Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 05:54

General

  • Target

    6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    6240298911fb95e6d3cb19a18fe71554

  • SHA1

    64c1b608e110e0be9db8f811d8d0df2485bb2cce

  • SHA256

    b4de6c8d557dacbec32c0af0e223c0f5a5c9d0ac80b44e165a3805678f7070c5

  • SHA512

    874b0caba849b08e2067db53101366f51567182e56639b3be6f17ebb1c8248a924e0d2486cac0e8fe63ac8843f3dabe97109f7ce028f1dd16300537ed14832f6

  • SSDEEP

    1536:6oLDYsacy7mHMowHjXJtB5i7zxp3p9JtnOndzikh:6oPyys5jXJtB5iRp3Odnh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    PID:3008
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2440
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:472068 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    51d9311907a6d37ab5d5ca5c5a4364fa

    SHA1

    bcc32813d4dc90be31adac28ebb04de4aa8eb99f

    SHA256

    16c12ced42b0aa2c27b7c1234cc2915a21ab5a10954941f1c01fdc37f93db2fa

    SHA512

    591760a9b3d6dc70c7077eeee5e717ca21479007c4537fd9304d975d9dca237162f2e4388b9bbc3083724a5624aa6626f8a4d53de150857c07e74b150c725f8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7fed999d524b2b591783bc19bce8d9f5

    SHA1

    b7f4c321dacd857c3cb749332b495b6dbdb25f1f

    SHA256

    2231cc9c702d1ce1326bdde0fc390ef031aee1a0dc30225af9e2d111dce42b3b

    SHA512

    8e6d9726ce9f2da69d0303e1337443d46ffde5892e7257f3d842b05cef23ea5520800b42cfe0880bd8db45a8361e86586f68f72f1577c39300b5c73bda6ae3fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2d02cb0af2d87047dec0ae53b6b47fc1

    SHA1

    06204398d3eb28bfb218410b3419b88cba05b02d

    SHA256

    9e30d6566f38ba15a8428a11a77bf9ea8bd9d4252357a98c07b10adc7dee9e6e

    SHA512

    a9610570b312ca40c2fec47c5e6aeaabd3b87c8376ccfb68fb69f11988f789e6a1b2b469dea7e9e30993ee338400d61f32c7451cd6f3fbd0be522b9a789b31ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb2aec66aa3c9e416178f3579b33d8e0

    SHA1

    b344497093b06fb1538b5a6d33e03fccbc00b01e

    SHA256

    2f7e1beb2d9fcc37c44fd89e8a0c838a8c6979c02ca7ce8a87edf648c96ed92d

    SHA512

    45629ad50d5b3a216182d957039071ba64f452a3eba6c8f02fe4205095e44db631d4b80701ef3996a5b03a2def9abc572a860a76b6692066a6e6885eb12fa67e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9493815401de9c0a2c80c43d39f3bdc

    SHA1

    1f76e21332c10acca1fe7fda9b622dc0286cfc84

    SHA256

    58273761192c09fa88b48d0bc73b8c521762b3cb87969bf4123a15bdf2b52687

    SHA512

    36bb13292d1a9cd35afa9a996d42bd0a6850c125ae47939a4e84417eff5e53d21794620422c54d85dbe9091be657321af57b8d93587fc6a2abe9cffae17f3152

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50dbf86d0ab189a703c7366b685b4e41

    SHA1

    d4de1f52001343f993d75a40e2fa1a99798926e3

    SHA256

    ba66f87e4caa45230e8f4d6b436c78f9adfc21d2a76857a66ba2164b684f086b

    SHA512

    9b07a0c02f9d39e184f76f30147ff71344510e8ef3167cc85ac3498acdc28c28067fd96cade6b86649e00c4c920a4ec9e7a7f0ec74260efe2c1e292f358a7d3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    227413e65b2dc56c6436c289455e07fc

    SHA1

    6f225c0d2a17c62472b59fe4c0e5034013e05bf3

    SHA256

    fd5cba24bcb34b397a180b309de29528c25d15f4c2de57510c913622e3ce89c7

    SHA512

    49429ae71cbe487157db03da648a711b7d5c1207953f9c8951d25f05594460faa9f746e47bdedf45f31f5c9f7d21f3e58637c73ce9836cb12b9e1414ae12a713

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f3b62b9d4aa361ddeb55509dd8237fd

    SHA1

    b7fada033aa9b27196a576ced0af8fe8a585fe52

    SHA256

    c770847b3288612a4799a30b3b52da8ac059b7e15aa6d350ea0bb57a35aab570

    SHA512

    acf64bec4d1aea7ba118c3b8e74cea10bdb91b937be94d39a0bc8907a06a39f0643118b1504efb6e366aa55e8244febb7f83ad3109ea6f26287b42884ab1539d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cede0b2c5ebf3c68afbe7029e0069cbf

    SHA1

    8e8b38c8cee151754eb1a85dacbb1708ff5cf513

    SHA256

    49cb0e857d70314dfa9afe6624c221ea4cdf21267f361263e631c4132cdcb0d8

    SHA512

    5bbf192cb7475dabb866eedd5e8a5ee787172f853f3884db62d67c3b0dfca060d3c7f33387c8f1dd6f055fade14c0414005ee324e1d057fefef71aac561ad3c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    895f8eb7d10ad39a09b03e21b3504322

    SHA1

    fdd4422806fa70133ca12ae804b679d2d237eb63

    SHA256

    a725e4ec05d1e2548bb423667bc975599c080e01e14379a6f7272839c8011ea8

    SHA512

    3d67c01c0dd8be11ecf181746f139d09fc156a4b27d638da33c699973653c46dc48afcfd54180d0e220198062c5abd80a5a98fb405571df9baffdb00e610399f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0acf2c7519b1ee210d363bec4bac591b

    SHA1

    5b8786dd5106972f34212811c9372ad1c16e0c22

    SHA256

    c505a9c8c3e995200b36f0d3c6127ef991f1d158e302b8a89d27527a52de60ed

    SHA512

    6e963ef341ffe2c8610463160add6b16b79c0343dd4aa978c2c4d8d070e3c586c8416024f43415b2d1fecd26a315bffef92bcc9b33f388967f46f5be8131aa09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c05661eeb1b7eb4a04678df269bf1a5

    SHA1

    51c22f4ebc91bc004d7cacbf61e9841ddf59efd2

    SHA256

    ce8fd638e8b6407071264ec58ff3ab95cd9dc4f1639f5fcd6e3b3f2ccd4a8f1e

    SHA512

    917dde9a68c44c45706a57d33550e755b0c04f23ef7eff154d30e1e0755d454c2a29c862ee6a7d935ad1d566cfbfa7a4e988d3b008dbd54c7001f88bbccaaecf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8f4bc5e1ac7521b6a65d46ecb3c40dc0

    SHA1

    c1883e3421ac2fc8ad67b99505aea0024c934575

    SHA256

    7701f3b6d7442cdb8d2e1abdd8348aebac7437753851d1e1fe5ce8d25605abf4

    SHA512

    1a342289a226249c3405f08d82462910fff5d9fa9a3b02aee584e0e89bd2fb9c0a812fe86b2c281c8bc0bdcb4eb2827151af8f404157ccbe12fe603e5490d9ae

  • C:\Users\Admin\AppData\Local\Temp\Cab3861.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar38F0.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar3956.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\nst2271.tmp\inetc.dll

    Filesize

    21KB

    MD5

    d7a3fa6a6c738b4a3c40d5602af20b08

    SHA1

    34fc75d97f640609cb6cadb001da2cb2c0b3538a

    SHA256

    67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e

    SHA512

    75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934

  • \Users\Admin\AppData\Local\Temp\nst2271.tmp\nsWeb.dll

    Filesize

    8KB

    MD5

    84bcf3c71e70d5a6e9dc07d70466bdc3

    SHA1

    31603a1afc2d767a3392d363ff61533beaa25359

    SHA256

    7d4da7469d00e98f863b78caece3f2b753e26d7ce0ca9916c0802c35d7d22bcf

    SHA512

    61aefa3c22d2f66053f568a4cc3a5fc1cf9deb514213b550e5182edcecd88fadf0cb78e7a593e6d4b7261ed1238e7693f1d38170c84a68baf4943c3b9584d48e

  • memory/3008-31-0x00000000039C0000-0x00000000039C2000-memory.dmp

    Filesize

    8KB