Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2610e323582fdf6fd4e066f7ef9092e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2610e323582fdf6fd4e066f7ef9092e.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2610e323582fdf6fd4e066f7ef9092e.html
-
Size
90KB
-
MD5
e2610e323582fdf6fd4e066f7ef9092e
-
SHA1
7995a7bf8c1916d8a0000d22c84351571ed8f536
-
SHA256
a2d903f4f47e511f59342a0fd811ba6e91b85013bee864b37319c7f688e9c54b
-
SHA512
e1b9210493dd8402fa6da7f2e27d93f51b3bde5a6405c7fc20665c0aebb74f6869d09d848deb59a00e4a47a3d2c2df6237919a695dc5d3b0a7b70e2d21e3e0c0
-
SSDEEP
1536:gQZBCCOdg0IxC9P6kEBCsAObv7vuGECTmVdNvMPf2NdUnCG7CFH/2ibeDyvVNaNb:gk2W0IxtPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525567" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28FB1141-D70D-11EF-837F-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04a0e001a6bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0c5d123c6f06d4e8156247d5af2de6f0000000002000000000010660000000100002000000082b742aba81c983dd63a0418a2d5f0d762d8fbb2b4617304220c332cb7d53ccc000000000e80000000020000200000003e8143a5df2f10b626cd14eb9d3740abce8a8e2349e33fb57b846cd6122a72f790000000c355b1d8e7a17669e4454aff9f597cde94eae3ea78542b88a0658052b2af3bf3d596d1f0b65d2e6f3d7c7eac54ff98d93f62baafc9b56acfde0bbad3cfb9026973927d9fc0215d584bc2eddef2b194dbf7f77d3b3eff41fc477c5a111d3d87c86e8f93c7d80abce4ef168d8af94e3c8abd96d3cc16e71f483590ee649e003fcaf238cf93bb009e65092156a685ce72f640000000f38401f25b61d2dd3260d4ae1d1a2e13acf5f901db3deabbf39ae2dc4ff059218554cee3499529ca6dbbfbbe5ffa997d438856a45a7a92ad9ca2d40ee753cd00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b0c5d123c6f06d4e8156247d5af2de6f000000000200000000001066000000010000200000001ce904ae744cf3964974f01bb1f37aae0fd3c7f5c5227b5a7bc979b8d1c5b3b5000000000e80000000020000200000005ab08b199b92b58285418ec52f1bcbcc60db03a57778bae80b2dee5fa13c470920000000e81db568ece30547d025791368748127325818e742985761614ac879abef89f9400000002588f853d88dc4dbc105208faf9991e658a02a61637a34c96ab54943d7f6e2a705b625b60637c97d68e6718b2c73a601817e707fb8991421e582393fd8b7d0fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 796 IEXPLORE.EXE 796 IEXPLORE.EXE 796 IEXPLORE.EXE 796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 796 2296 iexplore.exe 31 PID 2296 wrote to memory of 796 2296 iexplore.exe 31 PID 2296 wrote to memory of 796 2296 iexplore.exe 31 PID 2296 wrote to memory of 796 2296 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2610e323582fdf6fd4e066f7ef9092e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edafd867eac88ed309902e5e16e0a901
SHA177cc67e74c28c5cdab76fdbec571c52440d68465
SHA256a0751403fc9c6f620c4b5b97868ed33fc2dab9e1602580a1a80bc800e571b3d9
SHA5123eb7630708e231f5c307d330672a33b0c43c3c6646ef84898050d8f141c964179462fe51dacd780276b83656f889b13ab931756cc634f21ed5255834b1b5ea26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aed91b0aa74e981a3a91d5b53f6c5a7
SHA1e17fe215e79b29f37453a67ef559ebd9314f7b8f
SHA25695789aa4c016c2996367b2c3a9e12f8f8359cab287dd92fe88fc0ec00014a931
SHA51210380f9a8972428befc27438e91efea4d876c789d50d2fcb19de7f1f1ddb02087728eed8a5596ea52aaf99f9e7af7275d35c01ba547f0f2159954fbd5515c48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2d5efdcacc7efe824ec2bea7653075
SHA18484b52264886a43188f53eadf4537e8d9dec4e0
SHA256b133f4bc9fcc564cebcaf7ab0a8bf4b6a1cc80e3a7d091d7b2eeb3310386429f
SHA512c8f938d87b806ddecde49c1871efa39af08154039b98fafb7c1320cd200c84c74b4f8a0a0d84eb5fcbb58eb8a97fb2568c22e9a3793c13fe790f9f07b467c7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f85d55797828c40810df4f8e5b3671c
SHA1562f3847a1e75bc82571ef074d89630edbdcf2d5
SHA2561375820cc8cc8896a197e6de0cf2adff01f9f69c7f0d3d7d1210f7caac705228
SHA512dda5a57b1cce517585999145298441222f7ee74ac4100e7ec27c383a028234f26ad4bf8113212b0d3ddbabb06c62170b9257a549d2a06ce60e37186a7a27545f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b04ab9736c89995218ccc0bc72e990
SHA1b7fd77cd8772e3ea787b39894581527887e1289c
SHA256481dc24bd6e4c2a7e4f55150b15bf6414c8bc6f80461e714402b926cb53e1a46
SHA512dd8755f5f0dd228fd2aa82f43abea9176990173606742bbb60216167f878227ea24bfcf76cc5112b774d2018f8a48fd360538d9e63a5cbafd4e7cc10a911530c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f777e73f4f564a4c1396f4d10fbf3b
SHA1df4958ec64ad7c15fc1a252b8094ee7fd5fec231
SHA2560571b723c863fe973e94ed2656db68b64b70310c32f06c7a6cf8096eaea484c9
SHA5127b61e224003796838cdd969fe32a8c71e93d2b0e73e8705b47de4119c36c904cbdc0396937ef33120c25cc39c984801c78ff6d2dcfc3e9dd18d578bc22c2ba03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5687a47b559fc40765b48e15386f214fb
SHA11a273c0a35f62b1c714c719c4578e646a5fd1727
SHA2569b40aa224b8815c56b09c5b85ee4f0ed730263c57e6557088edc97e84761cc46
SHA512075a89ed507069c07241b68aaa404de46b622a7243f5d0a4d4eda43aa0efc4784099c43fc609978fb95733ec51e17bf38b84eae4c1deff126d4ad7dabcc2fa5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e09c7309b6248b3e602f40ebfbcce0b
SHA1f64134d93b2ed53253d8c9310be23382a940b4b7
SHA2569baec55acaa67532b92c3dbc7e841bdbb63bcee10218172e48e8c773ae6d0d90
SHA512812c88afea4603465d1556cd0cf40a4462df93211aa8e816367d96eac288eb37743d3dc11e564c3f41eccd56dcdbace4aa3ec28f0cb231e36711536f5c650bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168b4e03c84b4b2c2a75f0477ee362c4
SHA1d8cb6fe86b0bb2979edfcbfe7db6d58cae8c8031
SHA2560e7c62385a661d914209babd8f4802bd1d932f7482f4fc176f2e19114c9507b1
SHA512536001d9bacf66a73df5a3c5f928379705c4feb0e91c27be98afdddae6bc2dad8dfcd8a677faa8683eed7fb402109e97c5368bcabdfafaf9be3a38403ee96ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90a2c2f10daee3b4d7d02b153fe134f
SHA1945851f61ce48b2cce29b0d7d358c88fec773c28
SHA2565663ecf30ceaf76cf898bce6d90007184e3327ffa4a1a185500dcdf4ccba8e30
SHA51217035b44b416dbc813e306020c7cef366655047249f11aa467c7a50590900518156c8eeb92b13cff3f33fa0cb87d41586be3cde718018ba72daa91691bbc522b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b25c4055260c25705f1a66e1d5ce2ad
SHA18f4fb1fec3d2a8148d0a5df04a00485e51305ab7
SHA2567db07d019b99df92505cb64e6f404686479cac1c32f6b081de8ac16cb53c2877
SHA512d427c86ccb8b9eb4b2510e0d2f569de602cdc85cf5a7933dee3164fd6642092d2e8f19afa14a41bf047efaa54c7c2e7b350d7fb7aaa355810ff727fecc72b099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf359bca54ad5c94e06fccd1772f57c
SHA1915c7fa05017eab4466eac89641de7754e1a836b
SHA2560c8937e0f8be8985abc1aa20d41ad64588b726b5ea48a27c1578af629b6cca35
SHA5122bb12a42bde02f9677c845720c171896463aa56fd5df44b02176b242b06dfe1b5e0aaf2262f88bf8b9871afd7b82c1a9bf9e7bd4773ff6e220d600038a0c9b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8cdbca4960992e044cfbbe05ab92d5f
SHA14a13cd34b19f00f43d7370684868929993683963
SHA25612706b1301a7ef4ed10550f64aef4af5ca77b36c777523ac74feab5a69c2ac00
SHA5126218070e4802a07b89644ec02344ca10771386d06845f02284731af0d26f930a047fd2eaa9d5fac96f985f7e5ee1cdc33a9bb5996b3b3c8498cefdb6a997478c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509327923001eceb35c94b7b3e587ff19
SHA161e465fc3e859a13b88c5c18d5f0b33be133b126
SHA25658595605c86c80bc276efb7dc552b4cf6051edf568efa875f2c3b56e930f3d73
SHA512fce7cd57ba40f4130ffe6a47f48f5f46c30f9b717215a17bc32fd47a859974764eba23a535c568b65ae984f18e3e9cac02ba450434e23c3199faf015d9387b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5bef9f8062ae6222a5fe583158befe
SHA1783dd3b6246ba00bd63d97e7570ab9a2f40c01c9
SHA25676d4f792dc4678a1832bb0719cc124c2faa667836a611ae3fa0f2ffdac15956c
SHA512c54cce29e160f5e246d793505f89c1b8dcedf06b2e06954aa1f6c74cee1b249ecef7068bbc89c3a669ece68a46c8447a5f793916098dcac5fd5cf69f7ff74ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a367af8b94e3bdcf0a2cfd0c431029dd
SHA1be081aa2aa84add6da0fbbf102c0e91fa408db77
SHA25658d130ce15736095e053a6ac83ccd335f5f06cdc37501e52f375bb254460a64e
SHA512c9b388ab9db4b46424d3bdb749057b0807a5b643dee58d5105c52b421776f083795a47cde30168b8738c967ead7c5d597090e54dd85c01b972db533523381c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51012f540260a795a06fb0846e87b361c
SHA1d0f779c1f949cab967091047d204095159f32f1e
SHA2562209111c1a1f90e24d68e5c53dc471768f16998031a4ade7506980c67912e345
SHA512d245514fbeaf58e461a55a706aedd57a4e5fad99060679dd89f32138285ea214fa79b9c2eca6c41daebcba67049c687e5ab71e527434f49a3271fc97305fcd1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692529493b73ea1fe9de8b9826001e64
SHA1eb4f6b96e506a78566b8972d64aa06cd06cfc996
SHA25662a2e875d07ba16797a3ad9b07bba7846ab1866e112a489f898f443a420c5558
SHA5125ee5638b90dcf61bda7c2e9dd7fc6c5b6aba518388565669228bf69a18e78fadaccb7e174ee6e0ee0e8a377f0d36892a80cdbbe9372777d632ad810783ef551b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b