Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:05
Behavioral task
behavioral1
Sample
JaffaCakes118_93b6347c256310c1416d6a0c8a31a5cc.html
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_93b6347c256310c1416d6a0c8a31a5cc.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_93b6347c256310c1416d6a0c8a31a5cc.html
-
Size
56KB
-
MD5
93b6347c256310c1416d6a0c8a31a5cc
-
SHA1
3e4bbeaee334edf76bc64f2580a8c998cce3828d
-
SHA256
da0505796ab890c176535bdee5604aed3c69d03c2157cc41a233fa4b90a582f7
-
SHA512
ea67d7d88af26f4bdd0a034691ae33fde3015b57fddca161affccda06fbb3a58b9bd69ec315b02e908652ef599538e3315a6c2ad205aa8a995ee0a65e2afe99a
-
SSDEEP
768:ai1S5y5v/89hh6f524PZ4l5pllUI85l8pJodJhmTYK832LyMtrAB+E2i:/g81/89hh445USodJhNzMtra+i
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBCE4FF1-0D17-11F0-A54E-EEE4B5DE6E77} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000596298383b88f045b768ac3737055a04000000000200000000001066000000010000200000008cfc3078f0663a34ab903f930e6cadb18050afce99ddde720759743e9b9b833c000000000e8000000002000020000000614f48239412c221c6ff427f276588c6996772fddd52af4935d8bf95bd4107dd900000006639d8e8b5bdc2d749386be19b81c319421246a9882ce771fd8e991d9b27bbd0a5e0caedb511e769874e624b6d23e548b3a831e420af14372f712979d648c96441199ce49bf58d2899be6e900726959f568db9d2ad41df445af92150ac23a9c074ffdac66ea2f02831907a2e51602e42e2474b6d20cd8ef36e0bfac88fd552e2f516032630ddbc4592f46b904fff35ee40000000fbe69d0e45b1459604446a85815404d76478ea177975a41239645311217ca2745d373422220fe4f1ad475ee3798418a8071d7f8a457555dd9647b34afeed5892 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d048a124a1db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000596298383b88f045b768ac3737055a0400000000020000000000106600000001000020000000fccbce4b2c1ece3db9add457dfbc7479d2bcbfaa2ce98293e58bf1036593d5df000000000e8000000002000020000000f9afb1bfebdf9cdbddf95f5b0f6e371fb380f0b346891923afc9df60bf309acb200000006f14f4fdcbb5a917b74e1d704e5e03065e2c0403bbb540a94ce6ebf2fa0b0a2640000000bca39484cb5a67a6a71492640994f335e695a932be3d59f97c275f2f06d808895cbebfe1bd5a64a3ff97e0e9afdfb6f047af37173b0ad3f9de793dd6e07cdc13 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449467498" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2756 2740 iexplore.exe 30 PID 2740 wrote to memory of 2756 2740 iexplore.exe 30 PID 2740 wrote to memory of 2756 2740 iexplore.exe 30 PID 2740 wrote to memory of 2756 2740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93b6347c256310c1416d6a0c8a31a5cc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50efd76cff4dd96e4b996a5630cdb5c16
SHA1f3cd428127eb68a173ac6cae9ef3635b9d6340a0
SHA25666503c2ae7f0412f5eb1009bfc6e368c2a5253d5bb751b9c67a8ccfd4ed2c4ed
SHA512acb8d0b0b5f823ed792713d62cbb528cdee673d6733a15c3430bf1614c574b757bc3880b85d68b145fb6668e36d81aa6c7a98916f9618f4ee5ed21600aafd444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c94ae1f785ca699f37e7c6f143d17b
SHA1781bdb312e9b78486c7089f583232cb953976c40
SHA256e81f52ea334f9067b727c0286ea1c1ea6ff6d607c2f2cfd48cb12e6294ffbd7c
SHA512520194bd4c0d7abed48dd05816551704a034a5ba83f5ef98637665ad170e95ce7af3ee5500eaca693a100f4f862b70807c0917b766c99f11d6bd18eb46c6f55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51546b1076a4b3ff81eae2eac19eb76a4
SHA125113475ac927486801d4404dd22b3ba2715cb4e
SHA2566d0143b13af73d35e4675ad3830ec3fbeb83e7e9191a59df6242dd015a1a02f1
SHA5121c537c64bbc5c0afa4442e64695bbab80d6b1294f5e01b8f8fdcbc96cbe2f76d7c7951fe27cef3019b19a725f928bc13e59e54a4a907eb4208ca9215fc24124a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7cb8ef290928bf7933c4eb8c8186593
SHA19b50d83ca68a7229d9d14b514c1a23b5b04946a6
SHA256d9243b926c4dcb173bcb0374a1d6c5504878584699ad2d58d11a3d518bf39aa3
SHA5125784119eadd74c6f9cc48c060f79e5a72c42409c0bd78dd3ae7239e4961b2cf5e10a8d18bc8dae8f85fb2e1bfe1bfd56bcc10ceb457a00e6d88cee6cd87583fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5646e292301b711d5e127f7aead71a486
SHA1e916cb41a2a19060fdf035b93d251432400f6c4a
SHA25673c1cbc60a5b78869e17d741d79b8eed3650a9a9c5eb502aed8b1a1b22ec3bb7
SHA512e37a50971aca56b8e99f62ec001b24ff3f00253f1b133b1e1988b6931e14b9292d8d789d826c762424f1c9a7d34e7815a0182645486c2618807ce573e3df2f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed213f97be84693ab50b5eb6da3de5b0
SHA19c671ae72e00dd11460514f81d7bb1710544d482
SHA25602f44c12f7f255b778ad9959323c15c9b9cb9dca5d8cda7b52cf99179c88b930
SHA5128ae0f1f147fafa1b54fbc843546b84e3d525348b22b10b3a010fb8972fa5a58586ac5c23089f53af29c6855a131b75ada178065a8c76a583aae0565064bec997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55985052bd915d2c9179dfd28fdb42169
SHA1d1d74fa77d475497d038efbe6714a04ee27efef4
SHA2563d3d20a217641eb5776c4aaa9c932c1f5b3084c4368fce8bafcbd44148027d24
SHA512ae540e9482dbe6f4a4cc83e786df017dfa1369f28b9c186838feac1cb9f06096f3eaa4520115fe2250131696b840b236aa25a15b4bccc753db3775b03a40094d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52725f529a448a0c727648a57f23ca4e2
SHA1345dcd04c54cf1a4c8665c3af92ab9b894521451
SHA25653f75ef790eeca56856223a87bfd37f5368c7d77b930e64eaf6758a6ccf59aa0
SHA5129696ad64bccb836fd8bf29d982b88da529f502bc3370c7a0b79fc826c49c98cb3c2e49ae8c2ecdeb349e642e552575e14de50e181b62fd4a2bae41ce3d049f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dac87bea1a2ac5996ff9da7241bf9e7
SHA1da976dbbd09c963c49fca8f0298212172da17240
SHA2561169bedfdd6d86c193d7a4de94a281a1df1a20262a37d8f921ceafafe255e4f9
SHA512928082ce6ab4e3dc7167b37c44a129f67a96b0c98d00fc7f5b3bb65eb4137fb4bafd6feaa18c4be2cc01f442f7e7a04879d855df0a1e208eb8e21b2c151a05de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db90376c5252aefd386eacf4834129b6
SHA1892c65af6c34bca889817b4af2e7283e748ed192
SHA2563213dcdc8bb66890a3f4a0a186434ff1c41c6d8d4676b55466c2eaf50d80c0c0
SHA5129119a752cd4f92dce02af8eaae577bebbe7a2bf0f4c2e41a960e516c195d45ace85f842ac5bca14883bf02a015b35d2e64d632a7bc774487d2493f6ea38cb799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075b9f0c9eed137872271110602afc00
SHA165da367f3707b19751e5fe65306b9ff6acacf750
SHA25639fe58014442ec63c869bf6ae243389f61433bdc2743a0bc6fe4a8fbeb0858bf
SHA512d1a89acf779a7bb93a0b29c4a7e7a71bf487345f741988963aff6738ce2f8bda54691dd8447469df257287626f48279cb988f21018b6f16ebaa5ed7e85bdabba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d5deb116752bc21542380ea45eeb41b
SHA1da924b12dd5ce507ed76d06810f13be50675f85d
SHA2560385f71304dbb880a753b5ac444603a272e51f8304021805c2f9df0c0b197f7f
SHA5120a38e1dc8078532e894d5938f50e2818593d3f22c06a5bb70bbe77e0648e68787bb3261ff932c40bfcfec7c4cd2d49ca4ce7f7770a2d6e02a72813a9eb8aeb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD550ef794435793a0052c91c73bf3992f2
SHA1a6be6aaf9381524b027d12b641efebd48ec5836e
SHA256af164d02f469604fc43a54f562295c3f32147dd6dcaa631ceea1fe46a0580650
SHA512de412989efd368657fb1808e09b93703c5743c2a402c77357193f851d81a479647b91d7fadc3ce6a0a06e87f08fa171c9a42ef8224d76a44d9d49dbd0fd2b655
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc