Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2966c36a3e9c414b4f46862a82d11c0.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2966c36a3e9c414b4f46862a82d11c0.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2966c36a3e9c414b4f46862a82d11c0.html
-
Size
15KB
-
MD5
e2966c36a3e9c414b4f46862a82d11c0
-
SHA1
11a08edac5e4ff013c05894954e78ed3fcb31866
-
SHA256
7c94807a88e61c450e609f3014af861381938207adc077e40b88990600b29fb9
-
SHA512
4fd56613e4de84bf95a792ca29001ba984e1ed17df4d0dd258a151bf6f4e089b8d5c4e5c2c2f274d8daa4bb80b9fb70288b5f0d4d6fb8191cb9596af5eaee933
-
SSDEEP
192:C1f83pf7qkWCVLy2j7L0n7+nGd9gmGRw5XnSQsW:Cf83pfHWoE+nGjgmGCxSe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526122" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7327D901-D70E-11EF-86F5-E699F793024F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2516 2968 iexplore.exe 29 PID 2968 wrote to memory of 2516 2968 iexplore.exe 29 PID 2968 wrote to memory of 2516 2968 iexplore.exe 29 PID 2968 wrote to memory of 2516 2968 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2966c36a3e9c414b4f46862a82d11c0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5545d6836b7a309563f3e3cbb387a98eb
SHA188ff232bb32d35e18b2f309e275b43d670eb7096
SHA256bf86da1c2f77dfd30c9a2802b7b2a28caf5a7f492b51bb3c88255b7461b3c2d1
SHA512036a350b8b4427fd3f908c3365ac8410ba4a9255952e3006e0b4da4432e5619d9883ffc23474a2ed373f6c626b5f8287181298f59ebc2d2fe7949cc3aff51711
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_B05F2E1AA1980E34F0399E6443E4BD65
Filesize471B
MD5a70d4fb087cf6df5079196f62b0ca17a
SHA160e6dec52f6ffb575c40a044651b51564c5294bc
SHA25618cc6918e15d465ac1685209b81949a3d61b605c3f35f59c60392db9bf17bcfb
SHA51265590464b3beb020e041df694cec0bfbac44781a020cbdf65115926fbeeeeefd5bce6201c0c151b00d12e022ca1e8e4eb862d11f7fc13d3ab50c62b919d53b57
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52a2487f798ec0068635b980d9428e673
SHA10d695709ab19e6da7bc6f54cadf012a435d95885
SHA2568ce1d9870cb95a23eb4108b5a9bd530eafbb0be6f50400317fa1156b58bd3cb5
SHA5129d087dd53f0736a95f00b096b76a5e3627ce400be13995202e8d62f78b6e3daaadb280043ac21451eaae91cb6eac9220774678fa065b8db1311a543beb5dfded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD55a6ee2ab30bf7dbaa49f6bf7d2e914e3
SHA1e955d51ebdb99f3dea5b1a3258cbe1f5140fd4de
SHA2562432abdaa909231d7391cc441dd75960d20d506173587fba4cfcec237a575482
SHA5121f45728cf0f2d079c02b14499491b29b78eebedf42208caad7cc8207a46211cc7ce8407f89d4eb6721f28dbdf2e6085952e995f023520d8526951b4d4cc7057d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776e3a12244d3f4643e3f6420e04fbce
SHA145d8ad756e382bd844d96a57ed427d992acb9661
SHA256b57cdb5d93ba609d0c97178fb3a40fc46f1e734795c7d11aa8f1031a64f73136
SHA512a163473523500ed3cb66288c737ebd8f8f51a5b77a55b2e84e6a3f5563ae99e4498a27bb2c804d9c75899e415212055a26d9092c9efaed2e49c334aa56c899f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f03283f5033e36055cc21994850d9d
SHA1b3f1e1da64632f5e7354b5191b7dfd5bb9b573f1
SHA2567926969d21abb9f552ef1ccf8d3d1bacc8cd09e5d403424654a547772cd15007
SHA512dc576f2f16f9b3185a6c1444a8253ea7257dc754362f3148ef99531f359a2d550ebadba3198446f9e084080caa0c710522841321c4a597ffe4f8086db90a655d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b03a8d47dfbfb106de7da1429b05f945
SHA16e6eafbfad3362411cd6a393d0b87c549a911ff3
SHA256e1830095448fd8583bfa14995a049fc2310abe321edea126e4c882fbef4c3e70
SHA512fbf3ee34a074c617212f08ab51e1df53c0710bc6136e14661b8d96ce3c003defba9a2159acc0a2a74de64e467d64b670015b454ea8f9fd2b12faf070b6d35798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d65e5732b001dfdcfb685c421713f82
SHA1f3c7d6fa90c62ff729a0d1bd22c581cbb2c4a8fe
SHA2569c11c5f2dd8b7aa37b5e0331e4401e24ebca9ce52dbbe9d870e03b4afebc72cc
SHA5120068e2797729cf1e1e560642ec42881a65843bcea94e5e54af710aeeaf51479ba2c42aa10c53d1e55ce6d0b04ae3ab8b535d2454c0c434f878532c5d0562b428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1e36948e0dd82dcaf7f828697725b8
SHA124a3d170520571f219ba3d05ccfb790dd2c5285b
SHA256df010c3dea60ed6706cfe9ef88d3f0d7957e422b3d01838cd5f14540e6a08b23
SHA512a266b0be056dfedc4706af2dc5dd1b0b8a83bdc641db67f17da398721d2bd39082307cfd1a45a254e432df1b8450830572da4c16fb2078153132d9e8b880c2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a7634730ac28928b32e1af6da4d637
SHA18c3d71d00a172d85d6a606550be5e2793c2adc2b
SHA256b4fee7c6c495d9047ac818059e83d7e2c3c40396f098f3014efd8efb32caad3f
SHA512f25fdf5245dcd2d6aaba5222f59e785d09b9908ce9d7e010cc49aeaae3810134941ac8b1111c872cb18b8ed14dd9fdc846038af4b1544fd9fc008da3516cce34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf7d8981a6c661213c7f7f07617c0bf
SHA1cac6976bcad99b6430046e45890b6b4ac45ab83b
SHA256eefc6c7e248854a3e6d914687e486646d5516899e590d24c222fe9a6462d9a32
SHA512bbce7663212cef089f2ee0c37a223a1828b411e21a43eba40f752aab1de73a9ad8258bcaa426c5b73c0ae088ccd04cf865c2e15c072b67c61ec4045be7aaa357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7a854c4b6edda7e5cb0d1aa72d39b0
SHA1f1aec37620919edda6cd2e47a8104e7d7f7d257e
SHA2564a609c297faa019bd569f594d72c254b372f75ce7f1b6e8af13e4dec251ace00
SHA51207e5ede011c91811d9b4a9aed1727c1e7e3159d40e3ee1b83d32aa7c51ff6447828aace8864746d1522385afc650d9d14ede21c167cececa5a4efcfe4d4cafe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acafd460818b54c6aa618b8e4f398e5
SHA1f061c1bbe161c0cf713bfb3879a1a78f496b5a1f
SHA2565cf10f79025ea6c0f36d3aa85c96dbe7135a89f3ff4e4b564d1427a190255b4b
SHA51219d47bb93fc7bc8c1463dbdccb2b856be68df3d8e2c24657a684aa53fbfeffa054c2a1f2aca9e41416d06d95ba18f82ad191cdc5d9b59c8dfe17ee3202bab26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb305d65c2f94cc4948a2f66901b6eb
SHA1de1bc032de72d0c59c0aacb6a74acc32c2a9d898
SHA256a1f7f0e4233578cddb2005e679d33df5d60c20bc4478baab8df90c393b242c4e
SHA5127f504c409b63c59d3093c1a98921c069785e9f2e7d8e0fdde0975e2cc39d118e9b5aa5faaf632967b7b8d9b01ba3231dc8ee79b96a8582132a42b580c50f568a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1556b921346ca1fedc275f2089e2ea2
SHA1aebaf46d91bf2732b180e4d081aac3ab55fb050e
SHA256766ff88522ae652110550f97c5f399f658f8bf3f6365e301ceca577f79e21611
SHA5120cc0d69008bc2e103903ffb78b582b57f94b73f5df2ae9bc0841e6f20c33581c1ac997912ae9ca7f46509c3754395379c450dfdcc4c7fd1aa62dfd323e30e675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c09c51d4f3a1e1415605cd2f0ad00d0c
SHA1922fda82b87abf842112d2c8e7bf737d0b502ac0
SHA2561eeadee40a2386e586b56f593d28306579fa0f24ba5d988c9ccfb40fbc386c01
SHA5127b2daab7600268aba1abac9b5be9584b764f96683911be4ef420bb2bedb787c269813123310d5336c78c226fcee43c5ce95fe72b1dd75900fe237542fa36f89e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\jsP40037JS.js
Filesize205KB
MD536673b0e8bebefd5943ac3d85c19f808
SHA1864822b1ba80465485d8ebe55d3414d25b8a44ee
SHA2565be921f6c660353ff1ea99e5066618f4ecffc68aa1f92bd7631fd19373fdd886
SHA5122260ea9e0777c414b6cea59e2500b206c3e76c05ecfeb5929257e385d27788a055248d276b562d112cdbfadd2d288b3c3857d183a11db548d632c37c5cddba42
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\js[6].js
Filesize215KB
MD5d163ede2765f07ff38e81dd1874208da
SHA100210d01826cb71e81440268b726abe80d3f8dfc
SHA25682166895d9a24c1b3babee9eb5adda44566c31eaa39ff6d11e2d02730d865fe9
SHA512674529b619327e727f149a453c879be6f7b8362b9f3ac15c9057ba83c8da83186fa51c681d523cd0150a4dd474f38b65c1fb29053996c145718e653f3f706183
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\js4GMJK436.js
Filesize205KB
MD506096ccc550f825d1b5d306a7e681c28
SHA1047d83c6cc114599b1ca4f37a2f46675e042ee19
SHA2560b1dc588aa6ff1c9575daa51e3906e62a5b5f0405b5ca34ed99d50775bc4c4d7
SHA512b21a1c21e31a47ed6ad067c7c953cac3f41d999a7ea2d4809e79f2bfde9a35df6094d413412fb3decd410da024e339f983876c4a6fba0e884e7594d4223fd89a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IAE3FJ0M\js25XLL88H.js
Filesize247KB
MD52ddc02463fdeb3ceeb64b6b878dc9a13
SHA1ec47897c6b061db31e71e4d65b62ee8ea098439e
SHA256fd726eaaffa8fe677553b41a4dfe297a54878a8a8ec77f64cb3e1299bce5c553
SHA51264e19eee861113707a30df251c4d852785e2b6dd1b00f18d0eda3d7d88cb05136807d26fe301ba1d68e33f02b260a9214057528e5da47376bcc0272872320709
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\js6EVWEHP5.js
Filesize141KB
MD5da91d2477177c5063bdbcdd7a98af855
SHA1a9b0735cdc2a61340c7b9bf2f96ec9379bdc1b18
SHA256cecf5b2e83b556f8465fa9fd7bd676896b31f0e5a89891aac0c43b1dfcd25b88
SHA512bbd822feacfe30820e0c70d1f01a06588fca5e6c4309b9c71b908c4ededff82fa5757cb17724c6278f3c46698e4c5533363f963e11ffdd88097818cb224b18dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b