Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 20:03
Behavioral task
behavioral1
Sample
JaffaCakes118_96dca938c3b66d986c21ff1360fe1f71.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_96dca938c3b66d986c21ff1360fe1f71.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_96dca938c3b66d986c21ff1360fe1f71.html
-
Size
9KB
-
MD5
96dca938c3b66d986c21ff1360fe1f71
-
SHA1
f9e654a115529934e62d869c1b5f6f661dd32d0b
-
SHA256
932bc1483c14286ff981ee8448ad483077e1a6f451c68420c01cb00affb0d42f
-
SHA512
27ad381c5f1886473877e5aca157f19f500486133526faa36d6ab9c1ee0728c9175b9d3a8c0ee0e1fc74bcc05da1b30f3c219a9662abd3965b853d84286d5fe6
-
SSDEEP
192:SELrOZayIax7TR+Z2zWGfQSQ+dQ2QLQpQsQVQVOb:SgbyndWGft9dJsyDi4Ob
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ff6eddaa941c70409e3e0bf60063fb5f00000000020000000000106600000001000020000000072641bb46b738f21162711aa42dcdd66254b892797938115f60ea52936da384000000000e8000000002000020000000dd953740bbc64dda9b0bdc17bfcc9bb9a812e368f04bc7196de282ee01883119200000006a51c47bce47933d51898da00d8f5c4acd3d5592f90856cbfea487259bf8f4fe40000000b4bf42bad9586701218969ed7d426b5df32c74ee6fa76c147fcb00d3e0478407865bc8b30f8e950ddb29ab96a92bd614c680e8ecb241fd70b0f1a57bcef8e239 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{765408B1-0D32-11F0-BA1B-C670A0C1054F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "449478951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90625e4b3fa1db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2876 wrote to memory of 2316 2876 iexplore.exe 30 PID 2876 wrote to memory of 2316 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96dca938c3b66d986c21ff1360fe1f71.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5132c22bfffae86ebbc037309d3cd93f8
SHA1d221bf4e762fbd15168a7e1f4be12d325c0e8a3f
SHA25614ff2634102ab212acdaccb93d4596c7dfea69452804d13cde58b935ee6a61d2
SHA512d72cfb54ea959a7dc4e7af88d56372c03c8386762c84b66f1201a8ae2eab8db62390cd16c0d58512e9678b1ed62a2cb7cc979453646eae1100fb6e735e75001c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5f937452f8d912390f9bef450807b6e
SHA1f354fda6199e81c1fd4b66ee832bc8011be0f403
SHA25651e9fd8c5b82f417ae78d8228792957250cebb5d15529687123cdc8a84c937d4
SHA51213ae4d7964be6dd0842d9ca2099d63e01eb61cd7c3abf7169c2c2474d9396ebdec31dbe8f049fb302a9757d4ef7ed6f057212d2a191b8d0797702e54a0be5a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c00bc4dbcdd2225671de024c12fe9de2
SHA1977f39ec0aa3c2f0f1719cb70a412d5026d08581
SHA256a1633fff8ea5379ce518ef5b0813dd70b8a08620552594b81dc34bf4085c481c
SHA512cb651dd9fdb2d8ce7c76332294be066ff705f351c3ee0d6437fa1108c52aff0d881d5dff946ee0c3aeaa521833b709cb2d70a81314c50974a5270c5330bd0e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b61bd2c702bf8caf7950c6d0d45d864b
SHA152a61788579906423fbc4789c6768a614a1ce109
SHA256c2e2970f084c2099e33dac5d6603d14bc1faae65ca4917b2d01901de98e41933
SHA512f88c15ad75922d5727fe7a343e02a89c634265ad127e7b091afbcb2330ecfaff5e90dc9196da322116215d9b6f1a1a3db66d132e353ff272007fe3214cfb885f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c8001312e772e43ef3f896a1f502f8
SHA17f2aa2ad88d8e3bf2c29acce4ce4fec0daf071a7
SHA2561a5988c9fcc549b6b848b959e179c697c57590d2c3f737874b2214078da42e97
SHA512d29d14f5513b94f2f3be296f483502fcc8e4180bd711b7ad6fdd4208f60faa6ee61b1ff82f6daa417b5b0d10a36bf1d0542bb1a3bf67306f5e9378af4b171745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548a7164cf3abbd8b0aa837fc1e904095
SHA125638dcb74dbcc4eccbb72ae93045d8437b11a01
SHA25624dfb293061933af766a3e2cf1ee077b54b8c0063fd1e4802c3778bf1bc44d8b
SHA51270fd98cf5234b5ae00f462e2b5a1f74ac061801d20794c1505cbf825124d330de09af52b565a040d606954c02cddd9196e004487c388f1497102c39a811f5513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d5c7c37c311db824afc28fa37b26676
SHA1b780c6262eb8b0674bd0812ca9a7a223c5912adf
SHA25649603432f689cbf942590a408ff5692bc2755fc25fd7405eb6f92b04eeb741ea
SHA512344d7103dfdfd4ef3ac0927c2f3fe1fc8414b59e5c3b2b2fba40de2e5af3d3c3a6c83dbcedd644106d0a3d46fa5801fc84845f1cf55339648618c93d1b7c07b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53516fe69b7bda38a8203c6d86bd747de
SHA188b30b0148f26e3ff5ae20ec3f5a6542edd28d75
SHA256aa1e651ee2b423b28e620cb49afe7d1f4b233e80d5fa85da7cba380f92a24cde
SHA51258f8a52bf50378490a623de6a2dd50c8a8733abd2237f8c10d9f771e8d089084b34b9bb819919fca015cca15eca67d2b90c96c5045cc80423f1fdaea5a321990
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ed3bcbe42b3a8b5158dd3138a86a30c
SHA1c416d8e4bcde8b1b637fa3d85524b022a33d659b
SHA2565b5c18d04b40c52fbe3d9b2c568640ba9902b4c59e36cab948d70bf6004980ab
SHA5126c42c3b19d776ae8a59e49d033cbd44eaec81983659974ad507b71846d31e4052a4cdb9e60df276e932d52e17ae24bcbfcf061ef704adfbe08c5755ec6c6750f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca947231fe01a2f217fccebad8303c74
SHA1f5b5fe11d7e80c89585c86672fd5498f5e1ffac2
SHA256d7a71889e4921f15a57a8f9491f6926b4d5af16c90e19f34d89f062d2787a54c
SHA51296a459d05db4d997b1d49d63c355ac988242fa48bade40c4e50a09759ca947116e54a6b1a5ddc350cdc6bb948fe9440b1474fa038106a62c07af841bcfdbc8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fadc4a075bfa50c64d0689a50bef4410
SHA1c2757b0c0ce33e8924dc14bc3d927a21b1b7499a
SHA2569cda4a990b39af88303322961c92a60ca377e68c8e09ea4fda0a63d1d1b578d8
SHA512874946b7425c7652e8380c0fa53863035e029885ebf33d849ff3f06fb441896c8b827e96cfcfe3a91185775bdbcf935730829ccc40521d4e78d00d457b9ae78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ec6a0f5154a197c3e9c5565c9eb3e15
SHA1cc91cdb8ca1ebbd6c0c11a4b182215b1744e4e85
SHA25630a305d98a3ead00707aa7e92ad45a5599db50cfa9e0986d169fd7d0e6efd3ed
SHA512dfe9a26708044ca8e4370d22429cfb05dc29730c81e9441116399886685ba065e10922d2f7b4ba506043be0f6ea2bcc9c4d03773d9af11884b26b2673b29b24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4067d1bed85ddd003a13f45128d63d8
SHA1203d04304c6c2eca45b768f229cbc636e5150edf
SHA256f9891a252ace66296e83e0679482ed12475617ca2782e4c8b4ae6975697165a5
SHA5120f959ac257752f8d3ef4ed45572bacaab755f3b0029cc3a6f24511d75674ce683e717412d8559f7f8821bc8a3163cf572f587954aeef08c467fab5030f0427e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d263064e3f99ef7e8d0fabb23713d0b
SHA1b9ed9d78d1ded45858ffe8ddfee49747bed4c491
SHA256c80df9a210a2aba155d917742c549a65b1cfd4e2565bb477d1eccc1a7a8e8064
SHA512a352a7563dcef6c26a8badc19b3f05d626aee9da6f1f084987c24680e97a91ba50af14825472f83c40d028848329c4698e70bbbe35a3f4cb8b70c4b79a5e5043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5253a87dc4277e4288750c32a94135acd
SHA1c7328a717da6c355d016c46c217a6cb2e4e9b569
SHA2569e1f05021ce5a4af792862398b4c20ae8e8047e2eac81cb19408d284c4db3f6d
SHA512d7c6e49fb149c57659506013d61c9922890ed5337b2a24931400cb0e519cc647dc77b7b89aad69b0911102cfcb41d96d262a6552e568dd077ea4b3068a5172c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d987f3fc22a024252b8bce0d62e0bb4
SHA1d619bdae62312c36508c0902fde1ed368e80a509
SHA256443589e8c57acc93f9f2cf2b313fc05424f4b06347d814aaffc03c3e92fa7d31
SHA51215e0ddc4492df167858da32f9b3b3b670c1c66dac11f8f744b91943a39557966e18dac5d71411fbeab5caa2bfaab5100229e884fe8ff2c3e86c1409af80b5edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584032a81ec3ea421e1c886df83dfe721
SHA11f14e266f75a67eb53aa9e2220ebc8f6768c50ce
SHA2562eba21f048dc7eaa6c87a3d609ee244f26bc119265fb4129e29fb98aaa1e017d
SHA5129ac8d35c08c9ef01d206eee85151b95dbbd30cba3707ecbfb1f859d3123f51608a96806fcac2df5ae4f214c9d2ac5304d6dd89f29f69d0652257d7b98fd385c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0ea171a32646c835d85f2d5dcc40541
SHA106b72c41029a8181b3ca38530c178b6ea7c1ca1a
SHA256d02fd9d4c1ab4c6e44fdcffc4d166f6d0aca0a945842c63ec9b43d5646edeac6
SHA5128b51bdbfa3a30d72553a7442fcaca03978808eb7e1d2415339a86afb27677350cad512fc05db6453ef1740929e2208ba1b9de0295b1519bf6a8b98fbda5a2a0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc