Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e29c62ef068a13feaa42a0cf53a4d668.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e29c62ef068a13feaa42a0cf53a4d668.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e29c62ef068a13feaa42a0cf53a4d668.html
-
Size
10KB
-
MD5
e29c62ef068a13feaa42a0cf53a4d668
-
SHA1
a372e76b645a733a837ed9b01e991dd5c369d30c
-
SHA256
4e8819e34313ac0bc07265c00ecff56f51eea421568ba82fffb95b5bf3e23645
-
SHA512
a7926b5c61e5512a458d8db5bf9c225c230dca359d289a051e4c163754c81dfb487ffb3db25d7a1060f83a87f1e0aadf7ba2acb396d75608c41214f317a37587
-
SSDEEP
192:c3/zKZGTA6w0HsHoQW7XFb7dCFIiSAT3/zKZGTA6w0HsHoQW7XFb7dCFX:ibKZGTn8HoQW7B7QFdSWbKZGTn8HoQWu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fc856d6078012642a00f9535aad23e4e000000000200000000001066000000010000200000005dbed24e757a563f767531f384efe988df8690c63b49dd9e654c1573feb78c08000000000e8000000002000020000000ecc5e901a90d2d2fc7037caa17e86e8b9f8dbd83fe583942996c18bd6edd19442000000039becd086995d899696b70767b97521d4e34fb8b0b98423d6bd51ab49d3cbc3940000000086fdaf99c01c2bbfb5a9e09009b8287ea9490c343fa8edd6a76986c3e37749176e231237da490bfbbd103165464dca90b5288050bd64af8fd95965979894abd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bd5a721b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526178" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{951C42D1-D70E-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2800 2784 iexplore.exe 30 PID 2784 wrote to memory of 2800 2784 iexplore.exe 30 PID 2784 wrote to memory of 2800 2784 iexplore.exe 30 PID 2784 wrote to memory of 2800 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e29c62ef068a13feaa42a0cf53a4d668.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8d072ab1da99b02a03ef517bc57b4a
SHA18943830368f57a8b8b234063ec746855ba39b741
SHA2563e79df667e70deca5cf7707a4ece3a18f0cf8382f7fbaf131ecfbea2896cad6d
SHA5127241b18595f6108aa8c8d91868e5660cacc17ee574effa0253725d7ed926ac80c6e975e667ac2a70831451f921af70a1b9d498737c8705acd0a2e74e20adf1b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf46ab2770249acc1acb58b463b37bfe
SHA1bf231947a4293952c195693c500ae52870b570ce
SHA256e711a8c5a73c5733d3f8e35b60bf1f33cce510a2b1d72b0ca0d4d1367370cca0
SHA512865b742d425e6ceded0d75b9d9293c142fe872d9bee46cf28778bbc427afa68b3f717b37d2777172855eb754ee441085389c8cb7dd87508c548bb57057530b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59454b8c5ad0e4cdcb8ffa2ee45ee0ddf
SHA11b62fb3881c53e80a416eada936a0ec7fc8e5731
SHA2567abbddeaf1798e12df1ebb5aa60c7ca3c4b55a7c123c75cc22feba864054ccd8
SHA512f1992e4144637c1df879f58a52ea3225fe1e56ea0e2de2f6ad2f53b4491fac2623e73e9f187340a705939b52213855bac98d889c39f91c27f4766d144b8bef1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab42e14e6377f149b3517998be90b9a
SHA168bfe5caa4a98265fd367cbafb3df15bbfea85d4
SHA2560a536e56e138b156c02dbc42c26d28e11798fbc53aa47e3bd93564908ade9536
SHA512ed6aa59e1d077c47b289b88d9694ee47b04152b04847393c486d92aca26a32f99619c4f8c905f4fa3487fc40c75cf85595d1773348d3ad6f7d86a5389c1b9259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54906bb7f07063d4e6d4fcbbcd39bfc4d
SHA1ba3070ceb782d21e22c1e88f6a84de74a193a55e
SHA256c8f65cc6abbebfe63001b0f2ca38864ba051f64a2db37ce983fae444bdb8ca4f
SHA5121fa8d861d3cc65ddf60e549ee8b789035d3a29c733beeacf3383906b2b8e1f7dd16836f8efa82d39594b4cbb22a85c87c70e75c08d217b3f210eacb0f402dafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ef4ce374caba4f94336968530075747
SHA1b2b352eda6cc31fbc4c5c220103d4c0e5c638c0d
SHA2563c5344c5bea2617d6a28b03b392f7d4fb67947acd976dd66bfb7313f5440e2bc
SHA51262d9172441c5a68c15bc5cf4ccd84e8fd17b53eeaa3ae1dfee6f796fba79d66fe1d645dc568c9cfeeaaf570d4c42cd55defe23bc6866bedb1d1803b71630e16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b0c64bec064d90a128339a61e692ad
SHA18c85da8aa4c414ddd7a7a2133f5b16a84b70042c
SHA256b8d5e5bfa4c0052b840cd6329e6be1747b09371f2eb472a55b15038b1f3e448f
SHA512e90a576f06f0ddce07e875a939f419b055c3093be163394e6c1fb7059a982f6503504cee30bb00697c7c93c0035473941ec5b2f7815128a50c2058ab821e2c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24b625c070ea1260f24f1e76c6a35b1
SHA15dee6aa4ba5a555a4b005dd31f81a0f07d13b303
SHA256670d658865395d7b8b7335a951a0d8d7e714a5d49d6df686417bb76fe641dfe5
SHA512c7f262d54aef92abd4c9c4296dbf92de2a74f58d13177fdaa8e32cf581c9908f55a44aca09d53b3bfac1fbb59f797ab8b0af5327521b152f36ac18acc880c91f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50078705b295088e4492dac8adeef164f
SHA15e93faa1b7643cf35381c29fe4bf3af9b75e7627
SHA2561c87ad2bdc481d96929e054b6d72c0549c52c559a78cbff417fd8d6f525c1f16
SHA5126e573be0187401ee3a7ecb8c2a4014c8db64c0f1157d12ad4dda01af67bc28cadd36cfd9d6de83061707f44d8272e14012bd503c0d9080c73bd062849720f027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ded0344e54c7481d6eed87a2589a73
SHA10b6d3e0a717b0fb4d1ce2fc5a7116174df6057fc
SHA256f0b27b29d4c49489e16c871bb24b12adb0c64a6fab6133b360c12dc8208be30b
SHA51257de43cb77edf2686a8435b48ef661ad833462aa2edbd1480a9cde0bf4ee97175dcc094f2167a33959112900e8dc52dc3a3d3bf861180c58657a062c742d7dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645a69b072df03fe3fd1ad8add27ebdc
SHA10c184283f99d9699d08efe33580c62d5c14ea94b
SHA25633ceafada7e8837dffe7d04c6cb4029a51e0e77c268949f4e99c32cee00204d6
SHA512daabb82215b71f8699afcd11fd62fa9a22e51f1fe831cbf7c6d1f03cd4edc49c98a87eb613640cdce147e7d7e9214914cd6804c01cb093eb68b251c7d84905a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbaed401c6af82aa8f2b27dd51ce2271
SHA1030a518696d22f979451551f1cde6c579abb3e8a
SHA2560a0f98c1baf1f09f029e5c353e1deed0e14c5f9009a52d864c43cd4db656be98
SHA51227fab5e1f1941a25302a3e64ca41babfe8cbe1d05f38bbcb442e87d67d3274dc2d86c2e87596d0dac6c3f94b994e728213a3069e4bb8e32bc8149964ba65b535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529de0d09c64dbc4660453b33a091ea62
SHA1cc7239976b54b4237992384f0d3f56235eb5de08
SHA25643361f75a6c15a021fed4a48bee38b840fd380cc9827f5b521d1013be9fdc0a5
SHA512e05f250a95dd78478a6e9a859d378d0e99ee8a4c28afa2afbe0bc2c4868b0dfd1041eca448038d28641f2f9ce39992797ec94c07b574783335acacfb82cb7d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7797a312237e2b50c7960d66c9e9793
SHA156b75a1f60761e9575fb3de0c9ab4e8c240dd921
SHA256cff40b36f27f9ab24899c172ccd23c38e6e5604727d426b84ab63e7226d58427
SHA512504d288f416a647fadbd0f635620c3ba674d4062274b01af23c7a7e094e5c92948947378bbc2e81ec1f7e1ce95313486d38bb6bc1eb2f14dc4731d976c2c0c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688792af8949379f2891aae052c91018
SHA148726ab44a8bf5df9d2fe3374ca85dbf5004e094
SHA256668ddcafca0e6b84f0b1402676d870a00dcdbe35c12120186c0c73f1a32be335
SHA512f2703914dfc7519b3c92c0c5498fc0f53f5b536a9b3c8bf9bad46f9f872a0701b4adca4c270447ebf38b1dcefe94b50a514b1992b81129855a01c7cb48665eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f9e57750282d7e36fc4d8ca36d92d6
SHA1374473152cd0595eae18d10f8340085e29a23ec4
SHA256150b11163c4a8dbd6e7ce19cc0792c2cd4308dc339199f736aa931adfb99748e
SHA512fa2ab085e0d7a970b52d20d4e9000eaf3e5bef53911159b053f90049f9249f59e758472980043dfa3e4d0cdb74994dd4f6f5e7fe51d9dce322816caffd370074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e62bdec5a87f402eb19fbb61f73433
SHA1e16b497cecd1d7dcddb1131ce35ba2a109e36cca
SHA256245d228f8fb8c97978e1c0535cd5c3a450aa43bc673f8beaabe762a77b85cd84
SHA5127b5e5722969abf777ca537dbaa472202cd6df152bdda87e3ed7ed78a120b64cdded4367233a5b8608a5e5fca88eb947cd0eb91a1bc3392424fc4edab389e804d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53587f2e7a6ed764ca7b94a87fc526ea7
SHA176e754aeafa9dda0a33fd482b2d0c9aa6e3563cc
SHA2566c6628c48e5331d9e4e263d581cccb90d51d61c5755969b931f6a523b04d93d7
SHA5125dccd32952156d49e7d731dbeb981e979a76ce312956e8fdd928d04e17dde8f03fff5fb20e72efb9161f5c6f22360f7e6893a651cb497a585ada7d4045b9e9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852cd6fa3b3778da054990c21ca76ee7
SHA1a5b97ba3784fd7f990469500036daf7f87cb86df
SHA2566b90499a38346e00d81f9e7c2b785195c93dc93f2ca2bd679fc2a3dec06a2e3c
SHA5121e89fe2ca821b2e58e2b05ea8bc4fff80c5000311a60c2da2ebf0d27e5911f2145718d95ff1ede7d2b4c668304ca4d24c38ea8343ff00401d703f0567f59c462
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b