Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2e425cefa1412cc71040a48e304d41d.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2e425cefa1412cc71040a48e304d41d.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2e425cefa1412cc71040a48e304d41d.html
-
Size
19KB
-
MD5
e2e425cefa1412cc71040a48e304d41d
-
SHA1
c8483853ac2557e5884d813827a4a5042e1aba0a
-
SHA256
6874dfacf026837a7d0cdf55a7960827a61a90e688d0c79b5be9cd2fe019d959
-
SHA512
67eaa377994b63980919e00fd2b3b0a5488fe05778c3ded5c89e677fb40951e254f3764fcea55339c8c60e0801f08bcccd9e6de109574488d012a541a0448087
-
SSDEEP
384:4+QfPFd9QZBC7mOdMwwtKfpC5IgSnbmFe7AcXy623LAPd:Zcd9QZBC7mOdMwJpC5I9nC4vPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e089880c1d6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000470994cd35b5904b8630ec7c165fe6e00000000002000000000010660000000100002000000018ef616ef1c8312a5ac91bb7baf00327c04c75bfacc05dcdcd67a85d49b1f775000000000e800000000200002000000081a11fbaca8d1844a70ba2c25f7e5912a3fe0f01fa60fc27daa392a71ef9e20190000000a2bf813bc0678a6788090986c6cc51fb3add6b8812f65855f2beb10aeea5ad21596ec5a1da95992df97000b16aef79a658571ba0635b967ff55be7066d023f7b8083b9c291e75eef043e43b4e57041cc65cc184626a8497992909737422b5c8e5cd64ee9ed55ac028a851f00d58eefc993d2c800b6bdbb76ca6794500241f56cc99bde1289119e6b4519455ea1b17a6440000000ffbdf89ffb2a65d4f45d24945e821ad22ee0a1c6e8defb8bde5c1bc9cdd3d3cd1f5885d0e964cc8a3534bba42b68049f95a0ccb727ed0ab2e93fd565ced68e85 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526879" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000470994cd35b5904b8630ec7c165fe6e000000000020000000000106600000001000020000000a84446ce3fd061dc7e8ca41e586724fb81516ad0da7931507d6f8f662a01526b000000000e80000000020000200000002842f8867988ca238a647f16d604f6a7ee142fbebdbb2b34590da3ee81d0587020000000b1bc26252d602abf0af847c847027579844246b48103b7d9bb4c3a5d676128dc400000006f676dfdcccbc7ca443df0f9b95c96db22c170df072dcf6da3878112bdd317b53238c833fd6b70e6a987f266c6cc8fad606a9edf32bfe957d5dc0661cefa75d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36F773D1-D710-11EF-82B6-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE 2248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2248 2764 iexplore.exe 30 PID 2764 wrote to memory of 2248 2764 iexplore.exe 30 PID 2764 wrote to memory of 2248 2764 iexplore.exe 30 PID 2764 wrote to memory of 2248 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2e425cefa1412cc71040a48e304d41d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd20550f48af99afc464e2b7aaba5550
SHA1be0a221385fc0e59cb11903919b0263b4e20bbbb
SHA25626705bf3d0cca10ff2e43ddba598f45041018e1d82fe95760c44c5d3ce1b171b
SHA5128f4fedbed479095d0bdf73a1714788f7851ca61a359fec85d2971a9d6358e41a4914ee587719a49a1a514b377e54ae6da2c22949fb62e475593238735711b1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd05d9eb81d1a78d838e5177d6caee14
SHA1f7c3e3b6327774c381f1fbfb469bd06082eed0ef
SHA256cd4a2799feeeeab3c3c88f528f65b52839939d37c5b8f28c2927ea626af35712
SHA512bdae96f93396d8c0a09bcb19b97e273284fbf49ed5fa672c99b099953aaeb4a1d655c09fd5e47bd1c085454a92a1111a8105b85d9f14cdee6875ba1d83bf710a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31f2fa76ceb44f548bbaba69638d02d
SHA168c22704db9b597e6f5033aff0dcedc3c818acac
SHA256d526fe971c6d78e918f899b5fbe0645bd0710f428f71868ad6800013065666be
SHA512bb0b3df40e8e1f8c5fb7556910f9be9b2d57a4e2dcfbb5c57a1485cad49e9b42d0e511bee5ae321ed789a9ad88812c945d92e292786eae8ca1d44e15f20a65be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6a8b6e93bec1bc6e9a019832dee981
SHA16039e2826893026b740265f36793440ff2bd9602
SHA2562526e826514b73a3330a9baf603be71dcd9ce6ff7bb370cd3229f5f88ff1154f
SHA5124319e0a759eaaf7572d948f4061ff2132d02809de160cd1558371319a824c15852bade88d6f4e603117431062066b59280b0acd53ff55b30dd555db928abb49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54141de7b976911dbed39df833156baa4
SHA1e8fd2097aba9fd1e35b75b273f53f4b36ec2a084
SHA25616e963a5e6aa4d51b9484e49826022a933043f401dfd03abc11ce6ec8d40197f
SHA5121fbbdc260043cbc0d45a5e1bf632271a3b39f0b4c72f2c917ee548dc296517643a75dcc41f7efc417bc10a6163768fa2c7758b59344ee2eba39192da59d00805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4656a7718fa4a97c7ffae5240834102
SHA1183a57cf8ccae42bd2373126ccf0097940470950
SHA25679f1f749d851f7f80f672ee80bf5231a4e7399be718499fe9dd24b185b5336b2
SHA5126d0ae8617a39ae19655dc9eb5a225218dc39215237b5d06fff69e7a7b0397ff03f55973eb0e5d7bd35f5a00c5e611af48e8647f61cac8e8666d4c44ac84a2352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56787d354c496195c221d2d93e08d1d4a
SHA1eaf90e6fca281e168cf2328088e9c49e8c57bd49
SHA256a31cb644f27bb29d562890e00879755605bf5741713c0ad26ef30c3a5e7e59ee
SHA5122b5132c74c0a0cad05093112b8d2c4333f269db5e31b988acab4d102a7d957bfeeff5ecc4010577bff1b6ee3199db6da442d580afd82c6e88c11b5bc4b4f8cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f761f1ef6b8758c6ffb60d0ccf196293
SHA1675716a84d243da8d114501df0be16605bef3764
SHA25693bc9d587735107cfdd3db65028a9500f7a6f7d7b6380d4985551f7500c9f7f0
SHA512296eec86813cef6c5aec7b82838694e614e9451bcd49d8d88355a677d95307891f11fc6efc4926c6237e4b8b158669ae86b1d4b893a535ab77999e9a31862eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51636d7e8acfd93ab5ba781539b37e5e2
SHA1c70bcf69a44e3d5f5ffaf419dabf0458231d0681
SHA2561b9bc048675baa05b703a250a16de2d752359ba8626992ae3851b92a684a32a0
SHA5126ea813325488b3e01da7e11aba67d1facef718c0dff45085590287f5e67c3363361d7834561ff8db0025aab2d0b0968cd77eb3db530ecc05c9d913b3f8b03a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e14c261f3cb9480d06025f473b005f7
SHA1b28f810a09bc5ec75da654fcd927e558ba09263c
SHA256a4aa07039959db5d29655a71ee0e3f763341b4fd970998c1e281ee1641c92bf2
SHA512357b4d7c9bfbded6f71ce76ebe0e2d2797a94c64aecbcb0d2d1f6fc2a033f6ab1ad241bbfa2380226cfc8a9f7fd52bbccb021a282d6b1febd2a558f5b484928f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95ce12c7bc5674551e3a267c7075295
SHA13e194d9919fbe038c78a28436eb73b4f14f1a504
SHA25689652e12e4faf1e1a8cd0fec46469c794cbe95d116e743f002109f9dd287a174
SHA51235b15d6e775e17ef59f26fc0beabafd98b11186b09e8db0a83a3742b62bf0bf9626e62cba221613eb050a5b6d6c3cfaa432499ea7c3c7ac4553fb51b26c3d046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac2828454b29079df164a64378d71a21
SHA1a4925fa1a451ec16029144a9e44057fc25afe2f0
SHA256641bb632a4b6ae0934bbeba267741b996870e883f4cf904edb9f7a00b1dc4fc8
SHA512ee4b7ae72d6dd4c4f684f958ec390277c79145044f8e4d567aba974d0ed7e0bb8620dfb3b68b726ad49d6455c27427ab5293b671f82607d7bcc718c9867c8a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df237d840ec4d56a6e736fbcd2514f9
SHA101ce18cec553f9563c4015fa33ff1ad84dceaae2
SHA2565b93ae588465739101963e84c36a1e460af9122d536ac42f9130c5fcefdf1dd0
SHA512f6b89736b6a497bd6d7870a59fd29431cfb260832b77ef64e093f5c68d5e5e21375bf8e5e291b8d9e7f80a63d001d4560d8e2da4c55a89c176ffeed5835d3f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57084c8bb4359a2956807e113bf2d8335
SHA1b6ffda74bbc7e931c09a5eaf86b2b113d7c5d997
SHA256b8e0275955753c4337fde6feb92305a848bf8917c05ba6caebcfb28942e6445f
SHA5122f1abf8a7723e087429afc8ebc07fb7de8df83207130d8403e8e2c837982d74728051ee024134ba8e59f49404732ad6c24db952176ac0a65fd651c6fde823cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51825d4c7706e932d0f13caead7925137
SHA1cc7e982b9ef4f2996bcef00d4d87a93131c88f48
SHA256e558d9bfd1a1a2c6535b62c2b6e88f1c59b9d704761b8eba5a17d982acd56991
SHA512e6c3edb3d7653fe1729ae556fc87806674eb5d6c84f75464b0c8179c48b0527cfdba4baa6506df60e828ee8655a443ddcc82c9a80428cd06dd47c95b1cb4b786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c96fbd52ebcbf4846cb39587759ec66
SHA1277b9031fcb2fe3095591951bcd276b481681ca1
SHA256ed6d414dd68c9577ba2d8ebc889deb82d4bd6bb5715b064028aaaae28759483f
SHA512e641122a987d5e13022176ffdc899988b607b635cc48fd39dffb8540cbd241c41a95216115321520e43162da4d982088cbfc835f1e0b1accdd973560355762d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec9de95ea643bb49f3e6bb7929c8fa3
SHA15b9783bef7aedbbae61dea2219d1b42b3ef9502f
SHA256cddba3ba859f8a38099c1b5b44cb0e155b63eb10afaa33850ad16f0197e9fc98
SHA512150347725b625d0af6c325f88f1b01982ec4e547c8657c96c446014b09b355a41d91b98179a05b92195e5f609e2317f412724f175b6180474e3e747909c8f9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d32df34c09ff539f8b0fc5fc2f25cd
SHA11b007f5d060e6555f40f4fc37101db54b384a37b
SHA25674b39febde36ea35ce222f72d93f358908e677f45efb8a36615182d3cbed0312
SHA5125adbbfcd59eba7a0dfb49af761254027665bd35cf34dbda1f1a49f6eced83a428cdf8d4a79b1154b584f4cdbd85e305acc1ec603ac23afd00d960fe497af6c96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b