Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 15:18

General

  • Target

    8add281f780c4c43a273f5bf06a68899_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    8add281f780c4c43a273f5bf06a68899

  • SHA1

    90f13fe5664c9bb8d5a406a463aea2626bca9256

  • SHA256

    c5023b12d245ac81de5b82fb9115f98ad404723fa1723549273a6142090ed687

  • SHA512

    7941b6a407c38c22b5dec92c94ff89c284c4a9f7d48027a10cbf713e18254c75a8cb2562e2ad5e6309adafdf9da5baa9f6f8ae73e30485c687dea7b87d1de129

  • SSDEEP

    24576:enSYbD5/sCReL1hMk97hhmOTDyLa1Rra:er5/s7iw7hhZDyW1Ru

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8add281f780c4c43a273f5bf06a68899_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8add281f780c4c43a273f5bf06a68899_JaffaCakes118.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" http://www.321wg.com
      2⤵
        PID:3036
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.321wg.com/
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      daff6173f6eb4f75fb1e05646acd8ae8

      SHA1

      dd08b8ec0d5c5ba4929aae81b776b9e72b148e37

      SHA256

      c5c1ec3120d38f1f2444081a5d59d9ffd9302da5c41ac0fa3441813fab1ac0e9

      SHA512

      fb0cb52b4cd524c93331414360e4f08aeaaf1033d8aef6dcb7903945b03752dfc30648b332d422d7eee302139daa8d1a465760a5cff8f39b5f04e52ce247dcc3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      083d199cfff1654ff338422936652ff0

      SHA1

      9ced7feda6c6e5287c04d848e1f7015ec5e143c8

      SHA256

      11cb492b423d05e9fd6c80b8abd2bf88750f059258e41b024bef0f9b3d86e802

      SHA512

      57458df1447176b2d9888d010fad5d14b9619bc29211a145c2437692eded94d501962998103d5c64db5e8eee045061677e3cc08568572cde9621ff897f7188f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      73f842301989171690f88328647c2749

      SHA1

      33a312e6f54a37d75d456b48a230cc40fc5c34cb

      SHA256

      68e74acb3ee9204d127f5e5991e6601a081d84baa1457fb0c5fc84fded2eb566

      SHA512

      8fb92d068a7f8838030243d51c24c018379086b9616920f93b1d46f053c52657183ce10d1913442a3fa98491d6b0784385f93437180e6d83b9bb4f3315b6a7d4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      575f1a8eb697ce34fdbee8f833f2f39e

      SHA1

      681817b5b12fd9700c353d589467149caf475654

      SHA256

      dadb33b0b3bf8f3c401fca9491563f92a7dbccc4094cf8a0ad486dd0eb3cc3ef

      SHA512

      47a050ecdebc8bf8296bb86283988079bbd9c91299f7102c97516dc29975ff75d6ac5a80ffb7ecdbc23afc61235b62cd4145627cf09e569a131b427cebb37979

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      02f822a55b6a0b518455cf45017474f0

      SHA1

      fea619edf5bc4c235d2340fe096697c49c88be8e

      SHA256

      dc6bb9bdddca0abfddde6c36298b9b5f8bd54f9c732f9a59566d787ffd7360e3

      SHA512

      19aafcc0ed39aa29ec515f522f1657409ada9c3b3afa65d16c1d808a7103956e121924678be64bf7158a564f1083a4adce6c4f5d9507ddb75f363e4ee9de38e2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      024783fba74a819c2325aa799a3029c2

      SHA1

      d655f5b151552ba925bfcce56ac863d5809a5bf9

      SHA256

      90bf85998c3f07687b809244fec25a61f513c6af1c7ff87d1e27cdc0a8324cde

      SHA512

      a771e1ec37126675716c84b46ed00660b24654a5ef16959b014abebe42f8b88b4217ddd1015b1c23e7a2bf513027b01993c0656b8f467dda9c22c51472bc66ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      027e08eaefc9a49380f46db51ccc2e90

      SHA1

      6426208b02ad35c50827874ceb8a9e7cd618a959

      SHA256

      2a1d969c62cbe74a6579822facf9516beaf182e17fdb7847890ecb4f73ff0cc4

      SHA512

      988133dcfd4717f75341207cf1a6ec9a33a9688569c2a5c3993b2a867293b389353cfbdabed25c4ef6d7f417cecc3dbc4832f22db766c2b9322ab491d475ed02

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      f7703dbaef75e9a1c9fbb5425e574e6e

      SHA1

      505fbe21af4f524f7d8d79214171ad59aa4ac587

      SHA256

      6bb22ad79dad7f765028a25ff91da5aa8ee65db13218e3e2ba7f23490a3892b3

      SHA512

      6fa4a6ce6a0ee7565383de4961d96b6b379e7b85cebeb1aba7de442260272e3c9527ba7824e0cc64aba90fef68f935b944d288abd28660d41fe71d4c4b05066d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      2ce772156dfa317499be97a4042ea2b6

      SHA1

      4220bb4147d4c8e991bfdf3491b99b9b600d2d2d

      SHA256

      87fe8e9fd3535b01b2d42a95623686c25009f2564174bbc24e1fe593070a2563

      SHA512

      af0251fef7e5752bd145db91e9f866b86d330714b8782e874786f0e0d7cee42a55ff9781e1036f208d6620f06f28b2f9663f8027cdf73726915da762669a50c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      a482361e8233e1bee6e164e37fb76bd2

      SHA1

      acfacf29e33924dc0ddddcea703fa346c8d9c298

      SHA256

      b6860fe31730f78f11be30e6bcf630ca59d6cca723bf10b18b028053d91e1447

      SHA512

      4be7d6535313ef4a695914ff8869c4e2cde3a7791bdebaafef43d13b7a82e1f3d7f07999a38fe2d090855fda0d99ace0614044b2873d1cc1cf740a0cfc63ac53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      c2a0f57308d96687e67c3eb23a51fe2c

      SHA1

      e71cdf6ff3711e3261a23225ee45caf6a2831ebc

      SHA256

      f01db99a3ce163927511f5a261442b04e7494eb3d4001536252ebead0f5ce24b

      SHA512

      c806009daee97fcccf2805b3ad893944f334558d50cfd5930e156a7c8565d83870328253908fb99d9351e288658cd0ce6d844bd460cc5b74927f3eb0b127e60a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      3854d283a90182aa1ad45dbe997cd0c2

      SHA1

      69024abd1212e8ff624e6f401bd808f52122095d

      SHA256

      7bff549596a7ba98506e74d4cd84a5b8ab5cc5fe3044351a8d995ef3b855af7c

      SHA512

      a13cc2f3fb7cfc02b0c3c922d483c18c37163dfed248e449bd420a5f703db74ca28906ab460f92243a1e2e2146fbd6727b4427559e86e951f1ac6e4b14927e13

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      0cb8c6f11cadc038c3245cd87699eda5

      SHA1

      ba6945b4696cffb2738c4c3528a56dfda64dc948

      SHA256

      8bb64173332821b001b29057b964ddb19363cc86c0200b183021987b862d2036

      SHA512

      bc8115d51cae0a8ee316135d3fa33fabc443219b23c12e1864356b4a2da77f4a0bb1cc7d212b60e319316ba1fb9ba905bc8c19359ff435d662afce57d61698e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      5348169bb477444d87ba4397dc1d0d96

      SHA1

      728de61c6cbd9b8550847de1a246d7ab2a3b3e0c

      SHA256

      4d8f78cc4049fe91d23f5073e7a2933ba93fd9e0662041a46b4abac09af6b0b0

      SHA512

      a1475d65085e6fc4cfe3718dacc99433806e21cae8f1f7ffdb3f9992ea861041dbd7660e3a1a950e64a784f5e34f536631d3ba1c164ee6b0ba66ddf71b812327

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      47c9727c93abaa11dd5b959781547f24

      SHA1

      6f9deac85375cbb8d21d8df22d31b28831afaf96

      SHA256

      a163a84dddad6a68beb777dc400fa856ae7b64d2f8b6407421fc68081e469f1a

      SHA512

      15ed7cd611502b7fc40180abd1e87c62aa58f83d10337e46f535b9c15ee38522d0fc9aa524f679cd57c226ceb61c75a464a60e311681b07e98cc56074ee81c46

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      d7121c2c7fa273fa1a15aa04f2bc990d

      SHA1

      d4e29bb93bd98a04fb7c17f9f5b26b2e7110988d

      SHA256

      597c4d9d4f8f23a7c703398bfbd8aaf8df447baae34388c59d4fee910960044f

      SHA512

      e187e8f1a5b31cd93ccd1526f25c627acb52f742fc2cc93d2c7e1d00b4caaf598c5a9bd49472de67be8a50f286bfde89a3ef77f1f0b7bd03e2c20a5cfa45d2df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      bfdeb8f405ee4b39c43372849879031b

      SHA1

      ab5b16fa515dc54a5fa2690da9c74c0b74059430

      SHA256

      f3a4c6e07c8b7d559a51bd0dfd5d8605af5dc6b12227a388bbab1b6292943662

      SHA512

      8fd2cead2eb127a18d4751d700f779c38503c9ed5582d96dd7a6b53c9bc4f5d8057b4c62cc96e6068ecf2961aedb851866ea74c981f8c0bed7692f3e11ab03c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      d54f2ede513fd50b60f77c738df953f8

      SHA1

      a41094dcd3f4c77f642f0383a82d103919a318e4

      SHA256

      296fd078e12ae4e599b695daff3c48435b63711912b198f64d601bd7134f4828

      SHA512

      a2960a394d5da36b167ecf47ec0501177077aee6cfd929fa17e9f19af356c2360f7420cfdd3b488f7102a304bf975c03575a9ef490b2054f141895f7d4d880c5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      7ccf8b00c29ad4df1c48fcd312a9313d

      SHA1

      a764d6eb81dce99f9cd272599b00a3cabdb17fa7

      SHA256

      8d0eac71f4ffc4a85e67cf8456652aef16d291e2857985899b2256533da15d0e

      SHA512

      44cb98f97d946ffc4f43999fd0c1dade4af1a1ec1fbe346e97e3b21c0d7ab8c889480ddb3fb1cbf2b682a3479a368095197baf6af5322004a7494f9223500ce7

    • C:\Users\Admin\AppData\Local\Temp\Cab565C.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar572F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/1796-0-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB