Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2ab28a1c73430898593dfb7ed24fbb7.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2ab28a1c73430898593dfb7ed24fbb7.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2ab28a1c73430898593dfb7ed24fbb7.html
-
Size
10KB
-
MD5
e2ab28a1c73430898593dfb7ed24fbb7
-
SHA1
55b25a94b284348938610e70fd37ae726c28433c
-
SHA256
6981e8ec54441242ae60d120fe44769957b2b3276d1391d052b87b12f94dd0ed
-
SHA512
a52a41497d4e35f05ae471feac3c3bd3be3e2e46d7e817ed6dea5ba53d6392509273b937f6340d8668d1b0d7eedd1cfb6e1fd50c06c1d5fe4616e8a3da70d768
-
SSDEEP
96:uzVs+ux7wQdLLY1k9o84d12ef7CSTUKGT/kEppSOR8lYR8dlR8cyblVHcEZ7ru7f:csz7fdAYS/7+LSCSfS1PHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03FDBA81-D70F-11EF-9A8E-4A174794FC88} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000411bcdb2f9540e47bc08e351536c485b00000000020000000000106600000001000020000000f77ee55923b50531e6f0429c53732e1d05b216b58b3ef3bf7f94d2820d941096000000000e800000000200002000000053dbf842f842b2075b7bccbb66da5615a641e44655e125e6c65161bc50d2000a200000008c65a436f585b8ac26913ed874eef796bc456a9b721f605eed442309a0d056ed40000000ed8b04c3e65a42c353f843719bafdcfde7b41c9300dd775226076f78353dde53a59cf3f4b122bccbd4bba57a874bacec96d48048d5f74e63c7f795b11192c12c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03400d91b6bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526364" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2808 3020 iexplore.exe 30 PID 3020 wrote to memory of 2808 3020 iexplore.exe 30 PID 3020 wrote to memory of 2808 3020 iexplore.exe 30 PID 3020 wrote to memory of 2808 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2ab28a1c73430898593dfb7ed24fbb7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b6b04db99ea66e7530ea651073c23d9
SHA12411cbab89292992b2c4ffc16cb1958b6506d83e
SHA25622af659968c5b339ac015caef80d90390a611af0fe348b2e48163653230c5865
SHA512dc4294fb09a84d9937efaad1dddcfef4d34fcc0a5623fd4ab97dfed51d7a192eda623b2aa057ef9370c0a3e9ac84023ff24c64091fc64f66ca79f5d968a90d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f507611ff777ac25a45eadd6c1c6f2b
SHA1c408bb157b48d8c44579ad619f32daa5e76afa82
SHA25694be7b49b8cd0a709c3fee3837dfdeedd0f5b220d99ccd40a5b63e81b80b26df
SHA512c8a7ae08790fe877befaa978d6d9d1ee86ffa5722264bad38c57808b59d309e050c99183b23a31bb0fce4501d4dff5c3e84a386be06a153babe1086fb349510c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c40dfb7f6c2f6bee2c1e56cc91285b
SHA1229219748702a7df7d9bb443bb48902e1dc36d8c
SHA2562eada67d927142019765ad5068c0e2afca90031672549bbea3efefe344d35834
SHA512e28cc8833cf230d20a64a64b2b00dbfcdba9411a270c818b90c58f4f86e4eb4d7d707202d1c4b08651c765fa39013f041fff4eef893ab49e7310c2b442792847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d9f186d2f8801d68ce525e1d465709
SHA1909b5f495df71e71c2e7379104f4bff7c1327f43
SHA25697dd9bba103df3243c2cfc5ff08d1826ea94adf7e0fe826fef3089d83cfa7f11
SHA512969a4598a02cacf0ba5c5b6042319f468aa59d3277fabd431a4b9b18f87329f18d3a2085f6fe05319dc37fa8d74c636f8012f60b3d2295446c6741a4588fe8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e732041713bf15a740b8c260812496
SHA10b224364169d6c7845b3ac34f233d3439661a7de
SHA2566e9e529b26220007c53d749735dcb739ad80e361fb455961dc39e19ddc7f45f8
SHA51254c2f6e39a5918504c6d19235a2722fe34b3b64fbb0df818b388811536e10825df153ed55c46751e6f965be651f13a0b27a72c1aa0aa469e323e318d6b5934a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bd04c0d89dfb922faccecc508268b5
SHA11793b27209d476214a31f7113dc8dfedd70863ac
SHA2567e88473ae3c3377f5a021fdf3fc15a6553dbc53e8976f43f925323607d0edf90
SHA5125592913e8b13ae49b26709a023e4f3e2fa0e3d00e5ef52caceaa4f6a71607e8a6d2bc27fac1c479c3fc02d0941f329245e6479153ef209bdfef1925c7d3de4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58393397d1cd3d99497846982544c0258
SHA1e780c5234fdf76f643857f8b166a08a71babf9a0
SHA2564c153c1658feaa2c5736f6ea0a3c9e9595b2b8ac4418b83db1bf8115563ef488
SHA51221063d254bd6a0e9738e3a1fa0b3e2998db64c76fe2f4af8df389bebe096cd96f889097177765bd3a4858a885d35bdfdfbdc8c64c690a7a0d913602b8971e1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288d87298dc469ffa786d2f77a2629c3
SHA16664e25122876ae0e7f002b536d6048eb05aedda
SHA256be07806df26a3c9c58e739df51f9fba14660577ad46985a79f93ef653df6559f
SHA51237309ffdc03b086918a76eadcbbf38e2315b098634dcb406be3355bac48f9c66582866f79ab3aa07818e6fc0358606761688478850c84f8046301011f12a572c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b380b88c3c7be457c990c37eaaf094a4
SHA119f96b82ff8e32ad9c73575dc149b0e5ef9cf268
SHA25664a5c0fa72c1b87186f56f0c2d332efe68436cf4e4c23994dd0984a35f7a56cf
SHA5121c45ced3d998476c7c214acf4ca9844ffa4f08800e9521c7cb892487a631937f2fec0ab2aeff2e5d45dae521e401230b066f0c62e25580726b0a32089acbc379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d192ca492f068a697749e11cdc2d4a
SHA156dadbd824c3f6af17fd5d1818d158e200aca8c7
SHA256e26aa3e5c4689d1de1dc062a736793b1d5d1b82b159f6d925a8c829769771bfc
SHA512c3a493631b2aba0861586cbb1ec36d131333ac87984344d1eb49b247a1d22975682def48779ef90734df69271cb944b2cac5a906b7f060602453e6d60b93c595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d56a1dd65d8ce64923644e2fbac0b62
SHA1c250dfd45eb1987c8ba90f9d36285b2dc3156fba
SHA256d8057f1abcdf550cba13d2b929de9d9f01e77d187b020ab6f167eb4f4ace7af0
SHA512d076852cc659380431b432c53483d61f589d0750c76fe51d2af31af045bbed31a67dec05cf4d851d633f199be32bf9885285392b26f30fa0cc4a5476d644821b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522af2f32a3738c137462d53a070f10f6
SHA1fd87b7bd517d78b87f11d94feb774433eeabe8ff
SHA256c64f16ab8193b27e39402c31d3c39cc471062ce5865cf941aa404d6b96f6f9b0
SHA5127e0c493cdaaf54d4e1855b1ede3a3a90963ceed9a96498d416eae06546817794ff59c66ff60509bf2ca992ae3e3405502a575cc23c14d97a4a0c0bd7c9cfc762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d9923c2bd19acc47edbf5babf5bc8a
SHA1ed5e29d439ec2a9bd1f8eb766ef994867fc072df
SHA25689a3d4965eec30e5f51346d6cfd850026f145cc74b011cf141b7c3ef0702f34e
SHA512e6a09d034709fe031bee9f21454df7af317d74f040b7d3d2f147a776f084bc4c4a17558a32f7ecf7538057cff59d377ac4938af0de82403b7044ca56c342481d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f9ed9f52657e498e582bbf27bba071d
SHA15ee20d015947ed312a42d3f5382af4edc2324d10
SHA2564c9b0933cfb9cee1875cc5d48ff596927aed29ba2271c1dbaa0c291e8e48a5a7
SHA5121c87f526cbd7a20e0fd2061d855c7a0b7bc5dbb41034d2db27b1708fcb770383223d665b1056d937632190ecc1b3b04221846d05c52f0d9ef36929f60dc2bc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b20538bda425dfe83eb6a7a78944ef9d
SHA17d9695e64ad0776c703d4b80a5af0e64e9fa216f
SHA25620b83768f5da6dcad0329fef065c6d540b7f2d341d31e20c83f3c838b622675a
SHA5127c11a53e376be924f4230acadfe12bc60cdb9ecc92b99b51038b46b37ca68a9d8fdc4910dac06f75af6c6dad1c1c04490bc0039c91e5a76e041c06e60d3e9715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e21cccff4ddfa2e9aeb8cd9145d657
SHA1f664e4e381608028c0cd753c1758079509199364
SHA25648ee64aebe2cabe950fa86ff39cd57c51e2ae5d9965f54928551699a9fdbbf77
SHA512c374ad727c90b996ea746517e0a145cbd18c8e04455fd7cfe491f0f7cbd296dc5e8d4f5d0eca135a245fc42f2a0e1ef899434cb699d4b3a0ab34307356b5c2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928c504cda48a518ea060b41ca4a058f
SHA1cac0beaeb7eb24f4f4619df7f7cebd9999b1a5b0
SHA256122f5fcc4aefbea68a06ff7e89488dfcd2c3148bcfabdd0321be4f97e5d5a114
SHA5129ca20317f013a7ef7fad582f8e52be11a34e104c651cf9f78a8872ffeea97ba25266df280c237c6d91b5127d0cb4a3a7c6f1bd0e5462eb8c8745b36f300103d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b378f5f0d2dd16521718777199c7c3
SHA1741c12043b48f0926a316364ce23039b6d9cd425
SHA2569a5e53a3f38554ef3c653a93457144041d2d226f9bfba40d43ba8b59f7d2a241
SHA5123cfc841b0fcac32eb20a019bd10a6f46f0d55a44ff7cf1d784a067cc6dfa18baf3ef26af4321439078250ee3724193a6da649556e87f0a3bafe9b9697b9a8012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea32ca7c39a1eeb9e662f9d24f9d8c5
SHA12d4840cc02ff3b8e15f40665ffd0474475a9add2
SHA256db7b82866b881dffd62efb0cf16b363ca664811e4153e02d75159a3de51bf6d2
SHA512b1eb2751c39801dedab76f2f8cc714332f5ddc69ad124eee602333abe36aefb21371de0920c9ab3f901b0d9305ed90fbf9351d5247d9986718081f1fd055cd5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b