Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e294e00b4872623c72e69dcccc617be3.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e294e00b4872623c72e69dcccc617be3.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e294e00b4872623c72e69dcccc617be3.html
-
Size
86KB
-
MD5
e294e00b4872623c72e69dcccc617be3
-
SHA1
ccfbd132105b010435a8322e249a289ebc477266
-
SHA256
a3b4fb3ba16722ecfea4ea213c546b5db48fa53ffeecbf26d15aee7b65bbc385
-
SHA512
ee7921e4698df4aeec7ced57b281507122fceafad44c97c34d847b321b3e7e55ad9806687ee8b3be7e428d0017afff8953ce00cbf1adc1232044d7f3835caf6b
-
SSDEEP
1536:gQZBCCOdv0IxCYqeNP8CDjKUCO/0cqGd465gCsX+s0NeGsj9aX+uDBYhQ7DSq7Hk:gk2N0Ix8Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d011d8411b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6AD25551-D70E-11EF-8202-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526107" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a1a9575309631041b2153647ddd1dbc600000000020000000000106600000001000020000000babf03b4786a6a91657004988902ec61a4c52b00adb10f14bd5e5e909a7a24fa000000000e8000000002000020000000012f5eff832982ecb68700df496b43f0c51eddc55ea14ce72c04806835a4dd6b20000000a578c6fbfa6a0f4c60f8a027270d91c030dec05198cfde3c3ff546b995eab26c40000000c00a163dbe899109e17c08163f47efff437e00276fbbe24be037d7e686a317efaadf0ef2ff61122d335e5c37363679a2a6f0d8f15e43fda1df132eb25bdef8c8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 264 iexplore.exe 264 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 264 wrote to memory of 2368 264 iexplore.exe 31 PID 264 wrote to memory of 2368 264 iexplore.exe 31 PID 264 wrote to memory of 2368 264 iexplore.exe 31 PID 264 wrote to memory of 2368 264 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e294e00b4872623c72e69dcccc617be3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f683e64a781c325562c08f85ba323393
SHA1aa00e391a93663c3ca381231ea5f1939788fb740
SHA25615d00396ca87041dfbb9b1935c1f0804b56f068033316a8351149e225c751995
SHA51244cd51e834f6fa9dc5541ef109554f1418f10fac11ca8aa182085fb69f868a70ca93376bc8360a8b7570fdd0530c04ba00433c5579a490482705d09137f5465e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d5b3af97926ff8d2ae6874da8923bf
SHA1e5562bf0d56ed9e95eb63ffaad27058c2d53826a
SHA256e3eae5e08047ad2ec4e865d6cd8548740e26817900d2c3281cf624dee9ecb550
SHA5123765c973672c4fabc06132ee2edb104e31db91d0b3dfc18c8223d7916ab8daa5fc2824e779544169d35958a6d1adf1d08f058cc6c4c00204c38ef5dcdbfd881d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057816997ae19b8162e518e7b1653f24
SHA1904b6e5d1cf21a7e828019a0bf548a16c61fa6ea
SHA256f377b4aa61753f44b6b8774f87a8b6ce850a0dd04aeee5b137eda2a9f409ab95
SHA512228b00c82b3dbaff5b7ed6d473c00c30a7745e65d3f116eed74eb85d8452d36f0301f2b05cdaaa4761680a1f5a7e12c659aad63a3eb280d120965075e64c93f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1ba26cdf78db1eee2f5bc6e764f792
SHA1a2567b875eef307a48a3b9075941339c94f5056e
SHA25639e4b0de849f9acab0844b55b9159f72cda57a9881dbd2ad53de144b242734b2
SHA512d1f6d0a32976e23a4d0d1bf5640413fe78699d1075cf08c5b26a9372ca02ccb1ea18dc21d169eb86514cae3fbac4edb6cfa4463ef408f7e1ce80597fc12d3358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa30f6818e45caca101c2a2cb57a964
SHA1bd8935ed174b348e99bfa12bab0b3c1b619220b1
SHA2567130a71af1acca65efca3b95a8c2c6fe09ac2ad88458a012bc3e62b14593e0db
SHA512545f1f236070582c5ea62aea97b5663e20300ebbecd05e623565b31b5ec18f277324b58450227af75bf73358eaf6d29284a63de9cd4033bdfa5fe5306eacb981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d1ffc6252481f0fb434edc6860dc7a
SHA17ce66e552ab302fd8c2b4fa20c8f9eb466efa904
SHA2561eba51df347fbdae7ee1f476e7f877fd12630f6d0b17016114a3a27b8a03f822
SHA5125f05da1654e29f61203d418927ca373feac10efd0cc581cc2777ef64ad7d0e24175da4a457467d30affba0448574609ae1f1a9efa9a067ebe924316da389ce6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531bb66ba68acd92ab8f4837d349ae47b
SHA10eda205358d2c12a7f4b1c84296fd3c04d444bf4
SHA256d55d3a242ac6cf555dcbca182edda839ab5afa1c39abc301c87b0c769703d772
SHA512632f73a23179b5a9af56a261074ab3b79185088068e05d52808482fff4c02faea7e08b1ee9db6e40fda0380f5efec88b7d5231729eee32b8ced4881d1c5c9a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557dc327f9670146ef8c9a6073a41c618
SHA1b4380dce55831240d887486e82c5a905512b844f
SHA2566e4d676e80c676af1efdf7d2d4430c9f8cea6b24372037b7682e66066c0c23ee
SHA512a475db424e795f2041e363949b7c614f0809088e5a619cf10066ccfdd7e76ad7047f4d98435e2579cfd802eaf75471be3298387e0d379305420cef522ef0093f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032439a81484212866abe64054873867
SHA166b674e29d5d576ed6419813365277fece6d04cb
SHA2569c4232965e606ee3533efba2920bbd1259186366f5b234c7311729712ad5de3a
SHA51295d6757413400ee15a0a6da05398c0ea672043bb1152154847fa6fb522baa47e40d4bd355c2723ca138ffed02e0acf44d954785b34ee3d125e2eb27365f4bf34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507749cc862cedd1c2e3a48f147ab2dc8
SHA19931a3ceb82054fe7fd4cdebbd272a7e11173eb2
SHA2563f15ea7a4120d5a00207e5b578b502da47f23fabcfab050c010b094c0a1aafbf
SHA5123186363c17a1b7a57dfe2bad40de2788d0fb88360b6b494ad3518befcc844fc0cf2381de05f84153c469c7af8c073db159456ca1a4225a464dd74139e8ca16a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a217021a5199f46c507e639fdd6b0778
SHA1e89c64c9ee0dfcfb062e0035cadcd74eef56ea8d
SHA2560998954d69ea54161fa344cf098f66a93480e496ce6d7856922a9b5d13f7c8f2
SHA5126212442bece7bab1b0e57ed19236d133b4d47bd68c2615b1272d12c8abd45f696eca008b05b612bcfeb5e5015153d5181264888f7a9befa490ce764084cba474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58657eed950a29e2dd794a603ab715c68
SHA147c525b3fb9b2699386b1f0271f8ba4b90bced92
SHA256bf50b78ed87605476a7fcebb22fe31a2cbc87951d93396cbe5b38bf6ef32bc00
SHA5129e1c6b8143450628f2406e63b284cc45b6c139ff6d32e410a0b6a86a6fbb3c1b55ee956c90bc6742fb1ce3e4e4304753ea2abeb3808abfefd8cc0809544aedbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59840925f2420aede53c171901c6e4ecc
SHA150fd8ca59b76425ae17f35a2886ef0b1e34e6254
SHA256f462d72dbc6c2227b32d5bc46493f5a745fed1442e14420f5580cfa4ba1b5372
SHA512457d7e9ecf58e5e488a51916449090902b694fe76ac7021bb2d2c4a9a76e0dfdfae9b9c17f4a310b2846051f24f39103e9a1fd111fa0e9f7d0bc29f816067018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da0e59984e4264819f8cf88a2959c47d
SHA154e522fc458785849bb8d6ffb3e6797063763d10
SHA256544538aaafeda4dc8c13450a93b18afde3a24b255d9ebc921f8932b1a2cdb30a
SHA512bba2e6e1a206911dceccfba51f1e0a0c20d59e5372b424f03cf33308cc3c00dc2580a4765b1dc244de0473a0219dc728975d61c9a182ca61ae44981458a06456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20911884c1f50cbacf15be831bce9d8
SHA1feb92c0123ff87a0d3918a523da1ee788c648759
SHA2568bf423ac69e12f2154dd1b81f0850135a207930b815ed6b1d86eb1154a39a7b9
SHA5129657d321966909d9621402e489e4a2f3878c79fa73bc21279659fffc18faa40bf1fec8d3c94de13f1d907b4eb8337b4801b1f719cfe973ad077e072bf3963413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0001a6f1bfdf3a561d364ecf1c6221
SHA12529dc01d75c8303878e32d82626a544228e765e
SHA256ea2a2077036e8e40425aab18f0434b1a83b78b0e1c85d5f2d4cca0ce5980a73f
SHA51210925bf5bd0a2248d09c47f3f9d677dcdc4676cec1e11848b3c3501114116026cf0351d43de3352ee716cc61381abae9aa1dc188b0bfba7bbc4057564b1bdd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cefdb806baf507c9e5b7f22d0a26268e
SHA1319eda4ac0a932e70555aec7169bac9e82eb5d40
SHA256d59f075c0eb533966451e2b3766411f4934ab7b1a65dcf3437e9580485fcf070
SHA51216e684817cd1fac80c2422cee2a453d3e4af556e1b7c14572fc371fd3e2eb8b851443c485cd94889e5c5389da5a60596f1ce4e0b8d5e8bf9de1082a1e878d436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430cba9ae7204ec435610aa1474fa4d6
SHA1e594a4ce2ee3f37a461d65b5e5e7a73f593918ce
SHA256b595a1c3b5ceee012a9f472baa77a5f75ad0355088bf37d5673dd6f33ee8e93d
SHA512f581169d69bf2bfe8ddef01b769e86c1829e35096aa5cc978347b2a7def22e4095ce4809a32a8b345b5b9038cc6903bc3abe9a88414c3ef865aac669f112c163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e262359c3877c983ace39a8cbf5074c3
SHA19fa3e5ce6d499a9d6bee3609c8cdf4840d6a18a9
SHA2568a69dbe8e63cccf1a7667693cbfa4fb4cd75f167a46ba4cc4a3020f31f7f473c
SHA5123fb69a7d681cc95e445b8ee925f418c4480d2967543f43cbc263a2bfade4e3ae685a21b8972159f57c4a6a619db5bbe39fe54d82fce6a9df24acfa5c05dab622
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b