Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 16:46

General

  • Target

    eb86f59c8b5b2a861ea8759f75a42f7d_JaffaCakes118.exe

  • Size

    77KB

  • MD5

    eb86f59c8b5b2a861ea8759f75a42f7d

  • SHA1

    ee76cd1b0a1c203c70581bdd7f5ef5c3fe2a4457

  • SHA256

    d431868df67dd9926e404c8a62de3d14c80ac262c8e312ed4610640d43bc744b

  • SHA512

    db20b68cd97443ef8aabf7204b8590bc4945b45eef45e4c8a1ec6cfddb1a554e08f6f875bc915bdbdbc4b553b3e52a11d2da25dbff4ca870c591b62f0547576a

  • SSDEEP

    1536:THxlumK+oPpCnlB5XjZ5YHINO/AQh69UyibUqS:DumjoRCnjnGHPq91q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb86f59c8b5b2a861ea8759f75a42f7d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb86f59c8b5b2a861ea8759f75a42f7d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\eb86f59c8b5b2a861ea8759f75a42f7d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\eb86f59c8b5b2a861ea8759f75a42f7d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Users\Admin\AppData\Roaming\Nlakax.exe
        "C:\Users\Admin\AppData\Roaming\Nlakax.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Users\Admin\AppData\Roaming\Nlakax.exe
          "C:\Users\Admin\AppData\Roaming\Nlakax.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2360
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2380
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          1bb5b875f3f30c9c125f405079d61bd7

          SHA1

          21e0b01afe9bd8b8cddf1d644b1d91e2f63915ad

          SHA256

          bb7f2368555f3a6cf6803183e37d51bc0f2f9e23c6d8d9b00bf771f3622cfe4d

          SHA512

          4dc466bcb0255c5d9c981a2dffe2e2d2fe21450f3ecb165356d8f0498a57054f0ddb763ca25433bef097bf885d898d32399c9f58456a44ba932facaec36506f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          bc2ae81d393aa5cf6fab24e9052083e0

          SHA1

          d11822a2208fdccafb3a086679e0fb5f9a58bd95

          SHA256

          845d9da0043108267381d36c5d094821ca340ff05d8b919fefdc9080d036d012

          SHA512

          c626697c3435a7918bcfe31e59f82f57631f116c3531e86b92d8bafae8b7955712676d053cd621a705d3872d98883cb7a8f4f203ea6a057744a4d0d7950a25bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f0e83ab2b4e858a841f7ac8f95376df4

          SHA1

          1ae90481751c2538fd129cad76d4333b20de17cf

          SHA256

          b6010deb7f14aa437426f827c989b5fd04b7f57ed31cd6967eed3ac11728f130

          SHA512

          3f0dc00d83a687b05bd848537c5406a38faece9092335a6c6708b5f4866b2dcf988971c32fd0087fc6ce7de77ac578e49d50ab9ab827eb15b1a57e6a6487fad8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          12ab222506f55f61141fbe1e753170a9

          SHA1

          da17735df6a2a18aa9fb93f919c453cc0e94f17b

          SHA256

          d2810ef5ad718bb71962c338a74f9172462e3d69db18d003c38b330a59351790

          SHA512

          f9bda60539b2415f5236c4900d59fe2f8412d66063710b47a8c35106d2616d6d646db82765dd37df62d63ca301dce2e87f622a2fed25a00255a767dba34eee5e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d5617fcfbe1decf9ebdad2e9dd5591e3

          SHA1

          370c7b2da2b9a7fca73556268129c24eef92388b

          SHA256

          efdc0ba0245bd86bc75ae67a9054d091eb25d5a7a983c430cd091521ffbac21d

          SHA512

          855ffbc789f15bb4f9a0d206d5d4012348a2c1d82621649c0fd44833e535df59d136751bf9582aacc6d794cb7db902c465161a1c4c9d436131504b23853d474c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          808ae313e4bad265eed715d1cb2b7252

          SHA1

          3ec2f904fd6173dec697c3a509a7e90966a19c09

          SHA256

          e483d492f82368ca6be2fb49c26b0882d7cf016604b969a1f6e5956b0822db2a

          SHA512

          f5be5ad5f5fa15fbc82c1426244960eff211b02917fe82c8be762e157d340bfd5584a3f41d6c9377fc24c7485f143f1605bc04113f2e87934eed3e2e745e5605

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          363c8e21004f0696473d333249df87c6

          SHA1

          b9bda3d4007d857f77ada4c09205cf0562468ed9

          SHA256

          64fb2744e3947fa477d8da876aed22bc914559e0bbbf0ac67c42525f99abab2c

          SHA512

          854a1931238dd5424aa834ce2dd06d02f2fc2745ace8bcd5da5078da53d709105a3bf4437811bb9c04c709f2a4f478c855a513601030fa723eaa26b3ae8198cb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          eeae39aca577703fcb386eb417e372fa

          SHA1

          d4e060d2a557a7db0ec4d637008ce58b91d40b79

          SHA256

          ea463095aaa92065825bfe4fdb4947de0612e4299cadad183d129af4ab41dd2d

          SHA512

          4a5c4476b81f65357848fbe66f5717cc0fca51673a46a8606320457750fa35376e96fa08105f79a1c81084a9c1125c2bb0d0f62f5f05e162a767b9528e78bd14

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c279fa58e27dbbbe912d0b3f83f63229

          SHA1

          d659e760a23480f85f5cb19345fd29f63170bd43

          SHA256

          58aec774d6a34d94ddec254909b20914c62a9acfd54d479c6e35baad870882f1

          SHA512

          6238afa0f6003d82babe01bda775c99aea67afaea7aee2e033b5052431bac1791fd6a9b541496625dde9a21f5b1b61334760f7952d250b23f117d3a2c856feb2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ff7dca6eb8c26f7cb0e873ce51f235fb

          SHA1

          b44c4b3b44b2274f2988aee55de0bad9dd3eadff

          SHA256

          28facff4706bfa91ca7d35d53b3a487548692a5e2e0f7d1c56e4dbd5964c18e8

          SHA512

          8943593e4eccb1fb0213cba12a5ee95b8feef9b7eb279bcc33464c4b5f9cc7619498200f1c53dde5ffc43f4af092389908d31b3ba7879364cbc439ab6262b273

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0cf22396e352203252de20a3bd4ce54b

          SHA1

          6962f7a7de124dc09589a93c8ba43e547450b0a9

          SHA256

          54d3e949eb2fb9dc116f40ac919aca5df0f743c81907a567f816427deaa10af3

          SHA512

          9984a279d23626d9a84dc5d898018705819d046ff9242e4ebc13a173b1eff7406cfc8b6ec215621ab3586be230625793e5d70c29ec4b7904b48faa97a57c25f5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          00950debc0ab462da7088a79bbea5948

          SHA1

          5bba295a8cb88f243bc7d7223d2e973f925b481a

          SHA256

          051e4ec1da728101934430c540d6781fef1af9481dcdd4f5d2473855e87ac41c

          SHA512

          13332ab470585db4e4890c0d80abf505e1cb4c6ae8ae6c108e81d84398a2c3a0472a582ef2fe74b73ac36810af1f1f55105e9df2ae73ea3c73dd14060935fbbc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          82a2392c0579caf22ee663f69bac452a

          SHA1

          0cb9794ecda074c46e09c7662d3585f09077c1f9

          SHA256

          63e7423f5cfd269bf35e74962d289e2389b2f0a5728165ba4cdd2d2b859b230f

          SHA512

          9f897f429b6b31636787dcc28d754eeaff5eada8ae3139395923dcc5ea694114fd09fcd057dc1dc447576a4218bed5dee83201d2a7ad9a3916d2ad5b6ca6ddf1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3329f558dbe3f74fbfb159f892109ada

          SHA1

          f2af09c17c54e82cf00aeb788f53852fc24d3bdb

          SHA256

          bcd4038ed4ecef01702acd44460c768ba9bb50207adc5cf5a23f8ecb720f2548

          SHA512

          762b8a084c43f4dafdc5451967ef22a96f25b560af45c10cab854b7fd1dc3ea18448a71c7c420f9d60f904f9592277bf138deacd31c87ce2d8c4041402b40f33

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          273527e520bf0fb202952634c1e89968

          SHA1

          502e30e4b9d459878cc91aae4d2f7d3231634e15

          SHA256

          1eba1ecfe5c45f7b9e13759d8663dcb7bed7c23c13e7c80969a605decf1a4a23

          SHA512

          ff598b1488d6743f635c05cb1beac42cad131cf330dcd06588054bfbdacf478fac97832896b24446add7f10e95ed74e2c78e2926427eba582088469caecf2daf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          b28986f94105d523b2d986786bd6b730

          SHA1

          05d7aebe7118ccd3e26ad6ab67525bf9cb683c5a

          SHA256

          6bf749e1ad175782cac98c5d0456e208349e3a34762ec05c4da722545d72b122

          SHA512

          3fed4b16521118d442453e3039f4ad1541be35175a09d5f1c12f9c8520930d7f76ffb21fcefe24e04565b0be156819ec2090d5be15792f31b3eab527ba0bfc43

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2b164c548f7613a1c5eefda1b8d15861

          SHA1

          84f5810cdb19f8338c234569780aa164b32031fc

          SHA256

          20046c06fd6028a4f1775527e82154f976b8d5bcd1f2a6d0f81d70be281de22a

          SHA512

          e9783ae5b0b092eb61d9db2ff70fdab0bc2e17d99c5b435f5831ade1c7eac8df1963a1f8c89edbc4d3c8dfc38cb74a77d9228869a2f0ae87cea14c0efa60dec9

        • C:\Users\Admin\AppData\Local\Temp\Cab5E58.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar5F59.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • \Users\Admin\AppData\Roaming\Nlakax.exe

          Filesize

          77KB

          MD5

          eb86f59c8b5b2a861ea8759f75a42f7d

          SHA1

          ee76cd1b0a1c203c70581bdd7f5ef5c3fe2a4457

          SHA256

          d431868df67dd9926e404c8a62de3d14c80ac262c8e312ed4610640d43bc744b

          SHA512

          db20b68cd97443ef8aabf7204b8590bc4945b45eef45e4c8a1ec6cfddb1a554e08f6f875bc915bdbdbc4b553b3e52a11d2da25dbff4ca870c591b62f0547576a

        • memory/1908-0-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/1908-14-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2524-50-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2524-51-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2596-48-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2596-33-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2596-35-0x0000000000220000-0x0000000000246000-memory.dmp

          Filesize

          152KB

        • memory/2864-25-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-28-0x00000000003B0000-0x00000000003D6000-memory.dmp

          Filesize

          152KB

        • memory/2864-16-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-15-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-27-0x00000000003B0000-0x00000000003D6000-memory.dmp

          Filesize

          152KB

        • memory/2864-12-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2864-9-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-7-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-5-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-1-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2864-3-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB