Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 16:57

General

  • Target

    ea78961231a757f5a592948df290d5d2_JaffaCakes118.exe

  • Size

    344KB

  • MD5

    ea78961231a757f5a592948df290d5d2

  • SHA1

    02ac2479d7ccd136f6f7f83a16ef3ed5a7e79e85

  • SHA256

    76d385c04e71cd4808059eebeb459c12fa092c405fac226eb0743ad6f44885c7

  • SHA512

    91a0c352338974ce9b3355dfe67c6d966652dd2c8a871a70f00e730bb5dacb09ee373518194445534aee9c802677d1261bc952698c22b0ff7b62dc35a9349363

  • SSDEEP

    6144:J96K/MQ6eN1F8LQ2luAM4Hxe5SOUVTHLvH9nBxXs2y/x:PUQ6exq1ueeVU9LPZs2Y

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea78961231a757f5a592948df290d5d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea78961231a757f5a592948df290d5d2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\ea78961231a757f5a592948df290d5d2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ea78961231a757f5a592948df290d5d2_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\Dwdjqfihf.exe
        "C:\Windows\system32\Dwdjqfihf.exe" rem "C:\Users\Admin\AppData\Local\Temp\ea78961231a757f5a592948df290d5d2_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Windows\SysWOW64\Dwdjqfihf.exe
          "C:\Windows\SysWOW64\Dwdjqfihf.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    975df3d735205820fc4d69d51a44c016

    SHA1

    f2bf09d9b8a6be4f720b4bea3b3c35907baf2e95

    SHA256

    cfe83ea4bb8df2fee64817fa1c239057ec0b30963e598bc1ef4865d1578989c8

    SHA512

    16362e5ff1f4fbd1f9605b902526fb3b1283eaed1b019dcd4d90fc3b79567fb7f3bea0c9ee6653911695d76f69b1e0fc579609714e22e53351b64db2533d9158

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c75feff42a2b2050c5570a7be5200d2a

    SHA1

    17111d678241371df32d2b4d41033fdd636fbba3

    SHA256

    a0961ef8e70d07419563188785a2e481444bbddd7239e0bdd94adf5760b092fd

    SHA512

    289e68ae81db2a87bca51749444a26d17c6eae7432d0718704903f6e0c8b310035707a911542a00c21736de0160b30907802ab9f23696fa0628369bbd1176a20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc3ccd935fb3278fd99b7dca37fb8e01

    SHA1

    5e7b7685c69f46bc4b1cc960eb59c1930fbb5fe0

    SHA256

    c6374c6543be14b747b62eded0ce7dd938bf724d93d6e7210a1293651b9e4a61

    SHA512

    8a89095d49d4af85c56daf8582eca98ed8f14a78255acde8316d7f363439ecbe573973a71c482812db0c1b1373fa606c0f62c7f4fbecfcf7fd4d0d7a5f5ec38d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    185c2096bd061a5a68cdd0884ce71629

    SHA1

    416411d6bb5f42af5ef414f56db42ffa22f0a916

    SHA256

    4d6b3fc0a28cd5157fe108fbd89509cfe377b4b0c22ddc9d77ba7c0fae73e975

    SHA512

    2c90cabce083ce1a3bc6afbe324b26c8cfdebd8ab628be6e588061d5d906b9d12c60844e65d7cc681749a7ca66f4fb91e3aac8da39dfed80756f6e0d662a615a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a1851fb8f95597ba8f3e1d6b35abd08

    SHA1

    a601c32f2fd6695a44e4ef048d2dc73a782a9292

    SHA256

    784001656f919789e20cb6c98533992072b3b520f90b6c8dc39e294b70aec720

    SHA512

    47f07224a72b40f1b4c078f2abf64bf3dc6d5b0a4185cc31aa25c867d31bad813903ec81bb4a7fe8434e2516804882f0c6d8e15431f8799b489e11d481009e80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    365d94b22a8b3a0e40d992ac8bc7abd7

    SHA1

    784e28654984bf4476778de77dbceb17bcb143a2

    SHA256

    7d12dcc066c72fd8b666048f13b2d3d26c2dc4ce52acb4e2beba60868e7ed863

    SHA512

    7d1e09758616f83e618f493f7a084a9427813a423e90a7d7d115aa7e985aa7768498dfaea3023dbaa597ad80f3206001b2ae537c24650117f19c6e6cb214e565

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a68ec26f3df1af0f57fefc10abde9db9

    SHA1

    fd53e952e63b9f7024bffb6e97d19d2e06666ffe

    SHA256

    3c5d020bb82479ec09ba4685abaeb51f2ac71e285b4f9fe364bccb1d07ed26f5

    SHA512

    c4b48cf193c91b8a73287cc854514afab87286ff2b1b5f48b8eaa8a85216124e0be3a535f3be0c9ae7f78a430a46bb0debc220d4c00eb3dfc4cfb796a266dfa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0fd0641548e77d4455bf4a173bbe20ce

    SHA1

    bcf47586989433b712dc8d2a426fa8c7d73d2e66

    SHA256

    a980cf3c68a4fe18892aba6c9e68675043657d65c33ce2ff78e46f5e5618955e

    SHA512

    04c75603934703c8921b908194ff9b503ae2a2fe45f0f76e0e0e653356a1f33fd9b7fe02c00b0cf9c2b93ae5642d2f7cb307f67b35ae338e911ab7425eefe323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e30728a0d5a4e32b05cca9c75dae19b

    SHA1

    8a44ea6e98f6282e9f8fec142e2af6ad8aa5b994

    SHA256

    4489d9fcd824740e7946db4185a7c5e754daa7faa3f8bd4c36bf3b95e3ec853d

    SHA512

    74c942777ab091e9063fe21f4d45d78dbaf12c919401d7ad02bd351e2fba3031ed31dc61331f17b88c1c2850e2ad8551c692523f6fac880f53b638ef529a25be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11a53351424a13b6f763259af44959dd

    SHA1

    97349ba34b6beb3de90474103827f449b211922a

    SHA256

    6d3769e9506ec02c14c810d06d64bdd06411912dbef6007d6552dbd3da0a3cc5

    SHA512

    c8dc14583921906c305c9b54d5b4089f9d5c3110a6ff6b51700ea144899c0c4ca9066803682d15d505774121601b5e24b93e6314b3d176841f67dcfa6e3c4502

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a594be14610f0ae4d0cd1542bea8d51

    SHA1

    309c96527ef050d09df2364552ccdbc72d558068

    SHA256

    aae130c14687e89955df5176f9947a9cf355a163310cdff02adbe4d3933d3e41

    SHA512

    842dfbda63b6aece0a08a80647e6ce6540badb7c0fb8618ef6ad7f98799804e6c0a69c606972bcc45c3d607e794fcafc89266d2355541441a8b4520172175803

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16a080b5a6ac53df0c80a3509254ad3a

    SHA1

    aa684c85054c080ea220ac27595154aa694738c7

    SHA256

    78d48101f7685e82d06e45e56cb4a7c6f5ba076c1b1b996a9bb4e8997e8e0010

    SHA512

    136dd96336bcc4c494f3dade7682981d5728de48d293276d95b77a6ad780aca6aa997068f94014ad622b1e540870ae02bb0bb2a243acd07d83630f9a7570ffa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eba5ce1d2a8defb5261bfd5409e616b4

    SHA1

    f02032a33af233ab436b72bf8d05171014fbbbce

    SHA256

    fd46963292269c1b4d03dd4d59107154453fb23d807cad2553a017fe7de2d00a

    SHA512

    49a7a979c07eecb4cd972d0814b1898bf1425c188e9f68bbd7ffde5039a58f86382e2b7749453e8e88f0c8188bed83d1b075a48d239b2d35211c8df2fa76391c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    84cb7e5fd6af547053eedc524d696d91

    SHA1

    82d439157389a8f3cfdffd9075dad6f0dc370ce0

    SHA256

    6dc8d713755aa0414abfb440a47ef0f2a35cd6b8609cbf6d8c27a8476396f6bb

    SHA512

    fff99e54c8fa0517421f6acb13ab75a383321d5c207862dffff59bec7505996c50d475702d8fb76abe446426076857354c547656c18e76987f02c5d032094208

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd092af700e60525848398eb3d641f47

    SHA1

    8de1ffe857bbb8b6b3e135acd66a08918fd12499

    SHA256

    a5fa1b5e974df746767ccb08b031d14a008f36b808173d19b4b9d93573d5ef5b

    SHA512

    5c7bcb442974e4c74d3988094afbcd959b299cb323bd17c19624f2eec47ffde786229643dd1d67aa7bde07004c8c7a26ddc2ca01a13c0b0b039b7f5bd2f4488b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef1ed866cc4b50bea45d73b13f91981b

    SHA1

    e36aaa468f879ba5e1abe1009a4915bc346b951a

    SHA256

    70de0080ae1134cf0ee24cfb24238dc0a92f87b0f2061b6241cccfb2261fd9e8

    SHA512

    43d6b780f01148135497f8c3770c86e11f9ddcc3e09a3f0e0a3b016765438bb9a3bdcd2c645b83e25afbcbf4a800d693efc30a79b5983e4aeab118623e7d79e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f1a4d371ea51565d22fa1e1a8b00e43

    SHA1

    cad3cde7b667f21fbf419d28993b477531f5a8ee

    SHA256

    9e61e66f42b4ece4b81f53c94806a3705da5c5edf75cf9e9296a794fc8be04b5

    SHA512

    00e7bd62bfe707f1c7615504507fde0e44c9223f873f0e2350cb8c85fee6a061bf87d0cca4d2017668773243677f660eadce53e5705222a7e342c7d1bf86f50b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    595caea73955b3fb6c2e1ada048c62b2

    SHA1

    6146c51bd41ae984dfacf064e53a26990c706a6a

    SHA256

    158da80b072176a1a0b4e92b152721b6caf65025d3aa2e0871c251666f4c0975

    SHA512

    f0a13229bd680d2c0d883f32a014e8e7646e6109b77a976e49a4e1fb7f86be3c529b6d386a91a600a5d907eef28e9cfcc4781d422cf354cbfc0e9cbbd09cebef

  • C:\Users\Admin\AppData\Local\Temp\Cab282C.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar291D.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\lrskwjj

    Filesize

    24KB

    MD5

    90038ce7778c12ac1ca648333fa32544

    SHA1

    7cdbd529afa1a18b2feab47ed43c48e0ab851d0b

    SHA256

    df531360d9c79977f3c4c6db4a90ecb065da8cae739fe2df5cb96270aa16d9fd

    SHA512

    d2ff1be74e148b22c9dae7a090a9c83787eaeefda0c7e71c18e3339f5b5f74c3327adbe6d81434c8bd6d47c2158646a16c2c17c96a5e3f95a6cdf9dc1e07ba2e

  • \Windows\SysWOW64\Dwdjqfihf.exe

    Filesize

    344KB

    MD5

    ea78961231a757f5a592948df290d5d2

    SHA1

    02ac2479d7ccd136f6f7f83a16ef3ed5a7e79e85

    SHA256

    76d385c04e71cd4808059eebeb459c12fa092c405fac226eb0743ad6f44885c7

    SHA512

    91a0c352338974ce9b3355dfe67c6d966652dd2c8a871a70f00e730bb5dacb09ee373518194445534aee9c802677d1261bc952698c22b0ff7b62dc35a9349363

  • memory/2188-33-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2188-0-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2188-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2188-3-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2188-2-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2524-86-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2524-85-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-29-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-46-0x0000000002D80000-0x0000000002E3B000-memory.dmp

    Filesize

    748KB

  • memory/2656-36-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-34-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-31-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-27-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-25-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-23-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2828-49-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2828-50-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2828-48-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2828-83-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB