Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 12:23

General

  • Target

    0e0ed62f7b9e2bd514975808e06a298d_JaffaCakes118.exe

  • Size

    305KB

  • MD5

    0e0ed62f7b9e2bd514975808e06a298d

  • SHA1

    8c3e81e63216c25d245a3d42bb0bce565c41fe52

  • SHA256

    08519edc4326e639cc49139c16c0dc820960971f4e6632c0837631e575829d02

  • SHA512

    a36ac672f73f3eb98cd75731da4d0ce993f38075ee346dfdf3129b9559a11193ce033af9eb36a141e33d0cc826e8f51e91bb0ac6146da0c9b6a37839818ed3c9

  • SSDEEP

    6144:E9UfckH8PcoYvMblj7wRWhjtpMUpb9/xERA6vNkf69GqaVq:UNkHEcBMJj7wRZUb9/UNkRe

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e0ed62f7b9e2bd514975808e06a298d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e0ed62f7b9e2bd514975808e06a298d_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\TC1ak.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\expand.exe
        expand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"
        3⤵
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:2692
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.v258.net/list/list16.html?mmm
      2⤵
        PID:1804
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v258.net/list/list16.html?mmm
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      72bf2a2bbda4724e771eba563ddc1311

      SHA1

      b39c041bf39d5ca064772358a4b234f34776d2ef

      SHA256

      35fac06a52c0d1bb8cf3a5b316bb3e91fb90f2b7d7881aa24ff7ea208b73363e

      SHA512

      d63a2663c2620e7be7e436c977eacaf826009dc2b369fb0d5c07c26ed5b61bd332d9e12d23e38139cbdcaaad3ea43dbcd497f019de6b41069046ceadb9a6afb7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      c3a4762ed8c8b012ee317bd207f43d46

      SHA1

      0c6d2b2ad0bf69f343d89594864b7661abcb7053

      SHA256

      bc042d3522133ddb3e28676fccbeb6838e6156424ec30870aa8709826e8a52ea

      SHA512

      c662f5666342e92308014b730d460213733ab9df145d104a4a168ca881703f5930ad75a63811ed2cacc41398a9283c845cbe67e081e6b66898324c0457d95145

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      d633844010f6f557b7bf296844b9918d

      SHA1

      10a97808c620d165e7a4d153d6b7b2f6fd7dd977

      SHA256

      ed9c282401535e7afe5c6cc994f903f4f928b32550e4ff1f23eb4d35bf548749

      SHA512

      4c93f263fac4fc2b54a63d044fbb23d64c735d8b2fb9853228031d0b64d4cafa0f3cb852c460afc134b1405009ef0c2b2585fb16d999ee2e6ab2c646c54124ac

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      3431f9ca4a292c62acdf8751f141d989

      SHA1

      e5db44409085f8040d3bd7b0102723da9eb8ee95

      SHA256

      328d528fb982667d2a2a4051e56621613959de427d1f9306ac94784c25f8b59e

      SHA512

      be4790181d205b8005b54d153930f4b9a2221ab8fbf0e1c09cf8ceb57055f2b18f05b7dbbf9c2cbd835812bea4289517671e25892181510b2a07c389b69c3172

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      705dfc1472823dcc82b09567032e0c7f

      SHA1

      c185b826d3b0506578eac3c9e765b51ab3c93ee0

      SHA256

      9bb531e6ef6ccd510ea3d324cb5a549cf4e59e9852d91933e26729181d6f4755

      SHA512

      30f803483cfd02c3094bbeaa59c5946cf872dce163c5f2e9e5d195e48b16d6f6326d000e17e6f5e16af36e0f88839b03764b0b242dd79bd4bee21f655fb682da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      0a428d8f84f057eff6805b9ccf8e1476

      SHA1

      5803bf8af0e6b5d748057bd8a431a5b18a008a67

      SHA256

      7929764311a34b9624a21b656685c1023df679e575995ab86050bf0ad58b9f88

      SHA512

      068fabef1718270ca88f4ab8b726b45932785210a9835ab642463af714bf168a0c103b7d7e16f683e45e157687a5ff4362b6f739817e4737c5c697cbbc85b34e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      86090febaf9f5a1f26c9fd1636d3780d

      SHA1

      4da3d787b58979d4e71ac109e2c4a691a1dc3be7

      SHA256

      8cce2acb903306fc634d143e583226e76fba22e8963deb2cdf43dbbe304584df

      SHA512

      96955a25b986d5443f1db2d1f2811854489e9b72d6fe707b396127c8bfa3fd67295065f14661374b64624ff61b4604b72313d40718d3ed0b665794efa3f6a987

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      45beb31ee93d13ec76be65e291b23ac5

      SHA1

      0b3f9bdb0b486586b66100da324e96c2e757bc7d

      SHA256

      675710749a1728fc2045e2c1f27f95d987debdcdfb78eb11ef648d201eccaab7

      SHA512

      4e6e03fd13f3f3250b0c9a5a909263aac8c5bde20f2c4f41bbe926021fdeb083c4466f12507ff82b481bed946784d5918db57769084aa15c180ce621e6df5472

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      fa2037e2636387f77f8c4f0b6ef3c8d0

      SHA1

      0951da7cb93f2ea261f93d5be1db64b02be6aa23

      SHA256

      e6a47d323909889d223f402fa18300b02796e3fd4f6c894bf85207cc3b5f7773

      SHA512

      554f1c4b5f80f96f5e0bd399839fbd00da01051f2dc9d5216100101aefd5e3a2011c372e5fa6c8e26bef73f08096917395a4a83327ea6605168f8613e4735c45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      c005a1018468d33d11d9758e5e95d439

      SHA1

      94601750e1d19b22f0758a4d1feeb7718e9052ee

      SHA256

      11b4b3d3755f4d171fd65f9f12f8955061c1f1f3e8c18048b6f8fc575219a8a4

      SHA512

      951a7ce6c30a0053284a5af0b26f6d81aa893b04ad8bc80785b9e85ec07ca6dd086744a266de74a05ce3d887320239cc0b0812861819a977922ecbbb1f56bea7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      0234f1cbc1a8cd0a337553b81577037d

      SHA1

      099731f89eaf34f664d38ccd4a48b7d88a39d93e

      SHA256

      ceedc1cbc970600af2b35021ace3fb8a53a946ec369ea8945cfb470e52b05f4f

      SHA512

      96009382a4376578b21471a906ea46c0d8752a83ec1471bdad82aa29cd5bde9b690c14e30fd6646d366a0cdd50d52b5a2587cd5a149346dfc7033e3478eb19e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      273575f1206aa32b7a315861c1b1a1e5

      SHA1

      74f7204eb8a574da7b3460e6f0ccbcb7a0c9ad15

      SHA256

      bfa75fb94fd0ebe74d7fce91e0358ff46e9872246ca4a976a91dc2e5a6c795a3

      SHA512

      e668b0a0d6124becdafc7734337836c33354539e94751e8c094912e00a1cee08dec719ae9e8729493f7661c1f0addefa8b99015aab9154d67e83853faede2c25

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      715421117b6f76330fc9439676add72f

      SHA1

      0afd9a9578a46b84850daf8fae1308c08abc298c

      SHA256

      daf751a3a01f33aaaf7e43484580e31fc95783f12ccfd631d993737a506b62c6

      SHA512

      31a0e126d1435dd48106d9860b30047783c6aedf9aa73af94dc016e78b127ddb9602f1094647358e01e06e36fbf3026ec2ed8bf029cd635f74b8f881cddb0d3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      ad7233a3675b884569b0d851ecb3bb4a

      SHA1

      5f61c9c789b1419560d7e31bf74d708ea1540751

      SHA256

      06175e80d422b0f4f6eab95e37a7a23f43806b107a787a2ce89c11301df9a995

      SHA512

      6a088d1672731b9e78ae2607e5e2a12a75f2d8966c3995e56f1b5fd4916c717666912abe75a29c8d6c734efb605f751dff23328d1719a7a5d72d508ffa82fe73

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      122acca86a1838e28059f52277c75016

      SHA1

      1137e022d70d029475871aa26c9a789370dfa8f0

      SHA256

      a77a28505f7e5ec62a690bad3b4e2f74b5d364862591093e0fd7a2749a19cc08

      SHA512

      828977f48fe1e499dfc5125207b0664190bd194327a6a539dee386739d95e9f426b318dbbb759ef65f105a60cec16bfafe2edd713c674728afe5f139b40cc155

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      40dd832354172ce222c8be5c080fa555

      SHA1

      52ebbb16f9b862a4878fd58d339555cf4da7fe84

      SHA256

      01d9f1a66aa3f9a9cf10d829565d04903d6695e4db0f3e052acba6a826fec402

      SHA512

      bbd3f70937fae7145636f9e0010891189eb5702769ed97ba52ce7d4e4f73e64a7e98ae6bb92c0b0d3c5d5bd111187ddc3bac89822c14096ff54545645f5b034d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      c90861e95b4d3689e3fb88ab39b62909

      SHA1

      261524248a4503fbdb09fc6845d82d9b710e5d5e

      SHA256

      15e7f29f7b0d8a371d9c526deeb2364e347f88fac63ddd5a54c7362204633da2

      SHA512

      7c7b6d945cc26ebe8a68fea549aa0604fa9c0b4efcc43b339ca7c8dc0f4bf0c2ab4b0c017130e5730d8141abf73c15d017c984f02b01ebacb4b1e57389e27a11

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      cb47e53347eb8f3f82f45d7c0fadaf94

      SHA1

      ecf083e006b5420700fa16eae97e9353bf4d98e2

      SHA256

      27b4e72656e22130da3560c62a83b60c7a8c59643aa9f9e7628375e0d7786ded

      SHA512

      bf3b5f68d2f43d48841c6076ec4772c33cf43cd11f711ba7dc33de15395054e8b18b480f6a195d66ac5cd3f87d969e065ea025f3f4c0884536b6117cb8270ac6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      bfa9077e7557aac75c984e40fc9f5ccb

      SHA1

      349a24b0268a5a7478d0f462d4fc913aca68ecc8

      SHA256

      38780df9d6f70df737489efb481e1b1dd9496c4f066220a2b5ee661e3165f5fe

      SHA512

      26aef0b595c700f552b4b165b46f7d1e61c8b396f97515578a00203adfe085e564faa58ccfe2ae243ea92f80d6af292f9df4a04a3a1f1cf386f76891d5ec385f

    • C:\Users\Admin\AppData\Local\Temp\Cab3778.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\TC1ak.bat

      Filesize

      98B

      MD5

      ada787702460241a372c495dc53dbdcf

      SHA1

      da7d65ec9541fe9ed13b3531f38202f83b0ac96d

      SHA256

      0d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850

      SHA512

      c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708

    • C:\Users\Admin\AppData\Local\Temp\Tar37FC.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \??\c:\users\admin\appdata\local\temp\ico.cab

      Filesize

      18KB

      MD5

      f462d70986dc71a5ff375a82bd9e3677

      SHA1

      f3d9c09a0ff51d81377e15ae4e0e2fceaede142b

      SHA256

      69528b0fb4e1bc3fb8d92839d98e0717b3f680d98fdfcb9809a2f557aacab295

      SHA512

      5bd2d67bb78dc8c4275390667c135ed10c4733e46ce58ef524ea79869f740db00d2f4a37b949896edcbf1ebbfa1ab4dd16afab4418ff637322883435bb7543ec

    • memory/1488-0-0x0000000000400000-0x0000000000542000-memory.dmp

      Filesize

      1.3MB

    • memory/1488-2-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/1488-1-0x0000000000400000-0x0000000000542000-memory.dmp

      Filesize

      1.3MB

    • memory/1488-516-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/1488-515-0x0000000000400000-0x0000000000542000-memory.dmp

      Filesize

      1.3MB