cf217a4ad8ecfadc0be353ff831f0c5ee71ae902435cc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54762e71dc2a5272a67a28b8c4ade2d29
SHA1c4419e3900d2b3cc9cde0ae62ad740497e998246
SHA256cb4cbd337268f5b0501907519d9ca45bb9062e32c4475dbb9656859ecfa9fb69
SHA5126f034a17b0a4432600575783ce350b81b609dc3d2d058b7a898dcb55a64548900d882c9a195decfce7b0c4766c4449f87bc1b6ccef4c4b380f8bb063792de2f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d72ee5a1c54a7138397b3cee3443a37
SHA181168225895ce0ecee2568fa0e086566b69a0420
SHA2567be82be2ca4684599a20e76acceda5efe35d52635ff8f95fab0b5529deb9c36b
SHA512734e20d06e6db6323a9c578ba688dfc25cd4c0b346521c5b5489ef0dbab6d17f391fabd099c29c0b27f1fde1ec024f6a547f3d8a69594007f8d32f9a3cff5337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc64fcdf723606117dfd295488a8636f
SHA1b5e56b67ab8b9ffa43ae79844568268cae963ef1
SHA2565fdacf5e54957c1ef3f2881ba73339b427cd49634300938c6f8cdf3261fb1205
SHA5125eea27783e469a2a6e3ec1c6415e04ac3b9553c71e2e2a320b0b132693c7d57578f7b54cb9dc733d0d4549b7d8eb355e48db8959c9e271d30b179dfc48fa335c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd5b582978b88e76274c8aa13bc8797
SHA1e056b828dea60f77d98d689b9ce312cea8392506
SHA2563bb71de03a7d3cf2e1381a7bf9711e615b17d111c29a88e840b8a935a21dc1e4
SHA512dc774c03b8932cb7363ab0caa8edd3a3ea0247598c449c9e84c25f25f95caf17bb411b2e392ab73c52ab107b06d807ed22b3982aca49ddba7406201e89eaa1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec0a76f3890967440fe154afafcc35e
SHA16058100893a9dbbe49531364c65366823910e330
SHA2563e110448baadbe053cd1b773905a0719fdd87bfbc3ad1afff2d394e5b0577eca
SHA512a7d1077501a95857218dd98ccf0afacc6bade4ed2bf0632aa86716d71019a6391389435544ab16593fb5d77a5e27bb4970b061e2186cb76748ee172ec7e0ee8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48e126f36a87fabad26a37e9f1bd683
SHA1237b436d2b6ac37af5d951813e33c7a50d5da165
SHA2568c59ea7a381ed448b906746d26b97ac587f892ed1dfa9984a535d359610b3e49
SHA5127a738cc756f42e9d7fab525e610a83c1fac76e7e99c18b201a6f2fcd0aaa878ba3b1944a40ccb33987d0200d8ccc7fcb629c06a46e1d37f29b8e94885c5b1dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b3955c98e1a7dd5e2e9a02b8a1c88c
SHA12474316aab6e12b78b7632bf2b578056a21d20d7
SHA2565d75a2a75a4b44d2c5d591497082056433afc5f6a21b44b6b2db9284cd1c27a3
SHA512cd34d51b162cc30ad9d51ebe48af81e07b60bfeca9a296dda621afecd102c305e3c7fd5b2e11c819f48a47b6e38dad9bd659ca5da9e727d8c612c26f9a632406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409e39548458afaf48641b194b4217d8
SHA1d5be30accbbacc1d51d1a1e427b17dd85f28254b
SHA256f76aca473b218e624b5b6d56178f2bd8a42fd692dae811d537440be5589b8a25
SHA512d687da721cb99e7357e79d23466112d88af173a391ff31199e5551b85afc4d153e1ac054f10edf5c68255c7d6676e014f3de112da61744749f4787dd338d1a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914fed06e84e67f2fd8839e182d01947
SHA181364b86cccfc7c795e86f73b4b193ce630284a5
SHA25691ccc1f86cd09fda0b694ded51e46c3ab239e2bb3da7bc23e461dac647103327
SHA51267551431cce7a19f5a3484cf2139ff2b4fcc13ede118fed635a4c8656870d096a09275cfb59dcad8ddaa4606c8a2ebfb968ec498de8d9392b181b566d79cac53
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b