Overview
overview
8Static
static
1JaffaCakes...8.html
windows7-x64
3JaffaCakes...8.html
windows10-2004-x64
3JaffaCakes...8.html
windows10-ltsc 2021-x64
4JaffaCakes...8.html
windows11-21h2-x64
3JaffaCakes...8.html
android-10-x64
1JaffaCakes...8.html
android-11-x64
1JaffaCakes...8.html
android-13-x64
1JaffaCakes...8.html
android-9-x86
1JaffaCakes...8.html
macos-10.15-amd64
8JaffaCakes...8.html
debian-12-armhf
JaffaCakes...8.html
debian-12-mipsel
JaffaCakes...8.html
debian-9-armhf
JaffaCakes...8.html
debian-9-mips
JaffaCakes...8.html
debian-9-mipsel
JaffaCakes...8.html
ubuntu-18.04-amd64
JaffaCakes...8.html
ubuntu-20.04-amd64
JaffaCakes...8.html
ubuntu-22.04-amd64
JaffaCakes...8.html
ubuntu-24.04-amd64
Resubmissions
25/02/2025, 16:10
250225-tmwhtsvpz5 328/01/2025, 16:58
250128-vg68tavpgw 328/01/2025, 16:28
250128-tys7vavjd1 527/01/2025, 16:24
250127-twh9vsxjhy 627/01/2025, 16:23
250127-tvw5bsxpcl 127/01/2025, 16:22
250127-tt83haxjcx 127/01/2025, 16:16
250127-tqthmswqgx 827/01/2025, 02:40
250127-c5ymgaxndr 1025/01/2025, 04:07
250125-epynmsvndw 424/01/2025, 16:04
250124-th4cwawmhv 3Analysis
-
max time kernel
1442s -
max time network
1453s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral7
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
macos-20241101-en
Behavioral task
behavioral10
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral13
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral14
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral15
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral16
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral17
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral18
Sample
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
-
Size
25KB
-
MD5
1d93e8597dd860cf81cd913c4b997818
-
SHA1
a7dacf6a32b194720a87130a16f2222c44f036eb
-
SHA256
6514b345465786d232a61f8aca8e3b60e2bf8a3e45f237086e55caac0c19cb4d
-
SHA512
c35592acafe20b18914ba7ee31201faa7534136df292d7c14436fb3bcbdd5f07b96b3b63897509068b8263ec4e12f55e192de027996dac8e63e08712fb891e98
-
SSDEEP
384:PqlIcCtF4JVGTHyk9v1o99t5W9ISFaTGHx6QckT/gbpLOXguLZ:sZtSF5zg9ExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{274C9591-D42D-11EF-8121-F6D98E36DBEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443209455" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1668 2376 iexplore.exe 29 PID 2376 wrote to memory of 1668 2376 iexplore.exe 29 PID 2376 wrote to memory of 1668 2376 iexplore.exe 29 PID 2376 wrote to memory of 1668 2376 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d143af574b1614b8d185bb18f1c4401
SHA1f5b4ccea00c5afd9d28948c0a95430a727507665
SHA256b1a1b75094bee2586c31a09280c9ede7b83bbcbdfa7ebc2aa36f25346a2a7f8c
SHA512f97c41fb8fba89a9817722a6a0ac4d73ddb3980973e2a3250eb22a2b3aeb49620e963f3e915299e4cb5b86d964b02c3cfea8d0fbbfb02e14a23e0c9efda22362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01cb421399a13032da6d68aa37ac47e
SHA102e290bd7d86ac6a92634b83ae77545a21944f20
SHA256ed4f01b76f8a110c4c974a1e56478257c0f51aa79d6e14e61eca918940bbe9e8
SHA512e88b5493a9daeeb8f9624054d4dfa6dccf0a3be7e890ea5599068d30318e001b02de9886b2f6250c47b7eba7027f0b4736b818df074b2c8e855ee0beb280a153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53822ce82c2ccbc294d5231b1007ad280
SHA1a2a81de0873208add2dbd32ef38dca6e0a7dd5e7
SHA256537f4b939bda073002547e5f5567eaffd97e21b3dcbe07fa6e3db32731d3aa76
SHA512ab434119697ce502719fad93115efdc54e800a8bb322daff9ad8c7a038e09c292b5e4af99d35c97707c4392d47b7f78c6800fe159c4e2e6936bcd1674606da71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cce129560cc17a96d049104d28db8d4
SHA1813311a9a9d16b3cc4cdeeb9eeb09ec4a3204fd3
SHA25665ecfd7409f8766921b8e5580a3d1f1c5756e58e106dc49180aba6ec1795f0c1
SHA512619cc443896ddc3c767eba8d41210781b0dd38a4d8626e9cd5782f2df475abd0a62b7b220aae034855e9ad5835faf5004e4aa95ce24e871306a50a21623b1d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e5d073f8a5e63ccabb32343fb59fb1
SHA16f0f969310b03bbc76c110a839ca59a821ee4cc5
SHA256214df504556446ce5af328d04a27c581b730dbe8b728088038b2641a7bddb6a5
SHA512928f966b9843e6118883269e10aa0226e7f41219f62aa7ad344f7d3d3b50fc46a2a7ecd254e916b334cbb58707a9e69f9d0c8c925c095793cdfd0deba650b495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c8354410365925020bc183ea5420b6
SHA1f6865ac15c0ec049c17d2d8ad04d532f90269f17
SHA256b4176667bd93b31596b67501ff2ba01cc7b5a570a0e2bedf08eb802f4315a89a
SHA51287d97d0433eb5f9abad06ed5482481c8fcc1231246ee7d13a08d3c25a86716aec9f11c25861ee7f2feb25bdb89ddb9c2a04a53ff1755c697093a8b4c30612719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218623aee3b5420bd15863f325da0bda
SHA168d7c6741f6a620b208a435198293fe43248e46a
SHA25693eafaab640750d60fae4a6fa4a8a0b6ce83c9796fd68fb0ab6486b9ef2f7858
SHA512cb3f606e7f2f2c339ca9e49eb95eecd0a098c52d73c514c47f56335ca43eb913caf913157096e2fc8b72215e7d8d5fa247d8665246d947a1be0b12b0d062f62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e1ecefbf8c9378bfa916576711ddd5
SHA1d7ca16fddc371a913e14b11dd67034a4f1a69580
SHA256505de13aa78d75c1cea6a7ef2c02440c07f7dba7fa06ca26a40b111cef79ae69
SHA512b52224cdb6e1213e6c4d93dd30f3561c663d643f068f75dbbca3f033e60362d32f9181f945a4adc9460a58454dc37c9d082708d8b9c86a9711514b557f2ee1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b081ee4b02238726bc2c6035bd411545
SHA15ecc51ef1ddf887fdba6cd186a5e976842984ea4
SHA256bf5ca2cc2b2e2bc52f6d7239f1214863947eaa5f45f05f8c68d2c93a32776da8
SHA512b4cc578d43a3ce4855eede0ce18cb744508751c1d5b30252adb5abdc02a3cd1340d289220d87f9c7b6146ef7c7ec1311cacdd05b7cdf78abb3aa774d1d06cf20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b