Analysis
-
max time kernel
139s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:00
Behavioral task
behavioral1
Sample
JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html
-
Size
17KB
-
MD5
96ba681e4bf504a87267429bd67f22fa
-
SHA1
f56ffb433327f81af563c6bc3d3311ad97b6f0ae
-
SHA256
4ba94e602c66939104c84c725dd7f47ae2a11f62dd53e61970ba618232483e92
-
SHA512
0e2eec53db3c3948af883b1a7916e72242c0c645a08415adf8ad509d7a18d2813f1173db9a4ffe2a53ec695c2fd6cf685f585ad3c6d729e67c891ed5e7b4f373
-
SSDEEP
192:SI519ax7TR+Z2yr31Qks7wh0etXtbQLQfQ1QNQdQpQTQGgnQhQN/UpOBh8mwXCqN:SI0ML1lYu0iXxsYuiymcIGyH57Dy25o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004f55bdddc1883240a4adfed2b9b0970000000000020000000000106600000001000020000000fff6e5843024f0230a90b07dc6d6bad6c1d01cd541c314dc39b04937e85c1c87000000000e800000000200002000000084b52978cc4722278852ce015a44a1b75dedefeeaedd129adc1ddc00ff94b57120000000ace98813c69ace4ad76f6711414fb1fb8ea90725b1c0d352545560dd54a58d4f400000009ada40387a00c866c3666f26c098d33b299d5cf2f31ced162d7fff793b09468667c6e402156ac2f473001bb724286effdec7f385b953a148f3bd43420da12588 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449477110" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e1c70c3ba1db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D059291-0D2E-11F0-B20A-C60424AAF5E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2208 2400 iexplore.exe 30 PID 2400 wrote to memory of 2208 2400 iexplore.exe 30 PID 2400 wrote to memory of 2208 2400 iexplore.exe 30 PID 2400 wrote to memory of 2208 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6dccd11ed99bff1054dc7a410629a9e
SHA1caa4d602aa677f918be044be5d8f27367bcdb866
SHA256a5c2fadb3e9e5171407f81a86820ae02d5890dd29765b82c5545dabd3b96f512
SHA51273f3ab9efdbb38c3f496108ca72ba25a1b99c71e6b1594a39ec0da0abb8bb49087fe308e2e3327b3beb9513404492835d7a40723381728fb453e17ad1ab3a7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55babf160d3e2cfc9f67926a940440fc3
SHA159ff80e0ae29a67e8854c477552482b9c40b1f88
SHA256c3b680d90fbb6413308b004bba35294a5f87c0e656fb326dfe37400733dc42c3
SHA51232fcd276c09347b5557f6ac4d44df4078fd0004ee75c506e0adb7c3710215f94df3ecbfa2cd39c2be6bfeff72ab4dd234201c7e71e0ba38f1ceef56022ee3e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522ed1fffb4e4f178b2161975fbed7534
SHA1c4e036112c479399b640b0882309c556954426ca
SHA25672b1f4da7e4a8a4641d8b57c67fd5ef29eda46964da6fe1d8fc32a1002a401c1
SHA512a51b4183d62806c0640e53ff2f16eb49a33b4de1280f115dc612d07cf1b0ffb4ae896f47bc714cb03cdca80e0f1351b150f0b938a7721c630514d119ea3b617d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d97d637ff69cf6b5bc4ac1e26a3d2f
SHA1da6b3a403bbbe929ce28ee539ae0720b904ac8a4
SHA256631cfa32b7c3c73d74d32f89cb302b1e64b6c0b7ceef34c35a5b32e5a45695ec
SHA5127b348d4a3325fe0b87f0092f11085fc71402c27e094d3937cdc82e6a37a1f341152955ba6d40e20544e23c6f466d70e99e15777663cc154ce3929a9929b19b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9fcedb2b1516a9b7e8fb65b2eb4eb89
SHA1e555a4f171a557611c84e58a1b49b1c63292b944
SHA25695c6b469b5504683126f466de7c75aa774b5cee15765ac3db2dd7c26ea8aa80f
SHA51292badda1e2a6a6a1d6f182f115ec2ba29fb1a262c7700b1cac4a342996368bb7a71af350d076549174b10efafd9a8e4535681c77a66041efaff70c47dfc15b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f541258b005dcde8ccbf9b695653cc
SHA18821dc50e86a54bc620bc7b48989b08d9502776f
SHA256545e879b9d26c24d3f15e4a6f88f5d24b5d54b9332ee0e965b1af1109cb9188d
SHA512e154e8cdbec5a3c19576bd0b3c770d3ca4122c30f6c3fcb2da58fda7aa85f5d422893adaeea4dc6a8c76431821f26984030c310907b334b3a2c0cdc50b472e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ab4129277fb712206d9e77d3b242434
SHA145f96d1da5e9c48a52aefb1e16a67c6f6d124da5
SHA25608dac37b6209b3dca4d11a64df2a6d29fdeae3a341fd5a91b51bb6ab00221bba
SHA512c045b150a061c005804d9a8f2066555fe0d55707f2a482c86cd742344ee02709fb850c8f288a259e8d05e38e829d5b41c19d551def7d60acfccc87ccd420b77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aeabf850cf91797090deb1619fc408df
SHA13cd3d99c921e2bd064ce0c292ec632c4fe1fed55
SHA2569fd553b7a411eb185436e781c8604c3c8ec356a72a9e8a7f2a251a7169dc0d8d
SHA5121fdb2d0d797d35f3d3f5351bcd74bdbb4eaa2328e498540c049747c684134c22a41fdd5f546f68aab14b0ab12b8a17dd2cfcdbee94a103345d514aa877555b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a21a70321e73ef1dbe48de5e56a7d6e8
SHA1a0121efd7a7a38c3384f83c5631b81df8a240f18
SHA2560cb2b01ed31054725de04b09149400da91ab820a8f82f4dcfcd72ace524d0071
SHA5124d261c25c778bd2677f045d24902f53753ec9fd62942a7e6cc40081cf121e472d80636744b6fa0b22ad53eb86e67c232c857ac15c9e63b077896021165000ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be64fad9b27c91f5c974b99c08f994bc
SHA11bb2e66ff73e6857d498444769f6f2042b579aca
SHA2565931b8288b9ad9811ee60d7121d5c09567f1f1710f8bd505d0b97c2e6f6a7439
SHA51280bcdaac0af668ab427b7403307a40d9f2e3310833a72fdd9e0ac86c785498c7320ff0be6892d84b5090aac8dd58da71419e337719ee7e0cce80f590619069ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e88bc5173e08084b2b6381a5c4b1e2d
SHA19f0da08199e25d5fe59989059f568b20540d1019
SHA2562818631d67f67ffb15435d6b92698bf9b33428676fde3c2a9f7afa4291937891
SHA512d9b6f93ac481745a65749e62855bc9856cfec33b1cab252480b1955dc32173f30f0cbba4970cc0790193763aba19639796c05c097654e18a6d7984be8a75495c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e848bb63f5b761c62ff93e6289e1ffc9
SHA1c6f715a24192088ef45b68122ef7ecff7a723b09
SHA2561e6546eb673fd915ae02f0dbaac669efe225556b26d3e2de9a32e0773b331511
SHA512cfda611c482653ebd8dafde21282e5f205afbf1825141dc9f8a1beff794459a6556ca3c4d0196606d3e9da8ccea21a7b398307bf4a21255c8d87525b9029246a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb792b03ac30a3bad864a760506554b
SHA1d825383bce06eee0ec9530fed88a151143be98a7
SHA2563009986fee74b9d96c37d97ec3c196ee31432bcb9a851e6425fdc389a33b8dd1
SHA512c376e1ac7dfd0ff652590ac36edb82bd2a5f80202bed766cd9e97f820cd136770af0d5bc3c923506e817a804dac541829805042a5b6604d48160de95b5c31812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490858862579dc1057fcf58302dd624d
SHA183f37ccfde30a6e9eee4140a7efb2d3e47e64f43
SHA2569c1c3262b916130cedefb7b1e4da5005eac13a4f03944c45c0f84af5f7e4b7ef
SHA5127bd241be2dbe6046797b15ff4153a9560003d3ae8d5b6fa08a7c78578405e1cd1520bc35f1fe1ec3c5885afcce78822c0a4e64981ae351f0ff089e99b71c720d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d6118030f253e59e74f68ea1ffc0453
SHA1031fefe9e7c3e549a5c35a527afa0c5290240544
SHA25649e7658f0a065d4a8c2d0cbe9298a8c3b589f9b8a8319313b2b3f636879cb031
SHA512453ca9ebe29bdf77f7f7e9b714754936320ae06bf0fdae6fc4f3f2c03e114ca5f52a4923f4ac9ce3de57d59de1e0522e7532c3784fb3e1e50755cb12a28cbe2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f052faf88c4c532c65e3ca922326ae1
SHA12e31d18d9aacbec8a0be0c040ca89a821b5f8b7b
SHA25613e4a800df6b4eb0a52b60035b31035c32eca4d0bb96f3bd910ee6cc74da25d2
SHA5128891cf976fcd23727dbb45f104f4a62765e4de26c4ea99f59410a9f1db72c0f74b6b176e034c0289473cd7e2c002c7a6d463315248d79b732f693a70d16f6600
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc