Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2c305aeff4e5c9df3d66210dc6f51e7.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2c305aeff4e5c9df3d66210dc6f51e7.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2c305aeff4e5c9df3d66210dc6f51e7.html
-
Size
11KB
-
MD5
e2c305aeff4e5c9df3d66210dc6f51e7
-
SHA1
8cc710d193be4b70fb98397fd98ec6e1a3786dd1
-
SHA256
7d5b85e9b41079f7fd87b1b425a20b72cffa6b3e6a358c839da21bc8f47cd8e1
-
SHA512
1e67829f98bdbb91e86eefde1f75e38f9d9f1a967b013b2307e46f697014969fbb1c80112ef82abd13bf1097dff824a2b52210644fc4cb34a8854868ac8bcc34
-
SSDEEP
96:uzVs+ux7xmLLY1k9o84d12ef7CSTUnGT/kG5pJ47XTu8BdF1lxw7XLjlVHcEZ7r+:csz7xmAYS/6SJuXTBPyXLjPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bc70524f206e8549b8c7cde7805b682d000000000200000000001066000000010000200000002a6e9f24499cc18384a4d1d6ac6c46655f757446b8acc69ddc86b849bf2d29d8000000000e8000000002000020000000da6fed2ff9f24f916df857aa5448107e9b19ef007ea3bb700d007d8a8ea88f1e2000000075d2b7abd19d02e98a2eb3e1252f8945ff0e501c2b9a2fdcdb983164dc65b6ee400000003176aa6eedfe72f069247f5f6b55c004448a2e6ed1704de810b2e6581441f104707e6962601ba73d8a4e2e2ab60a3cc012358fdec77180ae368d3556d8cc00d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E5D7931-D70F-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7076d6741c6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526623" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1672 2420 iexplore.exe 30 PID 2420 wrote to memory of 1672 2420 iexplore.exe 30 PID 2420 wrote to memory of 1672 2420 iexplore.exe 30 PID 2420 wrote to memory of 1672 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2c305aeff4e5c9df3d66210dc6f51e7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9f90b3c8ce4f6a8906ad1c6ca96571
SHA15d4e1f7801f16444787457d87745656c7663be76
SHA25688b5506304ad618f798078ffbccdf50311ef4aadffd8cb60ca6a1afe3cf87135
SHA51205704a5ba7092092d1f70c5574ff4a302de5c205263982febc15893f08907f5b0b76369cfb453ca357af6dbf14e1cf24715f0e74182e4bf311e9e9d37cd332cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e7e54a26fea92f13418d7bd646e50e
SHA19cf7a60ace71beb03c31a5dd32b1bab821cb185b
SHA256cc88a0d89c3052326977562df359567455d29bf35aec299314d776eb779ed320
SHA5128a3b39a4d9e3cef06f922ffef52ec666ac25faf0eef7478099b819fa6588342c8a21683a224bd86057913c12ff1887631a3fc74defc76d4865af6f4a5d6ad0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58803ddc0ff7bf59a24a1591f72c4c6fd
SHA148e41cedeb138f1d5b45af0b876e3a3c1a1014e9
SHA2569d6f8bfff3e764497db07b7540b99b6bf382f402a191dba0173e38dcd02478d7
SHA512c9467e71beec75050bc1531f8883d0bfc5f6e428fcfe395b2be358c1763401e58bc14116b912bf1d17b96ad6cb0eb5a6a75f22c3c7579d02640f6fbb43f48432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25869c83a964f7f322662a28c0e9e38
SHA1d5f450777e8baa36144ae2ef437c961c932b4b3f
SHA256c363ea28afe3e8eb5e1b7f37365e8760485bf87eb874241b1ede28a143e817ee
SHA512796e5894930b4056f796ce23b2134f01b8561dc9366763305a71033704c0dbd741e8b14ee1ccba6adca8f7f26582062d23ff0aaa131e33d29367466c9b81666a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce70f619822b6135c1aa2c091925b61
SHA1acdce8b008e14b2132277120bbf7c8d486a76d98
SHA2561bf9a067d091cf73acaf3c1ca9985e4516b4352eb6253213ed0561ceda799fbf
SHA512854b5705eb4f2ec437bfba2cc06d7be740efdf0eea4a2ea4c0d15dbacaacfb3ccfa73526cc767eb3572885e580abad07052dcd2282b474d4cb2e30a0f3daea78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f9a5360fe97fcf4301c436a3795a88
SHA1ff1f3aec9e4eb43202852e02de107ecec1eb0510
SHA25647ec1ff4ce42305fce6f5ef4de3a8cd0cbf46f2e52d4fa5fae5ffc36af25d89c
SHA512a002361415bc9a679be23691d31678a3bb22c5c00f2a4f555943da6c4717c4a031e59b97bb7ce02599453120eb14133469ac8e89fb7c7c815a3e380f7655e6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ec768e7047b1bebdfe7682ede87af4
SHA1718754e827077e6adc863426b997386190e515fd
SHA256523cae8a566685f158804a33379a70673683f43133af6674a09eefd39ec3783c
SHA512395a5807252e70f572279f76e3b409dca883ef1491c4de51af53cf269135415454c4d9a049a63cb4b22919038aa707931a056c5768a6b824867fcf6af581ddfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e46e6e4ef0d6cc0386c21a62a2ad776
SHA171fd3b08ebc4bf108c91c329da18a4e3328af5a1
SHA256f50a74975fe393f7deb21d2e4db206b0cf167eb87a640421bd2eddb2f73b80f0
SHA512862d25b8394a7191aafab8654e9c5b9061c1509a65a39d6790a809cb7dff2b45f91204b2e7ccd84593e252ba06e1cdc0322198b4ebd589d62c3d852c9c5b96f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90e329554c5a19d979c9aa6601ce0b0
SHA180f16e9210246da38ff64a9119fa2aceb22f9485
SHA2565a98f4270bb3fc6bde795887e82795e1063275da0234cc6772418a0dd7e7fb9d
SHA5120ee33c640b22b40f1171c1b0e0974a67b79fea613ef7411faba899bf69ec7e6cf0830d3f56c3f7cf1e3f74ee995e261cc43261d4ae6cf831b837683386bb4dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8532d5f257df3b99bae567a4f46fde
SHA1cad9e812fea518d9bc7911209faf38c46e14f871
SHA2569fb97862373a5661a51b11b4884f1e5a68a4ec1fbeb89de550de731738e63ebe
SHA512691a81034ff714e20c4e57d92c451b8b23f975318317c263b6add8bf346d6dcbae59684d640da3608299a41e3e0f740262252443b3d208f694eebe5d35544c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0d7919d2bcd6b8c6c63dca378c7da6
SHA1e7d6b6f8bba93cf47c03c655fac49ef1da9e4383
SHA2567fdab8af32661cae81c434a814935955649b8e409489936d757ac6e5771182c9
SHA51210dd877b6e7632a38b8b2509973caf299e8f9d9bdaaed3e4a0dbd237b1076b2713d563496cdc3f67b5e16a0b4cd4f63ddf496ec97fbccc817a2003567c32b4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e70a19c8eccfbd65c7dfe394dac4d634
SHA1201c4dcafed86fadf884595d09915c695c7daafa
SHA256c55449333f7688ab92c4e7fab7dbe760a46d6c725db79eb81d6f3c6f930f170e
SHA51222abf370285e644fe436e71891b4a30d46dc775a2755f835a733f3f0e0edf530acd0fa67bfdc0246ecedc33a9e651270d8a9ab93859122e52f820eb7ef4cf93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2118c8c08482248a78c6266608507b
SHA1ea2fbc0088b87aca90942921d5baf8b2333c204c
SHA256581a2dd35b41474f779185eaf43c772d3f61ec8b7003e52391f7becc1fbe58d8
SHA5129848d3de967d676a3f9a36659a771ee7825f5115d6b4fbe9c14b7ea40725c10451641e93865f031193ffeabf57f8532a34ccec0277133f57ae270daabaa9d444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14b2772ad0969887d86b0aa7fb4cb6e
SHA153e287aa009550ddecc8a69c9df3a5640f7940b7
SHA256bfadcba7671daf7fe57b3b3c583debf1fa18d45eb5f0c914cc8aff38e5c9f06e
SHA512a3439a745471b51d7f0cc2723b8efbed50ff223071486d319afc62be76280a70c68dc968aaf2c3da33adfd01251dd9647be8cd34857882ab09807653f8ce4902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d02ae6a752d8e8f204f422a6822e2e7
SHA1ed05467959475c9c614d958bdfaab00db71f0860
SHA25606e4521b2019390f48adcef42bd75fb4384427d8f25bec67ec865f0a786f2593
SHA512df3a0c50fe1d47e9e63d007bac8f5c3fde1953c06a5e74190f5d50b93b6b533f22d1e730ca69ff0b79697395cd39369872a78591cd09ed929b12d345f5c29c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed89af1d5c73e71833af4e0570ff2f9
SHA1f8482381d3d9432c9bcc584664380ce7f9e4bf05
SHA256ffbb61bf09d417596d48bbebe5e09ec0ac89c4cdd3dfe906e264094d6364d9cf
SHA512a2676bbc13a24fa3bee9fddb047a30caca9e6fbf469daba5cfee8d2c46668ce950ab813aa9819ebd7ba3cce81235b074647c6eeca0c93dab14f1399c1d033edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f07de48c0614455949efe5fd746db2
SHA1552a96a39a420fb0bc3f6be2eb3e09bae0d98aa6
SHA25699d6cca2952506c4791458796006eec0b82adcf86f17c7cfb6a6e63955ad14f9
SHA5127aa5cd8b6c814e5b147c35c30eac58cf294d592ac17e90aeb1d8dc80e05546d8329525d8b801c08af4fc2a5ff319ddb1d701e499312a59d3bcb4898cfbbfd222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d18199e0b272ab6e4baa64e42f17c9
SHA1c9b0dfe54395f885d307aa1b73ff40e187e4850e
SHA256577c9b4e6a14864e4f62345444a54032294a4df2926d79f3a9ebaf43e62d594e
SHA512fb2bcbd3072f0e8f7a5c56cd0431bc88e3088fd5e41a69108b392a897eaab40894f16bf191f2009b7a6a817e792ac536fece2d36f602ed49ef6d3534b75c2b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b0530e89f3501d138c2304bf4d729b
SHA16a543f14cc27b01f99dabe0d674f3b1dcb53b467
SHA256cd9fbf5989dbe9d1fd9470f7ab8b0aa8a292b71e9f1a6dcdeef7bffa70f1dccb
SHA5128d058bb79c415748d2641ce312f0e5444cc2db3b9ecd138d54bbbc8e9b6827e253befde2c4c64b48a057512c26bdf54c7f18416b9f1d4aa8ae18c138dbf677b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b