Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 06:05

General

  • Target

    69fa6e6244cab83f12eb64b8989e5409_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    69fa6e6244cab83f12eb64b8989e5409

  • SHA1

    3a6432d9b00e232303a8cdc45f96946234d85409

  • SHA256

    3f3ef1996ee8486a47da1d8167bc78c295ce9c250b4ce4aa49cd53c94c7b2393

  • SHA512

    9bc7b069d85f8d0dac795a45f4801c458dc44c96280a0fc94aede318a01470614caa4feac2283b03eb7252fe017d485fb919a3375c6186927db471a6f6228840

  • SSDEEP

    12288:YsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQd:zV4W8hqBYgnBLfVqx1WjkE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69fa6e6244cab83f12eb64b8989e5409_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69fa6e6244cab83f12eb64b8989e5409_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchfff.com/?source=Bing&uid=771201f5-36c9-4a03-904c-14a2c58c2b2c&uc=20180116&ap=appfocus29&i_id=forms__1.30
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2732
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\69fa6e6244cab83f12eb64b8989e5409_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\69fa6e6244cab83f12eb64b8989e5409_JaffaCakes118.exe" EXIT
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\SysWOW64\PING.EXE
        PING 1.1.1.1 -n 1 -w 1000
        3⤵
        • Runs ping.exe
        PID:1940

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    764cacdc7b1e0aa3016852cad7170bb2

    SHA1

    8347cd054abe8bfb1d2c7b99dd6e629122af46cc

    SHA256

    dce5d1245fabfaf673475ab1fb51a1bd9237be32c13ab407c9b0da8987b07dab

    SHA512

    512e11b7674504091f38cd0784adda7d3f682f8c7f835efdf9a47b3db5925747429f3c19281b8de24f92b4b848aa776c57221c2af22e6ed59b07e4bc3d616ce2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a97811fec8f658bb4871285d2e4a0be0

    SHA1

    a804e49813f63c7fc2531f4d8621a14eb0f6d804

    SHA256

    38a4d0ffc17242e6f67dd02dd0fb856bf9fcf048302930f56fdd8debece178bf

    SHA512

    606b6202629fb11cc9482840ccc944850bfceacf7dcdf1c6d664c51da9d7493b3034b63ae636b77219a0865e2df359de3c3563b4351ca30e0e7dee4367b06c6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7fe6eb3a0892c713e4ad81448995fb19

    SHA1

    54ed3a4fe316e7cfb96bc2be0f5b582fc394aa95

    SHA256

    7fa027de7915831bca8747fde325ae8bdcc39d0aa200a7cf809e704de83344e3

    SHA512

    c3fce91fc2cff7a612d2327397afb7faa8f142cb770e1134893a6fcaacdb015311d265f7be8e4b1881370c93f7368bee5f2841dc9971cface00849ba1449d0f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    4f9f3fc869f5e8566102f4875824ceed

    SHA1

    02015fe16515324fa3f7f4d508fee3de756bc2b7

    SHA256

    e9a26b6ffcb72134b58d335e39e17c76c5f9a88e9eb6948e926172a0a92facbb

    SHA512

    740236dbf5421df3ee91462babde952f610dd1c9a8dc80cf4702dc28e51f1965959c6b8853604a57302bd6c47009215f3943c86e6c94c2b17de6496084dc08cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3982488498db83e6f7e64010de8429b6

    SHA1

    636227e565058c45de560ad0c6c764cda26a2f79

    SHA256

    b019351be850f3c94b7cc6491b1abbc2f13b7e9de5c5f3f8dae0c9d70d1c3b88

    SHA512

    b03492e061dcfeabd525f9c8f5cb04b7267b2a7c097ea2b130ae16dfde4a2b7d83027095dbea3ee158ef2ded0f5dbbf81cbdb9bec28f51e3ad46c8064aa54d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    6aea563addff2ddc4802c5afab82bc10

    SHA1

    b27bd50df1ca3ffcf7eccf579ccb2691910573b6

    SHA256

    6293008054c152157d0d25705531c7683c9da0d0fbc0fed3369924f77cd7ee36

    SHA512

    0fcedc534e95cd6565ec3cf5be9ce74184e455643396e9f1b4a1295532a3709aa5c51ec0fe29bc557c09468746df77ee3411680ceb1635bfe4aba78f47230d53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    8770a77782b454c73e7b56bd3507b535

    SHA1

    267eaa4bc7c45e400bbf239a093195dcce06c972

    SHA256

    09c31192d9e797ac393586b4ded73270f47e2838e35ddc80fb2394549435f952

    SHA512

    6f1e82f4fb21fb6070ec922e5a1d3d361455a22ad0a4c28ff9f6d04e31b85ffce0b9720bbd1d9db478ce4d20d1fdde2d2b0acff4c85c93c503929913924b39f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    452be3a862a6979b8de852ba08f6f267

    SHA1

    e977af632fe3c008ffd7f945c11f9d2057a47297

    SHA256

    47c4f4e1452c0873d58c5036c0e389b3e99360f6670b90c86d58d99fa3bdab56

    SHA512

    5b582c1c0807019f016bff8e0ae18a3e0b9c566bbee46223f8e0392005ba5e5595338ab66da754c55cbf38faa8424ea50b5ebd9f68c8471b365bf3dfb6e2d5fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7a180a0f9def79ceaff22c0d9aaa414e

    SHA1

    7fa69718694656e681e9ff8ec3f81073a81bf8d1

    SHA256

    4e3748d732fd78a8b91c0f7d8c54d28dc47733c6ee2528e22e5a0a4a3942c9ea

    SHA512

    6965037665feabf9caec4d606abee08aa1e7d0c901ebbc3bc007a8611dad94e17fb4b305650be2b95488c919693cc0ed7fa10c6d165cdc82109cbb809c90fb25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c3dbc595e6633bdcbe4c845296795374

    SHA1

    45915a18e5d0e1b4bba7de79cedc2ae2ff2b42ba

    SHA256

    847dd4f17581386bd4d7470dedd2c4ebd09f57a78ae98170b9c64cd233f53641

    SHA512

    609009109973b749b35dcad3b7b82d1fc01caf103bb657bc7bfdbe84721cf3c32da43e97bb9051b19fbf75f8610003f9acbceb059aedad523283159860af6135

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bacab303286a6af120ffeb1d72450aca

    SHA1

    69948f8c0afd2361d1ebb75fc72d90f11adde5a4

    SHA256

    1121971b977693e3ee96664d26424fab0566d10abf58511e3c7f1ad843db7b39

    SHA512

    0059d8741c8b42ba4a548344c528152a098634cdb52b2280967f5af0c97fa38b3e1306520dddf7e89c40985481758c74d715b6e342c4f9ece24c8d34c6eab5ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c272954dac2faaa650e503d98332a1df

    SHA1

    fe0b68cd68ff8b96cc29ef2d83ef0e1699e651d3

    SHA256

    f3a5e1daecc468a25548be41d6fa7cbb80ae57170a1d5a420864f42c8be694a0

    SHA512

    14ac8b7aab26369d86e32323041c5a4b2c8a5e438bd851f5b5f0d8a1c4a48efafe11132ad15da93c052e36836ded287ed283506318730af7dc9a4150106b5b30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ad886fb18f3a115fffe7a1f6663b8ded

    SHA1

    5bd043fbbc3e142e6a262218888fb8ea6f6621a2

    SHA256

    567d95695cbfb341e9770db03ba1f319d8db40495671f70eb1372b590e4f05f4

    SHA512

    f42750ab792f7809bf546e07508274ed8c25f5064516f400cc7cd1eb44b5d74a1654936c3dc2eca4f39d7f5992b442a71e8b2100169c6ab140ecc9451a32f78a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3235b809c8dec595ded13b16361b53b7

    SHA1

    7f692be07e7f36a26bee80af5bce7f42a7937798

    SHA256

    c5a5779b00390a8d721ceee668764aeb4f5f7b17cd4746e73e3b3fe5f7c529f9

    SHA512

    dbd95ed6ebc7eea2f25a9bfa762163f51b0ac59c6bc1b0a7a3783869abf619a19347a702d0fc60f8cef0e5cec6bf625c3c8679ffc6eab6991a02e55179ef6b33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a37dfd63b7062d223ecc028e0fc0d5c7

    SHA1

    b65e83b989c998a4528e458b5681fcfeb5d7a687

    SHA256

    b7a5b2aeba1bd2b3fbb2e699014eb3ffb2debfbe9b96c2da1da84956e14c99d8

    SHA512

    173e29588d7743f21d852af7e061622a8d273a5229abbae9fc3831ce154cc474b9e5bc995c95644c4c7b464874f384e8a8413abf8a3dc78455b290c6d157a7da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a21985403aac5c514ab1880f8a362c9d

    SHA1

    6c3c760d40ee8a33737952c9b263a3531c24336e

    SHA256

    c4f33e90eb58e3ff0ea834639e0addc34999f90e7c63d6da46660d929948d955

    SHA512

    38ef1fd5eb4b14600afdfeb89e8820511748b86135f579eba3b9361a91c73a8d10978a57ca11a05f7913ff08c19102a815c9b3a0f76797a176240a3bd692f35e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    3b82ca9ceacd0929edce8381377722b6

    SHA1

    acada2fc822086b14f5a8175e346a1d20aa38cb9

    SHA256

    652f5b94ab594f89b134c56fa82c6761439d236077260086da94444dbc93f67d

    SHA512

    ba3ad6ed43e651a2533edfd9c44e55f53a01b0a260512428fe0d9b6568a7353cbfaac922d856eea18738ce53f023834e7c5e4f2a2040cef4b1cc36bb03bbc421

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9ba23e040e51627bd76fe615a454e722

    SHA1

    ff348fbbccdec0051735bc44afd12043b7404c8b

    SHA256

    b6f292e23b97ce7a5adec687b37032efc9bec2309fb13c6b88c958759abb9433

    SHA512

    451be8d785769c6ec9c319be3819b390ad80ccd1abf2094661b00fe666d136dc813c6fc60f11434d255e00e455381947dadbd42ecac4ea715f28c1435600be45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    65d6565bcf826cbd1e137bf79b2d3f97

    SHA1

    065ce8ae0420419b0248c582fde7d5822dd05617

    SHA256

    3ab1adce99fa927dda47dcd79223e2dcaab5a08a8dd20e0c0d7fbc307647f116

    SHA512

    a6d4dacdff87513cfa3b73d5a8fa630170faf5d70b03b28688c3e0ec145ab40256b1ddf477424915f2e469e04cca84fb5330996708fb17dee77ac9b2e6ddcaaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    682306179db1e3a50f4f93bba3f9096c

    SHA1

    f479ff0af6b28a75c3eab7e701794eb539abc5f3

    SHA256

    6bcf4f866c8145e6564277f77d9b1e6eaa65202dd5260455b9ea2d2b25c47544

    SHA512

    c5dd4b564222055c25870d1ff1df9d2fc2a8e04883544ebb747804443e233be7c541e17895afa91c12e2ad73f51a217d61d5cae98744dc6bcb81809d72b8d802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    feee3bf47d6a79c83e5cdd0faf55f4d1

    SHA1

    3491057dddbe2227acb4a65ec6d5152a9cff115b

    SHA256

    10f1e7b8238d68c9ebd6c116f4428b9fd9bbb398ca6284337fe56eef0e8fb6cf

    SHA512

    eef54092ac0b63d3b9f81857c35f2a6f6199bf1085a4e0df2c7e07c43499a5c0bdbb87989dea834b2ecf983cd040a35272359368bcf7273f8201f811448b8cde

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7my5tn\imagestore.dat
    Filesize

    15KB

    MD5

    9674850390f27121bd450f2815d3fd33

    SHA1

    ce593544421344548c22ce4ebf58f0c5a87ae877

    SHA256

    fb85dcc0cb1f350b6d9fe5cbb784e0855c92f284bd4642397376703b8696070e

    SHA512

    947a609a2b169db070825ea054bed5d777ab2b46458e26646d078da8f5e29570691a5a10bed462768a1a42c82e83905d3726f7bab5ea9189d07e9f2cc1ac3fb2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\52G8PVLC\sedo_logo[1].png
    Filesize

    14KB

    MD5

    def00c11b1596db4efee6a9fbe64fc27

    SHA1

    bd298981e6d8d7e4ffa18abcf687041f4246672d

    SHA256

    95c427fa3143b1896faf42a6406686ce7602cb39052081bb32d12b51c9e047e4

    SHA512

    c056e95dbfa1aab3a50dff18c6d577dbffea72c93316ffc53b6b7aa41dcc7707a810d563894589a7305de0b76610f88150b2034670de368773b2b356f14ad30f

  • C:\Users\Admin\AppData\Local\Temp\Cab1354.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1386.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\K0JA02LV.txt
    Filesize

    152B

    MD5

    cc4b8b5087066856dece7275d763dc16

    SHA1

    15b2bcb3b00e27b63ad5f443cad2a225dd18b911

    SHA256

    7585a34cf04bb97f1942dd02048672cc0cad414f33c3628d7327457dff882976

    SHA512

    4b8f038af19752e9a29d5a7129be88fcad47ef563d7052184a3ff20a9744299d86437f7a6f52b86599f2178d1682059b9cd54425142c721757312c8234051057