Analysis

  • max time kernel
    62s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2024 04:30

General

  • Target

    cae0824b34df94e1fb557e57fa8a4972_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    cae0824b34df94e1fb557e57fa8a4972

  • SHA1

    0634deda64b1612b5c25f63738e5fea7c5f3f355

  • SHA256

    94d4eabf8f5627735dd44189499058d6b973dc8c63a367073dc1080e15e5774b

  • SHA512

    b44c83bd033f49adf48b1192d7bda0a7b3c3275d9dd258da8a6fc2387385a9b602c97fda66f64fa80a311cb93857469c9207248098d3fedd90a48148ab623419

  • SSDEEP

    3072:BCqModzmGJdacypMdH5QY88M4Rer3Okr1vNxuuzKLNl6vwFk:BCFoQi0cBdZQY8Qew/Nl6vwF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 51 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cae0824b34df94e1fb557e57fa8a4972_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cae0824b34df94e1fb557e57fa8a4972_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6103.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-6103.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7307.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-7307.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53950.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-53950.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18699.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-18699.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:768
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2088
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2320
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64398.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64398.exe
                  8⤵
                    PID:2480
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-50741.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-50741.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1672
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15120.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15120.exe
                  7⤵
                    PID:2372
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21010.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-21010.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2276
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1432
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61734.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-61734.exe
                    7⤵
                      PID:3044
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35442.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35442.exe
                        8⤵
                          PID:2052
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59876.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59876.exe
                            9⤵
                              PID:2688
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-15361.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-15361.exe
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2412
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-343.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-343.exe
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2492
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2554.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2554.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2668
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56828.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56828.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2036
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44120.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-44120.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1200
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2213.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2213.exe
                          7⤵
                            PID:2600
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37154.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37154.exe
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:3048
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36118.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36118.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1472
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35442.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35442.exe
                          6⤵
                            PID:2456
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-58132.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-58132.exe
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2592
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21278.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21278.exe
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2416
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18315.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-18315.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2084
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-48333.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-48333.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1980
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 240
                            6⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:2712
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-56179.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-56179.exe
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2332
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-31313.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-31313.exe
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:1020
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27036.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27036.exe
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:572
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42813.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42813.exe
                          5⤵
                            PID:1644
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37139.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37139.exe
                              6⤵
                                PID:2380

                    Network

                    MITRE ATT&CK Matrix

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24047.exe

                      Filesize

                      188KB

                      MD5

                      27df315ae341f34e7abdc789fce77b69

                      SHA1

                      1a561d07d149c921221a2744bbefb954a037d18a

                      SHA256

                      3ddbec454d0829fb068db4fd029deacc2ab4ea4523a9ce99500ba06d414453c8

                      SHA512

                      3de76534a452669d43fa4d5a7f341bfa59d1ad6209ba80d89f093193256bb5d492030f23283fd9423c8c2c3383bc0279a841c5166be2f93b2e90450d0f34fd90

                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27036.exe

                      Filesize

                      188KB

                      MD5

                      ed24fde5d12c06534ecc9786e40b2c8a

                      SHA1

                      770c123c88a9783eb92b6d69ed86c1b9f4d3cc33

                      SHA256

                      b8da97fa3f883483e700372a7697e9a2f42fd33216e4e745140e88db2df62a9e

                      SHA512

                      64be17f18efbbd90cb643394e966c6aad89fada7899fbcfd0853eafcf605a764704e6d59cec7c676015970f4101c83d5db3e5853d6f5c8f2c31d7d603ac7fb67

                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56828.exe

                      Filesize

                      188KB

                      MD5

                      8be6500759e823eeedfbb94b2b9e6b7e

                      SHA1

                      43a67b805381f06a7471d01e36aa5c25ee788a17

                      SHA256

                      92cfe6e3a29dbd79b497687507946c21b18e2e108262570c5c728f65363c5cfe

                      SHA512

                      65d25bc424eb74071de1343c279c207614ead67a9667edafe69006b94ee451e8a7b47445ef582f7e6c5cf46ba0fa4a58a1b06f5e25f65663e9404fb82cdf3839

                    • \Users\Admin\AppData\Local\Temp\Unicorn-15361.exe

                      Filesize

                      188KB

                      MD5

                      125859697d5b244adeab8f0786d61a41

                      SHA1

                      e7da3dbe7624ddfed31a4b1f00499eddd213ed86

                      SHA256

                      e6a7c2f0c168d817e4678baa3bedb71b0dcd1958fff13d7e25fbbb0ade84feec

                      SHA512

                      4909bfc63ed3650e196d6545a314fbc5d0ee4a58600f21627f043645a8c5f21896778fefa244c6aa5be47a4e4fc295955f10949411c62ae9ebc1b65d43f25241

                    • \Users\Admin\AppData\Local\Temp\Unicorn-18315.exe

                      Filesize

                      188KB

                      MD5

                      b7dbc14a0e0a4b04140c24d92f528af9

                      SHA1

                      d919b0dd27b507f4223392e805230f5cf54e6714

                      SHA256

                      b4b6b0d3824b68fab3933135a082c1e83ef849a9dbcf916eade35e306ccfd84e

                      SHA512

                      2537d2130c817166abebc8bf2909f5c550178dc213fe935fc746abded53b4d473b71cc518a98bd4d6ccdc007730b82b8d8815b0100bd0b5a2b39b89ae5349491

                    • \Users\Admin\AppData\Local\Temp\Unicorn-18699.exe

                      Filesize

                      188KB

                      MD5

                      8ba74c3866d7c3f8ffc5687ec2e78300

                      SHA1

                      a7f32a283f54f46cb17e55a1c28fb6cee347a7b5

                      SHA256

                      22aee599bf5704a5e8d5300a9ca86d675c0eb9bd1c8e031743672660b2704321

                      SHA512

                      5aeb1b65b9de81d82872906552d45ab99d78b076a21cd8dd3f1ad7c8c71534520d878b29d70bd4d25fd28a0a89da33129c16c000387bfa70f73c5a442bf2ebe7

                    • \Users\Admin\AppData\Local\Temp\Unicorn-21010.exe

                      Filesize

                      188KB

                      MD5

                      c6c069991cae2c18d45af0ee43907f96

                      SHA1

                      151141d2c7966e6f4837ad59d2214cbdfe867dd8

                      SHA256

                      b3f54e9be95a1002c15a9d09b0b140dd508e59d27243029b7acdfa5e171965a9

                      SHA512

                      c8cc712aabdfb3f2aefe8302707bd8b7e716b052d938abbff101dacd5af8cd1af6fffbbc635f5db3c106f4df837a6766b00e4d361aa344cdf12f7c1465aa15e6

                    • \Users\Admin\AppData\Local\Temp\Unicorn-21278.exe

                      Filesize

                      188KB

                      MD5

                      8305c23f29d1974f248f569b9508bcc6

                      SHA1

                      859ed0a2c6d4526fbc5865bfaa004514958e2406

                      SHA256

                      7c27e31e0b4c2ad16d33abb68714d2956fdfee704f990a3100b8e3e9206e0fb5

                      SHA512

                      b01e0403ed9886cc54bb06839c1b3e1266de08c0a0f59479db5c3e37c4bb759d17770dafbc9c737301fd37808b64b93dc8c7c6bf9d6c3d713a3207583b80b8f4

                    • \Users\Admin\AppData\Local\Temp\Unicorn-2554.exe

                      Filesize

                      188KB

                      MD5

                      875297a69e2ff3410c6a718563104dc4

                      SHA1

                      65257ed24a8fa50413712a1ccdf75cecdc0b69b7

                      SHA256

                      032b6364769dfa1f4b33bab2c8b43d3f8c54f36f0fe12dcb77bea36b5c68ba30

                      SHA512

                      d98e0504ff950b21ab30259f3ed9807e78c01b63e4a410747e89a834998b25ea930e0d71b4fc5c6f5df373d0cecbca72488a38757dde6d298a1682a5259f95ff

                    • \Users\Admin\AppData\Local\Temp\Unicorn-31313.exe

                      Filesize

                      188KB

                      MD5

                      5e9e8f23b201792cd3adb7a3edd41e20

                      SHA1

                      b10a3b676ef7b420a1ab280ce512abbf4ff2de3e

                      SHA256

                      413e0bc99909962cf6f6221a7c7e2e28f0905da6b007931d7b8e4720b47437fa

                      SHA512

                      488e4a6248cb9e8628281cf0e6080c1849350f8b764bcdc6464784c4c18ff6ba18a4e8672d6da28348073767400199885973ebc570dc51742af7ad241c6cc9a7

                    • \Users\Admin\AppData\Local\Temp\Unicorn-343.exe

                      Filesize

                      188KB

                      MD5

                      2730c1d8ea0d527aa0e725909ff14d21

                      SHA1

                      a268c8a72ec54bfa2eff790d3f7648e1b140b273

                      SHA256

                      caaed30008d6e5c4ff156d4440e1ff09b2ecb60ccdee29870752ca3990754fe1

                      SHA512

                      0e9f1a78122e478c82cfbd3512a2b6ac81bd9c0697e87fdb8a134ba79e7e4e3eb90431ca66d057f1016ce8fdbe39fe44182aa30b9b62b7a09dad99616210f2f5

                    • \Users\Admin\AppData\Local\Temp\Unicorn-37154.exe

                      Filesize

                      188KB

                      MD5

                      f6a57857895bb7cccbe47c3af81c54a9

                      SHA1

                      fc3155acd642c277c435624930ba9b1f16b8fa87

                      SHA256

                      31f31f283426dac4fb95fbf94c18a4bba74ed4618bbe354df810ecc1beddee7e

                      SHA512

                      88bd94801dca7782ff0d6f73d337466d869405352a1d290255b308d62d00684479e54317ef56d60d603677ca3a79ca7e31d79013afccc27eab69824fbd00588d

                    • \Users\Admin\AppData\Local\Temp\Unicorn-48333.exe

                      Filesize

                      188KB

                      MD5

                      d10ab65ad8a381649434a6cccbb2895c

                      SHA1

                      85eb27b35dfaa5c928eebf1197a5ab099e2ddc45

                      SHA256

                      5496f29086e0e52fbafb61e67135da0ea64b872bd7a6bb1e5785bf3cada9f120

                      SHA512

                      2ad9e2cee76b446b6bfb7291d47ce502543eb0e3b8356ad121d126b1b4d1473e617707068bf4da5e37d04fbe658deb30c438fe50ff349d07b16acbbca0eebd4b

                    • \Users\Admin\AppData\Local\Temp\Unicorn-53950.exe

                      Filesize

                      188KB

                      MD5

                      4a303d2d2cb392e925fb00253f9d2dae

                      SHA1

                      4c70344d0944108b5374d1698f949db25d26c4bd

                      SHA256

                      7001e680a4bec1165eb4f25bc8f8cab3e92c382f23cb6a3a3fe77377686494f8

                      SHA512

                      36f7f8becee83e8466366fa2da752252b8d84df267d54d399c842ee0b71679cf7b3db1fb20592050ed9bd1831f1b6fe24850c73aee33d5749c40fe165d05c3ce

                    • \Users\Admin\AppData\Local\Temp\Unicorn-56179.exe

                      Filesize

                      188KB

                      MD5

                      f5e62c36289606c591b093cfd066d6ef

                      SHA1

                      706e2d57d3d1aafe6bdd12127237e19cc6f429b0

                      SHA256

                      8db7eb7ed8abec462c311dbec6e06a58d55794ea163e52d51400cf07f2c1dc07

                      SHA512

                      3233bc45de52d1ea24e5beec780cf3232758e1b2ae4cfff664a08705b15ac440ca399c3a4d72bdd0ad029c81d38b45f133c41ed7e544422adbe6b775af502553

                    • \Users\Admin\AppData\Local\Temp\Unicorn-58132.exe

                      Filesize

                      188KB

                      MD5

                      f2b62e2c551f2d30c571f5f128b106cd

                      SHA1

                      4a112495aa2209a41edc626bbf9376044c6850a3

                      SHA256

                      768816401156173210ed5fdae93556665e787843327151f8119020d3d082a99b

                      SHA512

                      a181e1911ab613ad3821cb6a339b57afb88812f99d089981e01ea6d9e299bc61b11763a8d26e5efa18922885e637a039f151cb8efbcc7e2efb423e50012db413

                    • \Users\Admin\AppData\Local\Temp\Unicorn-6103.exe

                      Filesize

                      188KB

                      MD5

                      445499ce7f0b9452146497ab0e8c85ca

                      SHA1

                      f662dad6799c9748eb064942ee85b7e3815b89ed

                      SHA256

                      92f7241d17319024d5e858e6e0d014bea6502477fb4810e8017252831fc80ce8

                      SHA512

                      4cc71734bbee7bb09f6e0e6f313f26178eab7a93e361932318e0cb022132aaff33ed13d197de37b3b65692060e0f392af8d0e384260dab34bb025630163671d9

                    • \Users\Admin\AppData\Local\Temp\Unicorn-7307.exe

                      Filesize

                      188KB

                      MD5

                      b6cfe0dd1bd33850d4c5bd85f9dfe110

                      SHA1

                      78fc604dfe21b6f76901c623e83cb219e47ce894

                      SHA256

                      c3414bae83a6017b317f2049f8d2be8c042e2a952eb04f2e3cf7255a5c79ea7f

                      SHA512

                      54c6e9dd2aacfe6dbfc693cbb8e3e2c5567fe29d75753ebcdcf216bf37da1cbda881da10814aff013069754775182873773715a284cbc8865614d1d11a710850