Analysis

  • max time kernel
    144s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 15:28

General

  • Target

    0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    0749234ccba292fdeee26c8d856ed525

  • SHA1

    39c7c05fcbbe01ce1214c95da7d58388dacc5114

  • SHA256

    47da5dbe445b9a0bc7e0f48d9ca46ffc26f978096b8d68addd0b0a423cfc9989

  • SHA512

    d331dbd52f46882e359a7cc67c24d82900d2a8bedcdfdf555ee71851f6247c4a31d605bd187b234f3adaca687c1047c5d6b3624be307676a0d912070053c36d3

  • SSDEEP

    3072:9HkTo7cHvXq/rh0aLQ7uEFMyI5rzgMmZv3Atinc/JFdvqLSn:eTjPXq/yaUKUMJrzgdHA

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3060
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20598cc1c9ea5e6cc05a6d123938d524

    SHA1

    a5d50a87b59a054ff4f58d1f178a1806c3f4756a

    SHA256

    5beeae63b70d9228e3d336be633ee779559061b6ed6b500fc58fadbc6dbcbbc5

    SHA512

    0c03198bbe77350d714601a1f0c07c6472dd37ea2c34e32ef7def11d87d37dd6df5d9fc0917b94a330bea5915496ed3a8786696a12f79abe1b952ba808fd34c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7b90442a228eb225cc8ddb306b40815

    SHA1

    de9994e0842e599d5a01ba98d76845de8c09e58b

    SHA256

    377cb369742ff86345d9668a4bd76c8ca55776e96c152148b0dd3a5bfd5b5a59

    SHA512

    02652d418c723e86f78e0dec0ea94bd95095faba02bf9fbc913a64dc1ebcffd627db3ae25cfaf32dd0ff64f8e2bc94f65f36de4615da6b3927e5a25f0d86fb9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7ad57e04212f4aad378d6d5c8b68106

    SHA1

    50bb77b2152a9663d54c3511db81399841e40f52

    SHA256

    bc00a80402c5870e2059055f6e7028687d00e94e198cc1d581140b3876118d15

    SHA512

    0b047e70a2c6f772c5738b31207315aee301966ba0dce4e97f926963557fd6b21892319664155832b750bde26938451e723fa1ca690e690825a9f71245a62ad1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58dd2e3863fd6cfa7ddf30b15a820537

    SHA1

    41751a6e0c022db4f50d9e95d9d6d8e35dcbcb83

    SHA256

    0f2ce318b4be56c2986b0f4401726caa4655af2db301e43b35a538b2970593fc

    SHA512

    7be19b6d9bfd360623aff25b60700b65934bdd369e27b712b490608aa6a1f458057a8d9a96deb1f864c1f53579f86b812abe1f8acbe65bb3af3c53db736560dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52216cbc9dd27c868ee9fc0cdeada290

    SHA1

    c5c1f80d2b51d61be9889932588844a506b0c86c

    SHA256

    06256191183e7bcd2b5b197e04f8589c69d4c1d029d57444c911b3c7502b2134

    SHA512

    777a2f2caa47c207a17500304815b52b10aa67ddb0dd903f7f3d0f51a44dfa89e9070f591819df2e3f73973d2ba1282066c4d09e458f87622415da0e068a3759

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc71145fbe14c1f77e70b1587c8b92cc

    SHA1

    985cd94911c2496d67ac9e20f1351d890a0f34b6

    SHA256

    302073d6c429ac426064c3e75fbb2f3e5501424fa48b4247f630f71ae2389252

    SHA512

    6a4b269929f071b0744f5cfa4c4416223c833440f50ba64278f57eae6d7f1fc427f9deb43e138bb743b89de0eb8e6f8f43bb1f332edaa11ddb8c7a83686efb5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92af2741a74fd18204f1a3863cf97c37

    SHA1

    b4c98b6f8b7719ddffdbc80102e00f03b8b65d7b

    SHA256

    40284c46deb35844a81b560764c6da39d4554fa0f3b5149a84869edf79f25c85

    SHA512

    925ccfc2254079cc5aa732b32073cf8ac86ff714674f7d14ded343251f1310d6362bc0e7107d8050b0ba6f18d1ec656d122b0f3cdb5270b24b4232ffd7b6c48a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    449c4b71b06c46176065aaf992c2117d

    SHA1

    767a8f26bbf3219f1439ad85f3dad1100fd5d671

    SHA256

    0cfb5e41e5a2b7a1b64b45d0f4b12223db878ae844d3e0828944d3f9555ce42c

    SHA512

    a1590089d31a63091aeea4f55607c599ec1c4a9293e651896d359fbcab0c573b1d6b4059d29e347b2b0c5f8fc82e1e27dd7d14bfb06ed9fa68c0af1da83844f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6774adf9c42e70e38f21b49bba6ee6c

    SHA1

    57dd73e229e2aea4e9315098b34ffd6c291de9f7

    SHA256

    8bc088ad318ca83eca1f66f21bd7ff4ab8be24d8faea4f45e440a5f40c7d407e

    SHA512

    6121880230960fe70df07e932a67adc10d89122becf59c6e7a13c1a6595fafba1d4a310d0c4482df60ed507cd9851c65e70047f1d89c0187a7c2b8df5acee060

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca621393b96e4044e85fe95668b97f9a

    SHA1

    7983b92933f28710d72aee819eab9aade6bfb8aa

    SHA256

    bec83d43ab26e298cc7e4a9255f12cbcf0cfce236b2c1fe55f5e5041efd78760

    SHA512

    327d831971abdb0f4a3930d20518e1dce9b1cedb49996ac76b7fb8f37bee350ca95f85b71c6702cd5d6e368c1ad38ea986a1577c7e02397348ccee34074b637a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee6e6c03cad46d183d04ae05441c64d3

    SHA1

    fad1e38c7e0e9b718d39a67684d319da159de150

    SHA256

    e20e95c93cbc319ff962117712b6673f1dca5c0e6e4d04fa790b8fd706d4ce6c

    SHA512

    928cb6dd31ed34f4df0d3635d2a4875c21150500729f6f9d2e9711efacd6e1684b8a02cbadf670a9ab2728f327b5176938b40dee7498837159be7badaffcb1c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eb1e91e2f34320a0e28c37f24afb8b0

    SHA1

    88e1604605e56556e54fc804baad3f2ae0cb9aa3

    SHA256

    17fb96fa092e3572a68b4e3bdc2acc61627f0484117ee8f2568b060d1be6f999

    SHA512

    aa5e29dc62b3a4f90d1ddfcba8400cceae500a6b3b9398ecbdc194a235886b2e0dd4fe47e49b420aadedddf2b5dd4f6619cd402b80847db2da4a43a40f7d507e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41825f6c3d26eec61e3a40f4e93d44f3

    SHA1

    0adc6084c1eced20143c889fcfbe2055238d7f9c

    SHA256

    c52f69984d5ffd37758aaa850f3916a76e03bd2fc38a1e760ba25c97f2579b52

    SHA512

    bd3ca7c287ad302b378b4ea664c12e845bdda280b70d81db32b19a48423bc1ec358a72adba556d0f1e9b8dfe62aef8a3e160740057e308b7f49d8c2ced985d23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    273bfe59f95af8cb26e66f7b55b87b2a

    SHA1

    96c89937fc3206b67da7faa0cf5cce3db8cc5257

    SHA256

    1b8bf4ef40f0d7064e65c129d137778743ec42e52953eacb006b144c57025a2c

    SHA512

    f3c28c99dac7ec08eb0dc36985d2e7e89e918142bcbdd7b312b83db13f3aa02569cccddac7886cd2c41627f44f30d303024a3dc4f872f073220bd0075c298c8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    515245f01612e0f3ede3e0a26f04c0ea

    SHA1

    e6ff86fbd0070bbb7b7fb70fd153d7512e6df15f

    SHA256

    fd36ff63f74e0ba9686ac84120a984a6433ed5f474829acc778bcb978aea5196

    SHA512

    0e919a00020e0caf6a1c0a110a6cb731d82ea7dfaa192f0004edead6f4eab4bf5074296cede8ae2780c3e38c70d4df3617150ed0354ff8ce7e5886228d1c96f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    236199af75b726ff8987a9e120f95209

    SHA1

    4bc5de4e4fc1b234386f08a46d8150a63f9565c1

    SHA256

    3180d6cb6382897f81dfb7c736f3f5316deea259b0c5412e9c2d200ff314d17c

    SHA512

    f26a55f045773e5c57f404b3aea935aa4bf8bcd38bb315c66987f96121c3caaaa4c1ae09477d3323030e0140d057ed7b3ac0543dc43bba206832655f3dc0ae4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4af1a641c2a19584c2faa5a55c66c13c

    SHA1

    0ff5a97b9b474d4d1d94df6c9ad64461c446e531

    SHA256

    ccd481934053af275851737f775335dc88c1e78e967804d9616d7a092741a79a

    SHA512

    ff13624b0a1ac6fba65cf0a6989bdbf44b28c9589fbcc815d940dc4a43778b15d2b2ff095080ef668fa654f9abd49322976f5b1fdeaec02739ea58109c848c2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7019bb4317e3d0cfa3511cc57bad8464

    SHA1

    37a09855209d179f7603c5d654d56fc261b949fe

    SHA256

    e715de30571556060eaed637ac51eb7ac8bd23d1f837c678a6e829afd2c2a00c

    SHA512

    13df9b08f71894802dc254b8862cc954a3219bd4f59bc1ec6d2607ff22a0fb852485cc6f7b96acafb599ff803553a906076edcc7f65f4166095bb3bc3ce1b90f

  • C:\Users\Admin\AppData\Local\Temp\Cab4E03.tmp

    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\Tar4EB6.tmp

    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

  • memory/1684-11-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB

  • memory/1684-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1684-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1684-5-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1684-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1684-7-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/1684-9-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB

  • memory/1684-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB