Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 19:17

General

  • Target

    0f38403648d34e9987abf501af245973_JaffaCakes118.exe

  • Size

    169KB

  • MD5

    0f38403648d34e9987abf501af245973

  • SHA1

    b67dc83c5571433b79d8e6e9bad7c93000125c37

  • SHA256

    e4e269d9ad00071607b85105055b223b781fc7ab0f0df70f79f084ae0d639304

  • SHA512

    9e88c788a57ae7155fc831e9072b8b29690fb29a16e910ff7b38c9ee69560432b298206782ac0c1d7a19880169b2831d41f3e4f5e8d6757b0a59e995e90c8c30

  • SSDEEP

    3072:bCcJAwW1CfxyLP4R1TBAaRrUJihgXu7hYeVGasnn0RUX89YLC1/1E3qCJbqqtp:Wcb7yP43FAaRrYlgYYGasnnWUX8b/b

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f38403648d34e9987abf501af245973_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f38403648d34e9987abf501af245973_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\0f38403648d34e9987abf501af245973_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\0f38403648d34e9987abf501af245973_JaffaCakes118.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61266d0b5b29f5ed988878811616852a

    SHA1

    b083cf4e6da59a99e1e78a22db614896452d30d1

    SHA256

    34e20cb9cf5891989d7d18c1b41f1122f542e646376c43b28f6337b4061498fc

    SHA512

    7ce3a3a46cab4e67774c67d2264540fb8a8f39343683dd1a4f7d56090c47090eb39ebcf8fe882209c9dcedbc63251ae59affe05dbd5d06b4a6b5b82b20e71eb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b93f70153bafdb18aef64de745e1e55b

    SHA1

    55d10e410833d8d50d775705a0246b9b62c1f3ab

    SHA256

    61ed20388bd5d88bb2afa4cf48e174da3832099d4fecc9d269f813733df90b6a

    SHA512

    028712c184b465e2683c52ee74ab773da92d420060c9e1bda981d33feada4498995cdccfc7b11d083b667aada8cdab904edaff005e7340a3ff3db37cbe130b04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c326164f9248e7d3e23aa5c0ff0f863e

    SHA1

    53fbaf916c8bb29637927087c18abb79a4ffb148

    SHA256

    91adc78fc7d2eecedadb7e1e1117427cacec9a2f1be4b4be15b14038bfc2efc2

    SHA512

    880364e3c1bf18d55765a623083bc282d091f6c321876065c3670f4af5236e1b37277389d3cfef787f9d87c1ccfb32259430ed253b7145b4d8e03a85fc246013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89db784d976681c5de8bb7717171402e

    SHA1

    816348e9e2dde2fcdbb4aa1c44ab0e9c6f71e9ca

    SHA256

    c74196c8644282801fab654a65c626d7f418c65c97dd8e958e62d2de8c37e7df

    SHA512

    60a785716897eaf523b6329df466cee97fc84db327acafbe000bdd30521e5d73de5622849b08beeb728d615c2888bc265065ef212bb079fda6143d29981860fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03616507e1b76a66c780a550ad77dd45

    SHA1

    d29ffa5e9330a4e6671ea12da034637397c2098a

    SHA256

    778cbee845e1c9ef582323c4be4662566138ef9253eadaa08902492c27986332

    SHA512

    df41d4524f2e4e1a401958c38477a2059a489dabc2dc922a3ebd8b78083623c82b4d6d9c9a20fb5242351fdfa9cea6de6c5637ef6971504ef7fc791985a40fca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e96e85d5a199d900cee4a6fdbe1a673e

    SHA1

    dfa2101f78b458c70d5a1497f242a7d4e558dd3d

    SHA256

    6f8c1e06547f9edcf3655469e8585d626d3db8d090c461c39a676c88bd80f182

    SHA512

    a2776d134d833ee0d64ac219ce121895201accbbefd3d0ca8c7b716e07ab304cca7a79874011a27557ad961de23fdeeaaba07269122db71da5c78b34cde61bbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3cd77878ed5ddbf51229da57b8524a3

    SHA1

    6e9ed0558afcbd45f0e31ebbcf2612b91bee9c22

    SHA256

    b00a8af62da7a244d674c16219aa5483c56a884ee17b7fa81d791983118dd605

    SHA512

    3e30f9beabc884b9fbdccee207f2fc22f436921a5cd077aff171a76e595e88088b1d5e9ba44d9745a84c90bf6682d37649414c2e55f82010f4f23a567be70312

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd25c98140c17115928a070aa42ab5b4

    SHA1

    04db9b9f63c4f16628ccb5ab8f37cdeb51dd84fb

    SHA256

    db08005b83be78f78a88cf07c371966d8255d0bf623098d54ac0a50518ba1f9a

    SHA512

    2706bedf3476239716a54b010e29d9eb808250cf66abf05158939d8a97d8b2c506e738512676b6dc73ae4ceb30ad0a0d4d47991cda2e177b7233668627f52b73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13e019290d1428f04cac7eee2e19cdbe

    SHA1

    8cc9329c0b6ffa850ce03d4d06e056236b2509cb

    SHA256

    9e6dda60359b0b75f500e3d71431a5d7887d93beca448a2fa845a2e377da13ab

    SHA512

    b420953ace1f0434ef37cb6fc88a61d3411698d7c5a02160b244c4830c36cf27b46cf1955ba93da44f4501a71ac21a914613865cd445b4f79066136bb9610c59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    003a66b9e3b391da13e13a79523cb71d

    SHA1

    9904aacfb7f8d78dd6d6d105278b696f6023cf5d

    SHA256

    e3ac2502e49534082431507089ad55fbecbcd9babdf80e7b90dcf8a1888d31e6

    SHA512

    fe53a30be05214904fe6bb6a81fbbdf191555d9e5c0310bab6aae7e2d4dda14a5cf2e2cdfe8b8ab276579feab55c9146dbd28dea71e85bbd9bbac3d54a75e384

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68c2597f3c367d2a59c533c7d84adad3

    SHA1

    ff0284473134ce15001a973050b0708327cfa000

    SHA256

    6769703a5b1773489e01333e9072ec0628f4a65b6db5c11b94c5f437f3840ef5

    SHA512

    bc02cdf2b3872ea119d9d83615dc151ee2d3002793f49a14460051ff2f5b8041ad3b694cb40dca1f6075d5815b1cab9d6a634f45b358462b6032bc9bb52bd4b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7fe7a64b2b40727f80125a2713f59aa

    SHA1

    f5674a9de6c827a925fa3555e164b34a526e243a

    SHA256

    e7f679f8ec25328c61926cb8bd9dcd0c89f54b14842f19aa80f8933c061083bf

    SHA512

    21d87d2f16257eb05b89b8e78b898c4226d587850a7181f4076219794db7aac74592461d54911c05e3984acfe416c504ec9d35a9381a672076172c2a4346a436

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a0c3bad5be416e3f0226d22149050f4

    SHA1

    11d964b4a7833d43a4892ae5ddcd67d2b0361b2c

    SHA256

    9930317d9ad43d3322e7b8b963859ed882f15ef84c9397a10ac89a7e6f094911

    SHA512

    d32083e07b8f96b950cf2ed1124c77f69798a06b5fa03391eb39e7a96cbcc28a773f65f987ef3c235343372abb47ac567a9f95c232b912e79d3b72a6cc0c17ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a02b36377d82d70d82ec40da25a528

    SHA1

    1fbe78b4c18a80a5e5716f9cf28b3557714d60f3

    SHA256

    80b9ea0a44e1d310551e478fcc64b74e5b227f9411acd1956601cc66819055ac

    SHA512

    f30486a70fa98abbf8387f3abd31cd50053501d259dd479a0053b55647e23d6c24ed361938c187d7763da6d5dbb61c1716a32534ce9de63a2c316b05ae8eef0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3d93dec1630a81e75e509ad568e7e52

    SHA1

    21c9a58681dd9dffd83f1ce1eb31eae7e5b8f254

    SHA256

    5336bc3953629a113ab5a8e0380e6c66717a47615d5d81fd6fb1419a5313d9cc

    SHA512

    62461fcbea301bed2cfd54e77affdd88e158f34cd7499af6f30877d5c5740a918000a718ba904f3a7d119832369f3fc42869cc36beda55d3240ba3811f19f639

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6352c1fbdb51c9698b7bb58a4c1dbddb

    SHA1

    00e16ddfc3f4db67c9ba77f22c81de7b304f2298

    SHA256

    9e2825d546afe1059ef6dfcdfec17682175e617e7b0707dcf96e205b4a21cb7e

    SHA512

    c3bb4c2f888d7c3dd5f46382cadb4dda753402e612642ff49c000d1dc31eafffe403529094c419c0452185e877499f40bd82faebf89073b5a10edd8322d75f22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35ebdbae5d3a94455e9788fd89befb34

    SHA1

    b87d1678f114f8038218c23252d98ebc6accfa7c

    SHA256

    0876ff3f25a99fac874acd24723081b4adcd8685a030ef8048db6380393966ef

    SHA512

    cef5d2cb5c5a6f2020575807998a107ba1a0e80d31586eab399632c6bcf60f3fe90b55abd7236227500a0014fbd7b8b32dd3b19d1cdbb43dcaf9863a4cdf1174

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09a5e36f222c3f322a2aefd250e6b411

    SHA1

    f16a6f13b875681c33a3aea07019d07d950bb276

    SHA256

    779e6ac875ad70b78bcf5f27ff4592d06bef03e5fd2ace959d13490d256931c2

    SHA512

    93916f4e6cc3b1fbf391be9bb38b309e2c3d129e8f409974d054df154985c947490db212cdea56701d2018ac68d58fc9f6e883b782e76d1f96b679525be09e91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd7b2c80826aaaa305f7449d391eabb3

    SHA1

    e2dcd93180bb6227d659c7be03c2881b22a217bd

    SHA256

    73d23b5a3b089ca1c00711c3658193c06a547d876b7b6a06b94ea497389f18bd

    SHA512

    1959a728ac63a36a936ce389cc56be84f32c30df43eba7d5b73acd30801fd0bcfd5257d6813c4d2215564c6df62866e87d515c5315e29b2638be1be8285224a5

  • C:\Users\Admin\AppData\Local\Temp\Cab6480.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6571.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2924-0-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2924-21-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/2924-17-0x0000000000550000-0x00000000005E5000-memory.dmp

    Filesize

    596KB

  • memory/2988-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2988-23-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2988-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-7-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-27-0x0000000000370000-0x00000000003BE000-memory.dmp

    Filesize

    312KB

  • memory/2988-31-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-20-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-28-0x0000000000450000-0x0000000000550000-memory.dmp

    Filesize

    1024KB

  • memory/2988-18-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-5-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2988-3-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB