Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:40
Behavioral task
behavioral1
Sample
JaffaCakes118_95615e9cc4fb6d817d017e88d96f644d.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_95615e9cc4fb6d817d017e88d96f644d.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_95615e9cc4fb6d817d017e88d96f644d.html
-
Size
13KB
-
MD5
95615e9cc4fb6d817d017e88d96f644d
-
SHA1
60afcdb5f9a9edf4ec1f9f2edc4d808733fef316
-
SHA256
96bbaa9545e4e014d51fc50f865197632a53a5ef3ddb543a1851619f8631fd14
-
SHA512
1a00254106581f074f9b6889a5fe9dbb3986785159d6132f1dc7f370ef1a437d31099daf07809d48062fa8ccf597b3cf950f23b4e0b2a26350e3a8f6ad009d59
-
SSDEEP
384:gWGOlrhoqgJqCNCz238XPM13TTbLSJkuXgco1NSwPSJDcTAD+pxQEchO+FZXeO69:gWG6rhoqIqCNq238XPM13TTbLSJkuXJy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449472632" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082aea878ef4eb14bba4102c6e4ea52ff0000000002000000000010660000000100002000000037d5f0d6c2844e2a560be627525c72bd9bfec24ea5171b313fc6a3606ff896f2000000000e800000000200002000000062bdcf418e737a3dfdd38de815db66ac18ab899cce823c1144269054646f31ae20000000290ef05153c6f6a3c5e060be2458055660b6d8e6727f3494f3298d9fbf8c632840000000dc06f2cf2985069adcd1a32579560c1f51019cc7b369f98e0952ba95a76e443e75c94bbe9882ff849d47314177d605b33148ee13a0b8e203b122e908c205584d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0807D61-0D23-11F0-B462-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d005a39630a1db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2060 2088 iexplore.exe 30 PID 2088 wrote to memory of 2060 2088 iexplore.exe 30 PID 2088 wrote to memory of 2060 2088 iexplore.exe 30 PID 2088 wrote to memory of 2060 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95615e9cc4fb6d817d017e88d96f644d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56521ef59af4a8c5561e6662c93fd0c70
SHA1c893319ca1f6972991cd7ca9320a14bb3b9dd6e4
SHA256fbb3ba3c7dacff07f1a27fea2a635aa6ddd809871baa8e608e2fff8dbcf9cbac
SHA51291ae1a37a13b39fd611262f255ad67eb0618aff68bfb8dfecb008ae43b28e7d85697e9bc50ef3c49dbc0e0ff65f5ac3268fc2752e81ec1499df3e7ddd73f36ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd0f12306ba7de98e6a497aa491b984
SHA1befbb8ac5c846178d40d687a510d6cc95ae5b861
SHA2567310fb1e4e5c8521b1d42f6dce0d8759dcfa94c5df31f9c263ad0f61890e0237
SHA512a8299d19925e6d3ce27aa3501778098813f63bdb96e832f6805f0fa094780cff1293ec9a4ff32ac6b99cf8c07ef6571088408e9fbd52f7de857ae50c27de31a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf7bb21bcfbae2f37fcdb88c38076d3e
SHA117dc25b94945c39708a416e7f2ffbeb1d1ced35f
SHA256d74bb227fa66cde4d22511e0eb1224c48711bdcb5e78b890c6a3a12d9486ff65
SHA5127cc27214d18f08ad55e593751387e4f2008d8920d11f9802236e282c429df00055ef9f9d50e6a565dd2e32dd85c3a83740966a0bb7a2cc55f5a520f982006263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56950b2360a9bbc74715bc6f823c95f3a
SHA1e7bdb026b6f4b15237568c220134485ee7e90c0d
SHA256925039c5b1c548111733d2e6a69cc364bd32cb3550c67b52087d5cdf6295011d
SHA512661f12eaa247585b8a82b34b58aebf8068e3773442bc5fffccab34e2b9d33c9a1ddc29192292bda3e28de650fe24c5c063f8b5cbc2d51e3ab7168bcf70d6643f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2dc11dab377f676181fc9fa41a8bf78
SHA108843f586773f2044f8d761f5de1ed3964700369
SHA256c9ec2091ad9bce43b84daa7bfb38d96f60603522679d64baa70f28b30ea067fe
SHA51286d91e063a548c1693fde73981eb100bce8f0213c40f874551cd2b769d2912f15929d8e61227cfac9ecd96451563403b048f410587afcdda84f8b9480de9fb0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad091473eebf90f4a21c5fc24981318e
SHA14d39653d2d3ebd0a357167364f4e34fc3ca8fa83
SHA256beb32e74ffda37302c52946106a6c4b57ff0024e8e641f7a5a0d98ee42cfd739
SHA51256c88709431a660447f500d6f7cb96bddb91439917250ea71bdfbfb6ea34d91ef9d5ec5259d703c4ecaf25e5a729b7a20b2c5253184db7219e1929cb561ea5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc0cf459f66954f39f0e1635e9eae18
SHA1337f41d22778d7ff5c2ac94a715e9ed1e0153eac
SHA25603a88b39cebfcca0c958ab78d11d7e487fc311c89441865d978313a559c3637e
SHA5123c9b19f66954e11745fe865aa9cb111341d25271b6c48162858264f1c601fe72d6457bd870063eb8d6a09f39eb57e0ad4b2ffac2993f268e110d1b10e47ca6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5622b56e66fab30a2feef81c9c62daefe
SHA1cb440c6c269d1415bf5de401f667e68ea7814f4d
SHA25604ebf9f51e636ee3b8c958735ad14626d3fdff5e287f283f7a74ee03b8a88dba
SHA512c468b3d4adc45fadfb8f83276e66d5164b67cae9e2e00503a282f40ca5e9ae8fb94ba08d7d1879c8f116f2f5532d03d0543a690e021cf43994c756cc21185f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565a71fac9a1fda5e30e8efabbb54d264
SHA17a434754ccdb6a5c60937b68766f5f193cd64758
SHA25669b640f90f28f71eefb87d805c10ceb54c1cadcd6c67e1c6354fae713b70cfb0
SHA512c1c5ef83486082ca96670ee9669ab38e9dc024b21a5c0a332b06dbafb9ddb0a62fab4dd7e45a9900a1db55725e759d39ae94a611e2d095c52c3a37a66478df53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4dbeff5af12cdebdf1ca943bee4b5e5
SHA1db4ee322091254a4b3b29f85a746fe0740566c0b
SHA256bafc1b080070afa73c4737e1263905d1140cf751aec8173a010e8f28dc6fb09e
SHA512842ca221e978327c8156164c2328d651362114efb90e03df0a6f2baeb78d59f74be5580475c789935716156cdd4ea6b529eb65005421efc8cfa62e67b6e2f2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558e81db21889c2c792af415898d7fb5
SHA18c52f4a88c4873365e9c934d2ccf0b5979103b13
SHA2561d2c2c7bf6c63b099839f62e667ceec249463a612f730eb9b65c4cfc13e7b470
SHA5124808af45a2ebafbdb74cc0ee60d954b808cb62e636c3be12669248b9f369ddf18ce14a1beb7664c096a453e5f99b0623b4fcb5866126d4b2ee2c6447f69438c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588096e8e993c7979f7f2fb0250104bbf
SHA12edb7dd096205fe89b4067e6ed461b54c0cefb9e
SHA256ff829394e87854bda739479c01f11af845b4c030912fcdfd79d91efadef817db
SHA512992a2b4c0522a8e9cf375b87f1cfdf644a56cbddc4cb8a49120c5a403538231da95c0f202ac374560cd7863103127c08e64574c01022e4c967bcdde0b54e8f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1885e7359dca0767ed509559d51fe80
SHA17a8dc68ccb7888da551315049aefd4da27fccb1c
SHA256ff4bc6d581f5a3c4355d2e4b3af4eb64ff590c85bc6e1eb121740175721180ce
SHA512ceb64430e37fdee42285f26994a2663d7b3baffd68c0e55356cca08a4529743e787ae5376bc02c6f794f90ca7f0fdf546d436b19095d1b81ba016548aa0547f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b7626de40000b3b809bd6f4e67edad3
SHA1f17a4c9dfc3f71e3dcddef8bb1e86352d544ec72
SHA256208e1ccba07cfda48c48953108416304f6cde55be366d284b039d6b513760953
SHA512a85daef1c728e7949e1e055617dc8635b3304f028b8cea9f5db2dbdfd49d0a287e4de70fe86b9492a4970d7be486f396e56896e285c6be52297cbf8fb107370b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c243a567b816b7616b18e840d06b70cf
SHA1a6f97bdff1e5caa6e907ba2ce65cdfd2c67b4ad1
SHA25691272ea519b9b84c60c8eae1af8aab5b4d94712899cd47cd82e2d33fa207bc26
SHA51295c0da4e8577ca7f857a4b69c625c4fe4caf5d07dc6f3b00cd4e98a2b16850a210d351d2cb3bbe947eda26b8efc676071d08b3a7eb1772e3ac09ad8ba849ab23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54097becd08912a1e39cb3f8ae05f9fd7
SHA11dfa6e22cb26d191654a3cc45175d6afe6d3bc72
SHA256889b9565b9b8cdf916d818747b2056f4f3f60cf56330923f164b0ae2959a92b4
SHA512bf2721237ffb42481b959e29f1428888b683568fc138f825d2ffeb72f71f86c66c0e9da2ed2169993f84efcbed3963e1e3299b925ef6ad651ac86e5af5a9fc52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5151d7e7caf15efd9e3936891d34b8762
SHA1fb22e5ea5bfed5da9f211e414fa276b3211e2abd
SHA256020462a2bf3789bf302a3b67cbfda7c591e5abec1d21b35c19d027b61a3f18a7
SHA512292d964a492f285af1abff91186d980c4f6d34cb8902d636e50d25781afddd631ec040d6f86dc33946b2fb44d0401de16cbe11259209c406a8ce543e14738d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4984a9f15dd8a45f64ad182888e6600
SHA1a203cb6acebed3c7d00a04feea8cb9e5e2fa04ad
SHA25681a1e858e677f3a170efcb8ad045e31d6d2ba20f02c347880933654f89b0f3f5
SHA512b05ec8d49dd0f875ad582b0b17b3cddf50813e83c87ba2aa20aa7c66b139dd8c02c8ee691bc86d506a2761063e21d3fa538b4fe64c3fd4e498b8a94e8fbd2e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521d908fca32940bbe4ea527a9c3b421d
SHA1912b677e83e7de1aa31541b855a9b8cb52fb357f
SHA2564bc3358677051e4283cea8b868aa5b2d1b920ec8bbfb932513174fa00a3de282
SHA512cb2ae547b903368f0d467e8250a3cbddc1895a0dfe46df8d19f40129278c4cf6b5942b85571efefc85b57fe6b3f13770d7b8753e312b86b75d988d58cffc0d81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc