Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2be6ebc8314ac9dfd59b92581c4c867.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2be6ebc8314ac9dfd59b92581c4c867.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2be6ebc8314ac9dfd59b92581c4c867.html
-
Size
6KB
-
MD5
e2be6ebc8314ac9dfd59b92581c4c867
-
SHA1
1dcc86a17d806d12f35b384e7991cc5769edd7e4
-
SHA256
4cfc07013323d8431357a0734fd4c2b0e95693d0a6b444cab711eb79489799f8
-
SHA512
b4fb45fda6213a89f77406094d4f1d505bcd08fbc0ca70fb8cb5ed19e8ced9b9a10b6a3cbb538bfb81366b46003b09dab75134c876ef9b736a4284f6cf943e5a
-
SSDEEP
96:uzVs+ux7fzLLY1k9o84d12ef7CSTUYZcEZ7ru7f:csz7fzAYS/Xb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{884CBB11-D70F-11EF-B81F-6A951C293183} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526585" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2067bf5e1c6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000079d86b8f1950c248bd4caaa308bb6e7500000000020000000000106600000001000020000000aabcb6e9b393ede0fe99c39071e208b6641ba795d41c17fb1bd1bd243c9720c9000000000e800000000200002000000095b630deea988622537729d386ae4237acaee3493d83c1e09dea40ed1cbcdb02200000004d6f402f2e4f0c23ea9725147b505177ee9674dc1c4daaee787e4edf4b9479bd4000000055fc6ad6cbced65ba349a64cf1810de2c3fd40b0f05c882a5eb2a43f53b9e9cbbb83a9ecb54fd6656166523e4f2ce29cac99b43bddfa8b7ac76d825f3aff22f5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2448 2336 iexplore.exe 30 PID 2336 wrote to memory of 2448 2336 iexplore.exe 30 PID 2336 wrote to memory of 2448 2336 iexplore.exe 30 PID 2336 wrote to memory of 2448 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2be6ebc8314ac9dfd59b92581c4c867.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c26292e15b079e79cf4e7644fb69a2a
SHA199a732b5144f0a1bc944d837d6d51e5955cefc28
SHA256f41ebca1d01fcd5a3106e11be5ade2b43006ab8ec0c3d9d96b658075eab7a199
SHA5127797857d92102d742f0d0661268a14b38f280ed2d27c0e591fc0f6505ce0770e74413ac8f1b631a60c1bdf798fed0bff22b842d3a4079866596769f91dce9a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d622635329f91dcf414c67d092fe40
SHA196e245492a873da5d923861ae16e1aac3e1698eb
SHA256514b4e7b3a762e702d49949bc7ee3be37d76d3864a03f292d01f8c5061684626
SHA512e07d95cf7aafc44f687e4567f6f334291265b329bd6cb323699d042db64af856392e5b3c534a9e8625d6a10a5ebb5098f23bbd88b14be9164cc4ccb96decd965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e0adbbe9a38d633857512c2721dd7f
SHA15d78a33896cde42189f4e44034bc97f4ac74215e
SHA2565a344dccf697012d7647ff3e3e6b2f97d8a52ff53d6dbd1c35c4343a44c88359
SHA5124e95b7aaaa614635790e24b3602ff5f38244ebc9db73ccdccbe4d9474f34f90e04448aa188c481a9c7c2cc65b97cb80d566d27eb364c8e51746cf429e305bd92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c5b52799e77ee6597a26279251f3ac
SHA1869030e49a916cb8aac67015001bd5ff8ee1ab1b
SHA256627ae8902942c94a82419425b461268f6bcf89856ab8ea08795b8cef1a4d275a
SHA512f85384d5674000bcc3071982a71a530690faa3cf6922c4dc7dca3f3eb30aa426d87d94f07cd36e1d911d4cfef8e7d6384a26991c3097c89942e27c93118557ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29e70c93ec533442d9add8a3bc43dbc
SHA1f5bce370a079a88b35eca165140209e6d676b93d
SHA256486c73f555b198b3d39a86c532507ec5c8dfc84a293b8517da3a9c2012c66396
SHA5129ff73b4272d2bfe3b85dfa08938f48f63dde099da2ea00bc6d13666589c1d61c64984261b90fd5260bbbbe7188efc67cea32c4bb5e39ef50d40b2876651f9eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e99f20acce46c78bf876304c341f227
SHA159394d346a9258effbd5bf6d13b9ed77b609960c
SHA256adeb64582db2ccec271ea4d60a265458cc54b63b49a5a7b713094798e213be28
SHA512df8fd47d2ad6402017e56fb717ad4715fee2fe13281039e41bad15d3a94cbe382f815f786c9c5a02faf15abfa3299cd3ddbe0c941cbe1435eee49b075f6fff4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f078436ff1a9cec2d17f0bca919644
SHA19236760944194d4ee83d44117eb1388f63d0d812
SHA256c8a7a6fa956249108d09d6769e2b3b505b0a0086653a6c4c96f4ca948d0080a6
SHA512bf849e41338d8ae9aa15afb4dc5befb71bf68b88414a553248059219e1b4cb791f630ed48f72745f5099104124bdc5a1c16590db5a594100b17c7c3e4a9f5552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e51ea3f55f284346db40f6dd0660a4
SHA1b1c6c2e96552dec56c1cd066af16ed4e9bcdf353
SHA25602877a2f671de9825362686599664aaaaa52d11c9da0bd1eacf3d3c58942989c
SHA5126eb9595c56d5ee15017caef70a327cc34606401830f7821d3b491ae3117dc95db88addc60220683458a5227d5208311dc4016e06f2d843c84c6ff2d562d8c926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b7d85eca32ae0a45fac29b6684ab5d
SHA18d351af78b938781551303daa5e2059acdd71abf
SHA256937296605476d7558832e0d2931a10cef855ac8d6fcce51d801861bb671bc987
SHA5122b4c0ef0291c9c90cebb3a763ee65557b5b7d9e7a3642d95af715accc472271a1d5ad96b5da61051cbf00469c901ecb3bd78f8cbacfe62bbdeb73e5a73a5dfe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5369810b98230625fba18b67834a8c2ba
SHA16c0ddb08f5d968dd61dc4c10f9e01bc2bb0c8be0
SHA2564385ed3e765231307c899d35662ca1bfda2399d8b611bd0d2bfc818713f1a32e
SHA512bc868767c58c7b75b352c3dc997dff12a8bc3368dac50546e90fd6d528ea2eea964b768c53a122bd61f0740c4d8e6e7c7bf78fe112b5c187d2f7cd0cfef10f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b0003afbf15c49106c613a9f2aeba19
SHA152f3977f71674360da5728b58df4f73cb55b7f2c
SHA256ad0f17207792710a9060aeff79ebac3300b49f2a57003ec8b6166bfab05859b4
SHA5127b932fbecc1fac031e4147975547fcec270836f40674f582f05e2e2aade95050cc7a5dade73d8b2c6cce27fcfbb82ac3e7657bd418ce0f3b0718de3a285db557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576e31478f4b5bacb4a14a53c3165b42
SHA18ad484c1a488ce5d29b782bb82abf2575a8464c0
SHA2560a46a0701fd04e6555f5b98de8508ac888ebcfdcaf31fec81ee95ba2dfc40226
SHA5129c01936f8bd4869d6b39d12142a9223bff849d7c4a1293db4ecfd0154c836edacdb3d2f8491157c707dbf5e775153dc02e6d8fbb4063bd026db296412a29e029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ef5f66265edee77a6296edf25b75196
SHA1c0a2ebee11952ec8b0dd177ba5983e5b0315927c
SHA256b5d1338307283d06743ba1363eb0bcf664ddc9c46881429cd54b597bf816a0f1
SHA5127257522b296db3c66dcd2d14e820bfc309bd5b4a495a26f0a3a533c3843c6f5ec74ecaf28345f1763f8dfed852570d6b311ab1c9b2b28fd113aaaba851ec0ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7869023ac24617a5dc892307c312a98
SHA1f9ccb27c568d6dc4916ef832c2e5b9a75bab131c
SHA2564b8dd36e2636bbb4c4fa5afd21f602e21d19a5ed1a47f044d86ddf0c1c5fe045
SHA5123983e9653732eefeab38020f1d251894a83054bf85c22b5c0da3f5d3a6b37e3af6adec459bb8aa54e5fbd298343ddb0a9809b11842575e6024e32cdd8102e3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b8089dd24999f098d207d5ba1a871b
SHA1302327bd1d21b1592890b911bf421522ed483c99
SHA256c2aa987f9978499a9542c350e7a25c7d98c3b5a87be3f9a423b9ecd30e2c2aea
SHA512191201431f428b4c75955b394f89c8338fb6a4fd7af8d28b23fe8ab9c87ab7f7f259d6b571ec153d9797be5513be876fb92386ccaa2105de73fff48cb25edf8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9dafa8b1c8f972abc94d2d011a800a8
SHA161c1b5b09be51a0c40a31d8a95be7d9e6ef31bd9
SHA25632e0132c854701ea293405655f98fa726af64eddb2a170c14bffb67cedec2f69
SHA512698bf9b2adb64d685c96d77de1c8a6d439cb31e0e1b503575a74261308cefce70a83f18fc8eb78ebaad09d3ca531c2865fc7497682a3ab090dfdc2d236348b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f51036ac3cbf5c8192ed9b33c473d4d
SHA1fdd37b495f7db3700d1a1fcd44d9ec4abcdbd557
SHA256c1a966c94a40663bbbecb430d83593dfd4126d8710257d9a571d1dfb0938427d
SHA51262c826d5532ea823fe889f294c724da48d9d703725d7f8d41d6c10d9d2e0e6c9872653a36276e1f34f15f43bf281b8908412aaf38dbc2f0db44c5487238daf96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f166250e3b572de724091f9cb2b1da
SHA15cdad86696b1cbcf447543c28f54af4c5f660c33
SHA2569d904c81c75f4f753877babce7bed72bf3c2392996c38b5f3542a8962b50b6cc
SHA512883eac8bebb7f8672bacde23072f69e1b811384f5f4e8517a26960d90ae21cb0e429e8da8d8e4550336246582e06a8d7fea7ceee7d56a7f2d90a6c463e98d6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9db27fc58a243116d567d643c4ae7f
SHA1fc1dc2909bab8620914cae564019b875c2f13548
SHA256387a89afb2502ab08ec481322d7efdac0893d99b3f643ab32b245ecae8af98cc
SHA5120c3112cb62df9c21b828cb1523b6c40c4436539e5fb60342ca34977b756401e8e69d9e5c772083e8da217dbdc5270cc31ea3a4a37e0c6bc7b1975571ac13803a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22e406c43d290538914ac3c5a96d8ca
SHA102092e79dca247a6c3d9a039445911bccd0bb270
SHA2568a7d4306233b3c08e17a261f056fde8945560aaa6446013507a172f07784c1c0
SHA512234e7ec7d31501431fb4c642f5fe2a3fab964c343d8c399ade6408b4b9dc23d7818023e0cc1c400d8d26a4ab09e6789c91a126c143be9431fb489c2f54138f6e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b