Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2d61bf12642dfc8a63ea198f0c8a17c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2d61bf12642dfc8a63ea198f0c8a17c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2d61bf12642dfc8a63ea198f0c8a17c.html
-
Size
9KB
-
MD5
e2d61bf12642dfc8a63ea198f0c8a17c
-
SHA1
9300ed6a1e135a342552ac3b20af2561936e0c41
-
SHA256
4bb828e3820b4ba4f9628f7e15d92f2af9c9203189f17e6c7284c2e5a8674cfc
-
SHA512
165ba280d35ceb047e3de2953cb34d8243aef8688b199208434d93aed1249c76880bc879ba8737ce1bb43a3dd89ea97327e021f4945cffdd8314e7974262738b
-
SSDEEP
96:uzVs+ux7XoLLY1k9o84d12ef7CSTUnGT/kbwpgclVHcEZ7ru7f:csz7XoAYS/66gcPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000da6bd7c31878224bacf9074f06f5633100000000020000000000106600000001000020000000014f92ce4551088615e411c419c381cf67a4ca11412fe9109ee8f1f90c279a32000000000e8000000002000020000000a1c0feed502bf30a906c2ec72f47a07f4e8679147455c61e6c4e5b87888a148d20000000d475f9aeef7e024c95d912c256ccc7d1539f0ad111c0cd06355b7ca8ca71b1d240000000b536689e92a266cfb402e4391ddf33832e1dec0183cac18eeca7f7b8ae87ad1245aa339fcb1041a1d458f7c5bcee8baf0c43d7d2a9c3ef81bc580b060dc288e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{060B30E1-D710-11EF-8EB4-4E0B11BE40FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20869fdc1c6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1840 iexplore.exe 1840 iexplore.exe 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE 1608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1608 1840 iexplore.exe 30 PID 1840 wrote to memory of 1608 1840 iexplore.exe 30 PID 1840 wrote to memory of 1608 1840 iexplore.exe 30 PID 1840 wrote to memory of 1608 1840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2d61bf12642dfc8a63ea198f0c8a17c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7e4e8cd277607526fac8d2af27da4c
SHA1d4bc4f78422e7fd7d80cf0ad06dd834afa91f839
SHA25623721ae4371d467cb612eb2dc15ae6faca98476bba66219018460ef2202bfc52
SHA512707950a9c2f7246a4630715a6e004f0c38a370102a672bcbd931b2fdad3dbe9d2040511b4a5757b18df3e9f1bf3685c2658d1299d45cb07d0b570d407541f1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e71c872ae776e3e9194d020d06c30b
SHA12c8f2884e873b744194cfb4e2a0fa7fdf1a9c3af
SHA2569aed138e751aae00aec43850fec3c9d3bd9b890c0a585eb631692524f5546a6d
SHA512f5d770c73b5bb02659f438c542874401b1b6bafc3ad928aef6408ef3380de0e19c791a7aea1f8047bef51266ad8bcc596043c3a16f4641e264a14c835c1bb9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c56dfa41f530be329811c54656d998a
SHA1887120ad67b47a5eef4913bdb77d6eba3c391305
SHA256a0bc6558e4cf89bd4581f0bfe6ca4a3eba9b76af8beb8b8a3c0578609d5d4af1
SHA512dc671482f08bd4d4c763a0f481f992d423c3f8eda839f365564678613e5aaeab9a3ed1ccfa0fed062c394932cd33b781392bdec82faa8ca6b6621b540256cbcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0dfae929fa826c891ff971a0354f7ff
SHA18f1f9664bc994b5d882e9ba0f8a735845430e2f0
SHA256a6d065146ea86b03b93acf133904a1482a1b9b5c2d435f4fd5c267683584c7a4
SHA5127f6064fb6d6472bd47163d891677dc3630c290e273970bea87cae89e9b58383aff9d372bc5ec79b604616d2584e7f623aebed246433b415a98b7c8479e958a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5229bee1847c160834660d03424d3a417
SHA16e13a41129337f7412267c7b1e60776aecdd7de5
SHA25625336bde75d107515e1f4c426ac3f799b6e7d566a96dbd6a9652545bdc0d9911
SHA5129b0c638157826737102f397e78675b4418f5ceb4e36a0bad8a9af45791b6021a574b59478186bd7f24827fb75475721801d6ebc21ee4b9ce1924b6f6912a21a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb56821a625bd966345294755987bb6f
SHA147951d24ed6b71d149f0f01ea7ec93994e6e0716
SHA256e72b25a220272bb95325351f6424408f57b81a6c67af08c084e8b74f1e39aac0
SHA512c152176df21131664d9649cc50f9b709fd3cebd1c4e7eb66057f0c83a0fea874ced3e8c7f089fac5098d793a9314d6d81290ae14832179bdf9dac7eac65ea88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69416c67010e7c8b6c04e192fef8024
SHA1aa43c2916e1f168377a592545d344a10da9aa0a8
SHA256aaeb07e0f6252003a37c5d43ec913c25e82c77be6b0dc4ad686f1fb6db27cdc1
SHA5124959d86a7947842e2db44b7ca154e8524e9c57d2799e06bc0fe3cfc09446a7041d7540535c69ff2416b86b61c50dccaebe1cfb3a14b55d68163192e8ee189093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3621d280676cadf98c366c8fb1f167
SHA1c7933398a4181e126dfc60b5e815fd6e7d70eb47
SHA256e270b9fdf71564ada5165f4e8d5262471180bb187400ee5099888f2270589280
SHA51272c44741053719dcad4a32a40ae6e15cc30e4183e75968f40121596f070ae11dc9d786d31d155f8233b907e97fa4ea3cbd8dda3f70d537720594cabf2b0c21ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8a04800517e5ecd2b152ee2e234c52
SHA1b707a157cdb061df6482277c275e3b591bbcd91e
SHA256ea5aa92380fe42c1ef16d5e9e082cda5277556d9cca8ce0d13e6a941a0768f63
SHA5129e220045c2139bf43655cb4e25c61bef3172855e04e75e710d8e38ff008418ec1c14ea92cdf7c39110f5bc221a881e6495d8d1f356a00f5f1d60e5435954559d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f2cfd7499f9ee42731ab63dae03eca
SHA14738f753e6aab23c3b60b70be6cc3374ac46cb72
SHA25633446447fb41c7671c1e00df038dc243c4ff6560cbb348166ee13c6ddc425776
SHA5125ad9519d167c38eec42f68b36dca12191dbbaef8fbcba053c11c951be66087988757b331317a0eb34f6acfbe1d2cab16acf23305c53292a489fb1eeacafd9439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f49312327efeaecee2938f23ce1167
SHA1af55c3b6fa322a4bd3b61c787a101be9d2a26825
SHA25612e026b421f3f55b7584ab45da5f6e7d7748d8e70e28cee516c487443673d2bb
SHA512851739d178f486050d0cad3457cdb87949ae8a2331aa4dd97611ac757f9d1b465f57ffcc9927aee5a252c02bc5b7daac0bdb3c787d242977406ab28d612c439f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3c2a79e8fae594c876e553a700acae
SHA16a612b61654154e9d31c4fc8c85765a67b4fc860
SHA2563088732d35413763838891550ec7c6ee1b3cf81a78e536aee4679069b24e2cdc
SHA512abbc7ac29643e4e418d53e776a4e0ac319dadad0bfb495149c7a8083c624ea0de7ed5ec9afe097a1c8ff912ba368a8f92dd7c11cf49386ec6694b00ab6719979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370085465470943229051eadcee7469c
SHA160ad3791b6719d3a5ca78910d392c9ff59448f7a
SHA2567342cb692ba1d527a54efe1777c49ba7143ee2ffb0d7c411e93b4db863c6a9e7
SHA5126ba5095636864e0d6164f6bcbfa4f3fca0935ea99f28e66e18a8ddaf1b2a70503529f34fe3d18623af4aec61f8699d56f7eb47fc275d9806466af47de3613d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f6b03d6ac2fb2f9b63812d1f80a7a8
SHA1bce53bd6d2dac0bd70b28d240065fabd1db14abd
SHA25653147fd3a84c865f9102e0fef804e7664c30c486b529d709f80bc070264c47e2
SHA512e95bb44d0ba63e58cb36029f231417839eee3084a747d9c72e021b5f1c97e097d3f55e2d7dbd7d7fe82cb499cc2c748287e60408e819c24ef496865d47b8a62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4109a9fcff3126e5b9ff4409996b47
SHA186f7b8e8c63aafce4d611b0e1650819fe9ab146f
SHA2560ae239193e05e920e375d9746680abd55d33503cfaa19aeacbb80847d9e47b65
SHA51293b6df9028df95d2e49b84f853b58de1b69af17d5568d91c89813f75aa82a7cef7833a3893fb034d89a73065333246031477173eb6e30955ec959ef97def10ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb3992db549890508278c341a8d3576
SHA1d5ae8a84a95ec6b3ff1a0791a4c38f8ba452a28c
SHA25667658e4e45bae89ea05206e3955d73ccb4008bc0f957605a6d0582e2cd578679
SHA512b248ffc2b0a6e15e9465098d6f2909b3dd65edf81bb2ff4ff2954f5cc5d6811a3984598c33523fc88af79ab65e5e140b3e7a4b1e2a1ca0d333beb2bfffa84480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf2c6648c490993a89e79c5d6aedc7e
SHA1a2a2407b5c059ce51714974d7f5bdf3147ff4426
SHA2565ba2758da99cce2c878b6f12ffc6e61761f8c592c51fdde093ce215bb67e5027
SHA512f4cc1971b13e55a5ab092f7982e3ecdf6c2648bb448496b76c1afbca3100eb6db5fa790f8a77fc82bbfb8ca94a32342f661626999badaa5e9da69292b166f2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c87aea17753974a6673a3581c51375
SHA1df5b5f3a4968f94ac3051e96e2105dd292fd657f
SHA25676ac7a24fcb4fda1562bdd0872045ab925efcf529cee5b85db1d4ac5fea21436
SHA512eb7b4252bc69089654b92f8fb66d9ed610e0b9af9326dad06f86d19b3113711b5a0ffdb0e81d72c395e5edb0c39c8b32c1d72ad6f5a63feb0a43bfe385278d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba04d3cd86c610f0e38433efb3eceeb5
SHA1cd244c20997d0e97ae2387ed75a1ba5a76d55c71
SHA256dd2a9f7ac3e68b262dccdb592d048cef3b1c45114872024e7a64d9fd4afa08ed
SHA512fdc3028da01371b1abc71eb37f97f0665b460b0769c86a4372ef7fc98577f5906d294d28c6c7e258c36d880fba9ad6637ddcfc038a9bfbe0432aa02d2a9c8e75
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b