Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e256ba53993b23b7d02e27d87cc8ed76.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e256ba53993b23b7d02e27d87cc8ed76.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e256ba53993b23b7d02e27d87cc8ed76.html
-
Size
6KB
-
MD5
e256ba53993b23b7d02e27d87cc8ed76
-
SHA1
e72c5ffcdbc9aa8ea07682a16805f6f21d3058ec
-
SHA256
4f1c568ffeda417e4c43464cd63167059c2ab82531a43893beda0f2ae059ddd8
-
SHA512
e7e682fc7cbf6ac98df79088bd3b2c994ed849e06deb07ee4e70a18752a0c4a12b7852b7f9fa697d482b526990a063d03a9f41cf1f094541e78319cb182d3909
-
SSDEEP
96:uzVs+ux7efLLY1k9o84d12ef7CSTUoZcEZ7ru7f:csz7efAYS/jb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07156c6196bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFB7EB11-D70C-11EF-8A02-DE8CFA0D7791} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008df732b028dc5348b9730ca4c5914dd4000000000200000000001066000000010000200000007776dee1e90f8db6f720211029847075c66a03bc2b2c108c739490387d29014f000000000e80000000020000200000005e65f4926f41115a465ab8d5012283e1d758f6c04b5b570882589ada36a6e1ec20000000751f645216c7e9b4c75fd1860daed831ab76ac372b3845fb71a81979e983db17400000000053a3526b03ac6cb537dbfa60f8679b8e01d6171851dced64ddaf54faf6ad541d9f5e3a9988abe098690e5017d4da2f182e42025a63ccb5d6b4ae9985de4b8a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525471" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1796 iexplore.exe 1796 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1988 1796 iexplore.exe 30 PID 1796 wrote to memory of 1988 1796 iexplore.exe 30 PID 1796 wrote to memory of 1988 1796 iexplore.exe 30 PID 1796 wrote to memory of 1988 1796 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e256ba53993b23b7d02e27d87cc8ed76.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52227e47a6b2a5ed8b024ead9457c7c9e
SHA1d13d84b2b5b79286e70f5062f9962a5b00070b44
SHA256067eb5505b33d8e992cfda0bbcf25d4320a08ce4a6d00837944f066acfdfc47a
SHA51266aa4ae2fd96f2860debb0da1e815c0d0b6007f9b8adb1487c84253da45a9107d5bae7939b4fcbd55007695434ac217f3904e20555a840b014ee74bd84377b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477623023ea34c2b4d0960051350fac8
SHA1e94ed976dd78f52879b99b19ae8590dd40262c81
SHA256d560c573cb697e12efe3fc4bc8092c6b993776933180f172be5f493464c951f3
SHA5127e6c47600597920ed5ed3fe2ea1b70497b32a0326c1a1c71755dc2c36b7ea7e35a012923d8c60df8165b428610daec021a9a9ea0811664d590190b55bfae00a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9d1ab28f9b53f4befb8e5d139653bf
SHA177f3191b304e3090e90b7c60958bad82cfe6567a
SHA256a5d90ae59a45d91b792a6a243e8cb5ef87aeb67e7976bc626aa0d718cd8b3069
SHA51255dd1e0332081a5073c6308af92bf79e4080d4c33420b246e56d9c56334b4493ff8b60783abde52b52b030a384de0411cfd5c360335a92e2cdaafad0011d61d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee21df0c1f53808bdfb8644759ee238
SHA149524b5d0c2a25dbc75d1708777d9912bde3351a
SHA2566efb7ec30a4f7b4470d98e04316d29cd48232d5e95f625d06fe02768f07c348a
SHA5127cbea67c1ffa6d88ce7f852a94812b96a01328fa2a4da1c2c63165ebe2a889a9ff6ddec14704c0b726f63b27282f3cd5cf61075fa7262eb3b3703160adc3b346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560906a1b1ff27f07a63768c640a4dc49
SHA182b908393fc8a7266bde9133d1cb795659791c99
SHA25685d97571e093b206635c143bd330515363d845fac68eb0b01aa60d4f8fd91a1f
SHA5123afe755e7a934b599ec9730a332e425ac6a148a326519b387961593de940d5774a669463130a3562451a1b081e69d612b9e698ed2f8a66305b73b5affcfe11c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1290d4c4313e859720f76af4abb438
SHA12098003c4f4067bed2e547b4948578788cf3c8df
SHA2564272963c37492d7a83b716dc48e451e5018f145e8ebe5be8aa30b305648e2a86
SHA5120aca135c3ad1a6351ba94e750b6c2c35cdba6f2f2c89f0e69f38e87945c3ddceffea52f2e4d1848530140cbd40057c9839688ca66be54dbc375f2b0d142bb0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb784551f08953d7c2c25625531d3b5
SHA184e4332430ba55d289d2512ec7707e17bca673a3
SHA256e5a9ddff05896200ae76b700002e66d7445e8ed3910c0eeec06133dbdb2daac7
SHA512135806e91ec93d309a5514901c1f72351903cb62a0c2b8c8469b08de6b6113548db1f9f9bdef59ee685102660ffd92852ecc14d76522ff6720564c43aa3d11cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5288d9325aefd9968601b056177a6b574
SHA11d2b664be39cc5d68062b737e7b7270e61ccd63a
SHA256f6b91acf6b385f16af18e84a000b5fb591839cf9b5961cb580684a5bd8e813a0
SHA512bd04aa8f62aeb3efa010a925c80f65ecde2e4b65cb6ba62a42f57e1730fe8ea100da6de28b50486285dad9ac38e5f36111a522d38aa163b7279a574acc762ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c727c1b1ae8b3294309ba3f828976e8
SHA14f0cc1c700e2fb773771eb4606d4a1a919dc4c2e
SHA256bd40f86a43873921502df25c94dc9cab311074d75d5758052ad5bb112cbf8d9c
SHA51280863a7f29e3717dc745430cb03cb712e5fd76d37106478a2ff5ad03c41b5dc3ce7f7d4247081b1cd3f549c4e06b37a86df42fd240ea7faa2e81cb00969a6b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ceb2628818fa1cb20fa3b8694b11767
SHA13a43d353e1570ec7cc4a690b95fa6c98eb8147c9
SHA25674b473d85eb636e2fbab5060ae268e0e8aacc0c2880edf02b88f9c7f0b749b54
SHA512aa24962b9c23f1232d6e4f0b846c2e5f1d74c121fb1f7f2fe4560c7b95d259a3b19f95983b2e94b6c99909a3a18f12d19a52204f2fb570cac83b2158394aab43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddacb2358a7c51bd22f09f21d85f2947
SHA1f46b0dd169a7d2e1ea35df34f296cc98d2be2a84
SHA256ef29a44fd973f1017d0c2e106e1194882092434f0c43c224f1c2563c27a15238
SHA512828e18cf93d488ef30830633f78c9ad586d2ef30a5b5d350a64615e5b5edebec74641e3405db01bda116a9f85eb3435327ea89bfd1a0772064aff98dca6946f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b3a98876905d5274e2c63681da6f44
SHA1d15c27febd4429120331504dcbb7ee829032072b
SHA25666537c90568efa40223c45329a74c7f8ff61892908e32cc4eeef86d18f5448ae
SHA512df20e5fa1704c724adc2f7a658f3686ef8bef5c54cae0c2ac5c04f6293d04ea2f4f9955ebe46e31998c08cb462aebfc337126087ad49bb5208849bb58cbfcea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc452f1a959db4d1beab05dd4188c76b
SHA163930e164ab9fc71a8964d28cba18d3b3f5fcfd8
SHA2566248bcf2df21ce794493c43c7f8541091d1c56d1e9307a88b68e6eb105d71752
SHA51244a98f2026a25616c5d010c2ce97809ca898412525a0bd45f37ba9aae769eb445c661b81472676d84e7bea41afd22a97e9c67d25a521297a491a43a274d491fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630d6b42ac62dd4970c0c2ef97151a74
SHA197c3d5d19f9e5a7e82598e66345efb831ad1b0d4
SHA2564dc036521db58b4851ebc5c501bb466e2731da9a0b8e38e7669c2feb281ed6f6
SHA512ea7536de01b30b0be755a1a240348941212a0cfd06ac345bc73d6706b16a5977c41a5798bd56c2caaba449d0e2d683d5b3a7b5b6b275f6938dab7e04b5ebdcac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f602f4b9f5954c79d85583cf96cc51
SHA164fbbb1d90796ca533cee76f9466b7bd723bfa5b
SHA25609c49cb18544741563421addc60a515a82a8fe190006c2ae89809396725501b8
SHA51287b13b546ca4e84fe0af0e216e8886c3682e207403b155b7e1117e3de50d65ef48d65f2cbeed4741d05230e4e6a0b911e158d5b8c372e8a8b9e78f1e3f90c340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9412a7fcb6a434fe854aa0f716f528
SHA1949e27e2369b89826e5dc3f95d991b9ca1d4caa7
SHA256540233fbfb54ee5c6429bc2dd3eda1f528bba6cf2b4e112d8948c483bfd75d45
SHA512c2e379b0bfbf310711a236a838982fa3a567ccd4e25f5e5cd3faebbd2dbb80c57e80a7c5c6e42ce3fb53fc39cfa7d5c0174c899e1815c481d15462df47e11070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6ef1944840c03f48c0b4b0d60e7221
SHA1a8ada19f89a89c4bccd2371ed723cc8dc27f14a9
SHA256a31430237f6db657ff15574b75a4f6afda73db6c7a804102460e789aebc45111
SHA512941f0e9977a17c504593c2c3ba48ccad485167cdb22c172f0ef48e0f5f74365beb20d485dd90548f49af3f986d2d8ae0478260e9702d03f4573dc30f0b3b001d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652d1a54b79ed579c46db9ee4f6283bb
SHA17f9dab29b4d40bba076f167c657dba236d6b2d44
SHA25688fdd2fe52afd053c04b96638a4a859fcc845d623345a4b6363a17e41167462c
SHA5127eacea6bf5a9053e85520c06529478c4ffd2f9c1d7ee9443c325d08cba320a31781c9ebfead0dcd0f987b2b67d8d0f308fb0287610f5591215bbe63a00bc5039
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b