Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2c1e296c57be30a9978d5fac0825d24.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2c1e296c57be30a9978d5fac0825d24.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2c1e296c57be30a9978d5fac0825d24.html
-
Size
9KB
-
MD5
e2c1e296c57be30a9978d5fac0825d24
-
SHA1
2a45452b560dae4174d726d71b3291806ca51d7d
-
SHA256
6f8ab9f2cb4046004c50eb8262c5b9c4215784cf817938331b173796a65ebbef
-
SHA512
3f63b8da819c413f5b990f0ef6460251d3b569cc51465cc6921f0012d3d633dd8a7e26bd61c5750a0f6b4c8e1e9f4eea510eac3807e5a04fd433228eaa5bc850
-
SSDEEP
96:uzVs+ux7wlXLLY1k9o84d12ef7CSTUVGT/kdKtpnVElVHcEZ7ru7f:csz7wFAYS/wKnKPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526612" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000061dd0afc44829944b0d77addaebe84d50000000002000000000010660000000100002000000002003a33ed73776632db49de637e192ff205b7abeb0efddb058b22b513086920000000000e80000000020000200000007e726a688f4a6e8274c6cca3792e5de9f2c001c6f419c8133957e746bec748bf200000001f981870ca3be9448911fd57fdfa9ef40f41048cad5277da19c88b76939f16b5400000000a15f6a0f72d4d3595573040fefd161f0054d469bdc76e582fc0beab7e244f793a64373fb3aefdfb07373230b24cdabdcf345814bda45981cc83158437b991a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{97CCD701-D70F-11EF-AB56-7227CCB080AF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70dd576e1c6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1512 2272 iexplore.exe 31 PID 2272 wrote to memory of 1512 2272 iexplore.exe 31 PID 2272 wrote to memory of 1512 2272 iexplore.exe 31 PID 2272 wrote to memory of 1512 2272 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2c1e296c57be30a9978d5fac0825d24.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eafef6ff7776e096f4c3dc9c2b1fdaf1
SHA198c8e7d769dbe94006f45938fa3a51d4cbb04e1f
SHA25663743c7f0a80cb08a18eb971d7d04a99733e0e6c0e58d0bb61b63cb6adf56440
SHA512f931789686dfbbc29b56197b47c3a3232a6cbe0e05886e2da9e611ee7a653387531fa7b40aeb30879877cad81d161995ed71878b00cb2cc10f89b1e372fc3119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e1b453e73537f00e5e19fb88e039aa
SHA1c353cbd93eac2bcdad23f71ed5779db0de39df97
SHA256d30b26591c8411af088edfe61de33d798d0e2e7d29c3470964f239861e95c1ca
SHA51229f34de59de52da84da0e96e07cd310a08fd8397c3491ba7f43129d8a382966e2bae16e7797d520229440646ae6aa24e285f001cec32a39b6d7b406da6f81546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55470265dfa6f3859ac3441198e377739
SHA1d88c6d85930f721d8b23d05f92497ae781555f10
SHA2566d2e676fb2750f5a67575db07fd57c1fb1e361422463723d0bc47b2f3c9b999f
SHA5120cc516be8cadd4760827c063d1e0e92594fc207f62edd6e7f34e5e644c58fbddebdf4fe7cd9572e5469dd394964da45a818c9e9bd3e546943d0b0d0395076efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e94fb152d8b5790109fb375f9f0adf
SHA19ea51e6beec9d8494cce449805712239c5bf706b
SHA256f5a884583e8fb4b803b9fc4c4f5374d484f0abdc71b3a1ef770cefb2ea8c7f18
SHA51255b0e82c718853bc4e02e62040f88bb956cac41b0a5be7742aec1b1750b3323c1f8159b6dfb139f700851b0f2e4f65b06bdde7cbc87ce5c0f968bf8b7afc5943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1d909f3436f96e537946389f5e56da
SHA1ad3e0f79cb5b70d9b58df8d6c07704543f5cb6ce
SHA256bd2b0a50280208fb84b74ac90b603274ce060e0040cd22bc21f9db9650b88fd6
SHA51209734db19cc781fa96625ca06759f10f299dcd5e0ea94e65053e8041010ec162df4d5ed71d3381b8e2730b5c154ff1bc1a0bf141a1dce1144bf5ffed524fac7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593878c2212ee22b70d26b4c18203e565
SHA1fc4c3185f4d3a220de96f5fdcfb52e4a0b7b2fc2
SHA256798edbbe03cf707ca8e7c59be3fccedf0dd87d82f77d5c25d26b47e192834477
SHA512536b85520f6f42c4a64d17ce5c0df03aafaf881ae403718726943636d8b386bc178a1ae7e95a53c7a3d64b097d2ffb12e3fbc2e8381a362284ca7f3c7f9c1509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6a6faed279286168fb347593c38723
SHA1afb1587361132a5d4016ed29b1e90db2a9b9ea17
SHA256921a0b32c88286cf50309c5fe1ce99cd4b47f595b060af68ebe22714add502e8
SHA512cdc6420625c0bab10217e5a26254be2e95f58b97172526d3bfc762632817bcf5449b2893f06b4afd7acf831d0bc2a3825d833a875065682cfc77d88dc3f49414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c43d4b02a662013c0ad4d36f1b786c
SHA16711404a61d66e92dd504e29f7c1052db212d790
SHA256bd9fdd3822d832aadad9c8b84b744e3aac949c68b1e0032be6f180a288839954
SHA512779f3f753e51a31b842f8963e9c6729d1292a33102762d2fbbab2ee149fc04e5eb90cf5f9bdc84cbd442dc26f65dd0dc0d6d40f97676e7f5dbda372c5a30b188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7288eae9e8974d6239ef192a54f87b
SHA1b8030bd1c9bd2ede566196be732ebc7f7b5d3a37
SHA25683468cd47da536f1f1ee027515c085b07048611892167df47a47b2e863f01858
SHA512d0e053162530a461410d3872305e98a014fd4f66f367844884937ce4ce88bf87e93f63f448a43ba73047b41e3f443d617ef80bc7655130d23007a71179d3429d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da978ff789cbb4133c03d4dad7b4f8a6
SHA17d5cf9909cf7e209490b69a30c504062ac17699a
SHA256735750e582cdb0ecbe4c3375a483279735202a761d248b988be5f130a20690b5
SHA51286519897f0a30d399d294f891c5664b08852c869a28230800163f8d7216ecc4c260a73aed3990cab00e7c70da45fef52b9d1c1e997b60af63953601644131867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc51c1bab7d3955b48f3ee5b0f2a9f83
SHA1328333a7c2bfb619e8d3aa8ff4353136396585a5
SHA2565e855422b2f28f5f31309ad01e925000014275840c767862c49fe31ebb0f76a7
SHA51230dcdb4905f30de07090267a84e829a44e0a720dc6123720e1a37d197e40f35dee1259741ab2e9a4b240d9a50ce952ab0c4ddaf4d3a1cb710d817a55621f3aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc96c346ae3e684c8a06965a9f8587c3
SHA10e61c5d60aae35a48363b6be92507bc5a3c247d2
SHA2561ce28e0c6e2df74bf936fb053969e3d0ee5e5b38641913fafb144cae772906d7
SHA512d8fd5e2476b6924a3a9dc1de0da2fd6b441a1a2c65887426b1596e9fa7dfe3741da852911d530de3af95c84ea2abcdcac9a1fb44d014e6fcd913cce3445f23c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558389597708aa1f24c437ded52ebc143
SHA1ff17b7117b7f2db4d366634ea118256169108359
SHA25696f7e6d5744ec9ee26edd302f6aaec074d9617c50cb1438d733859052d0cd964
SHA5121b9cacba60332b1ebf9e3beec95d7ef5fa6312685bf0972f82cfa2af7c3b385ecaf9db57e6fb3c0babe50daa0430736b2a261be03a32f883f02adb7268d36cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505836a020cf06b19082820a58331b00a
SHA17da62086fe54f69a8abc6db61133f51a30a3554b
SHA25693c807c7bbbe29490bc3527e1c2e0397e168ebdbb00d6dbdcdade7f97c1ee49f
SHA512ae3a6678f50b38e4dfebc75f5b2bc2394b3f68b6088bdc5a3fe5e00e754b97dd80845795174bbebdbe60bd69a130efefdcbeee9c12b83599e24bda1253607452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51561c9fd0f833c976b42094d1edff7a7
SHA157058ce469a1a616de3afd4e825568f92efab42b
SHA256de106cfa16432c5b245b6e17c61eb6e4c0aac9d27935b27d97d7916275d464f8
SHA512912cd86f0247b82044ff8e8f7f90682384158d3e3f900fc2d4f56442e9c61e9aad45301a30484be150a7bce6fbb0bede599fe33ba89d007ea91ce297f1e86d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563383ab0e07c8cf0e79f3bf902154bfb
SHA1a15777900796ed190d64eadaf6a07c9177d345ae
SHA2565c67a893b44a12549f43a11fa52756040bc3bea316151134d1c49b188d22734f
SHA51252b658d405058c4d05834c88bf23c4129fe598d81ef7a7c7431d3aec4ddf0148fe9ac5ff487ff29d8307b4482cba33f2185002a30f2a878d122b774ea745f99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f4cd6a0c31eda93eafbcd1b337bf5d
SHA14c1c0af7a25c7f60281e00115fadb5fb31f18bb9
SHA256bf0a76b647cf83b4c003e69cd810f15e88d11104394f2d2f5f50fe43aef81ccb
SHA512356242b49b300e6aeebe48def4e7677fb531a975a5df330815f73c317f923500ffb2066ae4dbebc29f28dd825186bce067229500bda29033349abc30eb9610d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fea46a13db7984590677953a84c8dd
SHA1b2e0edf2131e5ea707d8f598d71c0b039ee4c73d
SHA2567bafbcd34f2d64455b3b3784c366c1d421e872de5d505e30f5516d80c1115db7
SHA512298dcf970b87f21b8f83dc83c0b2ea2ad6b1d427c59be5ad6baa730d68c35154d242be0f5c033db742a425fed92c7dd2269eb91e5f7bbeaf38ab0f9e306d90d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c01f477dba06ca04d8cafc3918a470f
SHA142ab208631c65d725865eb4df4d6633e5d13c7a6
SHA256cf3f913a4649b83904ece7c847b971160a6a8f2a775e648684ba02fa78f2a7cf
SHA51299fcde779622b5bb4501ba7adb6c44a55f50d74e89b809dd13c7dc728e835f7d70fc8ea9d0d0e946dc2ecc859aafb9e7e96a4f17c00c2935370ad5ddce17c570
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b