Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f9cfb53167200abac51780efe23e1de1.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9cfb53167200abac51780efe23e1de1.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9cfb53167200abac51780efe23e1de1.html
-
Size
13KB
-
MD5
f9cfb53167200abac51780efe23e1de1
-
SHA1
8c5d8721bda631faf4f9cd558545f5a0e4434aa4
-
SHA256
a3bf1251b754a6d91eb10b4b6ee627339f7e994ca1bb334520f783525f36abb9
-
SHA512
e1757f5a6dda6b3a1278e6f2b95b0b51731125675bab18b358d2e18ce77ac516671c41cc6c3060ca2b81de6f35964e05d6d8b91ab3e60b9520187bf6246e68d8
-
SSDEEP
384:QpiuFl633efGTF+HuOGIABI5TRTp+w1uNyS66uKbhq:QpiH33EGTF+Hmq+s6LNq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001bba5840511a2b478f5907fe4ee2a96f0000000002000000000010660000000100002000000091549bd86dc481e13eb3658c27788f640e933b95422082468ec2d2d071504c13000000000e80000000020000200000004370c1b054b6a1322bc1702290d379a7ff5bc4e6181d11e10bed4880c499c98320000000e2499d7d9e1e816150ae6b71dbd9d0a699df58890e03c77278b97b94504595cf400000007c86e8eab3f64eaec5eaddea81492b1aa8e387610d995b65e121744ec6f92755485f5404efbb1314be8bd63573564cbd3e782c55cdf10bafbe262b0503b7eba7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{386BD241-CFE7-11EF-B40C-C6FE053A976A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0411726f463db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442739613" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2744 2764 iexplore.exe 31 PID 2764 wrote to memory of 2744 2764 iexplore.exe 31 PID 2764 wrote to memory of 2744 2764 iexplore.exe 31 PID 2764 wrote to memory of 2744 2764 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9cfb53167200abac51780efe23e1de1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dbe8e4ae797ac67779b983c1f5b20a0
SHA1e126587745b5f8ca64c165e70c571a28c9cfbdc1
SHA256bd35b810bd4adf0e0e9581b936b0d3261c9c8203d530ca52314f666fc4eda9ee
SHA512a5bd603d9c11f1ea37a050324b7a691bdfc50cd615870f89b24b42a214686681f58034379f3dded2eb109bdaca95597f3ce79aed2bd5b97a5c8e7e9262699db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880cf0b3e1ab7c53b203f2aed18c85b7
SHA1cc734e14b4a1f6ef6f875ebc0479749d469f8fa7
SHA256ff3f1f79d279a9b704ba319b6a0d007cc2f6670e4d5f1960970907de83a1ee16
SHA512c5fcd2d92970bc610a27030a61130e79712a477bf94b3018f165a6125b75a4b50e5ed8a12bbf2730f5866765e18052f55698392c5ada1ed47514d2eea8fae049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ae6c38792cba2c570553852bc0adae
SHA15cc2cc7efb8bb6fa6dafe92b158967a1189781bb
SHA256944517ad42a8e7e5391d806673d3ad912ddf078d265c92b96f2b08f3e4490e9f
SHA51203ca9e38e0ec6b51e9f36e98ceccf00549e60ede38c18d6d64901d510d3427be23b786afec5a72469df85704c29307f91582d4d42cb48146155afcbac9845dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c1e97854e1e2308f955a6c77520205
SHA188028a4128b6c4c044617db75112ddbbc57a545d
SHA256bcdf10580ef9f871b869f24f6785c368e7f87443b848027dd7267830f28ad9f8
SHA512b10e0ccb92d2b1a041e82aeca19cffa12b9e711b79850f0f445b756af142ed335c731fbbcb84104ce60677332eec4b1bb6a4784cfad884d72026918a2d9a1ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71b4359c9e536484f730d465eb57f12
SHA19c851c9453c58a48416b5fd437a92e59a33d50af
SHA256d4a0c4afd6051181657539078f1a386ef9a1007adfc8af59d932ea0f75a4d12b
SHA512e43f2e0add68838e291d8c4922e85172332e3aef34928e7a532507b37f298f2d7b1b26251ea2c89c54076b9f6b4b04e13e895c1bd5ba3695938a139292aab7b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e44bbfe368af2fe9c1176d7a6e04d24
SHA181ffe414ce76b62166e00484be2d9461e773e905
SHA25677ddf8ca88d6573b2adbe9c8338511865654c3febb86cd1a5cb40cd65b554ec0
SHA51224fbde6fb19c61fca4c44ad22882d2087de121af1484f7b60620294281c2c92bef48dfd691bae4d7247b3aaca631f935c3ea51b6999cf8cb4222d148393a6acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb85c7db08173d15ed0c66101d1f5fac
SHA1c7997d0fcbcf7915e7449b559e09d14118124997
SHA2561a1c055e6385d4790ddca90d14c2e6615ba2c6a350ba406faeabcf0a24f83487
SHA512b5b45bf77b72efdfaacbae233692c261e864d0ca3abd22f75de571698e4c65dd97ff5bf8685e8879824c0692573b7a7d8e3a032ab67af77b8eda911f91e463d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cf928baa6f8351d097653e60380e8a
SHA10f44b48ff7402bd1679666e813103036ddd6a68a
SHA256f5b8fcfa1f5539478011802753da6835e9cab1d90c44185acf494f6f2a345f3b
SHA5124d90880cf6b9b71ece46bf821a386b3ef2d6190046252beca21af0af3ca554df7c28da397799d9c59ab887a006ba98e9cd5d5de0559528dc6440275a8ca189bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be701a3983ac3bccef431d0e2bd3f568
SHA1d7c3ac479021a1b782f7ccf8c73a9581529f031f
SHA25642873c3463f11c36f006ffe62523809d772ab32c6c9e30d2dfc8181b1c2a6811
SHA5126c8f71f6ffe6d24ebb5f86ae7b22a429246078d05f9ef74cd74c748d8543fcf205e2017f60a9fee7f0764358656ba058977fc400e09b617d3a710e70bbc308df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33e38d6b32732665f211a716f62e477
SHA171b5c5ffcafd11389a5d73554e95c766a403ec61
SHA2569fcd3d2ec8660318b804ae406bec1b50332dc10a26743136f0502a11c7fd6465
SHA5123a554795744bb88555591d67b230b8716e068ca3ed8a82666f9fbd5b80610bde5f0cf9b707db31de29980c56ce94ec798e57b1d83ad942479f11cc9b65db3c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0ceaf347acb4c65616ea86a9ee61f8
SHA1d495931779cbe58c361234222a5b6562a803874d
SHA256a8cd3c4c959c069c759707f15362bb9faf55aed46509bbbee258d0eae1b81d51
SHA51212cc77413a02a323c4d9864723ce0f42ce306c616ef2a1e488c341c70ad29de4050ea10ca5330df1fd8e3b14a52ee71aa3abcf35093fa534028c9dfe439824ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6abd3dee8220c4d6cdaa8fc543ede77
SHA1173b6c7c8a0574f729a2ed1449d9f96c41601b25
SHA256f3b434bbf2de9e992eff497f49a637c3409740fdc48d7413ce5dd69f9997a802
SHA5127584a74fe7fde4b95f2bb20dd391d35783626275c5d1011ec359714f5b0e91263addd166d82c2b88af93285abad5f21d6072e8806d93fecd81b22883071cfd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b37893ef6d553613737d1d42c0569a0
SHA1ebdf5eebd93cd9dfb3b337cf8a82ca221a234437
SHA256603dfa14b40da69f7eef36ceb0cf262da82d64af817fcff02788b9de1c70799a
SHA5126ca9465bec732d39ef687c67be06c4ffa90094d6a49d95b1ed06516e15c922c517bf1d63ee122a195e9ff2230b5205c13df3ecb7a64f15585a8402fdcb16df3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cca8c1a84ca285aa1c33a2b74e79e0
SHA15495e966ee7bdac423c6e6c06fe763e3a8e72b58
SHA2563463f2393fbb670eb786f6e733d3d02ef02a0e2e8240041b77f9a8c617965c53
SHA512298b83ff0ea581ab982a616dd95a09177d6bd7714d28637c5284246903e3c113d4b68ad5f787f25a2507b8210da292337e1061449be6b19fb198ccf521c95c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cddd9573ce101d4597a2551da2b3ff4
SHA1dd3ce5d8f6b2bd4b9feb3c3805baef7d2bbb6702
SHA25677dd89698b02dab687d366d2ea6e73aed5b3f944cdfa046f596e213f7b585fd0
SHA51214b0e67e8aa4dc6e04b7254c5f50cc5d5f1e65e41c64231b2becbc0830a15992b0eecd0ad0c61254ca4c6aac97f4e55b733312b624c6fd36d94a8823733b22b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377d592b927e6a9cd6160ee818114f7f
SHA16527b57166a6850cb8b961cf4329662f4b73b7c0
SHA25694a0db2c58a63f1ecb699542e0a57b1cb1550dc3118547efbda15de0b59c37b8
SHA5120e64d009feff300e2790772fb0995d76e4018b5df63e518c7425e2b74c8564677a7320d8e16dd57bb09758082f924bf4d1d4db9fda6e6708f6f373fe58a7aafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da042006acd4a7be8c881b8064d6c948
SHA11b9a8fb5dba983d4699cb16107d731ea5d1037a8
SHA2560631a33d9e2c98fe9cb0329efab38f55f872b7e342d5ed0fc9c7cafffcee833d
SHA5124e4150b9452a1591fdcb14e9800fb28ae9a10534cc3257ca1833a84ea4cec999018c58c5914344ef47fe20338b2a4723b4bc07a798390dbbbc3963c1dcb0aaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee518ae20674b0eb49d01dba4d426e5f
SHA1964b08eec313c02e1eae3a730c2e78de27d4eb43
SHA256b50d5e0e27a829d1bab8719e8319e0792d2ba4b26807f340755b3c75afc2fab3
SHA512f0d7fd9ea144ff90d6a8b962f49ca4134da4b8c1b39fb8857abbb9d65bd80193abf64531f8507491468fe8cd3d3dc4918d9ab0790cce2e905183347a173701a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec3e37dfdf6728fe821e69eb4d8b56a
SHA16ce193bec9ef64339d9ee22d965fdde46bd25752
SHA256e40a5c761595d0e56b788cce0be1ad2e21bfe0f938bc54e8d386fa3601f7d8c8
SHA512dba866877d5a00938bb4b01eae09f21e4206d7967d28489f72e0f66438da4e8a24cc44d9e16d6add51bbadfecc792ca872be9914c04695e096652cad9cf88258
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b