Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:19
Behavioral task
behavioral1
Sample
JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html
-
Size
18KB
-
MD5
946466f9d3b5c49b0141043d86068d48
-
SHA1
7310254b3dd73061b0d8532e8721126224114d8d
-
SHA256
a2184addb4428c9de04cde3b250e0a797c93be1f9bcf2b486d836b711b43e804
-
SHA512
8c49988fc6c2209972f5ce6a29a08cd72b791e92f7cdd67df3c405de83045728081e7caa9dbdb3458665d211602510c544fb91db3d7362c75e30278924c6d365
-
SSDEEP
384:SIYeMEnP3ixNoMRXJsYuiymcIGyH57Dy2Mu:SFeBEVl5vn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001e283d40ea02004e9edcb9b4784ae27e0000000002000000000010660000000100002000000069756ef96613b5db8749d669157cde7bd3d873739a6a4b9020a52e84b9f63df0000000000e8000000002000020000000018263df61af056e028753d0ee1480de8a7fff29dd8ce6d4cf05eea8dedfd7b720000000a6f4d65e64243820d95e86a27164e64d3424f2825446d5c9206fe9f6203ccbea400000000a1ef1c89482b0f17ebb856e70f8019f62479b1aeef439250cb1d27c907b5713f6dee61496e301f6330c33e883d372b523730f2204d15495c5e3d9eca9e307b7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449468654" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D707471-0D1A-11F0-AAC7-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1050455a27a1db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2336 2980 iexplore.exe 30 PID 2980 wrote to memory of 2336 2980 iexplore.exe 30 PID 2980 wrote to memory of 2336 2980 iexplore.exe 30 PID 2980 wrote to memory of 2336 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_946466f9d3b5c49b0141043d86068d48.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530e2b4452e43e506209e10779abba5a7
SHA19c5b14e7e10f436c2b05276ef503775112f64200
SHA25669156c15e441d7edc35f4a234d9309964ced0553e4191d24a7e8caa0f62627a4
SHA51284f87018c7751b7f51fa46a8b97dda0318d60063342e9e3d24bbac2153fa6ef97e0480fc1e843652e87493efeff114bc8f2f09f6567416afb5f051271675e985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952eb99ee19d569b91690e8ca331dba8
SHA124720264c57da128aafb1dd776c2485d333fe379
SHA256cad651ce41ef52cf4358b01b2f4799ce9ffb3a06d6aa9383f077d58bf2d63f0c
SHA512dfda619558ce57ead4236fc6dfa90fd057f9e0b67cd293c4a1541a3405b27d0b3f6c26f0b9a9fbb23341594a86edcb1032e2f813b39e2b4bce55088a1c0be3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54730a2e1a89ed6fe12e075849f353a3e
SHA1a4e8c24565b1040f8c4e3c5fc7cf6441a5667183
SHA2562e6c71e373a80a04d5279772f8264f5eaf3b366b7def27ebd5bdfdad78000936
SHA512bb2371c160f9c200eabae00e857bae5bf563f8afcc68bb169ba1898718b365d1788bd142caf55d717d92d99899c46ad6c714f70b032f74d7c0faa2522cf3a119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14207eb32d85a24c3e3f0b7803fb359
SHA1de4db5932761cc1f8605725055d756b46ee5daeb
SHA256549be0c9eec665cdf5a37248d6a38938a9c1d0be6d388cd1da553f330956c178
SHA5120321b58b69723793a5d2a76a854bbe937c35213ad938bb4f1d0c7f06a881cdcf74b1318bd679e83843b4a9f44ac8ce8f01d2dc8b91eca4be455d776ff85d33ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a23c00496aef365f49aec4fb4f8ccc6
SHA157ef0e15df54f63b5cedeafa417551c01714e15b
SHA2560d979c9f58c35b80fc17a68d1d89be633d3d27fbd99e7a110834fc037ddbe0b8
SHA512c1f4d98aab8b49779a14cd9772e01a851ae6ef3a4006e84396bbee3dde6f7b46a28c23b2929633c1b04ecdfd5bb0a06c864eed8500cce911d5c4d0bc892033c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eaa7c42e6f7f7536350b9086b981740
SHA1005d28cf974f67a9b067873090fec5f096ccbd4f
SHA256dedb352f14f47acff5f8263095ba4c2315b993e54ac0711c893bcb862259ffd1
SHA5125010e5c0e2572b89766f53efba48fda3576a5c174cadaaa5398035bd27e437cba98e8c76c0d5b51febcf99edf3387e567898ad5bbb7da778a295fb2c290e7973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b196eb7e3f8a7880276d7d9fa5ebe894
SHA1c859c5d6f3a7308e547b3afe6e154416bc9c70d9
SHA256ce6eec505e91e9a24832d1787899880603dcf77b25394436e4aa5b38549d16df
SHA512a71129355570c03edaba94771ca4309bb2a2b54c1d33227909bb7f7a49de7a20a5bd25605ce606518d4e2c1f736c8b53e313f7e3598fa709c497886fea6c4eb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5058be73ab01d6677c497d60787a2a89d
SHA15a40d67c7d627d9404cba5c16c3003f71d8bc360
SHA25606dd88a501c2d094e2a72b08665c6276d001089c48f0c1ce0e8b1b0589924db7
SHA512934ffc5262e4af295dab929b5be9255e9261c4370d543b9273ac07c1b87f81efb13e297c96c0951d6f59661aa12a93ca361d212e51035f8e06aebc1d53b40e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cd57a03871edc75a7cb07ce7b940745
SHA1c238a66689bd1db96dedb402f9e0628b68892d1c
SHA256ecc21d5441ae62e1685b8cb11d4dd9f76dfc2dad942dfc15dc652e02b89e0424
SHA512b8248727e174420ac2a49b9c1e3034750c496bdac5f22a6c9b8efe963fa369e722abd5eb37413803326cbd25a32d0ea7dc7156c18af0bd64873fef9e92524e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aa4575849226af0b8fa97b8cae009c3
SHA1a73b699ae66cccf9b8f25c65dbc9eefd8bc1db09
SHA256be866b5dd8073ce86a58446a3e5060b5d32a74a793b347d23219999cccb471b4
SHA512f90a12c4b7de87ab74845175b7d93e521856698c6ab8783e12d5770059bc69575a3dbb629e27d428f96e2c1c29f60530d1aa561c4b3e15e6e89c31ef2faf9cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547ebf85bd75a0da0da2dfcd1692b9fb7
SHA1bb98d018b8496835bb8acfc69dda30bccfb27959
SHA256a000f098ffef5b6630934cf6f67cb2f80d0ac4111e6d35da77dae8ae742404a3
SHA512956a89ad534de22bc3a79e617864fc16913ba8e40d1dd10c3cf452ac982b72d8d7ca1284d54998ef5a7f758c83fc87110d648c3d25ba64174f5f4f2169705e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558132b9d0becf7c4ce7e8d6045c1450
SHA199eed03b568ab0b685a0e57a560291c64a6a526d
SHA256cb450860615819c753bf7b522107037b9c63430da02c795594ab624fb4b3f471
SHA512fc189d3cd34329698d9a5b81adfc9f333780d27eedcd3532c1289da81ceafd50bc98d4b8e7a82cc0cc12b2147f697b4ba5d632b724169ecf6a05952a0e3c0428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c596d6caa3b460e3af564904b129428
SHA160c49a72e549ae569229d1a5a2cb51f22d3e317d
SHA2564c82de8bf36bae72c307820f82b87f0e030cc87401efbc4dccd7403da70a31ec
SHA51265fa67b6e086a17bc7d8d75aba9ce831c8fe590cfaafbfa473c77fad9e56a856c015bf718f8f304c1a24b819b88c0577319787cebf9b6ca446a05b83d1b906b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a6184e25b3e40d31c28601d94cd142
SHA1ea5a998bcacacc86d53f7f37649c9aad73c87394
SHA2568f20d9a7e721d2f6bb8a152d33dabb91e68c84dcf4523e12f09e0c9375d6f1c4
SHA5123121ae7ec82d8a5526cc4dc8109d4842f043e56cd5fad405e5ff57d9099817b066bf8d8e9aaaa9c6a274f6cfe389bee52aed576ab852e030fbc7113f4c0ec99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b7678d3ede7d77799d290cd6147d77b
SHA163197bebae4e5af9d9ee3efc35253885ef4188c4
SHA2563d127d16c4a530458a4c941d20bd579bd64cd7512185c188b1df57b1bd46b602
SHA512e97acf4964720961dc47cf2ea37940f5d55838b0aa6b43aa63e654a7f6569e28e8d1d5f2a83b256b7b938316c68b81794a11338abf010008a2febbdd9c00ed58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5f6cc9c27178101ef47184a924cbda5
SHA12edd3eb956af1890d51e37d7a39c3680ea75cab6
SHA2569d9184b344ed7281a34c3eb3c0cae8c1bcb5cf79fbc682cb20e64896b207653f
SHA51269796793594c3a445eea80d60fbbc12125a459fb5fcac92f7da88267e8fdb44c05b80f9bb9e4f29ed1f4520cd3a843b1b4aac0430cacaaeaaa1e680c88f2a864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ca6b258509f34febac53aee9b8cc25d
SHA1a5f9ac705a664b450c748b04de598977a6fb2430
SHA256bb4a529a1ac34bdf49f8da619595605076022ca0fc0615adb13983b89013a338
SHA5122ed2ffdaa1da29d070379a92f64281bbe66091b7ecf8a20354362bacb941eeb1f5068778ae76a109dae10ab1781343053315b2ad16c4c5e9b77ba0e01635b8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52508f214040ea68ed54139e663090d97
SHA1cbaf07a751f144d2009254bca067b2c648f9e7f3
SHA2569746db422e1285db092a080e81a7956deb2bb2aee3856a0425d5ad182848cad7
SHA512a4b1c3f6f13a52e3a4467e5ba91fabca4ccc30c717fc4b898654f939a3f69410c8be2eb2b09770b96b275930fe6825082f0c6e416ea90e1aab6a8e51c1b558db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc