Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28ec5e370b0f6771fa008d9a6ed51a4.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28ec5e370b0f6771fa008d9a6ed51a4.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28ec5e370b0f6771fa008d9a6ed51a4.html
-
Size
20KB
-
MD5
e28ec5e370b0f6771fa008d9a6ed51a4
-
SHA1
274020f5f3234c3225ea4a3ea8c7b31f6e852061
-
SHA256
7892a681cb4413769e206a637ec03994aacf2484cb07521bc1a2d9c51b140c4e
-
SHA512
cc22d3cf61e498e3d28fcdd4e8aa2d3ff4041f6ff130ed46d38a3aea911c2c26dc4200a9a81683a96718ad62cfee26d171ffe969859df21ad7500057dbe2d8f4
-
SSDEEP
384:4+QfPFd9QZBC7mOdMECuKfpC5IgSnbmFe7Ac0h6n4H0Pd:Zcd9QZBC7mOdMEopC5I9nC4E0Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b894ffcba22bcd40a7584d5e1a18f5ad000000000200000000001066000000010000200000007080fc9f2ea9927617e7b06fc64f2c1f7176042b01278a0231e3b7534b80bab0000000000e80000000020000200000002552af1842056978fd278763f551542ea8c01682e4f0fff5b64e713c5e21dac7200000005e8ddc88e2ae1ae69be23095118e6cb76b8766755962b3387f3892f32ff9f03c40000000bcb3c4a608ea1676dd582070fece92a3d0d378d76715b6addbd9d8e397e8666b1a850fc15089abc2241eea1301faf7ea9d73f8dc1457e18696121e5892c4fd98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F640E31-D70E-11EF-AB3B-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03274261b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2128 2076 iexplore.exe 30 PID 2076 wrote to memory of 2128 2076 iexplore.exe 30 PID 2076 wrote to memory of 2128 2076 iexplore.exe 30 PID 2076 wrote to memory of 2128 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28ec5e370b0f6771fa008d9a6ed51a4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ff92797ea91d264129cbfb57d38166
SHA15613956dd03a76d2e00ac35a981cff879e9db1ea
SHA256c6ec33ecf4829fdf3f7f9dce0f85da24365bffef2242072f6e6e041a184ebf51
SHA512d1b08c9a6e0b1a3512a4670e5c137416a95e8a0802101ad5f35dff4d6c46393bab11c06a6515b620253b6b244db88368b936923f0d608722ef2e9e083a7eb2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb156e08c1e70e1746e66ae2698b1cbf
SHA1c7ebb6c3515247f8f41bef389fd18175cdde723e
SHA2563ae8ac11923118906fa39ee2494ad835570df1ed528f6f3e2d2777157f3670a1
SHA512648cd7d43995175a367b6e2fa16a7e0f9e2e77d0276bd93706fb0a45d53c12419683dac815f5786a55436209c3304083dfd2a5cf6b55b2cd7145ef938a8cffb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517978b995b0abf3fd100274bb38082e8
SHA1e2fcc53007fea071fb096d2c1f4211575961d8ef
SHA256d3b3d660d8ff7dcc86d54d6e0edaf39a0a80db1a18e11ddb59a0ea4a7d1851f9
SHA5128785ab9075ffea88e41a81db44c196786a52c7f270fd75b0f0916574eaeb0b4ca1f9b6906c32a72a1807305ab10af7d584db0a35bbeff7acb2e48402a3eee3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59629f6850e4d6dbdd5bd2885ab102cd0
SHA18daae52b7c2a9eac222a59610e263c897d57716d
SHA2560e778b45672b4d48988fcbf6fe6077960fec09976b4eb86f9622165fe87f20eb
SHA512fcb04e9e35673294a9700790d55ec6f44e679472b07b0de2b13645e1e4584d3dbc9a81efa8d208341ae7760468f87b18efcc430e33850298c7ec3df7c2c4bc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553694f42d88a77e5b53d12a2c81b5ac3
SHA12be04d2bd54bf6106098b798423b293dd036682e
SHA2567e2ab2e6a7c9cc1875bb6a49f8b95507e1d0a913b7c3fe9e54692254b707559c
SHA5129c44b2f7e40721cd643f49e8d191b590548d34ad8dafa5a851fd82aa0c75539bac67d8d7746daf5e288f8d2a826433d25e49d080219a2ce1554ac47cad5f794c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740f82295487a6668fa66a9859eaf707
SHA10b2e193e390e36b6fc3eed2659cc88e8a06aba42
SHA256cad2b0d2411d95385e8c165b2d1bcd4158b7d1cbf7869203768dad00b88ab110
SHA5120f60ca11a56d562bef6f4f4caa10d0d3965b1437f9e7e5190761c7e8b4b40712ca320233a6ce72aba8b81567f2b7b8c532348eab5919a0153fcd21974c938f79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4fd36e43d200f0a14b19447025a4b8
SHA1643fbdeded59e72d85b272a98907f48cf7862492
SHA256416a88e1f39816c5c04696d8b8cb9435993cbc975b1189d1da5b877edd9a3b26
SHA5128f31c479970f2918873d778978c6115cfa7994d62aa3de2d69555e4aff3f5a4a82f94180dc6cf04462b0efd9a0b42a5e4ce23db5d16d4b6805abab45f3cced0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f557744843ee3b5b4df1f9a47d4d511c
SHA1df3bdf029fd3d23baf53c48e2e1d4513b2fe3d33
SHA2569c0346dbf88178014048e8eebfbc9e2020d046a44e96130cb2a4d51454cd7113
SHA51211c970e6c4c8c01e98573f75f5390eb40deb3998f848a975e39fc1b89b1ed34b96211505c5ddecb64487e6b935ecad767240ad3721dccd9dda7b5ffd76440e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e1b983cf96e377339dbe9426ce978e
SHA1a9961fb8dd2090cd2046ed88d73cb767c72a902e
SHA2566b695d4634c6592af39361d9ce2707c5c1616f4cea4e7ac3cb4e681197632d56
SHA5129fc497f80e8871c172e1428487f32bb3aa4d5a5a37968e2f4727fe3b1dcf35025473c502bf5799f00b9c3b2240675191a911c870b77077475c4b6dfb300c1029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148270a7139c5980464b144f1c38f02c
SHA183adfa7e78d803394852b62a12cab20f19b048f9
SHA256a1fb5f2a3a7b1ff71b96a70818f54fcc36a871abd7ca89793cf058dd86a31ad0
SHA512ece7212c8f555597ffb6bf24a7dbd36b8096fdf22899d675c32b596eb47a27fe5b732d255cfab42831cb068abbbd1a2e505afc34c5424663a39fb38d7508a3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31dca668d0ce6f1354078831b832102
SHA1f9c543d54022d3fb48f003cc3074536a0200ca01
SHA256e9959b8ed75cd0a8b8de162341ad908ecd2951bb48571fe0240e28a5216e2bbe
SHA51226b41ca8662cda7d57ba1b16e95e4519d809832b5f21bb65c6c73fef4b3d17a72d1091a8b68033dd54fc64d44e357a0326dd47c5458203a956452e7d28694e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef93c647caa87e08324c46b41a76a955
SHA11b3258da53e1e7b6577958326624f03a101409f7
SHA2560a8f8e6c857204027709426b59f9b6075cfa31ff9a9bdf99be902ab5c779b3c2
SHA512468611b566802f731aeecdcf5f9c8bb524fe556ecf6306f664255412751ae84aaaa36b3d8f67fa3e87d2b2f02715064bdd1a92dfa58ee99c119ab8c3c5cae7da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7bb21892d77d28017d9fcd12f321f67
SHA1a5df7a1aefa04bd9317dca5920f0a777f5459c3c
SHA2563c13756d47b419c0af9224195027b5150c836548e6d9ea9e1bb4a51d6ac70e46
SHA512f709138eec11b974063da267cff562e33d4bdee94ffc516cf79093ad71f29cf1cc8318cdec4d9435e1b95d1c1c0b4124fb9d7f01b084e81bcb49baddc0be7d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af91612d34cf2a6fbb889e47540a7ab
SHA106a71062f34c516f2763d901fee87d0cd151b0bf
SHA25648ca6f036b865184f08a0cfd3ceb219f8a87840b99121cdd58112ae4a83a0437
SHA5125a792054af004fd49f69ed8344d3ea1326874563e380a7674a46324086b8704c14575eb87f0d2632d71405162421ee561ecacd1c3672de322b8adcd5728c88ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28e26153f47877488966e365e5f2cd5
SHA14f286a54ce85b0203d38b7322de79e4a351c9a36
SHA25694b3bda938d7cdc601739588511d8d42c06792aa6b486af1aae824afb5dfb55b
SHA51283f2d3b93a6ba12c218835b34a199d25c8ac5d7766e967d7c458c8b634412c3c0a3f5523a0acc7f527ac848735795cfa31d134ec520cd737e0f452424dfbb9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685502c873f34cbcca408a4aadf83710
SHA19378f2023536c6683a1cd60bc14e488883d55c9f
SHA256d7dfba554e8e7d21952779ff99625e8141b814abfebb16e05cc7d95b563cb97d
SHA5128a235c009da098e03410a86e6a7c2974b8084f05ed4be7bd67e8c6922c999db8f9c51cce42f2d1bff42fd3476bf7c6d05d0a984fd360068035804c2e7f505a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5814869938eee31d6f48e213380f6ba55
SHA122ec071e934521339ff96aff4fec607196e4d6ab
SHA2563c77b16915dd76a72ff24f53e9878f4cd1dea73e8149b3b4c6cbe2ac21fe80ab
SHA5128d5524ea51eb8ef26f850ab031ef2424e892bcab9c48d10c49de7220332c6a2d3488028b90b18fd3dfadd21029a07b3a3c44be18321759252b72ee7f3cf59cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562df954a267fe4bfd30cbf53f85ca9f9
SHA1fb3805e447c8834ab85dfac8ea5d6ba561caab4b
SHA2566cd9eae59bad77c26ea54bb2f832c0b4d01bb96c55c51dedcb647d470dde505f
SHA512b9cd45595ed28bae86372abc3ba6205f30638e3e7e715c7042ab75e603e5c12991d80d018ac20076b17bb2718f87d10404ef02bbc8caafaec96bef29054c57cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8f7cc97c8b3ab67604a48e939b01e1
SHA1508fc951677c12fb8255793ce61c2760c3562b4a
SHA2566b111f2bc9043e71f5e30a9b75688efd13075a582be4c6c7a8641d33f72ea7df
SHA512d7cd6b4faea04ccf0ac7cae161c3c07fb576a58b8fe031fb228f9569b2a84a675a5f14c75050f30f1f5b13958411613a3f5a8dd52a16fd25f425806dba65266b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05a009db1cd7909300820ecb740d3ec
SHA104ba1c08498dbd9fa47cbb3cfa6cccecd0030717
SHA256c14a851160c5ada254d27dc7c72d24ed2a9a115420eeda9d29fea1006802d6f6
SHA51241cd66f4f4f906598103a92a2c4844d4af22e23f9ff4de7864675240453ef9b892eaf77e0b9fa4bbe084584cb6a06a8bc7cc2d91999f71fd9e1bd2d7a20ff1f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b