Analysis
-
max time kernel
148s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:39
Behavioral task
behavioral1
Sample
JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html
-
Size
20KB
-
MD5
954bde82c004b956bf668392a0c1ab7a
-
SHA1
97e653bf3616a163a753798f46be3a971fbba06a
-
SHA256
29eeb18ee13c9209b52c79359fa89e8226d70021d6cf9a51e57acf4fda809b42
-
SHA512
f3c462dd92ed78495f62c3c23229afdcf4c3528aed9068a1f3c625064ebde925061f6eca5a89b78e737bb8c3457359ab0a51400d9716386e7db5268a8886bc69
-
SSDEEP
384:4tsmqKi0VuZZ9DXRU3YahV8f8lIIWTwObA0DVXdxn+R92ki0LuZS2oV:i5k02HmYahVUptt+00Eo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f7d38b727988ce40bed49fe199697801000000000200000000001066000000010000200000006385709050cc28fc5a975aaafb08dd7d9ddfab81fdc0cd884419147a3c7c79bb000000000e8000000002000020000000e9d2b4aa7d031a99e10001b886fd828534c1ab4539e29a95d762c6817c8138c3200000009f65ec066e2f7db361861e63d938ec78f76ae874095a900cec0acf3fe521835e40000000e98d52654703658b12f1d39dc98a4cdfbfb8d4c7ecac345a50891775effcf79ba4195549f7ae9e86252e46ec580ba8c8bf2bec3e412449e52a7797b5ce27e824 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 003437eb2fa1db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449472344" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14680071-0D23-11F0-A160-DA2FFA21DAE1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2600 iexplore.exe 2600 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2004 2600 iexplore.exe 30 PID 2600 wrote to memory of 2004 2600 iexplore.exe 30 PID 2600 wrote to memory of 2004 2600 iexplore.exe 30 PID 2600 wrote to memory of 2004 2600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570513dc925c57a3283d111d3e1c3efe7
SHA1e19d8a3e27f680215084d1d0a2518070ad809469
SHA256254ebafea5f1bf803019f6dc63d72ea61a0343b9f0121d5f25c3ca849bf06229
SHA512dabff19140480ca16046ff34e6ca374d4ad4943ddf6c77dcc13b14912598757a721f4f857fa42c9a6884fc891521bfa1ec4a61d5a65ebc6a8650c5f1c7fd9266
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526d39869e5eebb3cee521c876a39d198
SHA15a40418fc2af1e4885631792cfc432102c051d26
SHA25626fac68c817c5b21add809cb826dbd3647878430af646541006161dd6d1201f3
SHA51241b816e57f66cebfd6669bb719f8ce0e4e7ff620d224f17e2899bcb332b0616f8f7a8322b4ca7f3e85f0a1884dff97eff28eaff4204461d99e578e7b83996cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4966b122df7210372ffe9697ad14715
SHA175464bd2642747fa4d206b3ea47f0689bc1f728c
SHA256ee7097f9e81d87cff4dd5034240bd030d6cd19f62454ee73fe0e26c71f0c97b7
SHA5126558ecac7676f8f58cc5358b7f2b0d45815313eaa9ba519ac469c83f27f75ab093450902011ffea5eba0304f556e939b9aa0c3beb5dc5421efdc4a6c278e56ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c674556993127fa7ed70c9efed01994
SHA1a2cde6b9b19d0f7926fb5d6493bdd32cdd7f66ad
SHA2561419bd1df37775365db1b88f77a7dd60b80b938d0dc759a5b6c35cb419a43f0e
SHA512d1e8905b1dbce4a8ecf1472429925c482148259ed03fece457efde0fe707c7cfe2cf61b8a5849f6ad9c576c496b946f0c6d55962f7afee88d20915cfe29c86e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5563a6bbc2f5dbd22dcc5ae553ec1e633
SHA1a7d9fde90f08add6549863b5a72469d537ad8542
SHA256efd461e266f10b2c3264e792dde41c56ba8c78f9f6616251e8ba1d1638271f70
SHA5120dc6226449663a67f5ef850ecf27f101f55f744584bf860b3d737aa357314896ae1fa144a70922b6d47f7185480ea03047fa80fbff79cefdd9e031fedbdee1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a365c9281a14421c72bb6135be0bf073
SHA1bfdc961790f6e08c35027d0d2098030040bec4ad
SHA256d65586f99412bd1ebb1347b91aa9bf00c72c5f8fcb65f5364d2313c3a907f4ae
SHA512a9569d5de1a1b83e9dbdcf211a3ca793268fc1e09a238fa273da04b6c20707ebf5444f1437f84d5bc346846ac700e88f1848899feee5d45b29f82244090db367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d2456121323f97c7a8f51f27454c18
SHA1b61cee08cea5c4ce00f54130d19f9d0b64c1f88f
SHA2565d23dde047709e41d0204d9d972fd905a14e018ac070628fd360cc2b65a036ef
SHA5123834b73cd55316d958e1bd6154d1365b2b778e7632c39a44e760440142d9ada1eb8b6a686f12d7258b15d25e4a00b4116e2c4cbfd6ca555e9d36605c2b439861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552d83f1dc4ee153ea9052f7af1c5609c
SHA13172d36778dae9071da4ea4e3d3b6e140c347fb9
SHA25655a30df16af92d6062057b62e34db117f9194d5c3d45f8ef37464420732e1eb5
SHA512ca1e559436f0c0f8c020a432a5c539c350f8bcda89ea30d322803d1c4023695993989d08838ed2b6215aaad4c032bef7b8cbd1c5d10995a8eee5957b0dc026aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd58dd0737928316edee49e2b874bf9f
SHA161e9faa0a08653c188f84df3ddcd26cc09e71288
SHA256aede95892b66e820a407d1ed8a5e34394527d874ceb6cb8f5c4d71dff1efc1d3
SHA512b21682b407343f5549ab9def0fb7625fad79920d0c963b3c66e9bd992ac5dd6a1ff3da80fd2872060e7fb718c7f3554d52d0640cb470687b7521b99c31f5af74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ef74078b9a19b6b9425ffa39c121dda
SHA1f021418568e63495a56484330dc73ad2ab1c8b4b
SHA256490fe16612f7d01d021a22862d185baf781e7b410ed049fafaaacfd2f9fd45e5
SHA512f2f21c1f188ee45a4833d0a71c62465b60a81951c3473c819629da343369c247daf8dfebd70af82e1fa2aa755c319e72bfc2159b8ad63ed78c6828080abbb63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d720cd290c5db6ab7f862e2c9fcbd2b9
SHA1c62fcf05aaa02adc40cfdf5e553b901bdbc4475f
SHA2563293815e3b9d034c3cc9c7eda308156536bedd686366be4238287ee7e6014ea1
SHA512be7689aff87b0205dd7c782e0271b12b5773a047f0bae5760d2393a9394300142ddfe8d79521236391a7df94f79d8cbaf89124af885941e232ff08023f563b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcac1ba3f7cd86a584c048ef920b1c23
SHA14fc9898953dbe430563e110360894e09ae201ba8
SHA25698c65ffddbb17fac246899892e2b0d67c4bc5254adf0c5f96729b44edfb94e34
SHA51279f9918c6cc6d77e4498a89bb78b4be0ac945a396d824db3e482237a7b12782a76146c45a7a301698f913ca63c316fabfe5f54fa2737f92852885bb6ac2d17cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922cbd4bee8d8f67d841b5b18c551726
SHA1ad4a974432abbc9e9585aa0a49fa13accc004bfe
SHA256684013f8ce802ffb2e44397219069b69a7f30b78e54dfa58288d7c1c37c01f55
SHA5121000d3f0a941d86a703ca161e51b3c6d3bd2e0e4d1e5ad8c3811d37473c50e3c669262f3a661a166925f40c70903610c66a2aab4b4189d249cce9d94766a7943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f042e8c1eb03a621cde78cf5623b18
SHA173fbed056aa2db66223e180412ae88ee75c72ff5
SHA25619a0be4b44dd1cc09a5a71dea90185359a5e9df640f5f8eb63c31e4175345ad6
SHA512e6868de996c7ed60d52922b5d506462890702f33de7a5d2b61456507f5b47f219ded8d351e1c4c55ff69224cc7b449a9dbedd0c913b27b2d46744f6a5baa1d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5654e66efcebeef2b2800993560eeb
SHA17905f641e19b9e5457040ea7e7b03c03bc05984a
SHA256cf41f8dbc7a4490111de6ebb1e9197be92f5f5e2afe4d1bc7bb00cb2bdcbd22c
SHA512f3c28536fe6d55fafb95ec593f57e2683f957f2703b39ab5e98ee7846aee5ab647567bbe396ba5bede627a50e81d6e906085ef7450dd11837fbefa3e732bde8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1138be66943d55a74b637e92d457f54
SHA114abc7c303bb981e304c7c66cf1a4214b2565eab
SHA25645b65a71e7b705d763a43ebbb24dfb16c6392a6b97201c6fc328c3fda9d7150f
SHA5126e4c072bfd7673519eaab5907c836cce8437d10adf27dd39a85c39a43ff4e5c0e1afecad1d9ebd2bd4ea4b8918e39c3b0522164043ccadbe7a9d2a74a3e0c79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f423ba749c3a8d474bc16979cb7829cc
SHA1aac28c777143a7a20eb43ecb77f9b39e0a9ab43a
SHA256a0cd4c5052d88263a80d32cc8cae9a02942042e11f2abbd74811c14fc356f282
SHA512d2b1b5ecc7f4d0537bcd2cbc908eb2376e50404e1b6b941c255bfbc6bd406a678814dd60f288868145042e773b1d3c4e16fe55921b01e565517a088d4f774699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ab64b5020beba00fea1ae949a6c896
SHA13b431e0e4005043c6fbdea44046de054ac322d3a
SHA2563955441077d1fbd1b54dd9f74d8b405955b5677d72a96e6a2a454167ac387959
SHA512d1fcc401585df744addbdd7a9f915509ac6b90db0b512e22d22c25932dd40c09155972dd64b2f7feb27e508fbe9470b2ffab7cd7a9f0a6ee7fbcf83acef78912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f0e4245b5f060cf609d45441793c5fe
SHA1097021b114929efe3fe744bdeae9b180071d0f07
SHA2561223912fa95a7f6718eaf383148433f252091d1ca75b630a199cc47748434171
SHA512f5c90909f2fc7445f3ebeb6bbf17739593ceb897686aec7ee68b612e5500702ad7fb5fecc50ecb33d56e4464d61924613ddaca8d205d5ffbabc6917f1ad88e4f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc