Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e261154d2995b05debe7d8130ac883f6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e261154d2995b05debe7d8130ac883f6.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e261154d2995b05debe7d8130ac883f6.html
-
Size
16KB
-
MD5
e261154d2995b05debe7d8130ac883f6
-
SHA1
c576c64e9bffad9840c898e98d37d2466dd9aa03
-
SHA256
aecd1bc579d1967c6379aeb48fec021da013d4fe3e2ecbf4b8eed1e8ee3085f5
-
SHA512
6d81f3aeabad204a37ba67121b91883388ca6ba841512d62e60aba765eaef72064980f09f6d61a8c1c0106aec6a402cddcbff183f12964643044b2507e1ec529
-
SSDEEP
384:eSJHygAveoLVzQohVpJk8NbzgPq3Hz5UC/QNlHQ88pPWw6Kep9x/UODb9e6pMYjL:LeveoLVzQojpJk8NbzgPq3HzKCYNlHQ0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a027cd031a6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C865AE1-D70D-11EF-AF60-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000434fafc5140c3644b49c4b17caba5081000000000200000000001066000000010000200000003f80dbddddefac2e5e3196f6796c95cd0d87b27a947b1855b9b715a51ce8d4e9000000000e800000000200002000000060f5fdbb2415929ee3c017f62c02397cb81d41f2ac480568a655896c1655a312200000000d8834f16c0ab8fb3535e07b75cbfe6ff49d703f80b08106500dd1e53a122b7b40000000a7243499715d4d01acce7a5eeb64f23cb91e16c90acc2a18416db5e7280c7dfe764cc187429f2242cf4230abbbd71a10713b77fc63c41055c4d0797c33f13696 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525573" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2712 2892 iexplore.exe 30 PID 2892 wrote to memory of 2712 2892 iexplore.exe 30 PID 2892 wrote to memory of 2712 2892 iexplore.exe 30 PID 2892 wrote to memory of 2712 2892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e261154d2995b05debe7d8130ac883f6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54732c91a8007387228beeb4b1700116b
SHA199f245837aa5ba929353fb8d81ccc5d200456d55
SHA2561f3ebcdce641de33f31af6a8c4afc1f5353a42214e3afc7d7e578c606273fe9f
SHA512384b5cc1118bf232e8e879c404fde3358f3ec7b3484d967cda4501b5db3b58a148db5deb0d9aa7276d8e59779af5458913743e09c65098bc74b2136ecca193ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9d82864ac9bcac657d9b39bea370cc
SHA193c8ab2d2541dfaf57bb3d8e023f15a848c2553e
SHA256f6252f74f0af1e733114923121b8ee91b5cda2b29b65ba2d50a89aa6185c7781
SHA5122f6463cc5df16720d2d87197f128b5fd17cf5407bf6a5079db5b9b11572fd41dbf1ff5aeb813d5cfa2cbde8bd88059851015ca80040795b0384166f22721a32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53075a37a912249e047c9286f83a12aeb
SHA10789537831284629fec41b49912d357f1c00cbfd
SHA256cc8876a773e7e9319c725e58e0fd6615c67c7d7cb77f13416b4313c94433a4e1
SHA512265e789251594fe63c8d37580ce4df5f0579fa10fddff6b4cd2f7da4e94fd6de431a942b7b1e506382fbca5edf89a931660c31c6fddc42a78436b920cb1265de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a73597cdb5a34f013e8203893fa7d5
SHA11c67d86e83df4edb3aede45afdb5a6b3ac3fb5c3
SHA25640aca79fe47ce30d69a81297b891f9adc9a361ae95a718492d12beca8591f735
SHA512922378380eca4f2b3b856db44db6df5d04954bd4755e67515b0ac10842287615afe86ce655eb5538596f6a0984e6e04fdf99f59596e3efe4038ae58a6e5df5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44378a0feeead4000dceb2e0ec65309
SHA15252b4ee4ee25e9a2a112d76742a35aeb3b68075
SHA256933b7e21140fa7329ddcdecb47d2e4c1f37dec4ee7fb3e08442574ab19011150
SHA512296c4855f3afeec4ceda3e762a6923ce7ee9b95a94491a630054dd5fda30d84d3446255efd1c11793f6a6cb49d2b26fe3c4ba7e3b8250e2375d2e36815a5fe70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0a6ce219a206bcc36bf41484af6b007
SHA158b362099bbbb3ffa7698cc3c15086355d40d4f3
SHA256503f2e185474771ef8f11794f320c8c864087649cbf3f06d10feb0f430005ae9
SHA512a143fe1a0241109b09d3471b1340c1f42c2bf39b9b58e91b9cfc21e86e08b486658ef728375cf234d156d3ea80175d2f24aacd0f8c4e962e6f4559b38ce941d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a92af0e299caccaea560b3706b52e3a
SHA1b5bf150c61e0dd705ddf535838ca17f5e86f4b2d
SHA2564334c31ecf4d81b4c59db9ca65c789f9404665a65ae6b65dcebcfc1fbeb5182c
SHA512a686022746b69aae950bff6f8960fd67f31669788de13c4fa06ea4d58f0828a48774caa36eb6ac6fe39af55643a4b8a1ebf85efcd6aa40ca837ed14733feb7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f627634c7bebbda5efae1d53866ec38d
SHA1b2d17378208498ec463c913cdbbb903cd29ac851
SHA2564927d966b3860aebbb24acd6bd9df7f8f5963345044face6715182c8cf5a4250
SHA5124f396efbad048bafe0f4a8a160e903b44b2441aeaa4f1c4c6011d0a8a4e5b7f6a81852ab7256f6a22493464d7fdb737c76610104d35a2fc9f03bcd3243c233eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eefc5951c9d248e6a7e10c8d7eda363
SHA192283ee734cab782656f7ddd2960b71a31d251ed
SHA256a4b7b0e8814a63225fb0639daeed1d7a5c8e9149b3b1d9b96a0e0ecbed08ab36
SHA5128b0717c778f051c3e932e667362ec0b2964f6a7db229c66bfa25aa488e87e9833287eb86326d0150c1239d433fbd3327e1f34c52f78c2867a8699e104185f02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5596fbe7262014c039a64a0699c6c8e68
SHA1f941ec61f46fc3e959ecca8d3e8b5e1eceac19be
SHA25688fc8793a16e7a3962c598b4b5f3c4d4ad7d984a1e6727d293ef6fbb7fb36d00
SHA512372703991742a70168348a5d1506c67cd8b8afbd44533d7fc025bb1f4f4f908a33048e76533b6eea3fa0fa3b4f1b26f3d68fe411cb05cde5051d22499a11b58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f49bc85043b26af1e9ab1ecc49e66a5
SHA1a8ecb8c057b791bc7192b6e00dc32ae26da9d58d
SHA25689283d809e8c5e57d984d2379247f6d8eb88a204f303151f1df01645294a46be
SHA51222db767d42e89b342c76cfff2eccb4cff097215170a2283ac8a10ef2e522dc28b5980ded138cc0554c0a28d03883e52d0ef5696dccdf38852bdc1ca3b36fb767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f17e6384fe687c318eaae480489c570
SHA1eccf18603b76b611c384761187b2d2c011ccc3f4
SHA256cb3211353d794df007f85eb948ed744e2338ffc9ba3ca0f4132a04ee0421781d
SHA51212836b19d74f25c21cc16193ddb0c423341b07b22f089735dcb356bd3cd4ba9d29a40fdaa7c0733a550b0ecf6ba8ea1f1d582f5b3c04e61c7662ecdedae41223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b289e7470ad6b38cfbd79aa4b351ce9
SHA1876eeeeed4dd0dd763cf823f1f66936db6073112
SHA25610f20605285a4503b95bf1dcc3ddcc2b8ddb6bed2864416624f254c6e1eb92e4
SHA512c15b54fd1a85848c2500eb8bf0186f6a8ca83f18ff440c9e7e08feeebd3553039c41327cafdaded6ce43be088318c5999f87524c052a1c7b36cc65c4dd678119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e714966f8f77ee12e3674404d6cb029
SHA120532ab495046c4385945ddc1306395a5c204be3
SHA256a2f7315ca0c794b49035de579fa30ab262aed9e26db5423f329b6aa2b278ab8c
SHA512c7c942b27178cbb015ea3485cba860a0c487f084ca89f318b326a16d1a8eb982412007d3ba7d78e9641168c6092cf0a86a620c2652d3f11c1783087324069fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafcac85a5fb8b46f7440da38209e3a3
SHA1527afc90abaa6890749d2c446c91f9ee2b067e37
SHA256b7d537fdb9f2326b8cc515d52788f570228251628441b61b6936d3332219312d
SHA51287d82ee5428113e3f702e81f8000e11427efbb91f6478c3ff5376f177cd3b24618ea410bf3d227c409c25c4805d19a1ab00c9e9d606b500139b995d82e171645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f39f5f6cf634a843bc2cae186ede7d
SHA1d98db2a17c68dc817114485a8e82b3de4c1ce2fc
SHA256d4224fc3e51486de3abaa5b62e867fe7e2e6b750eae9ebd48f6b549aa07841e0
SHA512fefa4fcf62397e4e390f46eb21a51ad6904a7c2dead4e1c0e0b0148f685663b8de9e869c7b7fe2f50ef4d8cf88bea814242bbe7940163e8243a0a4853907b42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb3eec010c24935f542d49f6e949900
SHA1ab6e263d166708da0021c0c4dd62f76bc3fdb81f
SHA256987f5494ab2c2d346e3231adfd5bb7abcad2f52d7934d5538c74e35fe24dd32d
SHA512fe3a3727505cdbae2803761c37c5f8afa61eb0cd5b096cee9789042ec75f5f27d8a120dd30e1107400861ff01abb5d09725b309caa0e592ff4d661524737b9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8bf9303b1e948816053eae0f337c0a
SHA100408274b8b1c382e556dfbfee4284ae4d13b8db
SHA2561413bd7807bc9c1f55c0aec173fc87478e9034d5d01c790184c6dc829e04e8f2
SHA512b4d0b94a3c4b701508967fc780802bf1fec86541a98f88039cca55a2745991ea0cce64064e733cc86105db707f82c78e2d3256dff7f878aa20d97a146f13ef3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9cd8a252d399a99b9b380154a6218c
SHA19e2bc3a412e24de486e4b62d3a48cd67403dc6c4
SHA2560cbed56e1b2c1f0691a8139e99e4fcb81e05cb650706fca3dd974d7d1033cb84
SHA512f6e1f6c03d5c41bc31c2de9874147da736d3895f71200fc23dab37947c5d7914c777f5de27caca70ad5fa6b80714a5a1fa346613c6b69e42bf78df4880aa518f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b