Analysis

  • max time kernel
    118s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 23:44

General

  • Target

    e8b7d90e4d041096a4ec76b8763bb038_JaffaCakes118.exe

  • Size

    227KB

  • MD5

    e8b7d90e4d041096a4ec76b8763bb038

  • SHA1

    0f1d35a04631d377c05edcd6bd03d772a03ef8cd

  • SHA256

    27c21a4efb452790ac569f5a4b8145c6cc0166d0347d6955a6360e3c6becea30

  • SHA512

    9694da097ed4023b477045f59a2c2936c2d282d794ee409c3e35f73031c240795b3d9870c73021464291116e53534bd9446a1e3bbdd7a5c0f20c61a92d8691f6

  • SSDEEP

    3072:8kKkooPVoTbsCjyoFlQsQhs6ScQDNkw50i4bYHuzMaHDcB0utBHfMrzrIEcSB:VKkvVTCEhssQDWwcEHwMceFd+r

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b7d90e4d041096a4ec76b8763bb038_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b7d90e4d041096a4ec76b8763bb038_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\e8b7d90e4d041096a4ec76b8763bb038_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e8b7d90e4d041096a4ec76b8763bb038_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2092
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    6d54c60f81229f72c5d30ec91ec58439

    SHA1

    0a2fe8014835ffcaa89b34a2bf7cc809e0e64de1

    SHA256

    514a9b77876d8c2b6c43c3f8637a55461eae1e00809ae6e0eff77a195cc12cb0

    SHA512

    ce6f99e440b016b3de287272248642775ea0a5e90a861a9325b48bc85b6221a4eab7534050746291c56a579766a94e1c69e8c101e5bf525955968bc104f0591a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22fecab447c253b3e91d6166af540e7d

    SHA1

    76aa008e1707080e27c5eb08a0bdf16208c061c7

    SHA256

    f6b2ad311f48a7798c4e1e9f83cd2e036b35ef7a1c4f0b4b88d632b24f591073

    SHA512

    6985f27c9483e268376e713bed0342515e2d79246b06d3bc572acfdea864485e3e835625e49acff90c6a5212837dcfe1fd49960d135297c8a978fe8e410b2e60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed96332d17461865bcfabc1d9b3e18eb

    SHA1

    2cc7f2582329dfb02238215c4a4380d75f98e4b5

    SHA256

    4d8ffc660e7ac6e91e5c24225a2586d59caf3c944cf4a971ab33cd5f060c6cb0

    SHA512

    af8b60ad8099183bed9e84aaa714589d797491e0bcacc39e26904086f8f1092153be4c1658411fb40064338bd11d651f846bdcb59e0d293eb2dcd828d2e5c979

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0099a00e84bbbc8da387e9f740e08e6

    SHA1

    ab79df91987995194b068b0abf786d520edbb3d3

    SHA256

    7d076778ea8da443fff5159300e82030df2f0c3311f44bfca7082f8619a38548

    SHA512

    128522ded4583db45c37bcf05e304030766c29573fffc6970002fc49d1ad381d3d08bd5fe67993edcc531b5509efc1f2ef68ab6cf2ff82e97237202118e770ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    112f1bbe777fa374b67417494cea77b7

    SHA1

    88f50282c8706989649ca611d2636a5b019a88d6

    SHA256

    8fed59c41ba3ce4bf5a78349b9e797510728f1fa9d722279163c59cc0e7ef246

    SHA512

    a390ecda1f80045cf085aa8101a779a1c8820ee12ddb8cd24a46840947ec7e1da0ff3493610bd0c8d7cd6138eb0a65af84f20b4b7323250357fa2c83da99fc48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f33641cd04d487a2af53ae6f223bb69

    SHA1

    abb148754e942f6be82ec628287256973db354e9

    SHA256

    82ee4d3bc9732703042cb39f556ff92e0b46572b5115fc3c3490ef0dad094565

    SHA512

    fbee55ef502e72ca1a7b3c2b8bf9239e49a806930a24e37ccb2c2e4b4f63716c688dcdce6ccfd1f559b4468362bc9c6632eb5a158eb90c8db134f59282f9f869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08f28ba6780e07b829777257294f5de9

    SHA1

    5b8481521311d44ca0a81ce2de00aa02a8e551ab

    SHA256

    cfbc8722ce838df0117cde12d178ee5add61806970d86fc049dcfd8f34b42cc4

    SHA512

    5cddaf77f26a5202055ca96aea906bc081fb909187f82b6d0e4b89543a529c5cb92b1002b8af9f9d50e8c5e1aed43fa4cf5b8a73b6c13a637aa49ca9db394c92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    29d801ebb8cedaf5b849ab1e489922de

    SHA1

    b008d12161ee96ee46ceb1e3b12d87e86a3e8025

    SHA256

    791c13b0d7704d5060e9dacbed3c2d49f1a92296183394a1c6ceb4d01e3fe4cc

    SHA512

    b7b36a45cbeed18d1e4e3504eccfbb20f9f1790da6c6b436733fe0c1a6af897ef1bea7291ffd8438e7f83ab2bee7c2be933ad3e704a639cd62a912bee0f8a9e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bf3cf9fc04d3f45515274aa7949be80

    SHA1

    184a192678a38e947360fa3e95fc72d9305b8779

    SHA256

    7f138f74d268f157ed935428be888758b4a3c95b6b07752f90fb20e841612cfb

    SHA512

    8a15605b0014914d2c84b214a80727b0fc470588155480e7163f7de7ee93f09207bcc80c00ff47b5b253019d4af845daf7d8b26f77a9ab0359b1820153e03c54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d934640194d2e9b3fbd24c4deda56a74

    SHA1

    d6898ebf1ee98841c0f97c9257e27f209d71f4ee

    SHA256

    86b22bf0b938e1438d4f5d11c212a6b44aacae52faaee01e753f9aa27b489531

    SHA512

    d09ab850ab7c5b93398b26baf10948caba84d87632eefa91b59f2b8240d0e3289b75e7a4c6d77f90b0fef51ac45d3070aa03af53a2dc24823e19bcd69d020de4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb44d77bcd08514f2906a66a04187a64

    SHA1

    cf2967390eb8896807831150c6b264735f93280a

    SHA256

    04319f6b470b1c031f2b9ea5e358a66b54e32d80a8e4b227b9ec8d56c84f84ca

    SHA512

    62e4f4f3336dd9090f211b4b5e4592bb923ed5efa751fabda032c454bfe799c07c4db2394538bf69eb003e148c65427f7684449a4ac66400e4de904076295d76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99f349c44614256b1b4a12265329a0db

    SHA1

    8fbe5032adcb5c48c4bd3c557b44cbb6cc1b0014

    SHA256

    3c2e39df0604cae44cc21e5a3bd19975f4b7aac8629a37f387b94846086ad0f4

    SHA512

    91d86087f6668e8a2a2c74c7f252736d535f09456c39f4af986047ed872f813f08e4400a02f55d4e82cd08e7cf25b9d8a17bdddf75fbc1d19bfad18b24048e8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f90eb17647affc999e1f7e6f421049ad

    SHA1

    018802be07d0da93b665635e4e20922639055a14

    SHA256

    586a8a71b857559dca123760d62a53d884791a683db3b7289417b85a6caafc2e

    SHA512

    ae60b962f87b372fa4c4ea4cc810cf3964e49ee1c842e18a462be2afadef30b619015e99c355f5638ea9edaafff1efefd22740311d2947e6f21064d896e0cbe7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c713f2d0d15660794999123a4d37dd2b

    SHA1

    594f1011eacc10349cf25a02f0e8a25f4629e3de

    SHA256

    9e246b889b82a33e6d1cc435433bf62ad371c34c1a87706ba5d27a9ad5d6fd02

    SHA512

    c7be5bab3bba1f9c20fe52bee5714e617628484e9d112314adb4ae1f09adbed6f295eecd69b4db63f1660aa21037510c6555ae2ad2e2fafe14de4cb0229aeef7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48918ca61d6b45fef97fedf7e7c811c0

    SHA1

    2107f1e766874ad9a005a6a7b957eeb458763d9b

    SHA256

    b8f30703ace0ca9ec562acea1a7088f5fe224c1eaba6b8687a85284221388a7a

    SHA512

    16a236eb7d43dcc917e9cdd4f93b4d7fe000055ed8de4495aac0b2a2721a8c57ead3ad416b98c0ec869fd8ba0169540bee507e2ec2353e1b68d5dbe4071c5458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e25f1fc021848073a1ca37f870366e3

    SHA1

    63235c414ef3f3609c42abdbbc99eb7812d99793

    SHA256

    2c584d003bd6319e7ecd1a3a127b2b59ba576095a3ad87a28859dbca8506c6c5

    SHA512

    5c811b016ae924aa5ae1b9db1dd926009647d7cc79e6345dd7003540f024afafcd7108908dbffe571a9b046e5f42c58a50bf47723fd10cae6319eb2a7a534cdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0ae79351e623358c87494a7adc8a1fd

    SHA1

    9e02b4f224cf39ab9465abc60d250c9fbe262948

    SHA256

    d15254487fbb8c6578ec84ad8465f072a07bc9764e4e388ed1aa65245154a22d

    SHA512

    aca089ce61366f52d623528fb961a3c9d9d0c267def4dc5f3d2ba90ef07f42d3a0ec73c3a20d8b41a52ca1b9ca277f5a3899cf541c635e0aecd1442ce8eaf422

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3bf0ab5e41e980b111efda3053de5c3d

    SHA1

    9933ca57f441c95735c3584edbad2a510bd43540

    SHA256

    9951233f996efca4f42c563bb8d76ddf66ef61d2366abc7da5229fb16eb5147c

    SHA512

    943c1d0d874b86bbbd63e664cbadecae3858180f63df17f8ee8050ea0529bed7ce58959cd3f1a4dd708a1f4af7db74148ac8ff4a416bec45ed1a170b03195a22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4346e350a3080959623fadb140f32f11

    SHA1

    bcefe2a877d883d15f1f173e4287594531e611d8

    SHA256

    82b4264db818391f24105b3cf94c5be7d13f131932f906485a04f9f32326856b

    SHA512

    7ef0b987a5b2660d1a7e806fce3f6896c8070129bb09823071b30a531282243164da0c1538716292fcf88387643a5e080c1d822a02a0be7b638bec5229908772

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    c3718d517c91ca179d6ddbbe229b9725

    SHA1

    3072e20247c60289a19bb15b09540e080df70eb5

    SHA256

    487e3f5c648e3c1bb828ba21268303867e27b2eeffad1d1304857278e23d8493

    SHA512

    dbbfadba2b27e93c891b0a0a73732c0d5ad73d894a60ce51dc3fcff9c0b1eeb5bba92aa319a027cea3bf32b8c7d388a6c58bfbc63bc431d8684baff3f9e810ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Temp\Cab4941.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4A8E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2376-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-19-0x0000000000350000-0x000000000039E000-memory.dmp

    Filesize

    312KB

  • memory/2376-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-15-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2376-20-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2376-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2376-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB