Analysis
-
max time kernel
118s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html
-
Size
44KB
-
MD5
e2c94c94adb4c6bc59a772614a3b8797
-
SHA1
416ca39cd9e9af8844d731ef952b4a84ce1a3baf
-
SHA256
4eebd66a0428e29a816194dbf2b3712667240c84357ea15529c21864863b9166
-
SHA512
d2333a68da5975fe269640b12810fce8a019ebd1275cebf2e8898e53c1fc37c05f3edb0bb565c0ff5d5144826e34431f466154d5a1dff5ef1cf026db4e82df1d
-
SSDEEP
768:Zcd9QZBC7mOdMgppC5I9nC474DAjR6QPd:gQZBCCOdN0IxCU4DbQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3E68341-D70F-11EF-9527-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009ad153e23fa40f48abe8ee0e65d1862f00000000020000000000106600000001000020000000e86d4ba385f3010e44854b45d6f8dd686fe59fd32ea9207a8583bb2fe896d30d000000000e800000000200002000000081493399f7740324efc43f5426c002c8ebf499289aae1310821068a98342404d20000000ff5a52beaed570b32e724c81a3a29c726c8ae3e086fe181b04ee49076f38ef754000000060adcfc81eafe0d2ea9d7d639f281671c593635c2a8b8fb92403278c861ab8b860f6d31e074ce6da89ad98232d6409e223f2589d193a9861ad56028ac6f59e35 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ff59991c6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2700 2684 iexplore.exe 30 PID 2684 wrote to memory of 2700 2684 iexplore.exe 30 PID 2684 wrote to memory of 2700 2684 iexplore.exe 30 PID 2684 wrote to memory of 2700 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807a64383dff8e3376434c262fc0b124
SHA194d1c5b04cf3dc60d6c6cfe81c0a86155790734f
SHA2568c3876cde37139caa5a12fc58ab5fe6256be0ea09a4cedb54d7eb7207b5a09a9
SHA5120829960b6d45aa6449a2a325912eb390e116a850111c4641bf2419bc14b3f45752763921dfcd95127603acf61dc16e6fabc0e470a683a81b98fdad4032602db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5738fb8198242324c24acff86b5e857dc
SHA15c293c9884755727866b70f2105990d89a38ef1c
SHA256d24e04d3c160819375dea14c612197890430155b51327f95550ec6bc67ce4bdf
SHA51288306fb4e299c00f7f536a94d5ebdfb7794f7d8c6cc1d08f9cdd1f841c9f5ad9c7096fb948e166fd7b3d278934420a75f6ad926ad3fe60eab2840cc061a8c152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09dc757bd5b9bee5e4945b81dd89ebc
SHA1052143e97f9c1c3b87f6ad62c38cf0abe5bcce59
SHA25643a3683365ddadc1e13d7b2dc6977c6ba4d3b41e46d8642dbead693dd1527a08
SHA512eb623f2d33cb2fc4c3b4cb795374be1f5a4f1cbf491e4d438c9e086d050f9f19bd5473746dee86a79aff89a1f4a6b6b504950a7266f60416fdc82e3de1504375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f69c29552038aba797364a9dcb6d6f
SHA167973384575bf37605a96d1171b9889bffe5fa9a
SHA256b6c3c3e6b184adefa2104e1faf0eeb0c1052a96a0d252a5dc70198f127916174
SHA5121aabf52a791257076b266fb6ea18358292d578ab3f24c0aa6424d2adf7f0e719dcb837a3fd8f178a4a53044f226727685ac3b0bc4e046184d79dd3536ada716d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699ee996bdcda547ce3c14bfce06c30e
SHA14f9a972ddc6c158c75a2a65fb738b8cf73700f5c
SHA2567c97d5ad832228c592a069ad9a196fed3b544c1da1ce87a4c409adaad3caae15
SHA5121440347801f6240d8c0414fb80063cac96542f36afffbc27dad28ab95a23bbfbb8f3e0d8ca445b94955858a442960069d54a41feb23dd370d7cf8d1bc0e6bdd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3cde35a2010eaccd57674b0432ede4
SHA143112a8cf75a9be6a6209f533bd7ecbac94b4567
SHA256900f68c6f083c80a4f6eaef9a17c56a88352b25773b5ef872847e55a1e21f418
SHA512ac3bfc52710e675eeb0bb48dd5be5f55e6a7691ba220c518b404695e6da2aa42f21131541b59d447b52c60bdc06dcf316fc63c11fe000607c0658dcdfe2fbbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba799d2a164160896022408ff9bcb563
SHA1246d0153219a262827412f17c15893c400c9f6b0
SHA25606f25e8e35defab7ea4755e025aa0a91fbe5dbc8d51cc6b26eee37ab49f029cc
SHA51262480f51eb1f0fe541d14777effc0267a4ed2c8d7c9ed87f5df450ec711626672ea5a880d2638dde80a6a73facda67afe636c1efd40265d45d19eb85e3c5ee59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc007e9952176ccc4e74e03007f0c65
SHA1a7ed7ec6c3f39ea5fb103704e97bef7dd301bdba
SHA2560455b8977e54863714ea0b20d144c39f9297989ac3180cac1163caa704f9ea13
SHA512713900e41ee869627d0ea190161ef38713ebc7691a7516de3f856d4ee01ba89ee89d6c9253950d96e508825668e9fe190193c3bbc01dfa46144431cc38aa22c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfd5cdcd6346cec490e4e86a49f8246
SHA11d6c3d23fbd0b8e6c2a7159b534c9ff72c183d3c
SHA256d0260ad826f95cbef77cb25f787a5787ae9cf21c3952958b687872152eb6d612
SHA51205512299571d76efb1ebf3b63336dde0a3d025557889107579cc19578d1b6440b3300d531bffb479c43806ccfd5934b407da15b352ca68f08f9122a1a5c187d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d245537d9188f7df248e7e2a611f587
SHA1dc128e49ac66c859ec2e7c00a466d6eae993e5c9
SHA25656df3908598a4d9f787f38eeb5f6dc2df3219c975509910b7209007058143f4b
SHA512c233a1dfe7aafa94a58e8be469de69490b9250620c489feb18f1fffaf4c9eed9eaf5472ddcf22d111db9cbdbf677f0780b0a0e30087524ac95375d463673ae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a57d9be196520080bb30647ea1b6bd
SHA1bf017672418ef41a883a6b89edb0f31cdf210cd8
SHA256772755f9849986911d008d570bbdc8c1961425a0bf05d257e2ee763881f72551
SHA51249f9d77d4c07661c7a6f577683504c7508d64e64447ca753fbde0ff12de0691c521ccc43dda0f754be107588bfd4880edc49f80ddfed4b0cb217e1df7eb5e7e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57456ab983590f3ea6b5a8336ae5b5331
SHA1bdad3b804c94ac499805cc6a8637d22839013a83
SHA256fb83e5b980387782c60447dda5ede0b91da17c9db3a8e7a3d8f0ed9e4c7631c9
SHA5124021f1673e26909ecabaacbb2655c25eca68af74e75e80cb7892928e94f245233ccd3089457490f6c35671c92514adfeaaa9a517af596c9eae5f532a2bafd826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fde1d63152202726138d8c6e4bda60
SHA1ca8f5f2b70c46bb5bf22cf91c0d9491af04cc2fc
SHA2564cf8a14b39d19bfc455c4aa3744acbc02cced507f4bf0a636ecf52bd37fcb4c0
SHA5129b36022a1bb666d487d225becf3be99625a6e6c6c3893471c8f94a4319ee1bb0277f44e3b1e32cd03fb5cb00166b6fbfb022a88fbdad708bc3793cbe9452ba1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a7ef7d323c208f0bb9e6ee4d7457829
SHA1e1db0146dbe3459843a42e6b3865f0add85dddf6
SHA2560725e4307478b5499c85d27b7a17634366b52dd7876786f3ad3cf83b2a668249
SHA5123f57edb6b4336eab4c21241e918bdc873f520653456e12ad0e2e403e84ba48d0716b93bacec0e9d0016d8e9c46c1b1873a3c05737486a97d631300517844deeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bdbb67a0da75686c77fbbb66cee4b0
SHA13681adc786728ebda6be596f0ef73003abf9e708
SHA256c42dbd6be58703462c36fe9133898fb49c121105c21d947608095974d847a60a
SHA5122f5a4856a103d06b619a5eab76c0969ebfa962492f123cb1681561c8b3d33989be6ba41a15dc1c5ebe198a3c79cbc0197f06928ede8b75e3215e37a20ee36b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5073bc21b58b003a977c26804790dd097
SHA1e8d1222c8850d99c486f0da4fab8db55988f62dd
SHA25669f2b49b7269996db4f4946f46772e0d6de4b80332ea97d6187112c55f8227b9
SHA5126b9f55bdf3c8125bc21e47e5eb7cf82724a47035c1f2435ffcea4dc13c8aabe1a418fbd526d480c15f4ae3bd61ec71813bfa96a6f111f0a647b7f29456d624c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef1aad547da26a2261d2104b0394b7c
SHA19aa2aa210f6c1d25d3f024807c5a6c9632abc178
SHA256f46e8e193453059566a3e06227e56cec989ce44d84f54f2db0e3ef6258967712
SHA512db3ae06efbed9496bed58046bb2eb9f950d7deb4610e9fc82b39e7aa1ae3a74eef0e582e9ac4a0a99e8a76e6aed2a5f8f3c77d3d030f6f508c2686158b91c99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f75afbbb57a276c9ee41dfd91d0e405
SHA1ebecccbda7e70c45f9514aa11f31d0e648c49dfb
SHA2569aaf0cc818c7dd8fdf33dedb5af0cd5f355e76da1a0333daf222bbcade677edf
SHA51274553b270b7c3c634767a488ab86eaec71356697cb297222eae7d8ee45136d2e1410698ece978289663294a8d338a0e2a3bdd428e1c91c50aadef00ac7ac0876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50335b2c17dae11c0b4583589e2b7b340
SHA1a0403e077ce7e650728137a4c0767b4abbd76de3
SHA256e97fa7e2154118a22eee5e107f3d082f64231a5d6a73e640f68e6485d0ce16eb
SHA5127859e3b06282335f033ced417cc9c01023bc2477c41311937b957fb75fd110e8b4c14d91b172522856117e9b1d982f6e35662cefb5dcaa7ce002fcb2cae17e61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b