Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:50
Behavioral task
behavioral1
Sample
JaffaCakes118_960c2efa1f032c528c561289a75122c6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_960c2efa1f032c528c561289a75122c6.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_960c2efa1f032c528c561289a75122c6.html
-
Size
41KB
-
MD5
960c2efa1f032c528c561289a75122c6
-
SHA1
ebb59dca89b64f4167d6d20c1bd36176a7bfaaf1
-
SHA256
80d0b061239a4f048f95d72e4629110b73393c504c78f4a7f31e532ff9408e76
-
SHA512
61162362687317f84d4ae76d2acf8c51ba8c98ce5987ad6ccb475bcbbfbbf0975fd32c87b256fef0b11df34fbefe0092a5139a979ac936973976943531f1b290
-
SSDEEP
768:SPoc8ujMLsO9ypXGyrTf2F3ViWWfpFsNizI:SPoc8ujMLsbpXoFsRFZzI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003acb29ce1c13cd4a9c4cd05fbc8e75ad000000000200000000001066000000010000200000009eb55219cdfbf2aa14bbdefe4286430331ea891d0b5a133861cb9d1ab4fbdd6e000000000e800000000200002000000000ca5d97e443a560ad313afc82673a2888e2b8fc88e3a6c14685134b38a06600200000008fe55cd8e49576c1f0db3e4b6bec3751cdcadf7b98465b2b366268fbdf45da1f400000001bc55a7087e14b102781119beac57a15569019a4cede5d97bcbb1e2ffabb13bf535da5cc2e5e16ccfe39a4368dc4f6d3b499ef71a74b8cd796d9f0af52ea7b86 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50baaed637a1db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449475704" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E78E8531-0D2A-11F0-BDF2-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE 2468 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2468 1960 iexplore.exe 31 PID 1960 wrote to memory of 2468 1960 iexplore.exe 31 PID 1960 wrote to memory of 2468 1960 iexplore.exe 31 PID 1960 wrote to memory of 2468 1960 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_960c2efa1f032c528c561289a75122c6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5927d8ea4de21abd648f066302a297044
SHA12284eaca45f298dd0ef8ccfac522d1dc6cf1551f
SHA25652db8d5e95925992783305dffbe8bef4129441348e33d88f496419286bddde4e
SHA5127177e84cd5634a3e49bca8ed7f93a52fa2f65c9662ddfcc1ed0d72a6813a180d322473343212e31ed382a0bd5e1c58179ecba0128ce52b5bd0f135107ab73d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574d42af570fca7a6ac0936c2957cb5d5
SHA10f3210a1b58c901c25488e39b499c1f7be8700d1
SHA256444a1091ad8954aec9ba6b4dd2dbb72e9b092f4b246f0df87c78fc153840ff56
SHA5121cae0250322ba224a895b1cc4c418f60589798a08409d9a95923cea9dabae72d0c55c3b4218ea43561e1a035d355dad5d2be0b68e8d3ea6f2a65d96d2c064c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c723bba2ff94d92039ef46e3aa45c64
SHA16ae7d04dc1fe1f7461ca09c558a9e388253343cd
SHA256a11f452f895ce062b02669b80693b9934b466340b99936c015529f74fb2dd9f2
SHA5129c66a1a0926ec26e12b6b00d778e4e4b24352ca947b240fa33939dd542b153d61882eb19fe216a81227be527d84fedbdc8842862f643ce105cf531c48cb5e51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59233ee68453fe4b1c525505e9ce77669
SHA1f5bf497a5a32d563fc27ecc7e4c51da22f434b4f
SHA256ac01971793c0b70ce4876b7d6b059059ca0f262e8bd48dd2ad84d403107f5864
SHA512fa89baef7c5da264ada089b829f517e7cc0dd358806680a0954aaf211528ce6bae3137d5695ab7ebdab161983daa1a2190b2018f3aa7dd6a75107100791de555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b44cc91fd639d87dd0dde6d9bed486ca
SHA1fd45bb7ac25da1af996f490570053e0f848da57a
SHA256d7e1dfa830de4ea938fc26ff4018cf353e17ca0e8e3179f05c34a917ed449c94
SHA5128c8c23b7145293ea641e1e7362b97194ed579551cc098dc508bce63f2fc678e8c4e4ab860d4e844efff4e967025e5f19027ed529d946790ec4bd3aa0dd84f48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46b69beade5c141c6019ea977d7fd1c
SHA107e4e1998fc4d996f0660e149596acb89985128e
SHA256685cd0d369d6dffd429acbd3383bc81d2b376f7ad87099ad195ef17b359f7a8e
SHA512161f3352f6ada1b2b6a4d1648dc9ecdb9bcf8fa13193b82e7fe6d6366d51925c21769623a7f6d1b0f661810690bbfd0658d12c0dc84555af4a3c1ab8c9eac546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5452537d7f64d21804a9d3aafc142446b
SHA16a20e5f6243ce6384b5f9c07694d4df9d3166129
SHA2563279ffe42b292d8f9e4e9e3cbc8ff7b5f75f463b367a66a8f988a90e2bb0640c
SHA512e207e7be18a0b96431dbab6a1a16032fa7648f03a5ffa88379bff0320ff08212120e3dd19db709441b9139207d4fa53be3640e979b03d6fbd4aa6a3d68702823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5694f71e81e164571a8c6c77ffb09d839
SHA1cd37cb9722f591dbeb4c6057f399c62af86864f3
SHA25697736c87500992a72196184915e2b96503ea3e19e17ff2a395b4f6d6e41efeed
SHA512089e81fd3d9ead34701f01b710c7ca05a335a96148d9661c36e5a2a43d771eda4225e6de8819a1d09628b698e860c2f94e4f929bebfd4b488064d5415ad725bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5167ffba81f4c48a680983eed1c48da06
SHA12a081e26cfb721795de0ac74bca0880a9cf269b3
SHA2569f0a4187d023fe32a39b97641bd16792812e893dc923b774dedbd5ee657e2ca8
SHA5125a82d018500a54e7fd29894b26604b41d1f2d1e72e5d44e98bc42945fba0df878ee0aeb4617671680310b5d6bcdccdf3ba45e7567fc67f82dd47825598abf7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590832d33373938e8fe4be085cfe933c5
SHA1bc51181abd96f8b23ca229fcb57e124a24b3cda7
SHA25691321e27e99e08f8af25a6dc567d21b36bbb1798f4e55dd55031c2c497fe191b
SHA5127b5e260de14f9828ca0ee076e103b03a4e277e907843561b009cdae6a7a5a3c5d0389777d05a17dd3862e9df5374db19e6b0b8a5351c8e0bb891bd00f94dd200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52783cd416c081b202698d0d15716c1ab
SHA12c120041f3bfdb655e14bb53d6f2e50b1325d934
SHA2560a4345a877856ebd0dfd618088685c2fdd79ad5ca4b86d270e9d9e0bcf30a22a
SHA51235daf156306264e3e4e0cce28a172a9e583f5af11cece28002a51b345d439d142b9b883cec0233b2a9b9fff1d25dd5d67fcb5bb8a6b68b3162735f4c7e589730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5791ebb622690a2cc6e1e8f34e564d74a
SHA1017588cf75b585e326f6638f5e524bef226f2e17
SHA2568217a2746f54afc9a647c073531605b4c9bc0de45422cbaf3361b1759ee5fe8d
SHA51240f0d906865690887e338285144ef1bafb20ff29f0084b0056ab144b6f50e610bd08622a0996adc0d9b08490a92906c3acf2d60668e5547d336b18347eef28fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503f03726ecfb9561da51656c45a33036
SHA19905787d2b80055a9dafa8479658b5182fbdb8e4
SHA256c6363f9cfe7840776db65332ac24503cd90191c62af6a2bd3e8260feeabba525
SHA5129cb808bd1ea8d0a054b70d06b8793a14dbc2517de8a7d2c46f6005b68f87cf54e27a586d6d32bab7af9efe80b003e6faebb3a81a870fdf144b91288e0d9430bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d13b2ddb0f9ab250b9b6f3cb254106a
SHA1d5b57a20056439e18e79a3dc88c862ab80955060
SHA2569b17ff5089aa2c4bdb70a71d662418307b6f6690e0cc45f6e1ae2ac79f36e757
SHA5120ff18dd2d5166d8ac9a50d11cd038f1605e9ad3062df5f6bddf1d4047a0baf09b035071c8ddf637ad6b07f20b0a63b924f2596713ae4d5a80915c34964937c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f251fee5c8eb238f84363039dd071f8
SHA179b8d0f749b812716d0b00a35f2bf21022950a79
SHA256118aaf64dce18f4c7753e758a5c568071d8f57eefe8a2e96de48e27161d3cf0e
SHA512872ffd339f21ca75dfeba74a9cfd615b1f08acd28ab4e737aabbd137ab4994f1ce326af70d25fefe9bd7390074be7a92895f3d48f3e637fcb26acc77eac3bc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4b97698f6b190b7dfcf7433adc9b09
SHA18665f9f67130c75486d2ad05608af4511a0dec4f
SHA2561858a5d0a50d2d5beb619e95a78c993e379d01c3d4692bd63965439c4ba07665
SHA512b5d18825dc006129308f81dc7a69fdeb02fef7d037ba0432374d84c5be3333ff408a5cb6c322e1de3046a9379666da7886835c22a01a977dadba3141c876c9c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605caba1035cd35f2031c949cabc35f4
SHA134e05d364bf323673efc6fe92d4bfba905cf6dcc
SHA2565b71cfed88fdf069d3db88b1b4b7715dc3d12b36a3e507fb67da13742fae1423
SHA512e35f896cd6b2dd41934dc18a40449466f291c6c5ae717c86fd7a367635a16a0c3bcb167065da49dfe84e9f13debdc3911039e1d2f0be021a622a83957b342c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587295ddc6a5a20aac8a7384b9d9d8ea4
SHA1bc567ea329018ea661f34316c50799747752c2bc
SHA2560b1824a02f7a9baf5a68c9b8e5501ab56ff76fbce787c1fb1329588261d66cf8
SHA51297c267bb2f6cedc1f7b935c186c8b1f138e9c5b543fbce685837aa629568d8c1133a42fc9d06162861c689c033ee74f4f37447430b1ffedc4a4c6fd43e78ace1
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc