Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:09
Behavioral task
behavioral1
Sample
JaffaCakes118_93f2419949ce6e0915b67d1b88989d31.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_93f2419949ce6e0915b67d1b88989d31.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_93f2419949ce6e0915b67d1b88989d31.html
-
Size
36KB
-
MD5
93f2419949ce6e0915b67d1b88989d31
-
SHA1
4c1058536c63f94efa26708ea94b22b544ccf658
-
SHA256
dc276c01b765a9ba865af8461a92e18aae8ecfa71216ace2a13c7be76dd7de65
-
SHA512
2fd7bca97b320de69508acf0d71d4132c8a4a5fcc35a9f52fd9615a5aa791400042cdde4e627e3376845e2e84da93e35077ff35a7c67321d553194713d95c580
-
SSDEEP
384:S9AnPHm4OJoOlvDy3t47tc+Jx/27QxqiUUBIu1tTV+E9r8OPQJxOJTs9mipAHP6T:Swm4l3O+ri+8rnvNI9BLIinHr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449468284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A05492B1-0D19-11F0-A5CD-E699F793024F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2680 2640 iexplore.exe 28 PID 2640 wrote to memory of 2680 2640 iexplore.exe 28 PID 2640 wrote to memory of 2680 2640 iexplore.exe 28 PID 2640 wrote to memory of 2680 2640 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93f2419949ce6e0915b67d1b88989d31.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD575dd014b0e93ae012ed314f5ca2db2ee
SHA1c92f60c1d50e2419e364ed33a7367fa839450007
SHA256709ec0a65398a7917d133f3dde049a1e7804faf9352128504343e7f9c2b56c57
SHA512927bf12447565244018566221ea0c13e8c3dabd60bf7ab12c2a8731c58a501bf9327b4a892f48ecbae25a882fa31e9dee58109f3037d3a5b9afa55204bc12f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0aa5059534457b3c9b07069dfeae90d
SHA1e9abc1ba2d7ee62c3ed435f9a678d3a1d4c925f1
SHA25634c1b683940bb1e380cb60c74426e5d59dff6095f1e87fb55efa3fc7127498f9
SHA5125300fa07fe66315b312235a54fee454d213b205b1d6710bdf9d7b68ba0edcaf6f39280e519b842187087f7bb4b0f1afbd089e51b9ff9a909f8e1db974ce0d258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b875deb63dc6d34fe26683ced591af87
SHA11e675489cae639b30e80eb77bc165566deedbd3e
SHA256a0894126a9e3b9f7c9ec2747eba2129f35ee78ba9e9ef1312904ae84a5239523
SHA512e2c10db7d60544bd72526542c53d16c6ffeac4739f3b63e2867afed4641278e3e2a72c8c57233001d10a6fe8227f3733b1be3af58fff62798bc4f5a3478e9843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59abf8002ac80beb6a020bd6656bf5dcf
SHA183d6bb19555ce09452e8e3c47e4862e2b7e0107e
SHA2562faf0556cab2752f131013711ee9600747e1b647bfe3b24cf0d780f802867bb5
SHA51296be721fa9700235f6dde0c885826de7169042a0e4de2495d4c150e5379cd41183cd6419f8bda69798606d813fd2e7160f738b298219abee4397156cbae4a9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd11687a63e22e3dc8373c4f7120d0d
SHA19f5658b56ca756b43d7231b3f386d0762fd426bd
SHA256ffb43d652ee4cc54bec7a1ce3c982047c5c5a2746d17f072b3d6c5de7188fdbc
SHA512c220fdcaefb39d2b3bb4e7e9dd0118fa46eaaab8984013c528c89f9caed896588e974f3460e869aab2b5ae0ac361a9f2d35f6b2d5d2239ada4221fe14d92400d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999c5b0dca8de38d26d1375be0cc4322
SHA1a4eb6966116d8e3f2a78dba115084fba7b3c2f9b
SHA25656c001c531110f0cb9a30a110fba803f81d1164d32c75ef466c372449ef4efbd
SHA5123578dab1e45296778bcb9af483945f4057d060bdd89421389d96315e14b73372096353f95ccd484fc5526b631759e8ffcb2a55dea26f6797e4e31790432cda6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff2b2fcc227abae2221ff232b71dcdf
SHA196c869cd1a261af1ea86d2f1bbfd795ed5c5bd00
SHA25623c0f7ce359b941f0917398cdc443e5300db3decaa3adad1d34b6e7d54a2ef00
SHA5126b656754bcd424a0d04c6f07b264cc864a9798f88ecdec3680fd1d0b7c28050fe35171348ff1521f1b311594952cd73eb422d6c9704d5169004c043b5a9ea553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c2b7cc5c88a59453ec710ce6b85e02a
SHA1a5980a4a9ab81f7d977ef8a041f57a644ee9c458
SHA2566e1f2e38d186f40e2229d96642e483cd4df2d48ee8f5d770191dd553b21d2bc3
SHA5123f2e39c9bdb95191cf5175a03cbe2a74a05af88b9f661313dba314372df97bee730f9057142c2a0a1080c0d29d8d4329b75a70813839690cf07c94af58826ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc951936c1e2361c5e97c3238d2a45e2
SHA16d37a4d48f8ed0766b3887d83861137708164c39
SHA256bbb67d7cc6e24c1826d392f2846cda8ba0edab7d863ef341d8e89186f98fff02
SHA5123c83b39fe3debddc867797aa23948928ae812b44990d3ef71845ab2d3fd8ec9dff6c3ed13455044c1ee4cb3aab98d881f052b9c225523ca5d78115aa4abe608c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4942e4517302950e895ca68035eabc6
SHA1bc9d6ff3c217a0f02b2751fe1340583649cf8f1d
SHA2569eb5d43b79ffc60a921a9c3855e36bc5eb4c0287aeb2c971c968decc8a9cb7cb
SHA5123d07658e084adddaa984c57cf9d9deb90f34ca12c106fc32726991a5473995d586a4db8c99f37ec79b970768692441de9a74d32c9f8992ea694a1f262c857d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dea3a1409bb7c31eaf1e6d8d51d84b1a
SHA138dfc495dfe6caa957776767f639b037770922c7
SHA256bf54dc951508248c57f33fccd02925f34380fb0eb44e959da8006e75017ad737
SHA5122ed95b8dd6e7427e33a8212deb97851b8696aea6a431eb473f56f95d68e7b9b07a7e99f93437d50b0749ee64c85c54f5e7303ed634134261194a72d7af46cd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54be2ff806c4a4151faf0d530e4d5a539
SHA1ab6f3688c6c6be5e02176698af16eb936563ac7a
SHA2568f73a971f333b8f65f4510d7e0037986e604d7e41e026e42b7712849ab05e0f3
SHA5125eb7b666c08d8b7700eac76c0cf52a475ed5761d118f9688b31c8b27bb2626465918e6b63ec093aa209c02d54e522985469c0229cb20caa015a15284a1257c09
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc