Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html
-
Size
6KB
-
MD5
e268829cd357453bd5f40f644ba7d7ff
-
SHA1
25373ca2d1c4a4d6ac1f3601b2ec000beb36cbd2
-
SHA256
a61b2c2ffdd28dabaefeda2187d2c6b1d59aa86195f514174edad8dd1511da75
-
SHA512
64c77d80c312b508dfdd8ef525f7eb4c13928a67b666f3d3673cd15b8b9981e98682ed9fd304a3468a5c7aabf9fc7848a3e5b2383e3a6bdba4d05c080de01a8a
-
SSDEEP
96:uzVs+ux75RLLY1k9o84d12ef7CSTUFIcEZ7ru7f:csz75RAYS/Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002bfc177be02a824299b0365f590977ea00000000020000000000106600000001000020000000c0d4fb134d500c2723ba4341fbbd24cd158f7749acf939cec13b66ece7611888000000000e8000000002000020000000827fd6ef72fa2862d13b413d45ff0aae9924a40b27d2f40358b15ee1376c2ad620000000895646ca7de0ed40bf86b44870dc2c2af5534c06dab43b32fa667c4c95536d444000000003e0d5c3bdca5edc4ecf46fbda5bf747b5e3dd8f898f28be0ef547fee25499854ee1de37d604e10ef6c7e0ffecf11c26f91affe76fe84cb10e3ccb820018aa22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DF717E1-D70D-11EF-8673-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fe85341a6bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525656" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2136 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2136 iexplore.exe 2136 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2384 2136 iexplore.exe 30 PID 2136 wrote to memory of 2384 2136 iexplore.exe 30 PID 2136 wrote to memory of 2384 2136 iexplore.exe 30 PID 2136 wrote to memory of 2384 2136 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6ac47017d7e2c506c4eed704a7d2b8
SHA1a811e750fb73e99afe71452e136faa8da776c7a1
SHA256a58dbab09150f29d80df666cf04c6f8a83af2a653b5f47622d78d746b50e4cb5
SHA51245a65f185782d683191a811f96458d23c478b4e26368ef6fee9d499b18210178f62a24c3e571544665914c746a1376a4c1dfa85ec5d1cd48b68293d11c6f12b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5f2aa75b2fecd1a329b9ebe84855f6
SHA15155cc3a392c5da82c719ff3b4340ace40d59bda
SHA256152d60b7bba3ea803e60300c6774b24ea2772711b9746608ea12152fdf2e4bcc
SHA512295b928a69be9e72931b07c4e5c61955f41fab193ea31b5f381246ab75663785a190c2919d0e2fba04152a74036e1757a8674aa4e8237f0f74702bf036769697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7969e6f96e21c93074febd067e2423
SHA121651479791dc3aae2e41f464f5ab56a8aa3cd82
SHA256ebd435ea70e9f1e80639add4dce1aa628eaa5f485615ac40b1eddce352850940
SHA512cb93cf770f691a195403e386a2a77b75f4020191357a2b7d39964a680b8d599e23cc252cc5b5a6c95ac468108e69e6d7c5166d69a8610eb2d2bc177eb4824c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555d94c92bec63b11dc2c83059df5d0a
SHA1e1625f262bf0470801f11fc99b747fc6788a01fa
SHA25672c0669e17673c93f4ddae42d4a5356527732a7b9cb9e7f4e46547c55c46e047
SHA512451ad8954c127aa2a6682cefddc117b27e09c039504865238784a4f7c9db9476c0388d2678d71a78300470875e33c56396c8c168b7a19dbe5f7aa3aac0bcbb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9919f900b3c48fae96322a4d12acaf6
SHA1d41cd11b03cfb8ef7346978d15e7d61fe91c8c7c
SHA25687dd4f457bd69211acf3c1ce6ee46ce087e7ade69e359d167089535f70b2b790
SHA5122051f33d1f7da268ea3479e1e60bc3d4b983fbb8e97f92d57083e6ff4b7d37cf5d52b8f0e20c148e7825def1b0e39e19ae173b51aee854986371540a911a0c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db039d33ecdb4c2434804565d87807dd
SHA1a15c95ae5b5f08c3250e10604ef8b12f485ac2d1
SHA256c49d7160a80a6bce2cbfa452b212c579883d0d007f64d2f1e6e86349b8fdff09
SHA512851432f7c97d210b1378cc80d3be2d06af3b9bd92ef7fd9575996ff7d43d42511d3f84b12d77ee701514507956fb1b3b216df72835e202d178206ae952bb891c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cde93a3a42ad8c492d2408ff7ebdc11
SHA1c6e2acecdfb5e0c32fcda8c89e283977049ae5c6
SHA25640ab3fe139927634fa00ef157bb881fc6469f4fd4dcc43c3e9100a67293b8145
SHA51216abb9862537a36728b27f5c3652a9c705874a5b521082b69c99bb1c84cc71dd12d0ba2e69d768158ef754ee376200c18938c0fb65d7ba3082543ef43b00d431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9999a561dc49829806c05b3eac6345
SHA1abcd924d49962ac5c4f57cefe2d32315b0b416f9
SHA256a43cc4046eb301c7fe47357d301643870c363772ec389643e6bd6c7c8e6292ad
SHA512ea4e07c78fcb6d3bb99783f0bb44dedd6ecec6f2af6356a5caf9244311de6d9735656a1f84f174a8afcb4f422beaa909c5572ef59aea69b63d9b858e6d5a600e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c3ac579c4677f41ad7d9a02d9a6843f
SHA13e617bce50238ceeb200fd0c29e0fd4166c914cb
SHA25625595eab4925a1290c2e4f4894b5fda9c2c95087a359b1102373771a127de6c8
SHA51298fa6613a8e2a1852dadefb1ddf4d0860664ac8d5e372eff6de2cd9ef6dbe797b979e211434e576f127786d461339ea6bacf212029d64179279ce590c10bff16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55201e218992928572cc6d407da08dc31
SHA1dbbdc18dc70b2688aba89d7ec7a6eb51cf6781b7
SHA256692a4be80ca57ede1b3b8d983680759231853e0bea4552adb54a6e29a5976ea8
SHA51284fceda4d67a748b3cf134d649f959ab3a7f62a4b43a4f80942d106c56217737e4cd3135b065918fd38baf62eafd02e70789b99e4c0fcaa8485f81bd8c4c4f2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c91105fa910e2602d50fe0178fd61b6
SHA1e0288570fdf377555da0af90c8faf6aadf97138f
SHA256d94f463afad4a70bb2d0fe4a88a2ffc602f30517d0ccff152992d82cb7ea3f5e
SHA512ae73b47682f78045789ad4f2039572cf230bfa9ca2c79488f723981eebef15600b97c15dd8b660ce08e2b34194981b18aec930b7021f35ebe5c66eb20ab20548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01f5f1cf1530008e795a474ba826859
SHA119bab50ab257cd1a832294bda7ad116c70429380
SHA256d29b916f30b2612a93914b63f4d04d5cfee9c62daf3286b4c5c9cbee9d07f2f0
SHA512383d4dbbe15e431fab4959c9bd1924faa2ab28e679bbcb75f993a67f457ba79826ff47094b542a0e34e589b6a1be0fdc506b82a5d8fe75cd3b5430f262f37b7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb43774c1df86de95eafb19aef1e7d9
SHA1ffb37784c935cc5a028df2ed1c5c9047226fab44
SHA256ceed8596526ee04b881799fd2cedde993e7e913d2eb1d551eb4cd097e17e90fe
SHA51298cd1188f7f73ef0aa8f158c9e417214314c3aca9fe9db56bfe149f5389308caee1b83e962ec643c9ec50153728f1f1fa05be597d90db4a7b908a77b853cc501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f583305e4021910e7232f6892e415d6
SHA12ad8153dafc3fad97678948e8bc77a76a9182923
SHA2561cd35305a57db69f87dde3e9ec0efc31ba4adc8fcf77df066569a23a7c213c92
SHA5125050443abc3db8eaabab5b813318cb9e6cb0e07635d65b0f91997d55fb62a775e365e2b1b5d594872477a1ecce25e9f9089f5d16abfee86ae1371fa4a622bdb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b326cd3e789321688347dd6daa7ae9
SHA182c36dceb5881a5d8f90dd3384fab3b4455bb58b
SHA256e35c7b51269575e6401f3b91ed9b2755eee669022f024f7ae2f8254fa6f8af0e
SHA51287e3e95305924d51410c11bd98e41858fb3e510041a8c65bddc5ab6031a7bb9475c5716fbe13f33326139f79f4d3a4a9fdeb9d505e0ba16f7355c5cb7d2a63b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d1d91c5c86247306bd8b082e89843e4
SHA1ed7e5ca3dacfd476566fd49f8e61be84d27e28ee
SHA256ed3668d2236c7045900ad5caba165288c474a032a5fdf317461af938092c4fd7
SHA512948513f4c021316e655c44963f9e7c393f153b495a404985acc0ce5ea184a52aad8565bde82ae681db2d3f2d41879191559df0f96298a9dcf73f34c431db7cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b7534d89b7a3d2d17c9d1c3338a8852
SHA1811618460e256d19fb58ef1bc7bd5fc8cd2f63e4
SHA2563de7a87d7055b968dd16fb2b8a25827af4be63fe0d1fc6fce9002a02a50fd6f9
SHA5126e22028231389309bd2fddc3fb159a46787e76f087fff14f9dc298df19ea4910fd269c37bb443d7e959425c5cebe80357b3d8b417637c4346db29579dbbaa1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb42356d22818bf6bee4154646070692
SHA1a94a50b66c166e94eb7b461cd5417a6f24bd3ba2
SHA256a867fafcfbe68a084e9d7909e483a12850d25692a8d4f7ec0eafa8bf6e793a98
SHA5128e45fb3c0254bef7c8b6eba455d850e9199512a1026d5efc65be82c8064741f66d1ef53f030d33846e41f26f44ee6aa978f8bd9b66077799f4bb4ea50778da63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ebedbf39c4dc456214de5aba54535c
SHA16fe0301ffabb4f42fed55d360b17df6c41eadd1d
SHA256daf388cae08307e45b5a73e540376321db45614aa0079c4c6ed4dc11f80b27c6
SHA512c89f9f519671526bf1d811900ce08b312a4534a989ccd495c189bf9fc958f8e2bdee1ddbf7b9861d2438b339a4cb6d4d93a0b696dbb73f08cea6cec57e92b6a1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b