Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 16:19
Behavioral task
behavioral1
Sample
JaffaCakes118_ccb3fd8bef23b0616dd9c88543c870b5.html
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_ccb3fd8bef23b0616dd9c88543c870b5.html
-
Size
19KB
-
MD5
ccb3fd8bef23b0616dd9c88543c870b5
-
SHA1
85cf2fea4055ac4538fab3a53fa4c50ba6ef2b6a
-
SHA256
8b596806b9392b962bc18b0e30c31a3c83a1dda4639505198cfbd4633961e64d
-
SHA512
3d4bb2218801c248da50ec7067cea4952ec371818cdc18d5b6789684b72e68f596c538e4146a87f74b5e3bd023f57c1ebdc9939887e030c3a9dc167da4494334
-
SSDEEP
384:zBqtZRsVuEc+6bkuOENbvCul0LgIssbQbDwiTkBFV1aG/a1B7rl99Ye/ZGr1h:ItZRsV2+6bkPENbaJZYDN4n+Gy1Jl3Y/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0154159b262db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442601444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003b2cf5e423b94b42ae4a54ea2a2e1e5a0000000002000000000010660000000100002000000006a10987f3891845257bf42b20bcb182a1107858f93fc0a1a3d00b0785ab43d3000000000e80000000020000200000004e6d0854dc8282e929755b4fb1f8943ba4bd91c99a598d669db7d9589390a6ed2000000007232229595322f7fc89ba2421d5eff94f3e09ae99b173c48d33d56e13f54ee84000000041095b3da2b6be81eaddbbe1704668fa970da634b4dc3a5091560a4730b4b32ca889fa25e291eecd36dea0df8f427f27731f1b48ea8aba2680a90aabe3c42294 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C5DBB51-CEA5-11EF-81BC-F2088C279AF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2560 1740 iexplore.exe 30 PID 1740 wrote to memory of 2560 1740 iexplore.exe 30 PID 1740 wrote to memory of 2560 1740 iexplore.exe 30 PID 1740 wrote to memory of 2560 1740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ccb3fd8bef23b0616dd9c88543c870b5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD565356be57645abe445ae73b453380113
SHA19f4cee74f5be43beaacc857e21039f2663ec01a0
SHA256968fc7f9d0d3fbcaf3ed6c54f40ad098a47762a176f876c47cce60b4ea35eba2
SHA512d161e3e5f7b2ac608ac53583a466319784de6d1dff9855fa283077e2b8634e938dcf2fa39808ad340f3bbb8d631bf5973098e75f4d2ab2eed653b769b3d38ee3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afde71e8a9963dfc2aeb46f73b6b684
SHA1d83fd87b03a9567ea37948782da38913a920ac22
SHA2566e0c297fcfe6de6242d4074a35c8252ea993fff36bfa891d88d11dd8f2e9aecd
SHA5128f93416f9fdc6577318698eaa9d579d251aadbc530592ec622e5294241608f17bc61286d461de7359cc1b3f4e6d3a689aef221eaaa1c8a0e51eebcb784b3da03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0b7d985db6c96391ccea066d183dab
SHA11ac29ea3ffc3851f5fac661beda4b6dc9ef7b700
SHA256ea18b6079eaeabb3257f63551ecd81485d117edc5b6c79fd5e3c06cdac24bd52
SHA51232feda14821552fd08092718655c9fe98581e3756947864d610d2f5752bcddedec82a07dca4161392d64ef834667ca56db2e02e2f4215057853e14331453db7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f664f32100bd62e60a234ca1ffb294e1
SHA1a1ba73deb9a056827f156c313f1829e1ab61f1e6
SHA256697d8f1ce6ff865a873fab53eec21a5ed9a5feedd07c7e3ef75350e1ea539531
SHA512baa05f66ad6195f8fe231fe13aa6d2495d6d62f31df13d5ab7bc183cdd2db028a9d3427bddb225e7532632b8806f36392f78c29330c72fd4f844318ab104f02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511488d8d1142d1c6625b26f6d96a634f
SHA1ea4df859bbb6aeecc0324b050b4726069731feed
SHA256e0bfa0412d57e540603f6eecf909f09af5a01eea2ab332e8df28ecd3222ac93d
SHA512900c0010bbf2fd6a44f3a9dbd2ba19bc66e44993b9f096c5340198b3e659d5b8eed533a3008d59a73db521c671af668e117b0d03ba1a8562a3bf4be8bf0f8631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09e86cc1a8903eb8b0cb4120e76c95f
SHA120ad36bb4ff9c30bf56947e7966a0506c6c05eec
SHA256f01d165bacc817ae6ee1c6b88572fe7ab10f22f01667c02b1894f4cab5a888ca
SHA51293638b471cf3e80b3270810e9b94f3995b4474ada7e035754c68f82d8c1d5963dbb1fb08fc3dda19d348900619d2e39a94c1befcdf99687ebf32d04a997570e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab946b534f908b71ab1055327abc697b
SHA1b8886e47a9bddb06395690ad00b2deeeed0e452a
SHA2567d0db57737f7102903aceeb3deb7d6758232ca254b82f8cafe3bf4e8543a6d46
SHA512b43b11924573a0cf06b200f96bc70260517b93c4590c37bc2d40a37b86bca5aab209f97365d13e2ec75ee3166d3b62365a401b75c789fce491d19ceac3f3188f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be207e241507603ff11cbb4c4aa454b7
SHA18a1007b9d0a5d37426f302e61b50f37fd4dce3c0
SHA256c428d7db1d43f722486c29649059d874a09d0b3e271d454317753c6e2662b79d
SHA512837e397c385185df878fb89097c422dfb559c31fd8ba3b7ce478b14ef7f655ff9dd6ccac45ec3a6113cd40d56f18a23f0198f618b760a2f9cac1241464ca4411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711e04f737ac226133cd3ad96f14ee5d
SHA1eb225d6b7d873857a1ed2bd93e54003a74df9a57
SHA25675526ff262d12e8eea2e0282730889e7909e2de0ea2bdecf8a49ca4c858dedcc
SHA51288544c9e6e757c4627a5333c9ae537f9fe814b3f58e66ed3b46b30a6584ec0a2c2bb08d545c0742c0d4e1826ca7db2b04d88d51456878a38b05e39ef7b8c7716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527798a7a8fad0d34ae75b025a2e85c76
SHA1e3055058e390003552ba1a2fb33eab20df5748d4
SHA2560f77175499b209f5dfb2a968b8fee3edf5e84913ec8c183cbce64da14a310c9b
SHA5126f52aebf61d80827304431695a5e5b1efa5f86b68f814112ee858ca16ff2df33b072702c58cc2ed456fd6de56c0f296e85a605096c20ba3e98b9b63c4e5063e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591bfb6e98e80e9bed61b147fa5fb4f9f
SHA15aecb4fba6a2c461912bb8aba2151896583bd6dc
SHA2564a4e8ce7d0fa22da0426773a6a45c3f8ba046d5c3a8910a84ab91c20c81fbbf4
SHA512dd5adb6917f19c4eed3dab90ae5d2199d93697f456361b71159f1346d6bbcae04479bffb5ddb9b34e0cb8e9315b45168d7f0b965164bfef85d227b130adcaf91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85b3ac049c63db18fae3816df4cd4fc
SHA1d98dd689c39f8c0695fcc75d2599b846deba0d6b
SHA256465b3246a433a4447bb74a9204d56306465d649e2a97f795cd88d2a8d5dc9a7d
SHA5121003639830a0ec96309fe5c01b548eb0372e0117147f39693b70d2f421e443dc8d7819682a07e622e9eb365e8f576c559d7fe6c620cc9e78cd8fe9776fd5d7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951842408b3445c588d8f4d832c45346
SHA162fd2ee17acc3c18bb7b3a2e9bda60e38877a0d1
SHA256df9b8852e8d57990f190000fdcd4c45ae8685f16280275196312b8efa936364a
SHA5120d362fd0454145b9bfcd802de086db37d758d33b93da20ebc470e1e91055876ef7cecaf1ad30da8d8ae87363d971093883741723a48fe989a21d643244e02f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8bd39e42078148140c056616d9d494
SHA1cb6ee759ac85980cbd5f6d66c48bbb78fe829103
SHA2565b8503e371d2af6db212fb8b71aca67cde9e3af353135ef024893abe866ee5f9
SHA51298727d1ade998f11df05f10698404a46c7f26c83b434a47536b8af3cf9aab4b8b66d9624009ed5d0b96eb41675e3e89dd7ac7c19cb31d35b59e689124f784471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549504a3435086ba1814466f1170e58ee
SHA1bb6f639290e469b9df6df66b4255b5449a04ba92
SHA2569df010b73e92b7c5a3552ea6718a93a79bf57144ef3cbbd6b23c14ea7c291e81
SHA512dc77d5b7b5f75906799cc65543fcd5b0e223b1331ce8b5b1d10ac5e238b050d0276d0c8f26c2c2a0b64a4a92b4b2612d72f2e323178462abb30332b1a1fe82d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51084db46117d886459b8d751ddba3c0f
SHA1f260db4846bff2df240b9aa5b31b54dde8a51d7c
SHA256ba917a6e053f0ab3eb9bdc4c48cf3c331df20a7a3b976a6daa431a9f44dcc060
SHA512b896825c9b0de065d28aeb8df2c315180d7fd5a52450483a62531f098a41eb7fc64daa2693b4da4623c7745b2845e1bdc635bb29df6c0748b2474302abe7d104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5417d8df32015b463ea44afaa3b2cd29c
SHA1cc291d1a63e4b9f4e9c52b1f7c057808416d986c
SHA25624af02c1fc548f8c62a553f0c8b4cd48a45efdbc400e1f007fcbd02368788992
SHA51241bc1c1db01a81a0e57ac07fe603613ddfe5bf8f21b01c2398c50de86aa9c7451b6c3dd4668e18a1c33da31e2f5c62b225e3d05ea830708616d65311278764c7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b