Analysis
-
max time kernel
119s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2a3e74eae842e806f6f793e554b8e20.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2a3e74eae842e806f6f793e554b8e20.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2a3e74eae842e806f6f793e554b8e20.html
-
Size
11KB
-
MD5
e2a3e74eae842e806f6f793e554b8e20
-
SHA1
6a596722a93a93fcf4f6de148bd49b35473d096b
-
SHA256
6d2fca08275d484666cef3cfd3d7c1c2a79abccc80a61a5bd08d1d6f3ade3b53
-
SHA512
69c886793bb40d94ac5a2b1cb692474f8597dbc677c23c5e16252ebf32b7e960b8c1fdd1afdb4cf3467dd040b9d09b419754d729d42c9bea0cbc44d2f2713d59
-
SSDEEP
192:2VkrlIsr03Pc8k/w1wvqyMBIznuvMCpm01SAuBuLbdU8d:sClIcuPk/gcMBIznuvMCpm0SAguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000127ec24a6c65244c95f2a9d0d20427de00000000020000000000106600000001000020000000b4fa758472cfa15f26ecf25f79b37468fa8d86de9eac794104002c4dae613da4000000000e8000000002000020000000f3f388bf79aba98fa9c318b73334bad99ad4168911a95ccda530c67a4ac8690320000000b531bb8ccfee545efeefdc96a8316b7141714267583012470311c1f48f6d410e400000004356cd3a91e0c4d7406428c036fed1f0e3b25b909aa32a21db6a19685da85c8d8a62519442c4dde1b9d0c58eb612cf2a7c54f80d431ed08c3cb6476c615ecc96 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f029e6d21b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDC53C41-D70E-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2692 2760 iexplore.exe 30 PID 2760 wrote to memory of 2692 2760 iexplore.exe 30 PID 2760 wrote to memory of 2692 2760 iexplore.exe 30 PID 2760 wrote to memory of 2692 2760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2a3e74eae842e806f6f793e554b8e20.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e8531f2613fbb7e79a0a0e24fbb148
SHA114b1ea0a06dcba422408d46b6d4db333e5e76d6a
SHA256c84de4770719be952a6ca997815b16df300c02d957a06369bdc013b4af94b199
SHA512b1e21aaa7baaf39d1551d6a90a0e338fc43a69bfdb22a3a584609a1c3d0ac6b2249b259d31c8305eef04346474dd8372f4c644f1527d7a290db052c141c85ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0a9c46b4b05813c3eacd056a0ea256
SHA16652159b13ad448b621dc219d59639a442ed567a
SHA256fe68d6db981c61de01342f935103dc41f30a7621e07592e2c0c55f3867afe3d9
SHA512a2a6fa3330c6f9c8f9781ab276146f22b3db4a021c0e5fc1a5e3b298c8b58b4704fd64539f0d31425bbdb08288ceee723f8b99930cc983677c751cdc03f635ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d71801874d59f84fcde2fc9e2023466
SHA1ec77e0903eac308cc7fac3b8838c04c133bd18b5
SHA25675f72c2935fee11b861265027958bf3930cf24134c0a6bcaefd71e38d7dd74a9
SHA512be349729eef4aed1962b753fb6ba62b96de73c18b1060a564ec47d34d5793e55f84d07c732a0f967aefe17daef1b2f04e0614b15d3c71a7a5fc983958746ffbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96c03885b7abdfbec613870eba3ce99
SHA15094ada27678df016eac328cfed1553c78a53f9b
SHA25666a671a99db1c64e30d601485d4be5b78b649a4b1a2e036714ae5fe5281621bc
SHA512d77d54f168f0a96d26ed6f3023d0ba67d44d1068bcdc78b7bd7fd5a475b492bcad6acb2704bf585f7ab2a596e749489cd97b07d0315d79aa254c5b174ed5e3a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b891de10bfb365350efc0d8d89b4689
SHA1566253011adfbd6ed37322380d454eb67fcff041
SHA2565094c2f6f79b830c8e9ff093d7017abb9f329803a78f3aa8aecef83b2385314a
SHA51208d4d4b6064eff45a6f8a7713dfeca1b5a9d7545424c3a50091c20c0d991a8e11855ad965e19bf1703b49a691b6586c32b0169a33ddb0ccb7235766b3fb58951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a58e2a7e7863a002d0bc4796fa6971
SHA12859b65a50ff43faffb41d88d8facafa0320868c
SHA256e004e84a4898348d8e9b79a48b9476a16d4d49bd09e8542d0e2c3b58cb08a939
SHA5122fc11e94fac52ba68a42703f38d92f3fe213bef905b12b0bf25c48a145c35f73265bca0d7e35bef9e65181f0f7251b473be2eecf6f79d252cf5b196c71cb017b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901a5192bd4bbde49c886892ff678fb6
SHA143c83c002decae089e45d543be0dbf8306389e21
SHA256a0147c74e9f3740d53a1f82d19fbad5cf5e6366d1449c8be73bdcd5fdcb1448b
SHA51214df1fba27902bf74d7b749b52032a2b5a132ef8c114d58152a668cb917a5a2685cafb949a74641dd2ec3131bf93999ee3b7d21f17d81f386f1eab23737e3d8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8296a677bd045484b268f71e36ce84
SHA17bddd73247e57646e3caf55b9300e7df7e6502ed
SHA256576eecf9c966d94e51aeeba5c874a79fa49107eb2031c9e3aacfd0fe669ed648
SHA512dc0b0b05a660ef0fa9fdc6f831f6658cfd5f671d44b16d1b94fd41b137b7b8f0657f468d490e20e54eb717d780bb8e93e99dcce4b54a7f0c7b01d37aa10c9f88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506eaa10482fdf4b7fae44489a407c465
SHA1697e98e71bc7b93149fd9bf0cd72be81d45e47e7
SHA2567c8b9e3f42296a9e18f7be3e1c6d7eb5f6c2a7081cb2b81648960e13487de124
SHA51203919f46c4a16c17d365961ffa8cbdf854edabf4dcf986aad622862f4e88528568464559f85c623330dbc407855fb8f76419ebf820d1c824f14f475f9a47fb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb4a1503d4fb0a3d83e9dedc32e5eeb
SHA15303ccf66c6ff8b39734d721e405890850b737b9
SHA256eb61d7b5acca9c04b61e15bfd02b756b46890dbbac88ee72dc1c557e0d048c37
SHA5127e62041074f0a777d92a6d574b7888bf7f94494406a96d0e501902013ae21e5c6f15657f0b010062b4d65e12285fa9dfa93444698786f244936d67c8f22b84ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2047b3be8e248b2b81f369e22f5ae4
SHA1ece4f071102cf5ccc572eb8ebe65902b2094c6d9
SHA256343d7f2347c2fed5deb59c2882d4fb58d37377f3892f8b862b45d9aaa93e195d
SHA5121e04792b93f99ae0f0f65b1cf2b9e79a7bdcfd9d95136c9f5353ccdeb9897a26a6f9318a8f551351e60664019e2b02ac7266ad57595f703ee6130b129a11c820
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4d2b61674fc1515a1a445ada43c8c9
SHA119913bfbdf5b5580fc578dfbf9635eb2cb0a4d0e
SHA25662b313c9228226561eb6c391e48baf5814e24e2cf9155812ee3f527ac0192de2
SHA5123ab87e0199edf1d97eda08c23c80d4b966252ac035b313bc8bc756e4eca8f13c2914376a4e83f21e66d182f7d6b738e3d099cba98d31a85534a80a3c363dc569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57388aecd1ce5cab84198a0a5fdd9f3f2
SHA1faadff2793d276fd7e28a8d6fda1e71f5430a5e1
SHA256798847dd032d7a88d0c0d191353291e4f7cc8756e26b64eed1a6eb7b9e6fa14b
SHA512dfebdd8d80bfa6ce2364944950088b9a229de49a6c50408168bb04949dc2d6f0cece3802004a7b3c34ddc0eba7e7cbae46eabf5c32d494d05a592d07f3b9470b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3aae08ee9c9a3208ce83a9fa759fd7
SHA1a44a5a6ee915917bbe270a3e25ae562f1fd4a574
SHA256efa7052ca547ab22379a3c9712273ce00ba273205b48d5eeed8f3e8eff261f4c
SHA512d8fe5b107e1d82caa0269c4997117206b3d85bc72028e65f691cce6c78f151f859c971ea8338af0ede9f116064fda2d96f286e13356955a5af665044ed1364ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926b64d7d2236bb336873f5d902d4403
SHA10d5f5453e0f38cef560c2379ed60363f789498a7
SHA256346e39996940b22e822d7e748b702d36d08c828f42b5c826e597f3fb0b665ae9
SHA5124d6c02d1d0b6875029bd90b16d868c0ac4dfec357c52a2ee3f18a278a5812ad28f96f4b616ef553d1051a8da947f63a5332bcfa7bc9394d76d31247c968762f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f363a208b8f31e3d7e04d45eea9749c2
SHA1677042c435b862f8624d8f2720ff9a3374b459f3
SHA256018e604e7eca7832a681119ea3421be0516a9c5606c5984a62417e2406452683
SHA51211e05ad6cd11b8cfa9e237242296d070ebda791a70b6dc45ec62cb45ae35b9ebf5d2cf9167b61325049901ffa9aa1150ea2466f0adde93831bd22ff7fe91fffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5108d1c3b3d672dcba8320e1ee93daabb
SHA14c0804c91cd58051003768d8b66242490424de00
SHA2568b751ccaebfba56c112135a8fa1cf72e86c8b21a9d6cbee3f7a85e893f1b05db
SHA512b0f8ab340b86a82ad1c2508ae22e90a725feea6c0371c50795dba4924db3ae23d3f8f42a53e07ecae24cf5e08559c5c3386adfede8200294cc400ea7ec89d89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c0cddafe052006fdb6b7c895a03325
SHA1618fa2b3ba8a70a9416dfb5815c74e3bd3075416
SHA256c608db4b92edfa7530ee79dea76811c74785bc68b1731660809f6c1536dcff1a
SHA512365ca1466aacc59bd222260d4b8904f10f4a5337aa447793fa78f881ec997cdf7027e2b005b1ecc130bdb2ebf0f61c0b1223e185ac8a3dadbed5963fe5f51838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ca6e6957ace1d972e435432254fc9a
SHA186afc5f2de969bdcf773f2a6d2d80f8ad2369a42
SHA256fa881bc1be036c9ab6514085dda36e73c01e674d6159e455d8c63932bcce3baa
SHA512aed137ce2d6196f5a60f1be1455c40b90cd4162c3dee2ce2ff8f2b860918efaa04dd26bff658a8bb0a4691a0d7cad3d01b258cfb3883ce545c07129edd058943
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b