Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e26859d140e027ce54826f7def1b7c7b.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e26859d140e027ce54826f7def1b7c7b.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e26859d140e027ce54826f7def1b7c7b.html
-
Size
93KB
-
MD5
e26859d140e027ce54826f7def1b7c7b
-
SHA1
d7b66abb6bbe8a914cc4fd3add3ccba816358f3f
-
SHA256
6fc674d4bd8f65f3730ea3f2afeaca75b3eb64d1048b0e3bf523fba0e3bc6aa2
-
SHA512
47d8447d8ab6c598a8026d4ce360f3c86673766f2f49a87b5c6c169c7e585f4c06a0a646f69b3376fa8bc2c0cce3edfb416d19639ebd7c2d3ad63a68eb099929
-
SSDEEP
1536:gQZBCCOdDBiyzE0IxCMyXFwkNIrsVRcv08Lj+hovQPeHOu6OneVs0MPRZsNo3pKs:gk2NBiyzE0IxdyXFwkNIrsVRcv08Lj+c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525652" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B988E71-D70D-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007e1d52a3671a3649a0eaa06e678f1fae000000000200000000001066000000010000200000000b5a3da4b579b4e5be1b33fc2a471dd321fc45b121321b04cb470a55b7da2fdc000000000e80000000020000200000007ec1337e4e4f2645d96c32b0113b4a78585992d5698720708143d66dc7dff4e720000000c386ddad2b343c7b4ca5d38002bc75e4ca992687536dd3fba2788011d6eb815a400000003b0eb743f2b868f5ac83a8e74a75abf87bdbc8117799249190c7ee1ed7340a9ee960cdbda5a016ec10e8d6c82069dcd0501f01bb64db7abb0dcb19d0552635eb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d018c3321a6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1060 2380 iexplore.exe 30 PID 2380 wrote to memory of 1060 2380 iexplore.exe 30 PID 2380 wrote to memory of 1060 2380 iexplore.exe 30 PID 2380 wrote to memory of 1060 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26859d140e027ce54826f7def1b7c7b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827f34b432dd5997ae8de5267b2a7f72
SHA15015b705eb4463f065de77377b4c4951f3ecfbda
SHA2562fd54f098f831c17d2b40b7d321099cc03205a9fcc79d2f88f3637941a5ddf9e
SHA5124ae7717547a2f8e5c71decfe7335b24ba954743d43f9b65efb06334f9aeb4c4cb6b374ba4ef9ffa9fb512f57adb9339bb534137fd0635857279583e782de8b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eda90e004e3d20d7c801b924af75ce8f
SHA132e50cb9f50a391737af48414f752d460ec73d3f
SHA256175ec69ab40bcaa7e5174f35eb9be85ba189d334e2205b0f7ae62852d8fda34f
SHA51215baaf41f77cb12b3372f3b0be1818f66a96073d6f1c631bc8814252e73f890b2c00787bb939fe8a4b860cee3c11cca1de8af920533cf397e1195a8fc6b8801d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114488ada081e9e176a4d3439113e14c
SHA145fdafce0ee4084ca136dcee1341f276bce89b1a
SHA256a35b78321cc3a53cd43f08a878d6120b3f4c61c24ad4de6106218f30a8b0ab56
SHA5128b289240dbf9d90155c0fb3f2033a2f25792f71c67099a88628bb8100d31fa96414c45e8e311f2940c45789bf1434dd3caa7ef4e870a58e0765c3b31bc56935a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9a98e8e6eb4aaae7e96d7d54c600d1
SHA171c0e54ba5e5b75ff8ada9f4abc2bd9ce3715d08
SHA2564cc1d97dd709c7d815ac223da84f14be42207f42aba635747efa3993677d0d96
SHA5121de95aef3d41acdfaa2f57a75eaeabb6e46a4af1dea0607a394aafcc93ae39ab29ebb6646bcbb2ea7efa644e555709e1e9a23f91cb8966d614482887c9f347b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c03f2d39e56d072a66d38f1215fb58
SHA1075e131d1588d91f9c5a65d921baf94c2f9cb1c3
SHA256598daaf5078d68e6a0822147d0c5678c2adb3de3316ba222d63c89e25a8c59b4
SHA512866e37a57f50e78823786eba2d9d942f1273ee3d1fc04cfa2e6661dcdccf3d166c7926094af03e94a70447bfba092bfeaf2c57add9f735ac053ff60955c48b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ec1ee7f500a7e37f1cfc7451918804
SHA18688cff0d322f2e809756fe7744f1814890635bb
SHA256fdbfca8042953378405744775782b5254c7c93c05d36af73ed4ce6e9bf9f4a35
SHA512222f7b06e6b24d081512953c5872940670091e34f41dc79c57589f08f13515f5876802e15472ca804978325a073498bc51becfb48da435f5dca5bcbf2af79039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f16d4fb76952c334a72324bd46dd30
SHA183737ef98d17ba139880fac5c1ba83b3d8e503d4
SHA256d8c8bcc82f4a573eab292749364aab3244adf8d9b9bf168bf586dc37f09a2f61
SHA512fd08fde1e58771e127528c446c445e2578f3b8de340dab8fdb8577cda6cdb81139ff782216bbaa539d8953a46b6ec68e854e6c8acde51c720e6f670d4c271b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cb38b9275fc15b3e023684acd2ac58
SHA1494dd8e0f2b35425579809e823b15416f83917a6
SHA25694e83daa12e22ab1c8187b4fd2355e93fcdfbbe75fe28d1027a6599b31e62759
SHA51221e1942f4c3a6c300a877cbaeee947d0751b0ff420cf789a742779c79146a833f7dbfc57f72ee5ded7089b2b97de1f80fd66e891b478ec510d1681d909b2dabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af06d35b2edf0129f18e6d1c7e8e7e2a
SHA13f3276d2da9df7e20ff6d074c4ac7bbe2a7088d1
SHA256cf2393685132ff7fe0da706c2d968aa457f5e10ef4fa090f330c632d9d520a2d
SHA51225542b013bb64274584999fb5d5fef0ce27385d2c47a12736854628b558045d33b84e7c78ea8032dc0e296d7b2aaa5afc209b579cf3dd7f728a3b2f60a6235c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe71c6a251f1f5ae1a1ac6cc8873983
SHA1827bba711694e683601c58d27b35dd95bc87458e
SHA256d83b4e59cf5f206fc3ba952ce02bb62a692e711d21c864c34c25127d6f3eb6ef
SHA51201dd2870a89760cca506b5835affdc21c776a2f035d43cc4c4efe9df917e3c91d54bb3d5da382f0c7ce6ddc1bc5f8e1417b31012689b89d5e2bb20415789b57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1f067524b17b2029c0dd6f32d2e255
SHA150915a627ba0589dcc45f8f203ad71851a6354c6
SHA256ab3dc410d8b52dd6228babbdf53cadaffcb285a86d6af2aee7b29d69c574bf66
SHA512f15de40f396a79b62b90c5c8b9f4b418788864915492ac3c1850dc712050a5a50a5af657b9b9aacd6251fc124568bdba2f9baea354f3f35e16541238619e1c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c17bff3fb30b838714d6fd88572c8089
SHA1a32a695b907a6bebdc1737c3de28268b8e5f7f3b
SHA256782b354d95832d6914c53f1d4bd91324a3d6b23fd3df5e0cf737a5ac692ef179
SHA51232f7c7811ddc3d788d46b8de74eba1bd695cb65c687315fcef7f4c659a162cc6b309447b5ca3460036810667d014475462b61c107d99eeb6b5c37b22396e2a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9269611c34edc8a380051f8f0e996c8
SHA127f8864c2700a6bf8614294887e0e6672914e154
SHA2566b898d2cbfc1901d716ee808c2087c46814edfdaec1e6642dc5fcbddee090132
SHA5122e51378760f300aa619549dbf026583ec8ba12608162f6db77cd8459d2b7afdb66b20275d27ff4fca26f778b853b55e90775932bbcce07f15e29a9a926e6b70b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f534bee1976bdfeccd7e878a7d2409
SHA11619be483c1fd3be21c71e01b3c56c3e747adf12
SHA256613ed864294113fca5075b75fb9dde5b8712f22d4fff85f1819737331047ef3b
SHA51293809669609a16eb4e253252d4857f3b27ff35625b4293ec1be7a7a8684dce9ffd6fe0fcdf6a0582cb4773addcc40c9673b37343ed7def25aee8358934b3e087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532da5e24cfe9ff80c77155c3d1839560
SHA124d5fa31a42afffef74180e3379509f48217e2fa
SHA25650e0192370d07bd1da0fdc6e53836fcb1a29a927dfaad4b622883b0080ed3a11
SHA512515e67237c83749de3cf8eca10aa06c411022a3aabc599aafe52b42b2860dfef5ac9978a6baaad51d83557dd7c3c56cfb96c02797d32906a91bf40c91f36842a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556440159dc4d91a747a0a87eb7aa6af1
SHA18241788f4563bb9249ebf95bfe24112722d8eebd
SHA256b2ee600ffce3ce32efd02e6a3c25e774155202619a298ae2bd41a4dedcf291bf
SHA5120567e8801fd0368d654a37f3b3f7553a368de04e21180efa50a28a7251a708bdd3343882bd0935ce5be51e2bf16ba4c9092ff73ca9dbfa797a7164c464086943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f98f9c9699c0919c8174f2e50a62af
SHA11b84613526e20322b064a43fcbd6de6b599a2f4c
SHA256ad6733b6d322a6e8448eca261daa2fd03a12f27738652dff75433d7a34e09641
SHA512ee032db83fb390c2cc102c5ef9dc5585694f81669b774a28b89ed07eb46bfaa076a9804d06380efb1cb550a8fd2177b6db6ae70465d1c72eab4914ceaf50ea1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5491b66dcabd9cb85dee274cb52f41fa0
SHA13e1ba6f9ab6357fd64c97fbc774c0504070443ed
SHA2560d047c5ecb98ba0fe5a5756814019a9914970a656ea55ec86b52e4fa673a52f7
SHA5128369ac964697cc820638b03ddc19c5e127ad274489ce5241e120e6f5b21d5aa78b9d7e57a638d1f2a0b23d30862a3ffc480ef6f54a7e429d1536e4c3f2cbdd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07c58828caa3f54e68bc11f0f5b9dac
SHA14a22cc7f928f366dc3e9db67f827bf3033b62186
SHA25643fb0541a957f819d601cc75207a177921acafea82c6d8a4866ffd833658cd50
SHA5126ab2eb7f3b15c62c1fa639168e2f0954a1fa21e952ff4d930aee19ba8620eedaadf9dd7bf7c09c8aef7042b264e5f286a4bcfdb9eca985877262dd436b74b63e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b