Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:46
Behavioral task
behavioral1
Sample
JaffaCakes118_95c39c44a13641c7eda0a72e0f6c906d.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_95c39c44a13641c7eda0a72e0f6c906d.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_95c39c44a13641c7eda0a72e0f6c906d.html
-
Size
41KB
-
MD5
95c39c44a13641c7eda0a72e0f6c906d
-
SHA1
1c78a0260235eba55edbbf69cf7fe4f091f69892
-
SHA256
a73bbf48da29b5b1a12c787d267c4b317ec267c7133f91557160bad766d28600
-
SHA512
5b709e5d1d6e99cf5860342e57c4aaacece6b582c9ec1e27af61ab7363b7477e7846bf729829ab9f895ee0f10c852c212f1360646e65f9673ea37ac1d78ed2ae
-
SSDEEP
768:S5q3al8KwPUkmzUkosVUk2AIROUkGMmUkQVL0jb2XsOP1Wa:Sg3AaCQtys2X5P1Wa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c2b17e3cdb58c243a4a3c2976a14a36000000000020000000000106600000001000020000000c2c84d84574882b4d34ddaa4fa16a6be7c4f59f15e8f1fa352412540db4b76ca000000000e800000000200002000000092b5fb882155b3c3a14138b15c0e691cd0065d448fccb2ea36349d0fd7992e9620000000e3e971407198571c7ec073a2fdcef6edca26381f3022bd8e9815e38232c7a2c6400000002ad6c6893892f3154eca003bd0d8fe5566e8ec3b49228682d2db9617ff12a370f60780149e60813b0e0bb2a68b59df32f8abc149604db5367ac12054f3eb9757 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fcacdc33a1db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449474036" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0269B0E1-0D27-11F0-BFDF-52AA2C275983} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c2b17e3cdb58c243a4a3c2976a14a36000000000020000000000106600000001000020000000cdb9270b658b499237b6d0ce053329be818aa38624034e4d23f44e191bd1d452000000000e8000000002000020000000cf5def877102f11a2ff0f08063fd12e3d91a180218d86426883010d44c4ab46e90000000496aef2fa3fe7179bc0eb7b8921861f4124639e818eb3eaac07a7cfaf724b556da0204969e0803488452d66159c7ef4ee4db73fab3a573841a13f1fbf93ae5d5ec021ed0038b0a38715f0782823f58b6a7186cfc01aca06fdacc4224b85d4ee355b885c4fd78616f8dedcc1ab4bc4d119178b8b925d66bc96abff5e5b3042255cbfbdd1b081ad7499c431139965c9afc40000000ef323f143514e6e868af973a52a0060f4c1d4a7b0e594f6ff2b7fab9a37b318269afbc278a5caab24d33113283dc3116b1af24a8b02a565636870fa659625d72 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2744 2748 iexplore.exe 30 PID 2748 wrote to memory of 2744 2748 iexplore.exe 30 PID 2748 wrote to memory of 2744 2748 iexplore.exe 30 PID 2748 wrote to memory of 2744 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95c39c44a13641c7eda0a72e0f6c906d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5071442fbc34744226818192d3516ea02
SHA1c5d611b8b26b084cc7e492464f9384fae80018b6
SHA256936951371fe25b8d220c4dedd07257463bdcf81ede50368f22d1c92b8b79751e
SHA5127d567737b8a1ffe3622d015edfb4bcf69ebf909879ec2e3fdfb1f399c3c51860ae204752c1c245cde1e58a6ed235af93dd41d7e14090db6b8a17e4196fe11228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595fbb29868992536e0218162ab03fee6
SHA1ff8aff69b9227a42498eac437df384b60777d7bb
SHA2568f8e57e1a0b497304fb29f93eb07bef840a1a3902e043cea606d806879878126
SHA512ab72a2ac25ad0566eecc2b73a8fb622a1a1f1c8b534c43db11db04fd397788e4987686e7e2b5daf96745e4cbb81dca0a313bc581c5f6f07f31c640217624a33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4151b6b98cbf0546cbe26182aec82e3
SHA1a54106be407c0afa3409b0c8577df2f34667d2c3
SHA256f9940c3d820ce1725224b97c6d1cc4341e30f2077b07b7270c4d8a9c88a5e06c
SHA51265ee25d726422255840dcbc4380dca7bf37799282c6555b19558175e90fa4397b5de67fb00f644e4c35e96f0d671d911b113286ead51b45a588d84fd65157ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595b86654b04b4b3874e80530196e3404
SHA1279395641b1be244b1b61ff6cf914b5504915717
SHA25649c0823d0c17ee6104b9e46722d3eaa743a601a18106b2520e5a4a942e750929
SHA512d0accd4dc319930fd0c7f9fe6a1349af2a6dec0e53dc4dba34324f4f4bfaf4a3f32d60273f1ff27cdb69eb4accc61fd4b38ffbfc642b0783d919fc8ec1f9833e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7e6e0887b8609699557b4c678d10ffb
SHA19c3a37bb1b69f9a5968ba8d0e10ee0b8e2370d01
SHA256aadf54c03c4e9de2eeb9d709ad18619553435994bf668b0c734c82c5c7b6b62e
SHA5120d034dbd9cb9adc5afd94b0ddaf125eaad9893e0d8209de1a835caecc5528812a8d9c658b97a183b48a5464a8c960b515e74b86d0bc7f6ad7ca6bbaac3663765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd0204c5f867387a198f326f83624121
SHA100eabdc44a02462145e34bbb2034415255d95072
SHA2560596c5c1d5642834a0a9c3c03fb5dd7a1a7dd78efc0f22a84cf7284df455ed6e
SHA5121b30f6c72189e5ba43bf5247a56327f15068e359d984d42324cc517cb94fdd9f2896aedb66348ef8c27f79be9c0dc7da0a0477b4839ec21bcc479c53dc8fdcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58163d8041e9768cd72616572aac136fc
SHA1699b47a30954a68c03942ff8f2e0d0d54e28833b
SHA256e5e4684637f199118658835fe65aa4a0df58ebf27ae30d23f7f66cd443f43fb8
SHA51237a430a9242a9da6f09d6a624b023af2af93242247af29198745233ad8149ca2b28ae12d88c06f2db627ac8db1b557b0b4a5ffd177e1eb1885c5841abc8504b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52073c97f665697329f2efe60cd378028
SHA1e28f119a374bfc9ee46b2a7a94b8b5cb691fdff5
SHA25698eb4e5c322682db9178991c82a82943cf3e652795d177098f8c81515a485286
SHA512e61f46c1b8e0b4ddeda59276a8747733cff071f70962fba77fae48becc6a550b152bd2d082afcb77b905e063f7108c8a7a6d8dd869d1c6363fac2969d6dcf951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5965776c145e9d7fcfb3ec5352c8a652a
SHA187ca67d65ab4ebee476926f31a93219e98cf4ea2
SHA25639c267c39f7ca380c688c97b35a6fd5693b68992fd9c391c1a63a69c384aa4ee
SHA512fbe4bd440e3dc8a3427fd744b5bd9e3fefc1c27c99a4c4f87f54b06a1ee53328f99ff58699263d050820a20b822eebe54f935b08d78707a701c558cb41a8fe16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c9b04a40940f955eaa8d6524a531968
SHA1515d18286690293f50e9c6ad2e0d8ec966212163
SHA256970a91329151ebdc85209e382abfe4e78177872922c4caf4df00bf1b75a0bbca
SHA512143de7d7e6e0492db948e3a1544215e3146baed39f23ae8e17bbcf4dd0a37cffdb5ec52250ac9927e0b29c95b357416c1898005180315e0af37c8d9dcaef536c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc691bc81169c468407da66b43b8fa96
SHA1a75bb6a53877d063efe74504ceba85de16888c2d
SHA2565f203c3a514600aa467dca1b91d20c952cf6cbf5e14c099191b52db6d00f8087
SHA512671a29c96df0cbf7fb0b9303a9a800f58f7b3e2cd22b6e7da87b3ebb4b3cb8a9965cd0ddd803bb2886455972eb89e35469671c101b733cbe776fe72dacbc3879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af6131f07abd0f3a6f21214882ca50f4
SHA1a343c364a2e38edb31a55a27cb0a7dc148dd1cb3
SHA2566bd5e87b22ee6228eac356c0b4f33db016c21bc998f5055487fe73b7af78c2bd
SHA512cadba57a91b5fb439fcaf53853cea79c0bedeaede2f24156bfc05d6e74b0c23cac4739992660627d0dfdaed7df5dd659dc683384417cd0501863548d3e5b5caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5187dcc9e0723fffd07cf8527c7b7d63b
SHA1601eb8fa0e87cb71f287a3c18440f652692ade2f
SHA25656c7962b297c2d89ea15d9b4df9488782053e938e1e8255057cb0b5206da18f2
SHA5127eca3d2f724985b398118ff42f89bab9d2d46aea5c10e7e45806a732bee6ed0a0931b477643cf8eed7a508654a3bf3f6ccfb34017aec3e6091d0bcb8c3574ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5112f7cedba05fc23c76345c00d608f24
SHA128b887aaba11dafd80b6fdc947fafd2701746d6c
SHA2563df0b51158bb2bed7bc2d2af3450dc976e10ac2fa2eaf4c39cf8e73e101125ba
SHA512765a62491b3ebc9af8f4fd46514827cad490ad138e616e58b43aefce8deafb927de815627c7e60199c71ed4844d315398e63261074c299ad56e9ee893b90e3c7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\e[1].htm
Filesize47B
MD506b05ae9614bafae9b0b09cfbeed559e
SHA19b087683529b7b89a117b2d5cbb35a93e7dcbaca
SHA256a60692031ce09be66be89784e8b0214c0f8b6f52cd8fd6a36129a635ffe41ad2
SHA512f97936b6f3dc025fd55cd6a9bb59bfd3a58ca1d03e0fbe68bbb63e8a1875814fa8c367bda3b59029b549a5aef20abb5bfccd01cff1546ead70f6b07123be11da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc