Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e26310dfaa2091bb3f3b95611af359a3.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e26310dfaa2091bb3f3b95611af359a3.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e26310dfaa2091bb3f3b95611af359a3.html
-
Size
6KB
-
MD5
e26310dfaa2091bb3f3b95611af359a3
-
SHA1
629876f5d7029d8571b56ac57d35767e7de23554
-
SHA256
a93283e08cb5aa2513f085feb8914dbb8f06562c68ddd974f748017594473353
-
SHA512
22587d46d70c32b0f52477e0b054e0e0a51012a9a846f948e7fa5edca1cf0bd15524d322dda3c0f9c60397ac123cb96c3c28f099c3e5d552894466f3ec5d9584
-
SSDEEP
96:uzVs+ux7GxLLY1k9o84d12ef7CSTUixPcEZ7ru7f:csz7GxAYS/ZPb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80670e111a6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C06FBA1-D70D-11EF-A0C2-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002cdd2ac1b90cac4b8fc207fa54c85604000000000200000000001066000000010000200000007ebbe06495431a1cbbdbc2cea822cae9be44d794b2ef5ea18ce650e80c9e3ac4000000000e80000000020000200000003f81727a58ca7dfebd283a698779b62b2d958c00e5b51cf8a6418aba99d9009020000000a25c0f51a82090958dd0bebf28824167bff964806b51282b28771f7503bf629e4000000054dca4f4af3ae67471f9d58a04a496f4746e9d611df088aab7a1c86808a8c010056b04f806661b565074151fcc723838a2f341611249b555fb2eb48698a083ce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443525599" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2788 2740 iexplore.exe 30 PID 2740 wrote to memory of 2788 2740 iexplore.exe 30 PID 2740 wrote to memory of 2788 2740 iexplore.exe 30 PID 2740 wrote to memory of 2788 2740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26310dfaa2091bb3f3b95611af359a3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e84579ed1e4d9162942e2e89857a5ab0
SHA138f212b12bcd9ca18a6948959ea15639b2e4d866
SHA2562f8564d1831ad733918096b5614a5e7ac4fb26996ab9d3600ab945686003c3b4
SHA512e74b12582722355ee9a43de9d4b46a5cd516c18241d7c7b90e32aafb518c1eaf1f494f479e3f3322e2709fd79e38655e6948914639d9e085944399c66cedcbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa43e24dfa4fc87c5feaf1a0148a50e
SHA1502b9f0981acebcd5a0b24ff5b3723cc0059f5cf
SHA256aab9b4ba01caf833e2c86fa2d76a6b89b5a16e25a882f6311bf208b128b5363d
SHA512bbc8e08eed298fa2dbe46946765c9d27ad7ed29b4f14e0a84b7bce3793770395a6337ea07830975754e88c1cd12286c2232b88642df70b83943390d35bfd86c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dada5630b0c4069094d81439df72cf72
SHA1fba800a7ba194da0b103eb8a9bbef8829628dd62
SHA256595224fcf7323fefd75e2dcdd3f33d19f5179988593ffa56bb65c9dd66940129
SHA51228dcf77594f1c8afe3d9d5dfb1c9a2a6b5bc9f1003902bafda7e9eb356686ee2d8affce14425f5e336a530967283317a88aa36a36aebe135891da2955479e17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796cb1645e6247ba1340d0c452509121
SHA1d0a0c39716c3f4515d4fa0a6a12206987eb9a694
SHA25670823b0b9bd5e25e77ab2c474cdf59224045b8b7c7126bcda94801002a285fe3
SHA512f94ce6899a38a6df6d89b1787a221862fd026556c14ad26ff3df9c33941a07b2d0bceb34a3b0146ec67409fd76f7f2750316a5e6be60a79e996e5f694d1fd57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7140b908f701f0fe6db01bf277a5b7
SHA190b5247a8f99e84c2078535cd55604132cf6a427
SHA2560d30924877101a27224e6c4d805d495796bd59a624efb77d5ce076d05d342ed6
SHA512f493a627c8a58724226dc81ee44c82d9463f12628ced20fbf40e6336edf54c2cd99e138a920ff57c8c94e33e88935ca8ebd9b19687da4e6ff7c85b28f7c476b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971290cc06817b069a3036b9867c593d
SHA110db6ead984cd77a0c5040c1437dc50a0f22b87c
SHA256cdf69801a75fc89bac4598b67a95ad55dc2af674d80a6d9ce73949ff7d3e09ba
SHA512fa97acc95f8b80a4e85d52c0ea7bbc6acc35a253f4c954761a5a8e548b6b7ab02d8813af707eddf61597958699f7720fc4c12ff5fc87d83b1cc9038287e2b47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d9b7bd4a5a54526d41541ea5c1460bc
SHA1ad168ce65c4652c5b4f0589fdc7d4fa8af250fe9
SHA256dc61a40332a0b3c30164320f0e1c3f41173ba847a77378c2d86a09a2318c70e2
SHA512a7ac0b15c7faca9f020ef31b36f8e2b9e3788bc32220349c451e06555762cd4446895ef86d0bacd8cade782e8618ee44fdca9cdca4f9768e07bf6f72443733eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508289bc172b3bd1b2aa2c052c240d74a
SHA191bbe48c71d59b7a22734c10f9abf88f4217c0e5
SHA256a71ff5815e19d4d358ea0d2081f68b1a0e201da380180b5735acb58b8ad898a1
SHA51248967892dd2f6fb2bc57e26713c23676be4eacd9bcce7b34a70cd336a1a50f226db32481face88e13873873e575e35ff36313cd37cbb91eedec139d69ffeeb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591f16d2310e98a267e0cdbcee3b5307
SHA175b487ffc0d2d791c9f6d2be9c3356b13024243c
SHA25694eea1bed01c4c8620be0a2999a72d5adea0821e07a35852ab6a14e6e8c12d40
SHA51260c07ef7b95b729688485b16c62e88e6e813763c19c55fb09669d0d3ef00bd69d7602c6a9b56aa0805cbc54c0d3183b8738bfd4521d684e72c00f61e388883ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4954e1339c8b9c2dc7af85c5fea34bd
SHA12aec831272c75b7d0605ea2577563758033311a2
SHA256e1cd15fb546e49a26ff1e4bfce53080f21b758f76f3c6021bdc45fc246b65e92
SHA512215a6a75c0feb6260664f77bbde2800584e59ec4865e3b3d3463ff63d73f957f819f9e917d8a3153e9d490d871815695d0cd7268ae47fe509c1591a4a2073312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a407a9ba2362aa6648327fdf5ad263f6
SHA1ef545efba56934baa7fe9699488344353509f352
SHA256a111e841cf8478ba9ff65622eff030d6410325655324561feab539f4068b9903
SHA512a8c40307a3eb02463f70bef769a95244415fd5eaaafe46910cb6898e776cb64972c21e2dd16a2c1d31c71e59c1a0f71004256210ac498417b3c8ed9e1b002149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429947640258961a8a76a0f12a87bcaf
SHA12ec58c6c497dae6018a66af734242d2102dd6d67
SHA25659793a2a395d58a1eace6d41f2e5ae613d5de83c3a4c403acbc385a4ccba8292
SHA512dd926a51a63e0afafa5a62a89cb73e1185139c64b64604146f11177163fdfacce196fcf444d113420c7d18538436e20c34db50115a5dfc8db86e42e61dc79603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d73f7d2f74394cc02ccd98747de259
SHA15273382cd64e0a6c07feb8a797c2a3e2f1774e89
SHA256d154afef62135f1735c9700676cb19c431fd3e97c47d4d0e75357e10ae46c8f0
SHA512ee1069714ebdf91380ae4cb85d275ebdd6a1ee12eb9c8236cde9eb7965060d304378ff0b375edf4f7247daa7219314e238b81f01e01bca8cac330001dc03f4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8d2a90f9f05564af04e518dd759d9f
SHA1d74b83a435a578ee509c804d1cbf702e77ef3e66
SHA2562e8aff64bb249e2298844058bc9735a5275d332a523982fc2dbb0f4966559fb3
SHA512a787111f853764f1fff446e750df3304033d4a4c25beb1abea919b205169f4b9e3dacc452009f785b2cd70c13f8e34d6d1d5de0fc91ccd14f0689c5c65be7cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d44f52a1354742f1a4080020d10034e
SHA114c3e6d099f9be46a03f270062fe5c7ddd17e183
SHA256e1148eb82c7db57ee7f3c3fa29de4b908b18bc06a2864eb0bc55ff0e1d465baf
SHA51230d10f24ecb2aee40e0a22eee2dc1e4c2ec67c1ac18a321ba8584687d088fad86556c2e07644e02bb30dc971b20464c9ab63c03647ae22c6b7f4e125e070a0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce29be2f64e51d4f5c9392876b040421
SHA1c0cce5fe6c242b1ebb170cdc682cff0b6cd8a010
SHA256b46312a17f83e1627e3427b6b20386358fdc5e287ea60cc85a8858eac8daeee4
SHA5128a02881d06cbf1351cb470d06b11ff48319e8f53b9391ee18c206f1c220f043bb5250321c4ee9e06c876b6567867849ea415c54899659c0739a0ef5a6f779f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a9330fb662fbd484d89f26728a6ace
SHA1cb6ea11de927cf5bff0f535ade2ff874147ea01a
SHA256f8fba440e8b2441980cf458d2946fedfc5640aedeabf093fd5788f0cc77c96e4
SHA5128341c25c0cc67f7df3dcdc80747f3c065ff0e6df1816c9ba06b1dec1e3749633a44a57cf38509a3cade53d038e926c5b3f300817cd157e8b716b282e76118c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877f9f10a4bb09478fcfe2ac9da07c6a
SHA18779295bf9dd6d1f7be3e9bc524a750b9b3fd89b
SHA25653eca64ebd948054861608d5f38e065455a5540da6d59e92fa99332852bbb3d1
SHA512b0e15e1f8838ab6ddab2ddf26dd5e2f7578d2397a8acae5aa17eae126ce6e7b4002ea89417cf2f357d4db6ae92fb402a66734f1d3f19392881220dc2482f93ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559697a2b3f52f6c751b7ed6375482f65
SHA1e234d07256f5d0b0e53d008fbd21a66bb3adf663
SHA256dd25eabe86459f12c87a1ebfe6c1dbee33d355ccdc6f36f29af86f3df7ed9680
SHA5125dd18ada425163880c98c8a2521002dc8df83db48013180d04aa6b76f50a3c99e01e925fb47a5e98a37180fdb5370d569c6f7652ba7872e8e033174b0380ac29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b