Analysis

  • max time kernel
    120s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 04:36

General

  • Target

    18cb75ef613efe0082826088f03d9b09_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    18cb75ef613efe0082826088f03d9b09

  • SHA1

    292b5facdb359ea3aa946e676584acb8a1ed0ee1

  • SHA256

    b28707d3069f70d00d396a14cf1818d7e02999f8b72210a2ce6d5c13b108b073

  • SHA512

    3182a81713d2afda2b9e10494e6237902abb1a4c4766a98ce6f86f77cdea582366e94fd41efdfa8231919043b036884dcf58f72d9fed8dcf40ab39ec3a3fad72

  • SSDEEP

    3072:BOloA4eCemeWuG+2GVAtWen9nIyOATLPdOnNDQchiulf62nQscOSn:BOloA4eCemeWuG+2Gqn9nNZTLPEnxU2e

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18cb75ef613efe0082826088f03d9b09_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\18cb75ef613efe0082826088f03d9b09_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\18cb75ef613efe0082826088f03d9b09_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\18cb75ef613efe0082826088f03d9b09_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Users\Admin\AppData\Roaming\Ygahaf.exe
        "C:\Users\Admin\AppData\Roaming\Ygahaf.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Users\Admin\AppData\Roaming\Ygahaf.exe
          C:\Users\Admin\AppData\Roaming\Ygahaf.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1780
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2720
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2748
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dad6de64d6f6c967b091338f33644920

    SHA1

    70b4f9ed9532c43c7b489dfee92db0076313155e

    SHA256

    65c73bf5f81b834ff9cc12da00040248cf11d3e0f428ea5be6e5544e3e6d3e7d

    SHA512

    d24f6b8df3f135b1b6c19e471903b3f354cd91b44bdfcbc1ee79fd33d80b4cb9c1592ff5d991fffe7c78327f078c11544b23485cad75aace66a75a751b140fb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94cdc1e7c8952ffcd4a521fa3d5a5fec

    SHA1

    aed7858878e214417f195c35b31509dea95387b4

    SHA256

    88ea312da16a54b84a62bf80b6325e093a6225aa044b2e1b0e8b6f95e213e6b5

    SHA512

    b1d5fc6c1b5020463070718d87d2ed01a7dfe7baaa4dff1b09f2020feb1b66773fb81e3d65bde468b396287afa88b31cd3c9dae68760b3eaabeec433edc4088d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41742ef039c24180c8d070e6f56ca4d4

    SHA1

    56a62f4d8b16f3fca22ebe9a2f1b726993db5e0a

    SHA256

    7f1d55d8c92afc39eaff05378cc42247f2b9f748f5ce5c823dca0b1ad51ba291

    SHA512

    bd1affcb84353d8d1d7e21b2d1bc0bd4e9a63efea2cd0eab9a1620f7ba70dca51950d0fcc31be44eed0d6e0047ec47e93406aed2eba991bbd42b43a458b948ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ea049dcb9a4b9d25226ade1225bdd26

    SHA1

    422a0b2312137897d8a2da240baf1301bb4f9ee8

    SHA256

    c048faa2efb68b3d7095dfd573f429fec18ec8477e11025d3fb24583c78fb60b

    SHA512

    f2a303ff72cbdbadaf333662df4220d6f7bc8e5f3c84d3bee5ff0c4ddcf9d4b651210a7c1f3a5350bcbb6747f5310f1ce2f1740195b1d107cac4bdc82f862571

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e11d147177924f3f38bcc1371d39ad2

    SHA1

    46d33e26c0c602c0b265f253250d55b7504e1a46

    SHA256

    7ce399bcb54e9c6af7df9c3badc9599c05a0eb77051983375e0319c4a76db144

    SHA512

    342efdf024d22d4e52acc9d5cdd76478646e1c6634e922a6a4ba251da2b88029340297894caac4046b14416f436eaa704e43719521cf3d81ba4e97e648b5977e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c56a68a31b2bd3ba2e0d8ceca54b227a

    SHA1

    5dda0f4c5d91eda46cf6dc03d9088a750a7fa121

    SHA256

    b352fb322fb5d9f074d16d6f099eb7b5edfeab1bbfe15298e10229c0dbb2b448

    SHA512

    bcfbc83ee1a43522ca50fa83e6ad5824263941e4d4e4d17ab4f4fa12f5d1eb85b0a1f47dec497313aa4afe3985ea31d004310c1844dd7f43198150db29c2ef3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cadbfb32f84f2778adaa1105ab7c1b88

    SHA1

    e6775490259d33679fba88b6a9bc859d54e34d9f

    SHA256

    620888836f96f543d3858ee958569026b41eb948ce512169f7dffc7a23ae3335

    SHA512

    861099492c88e909ed2e82af48244cd561e4cf1f4c028d586388b81dcae4a44fdd043147a44a1e2ec982146a0578783ecb489b3069b9b068e0af7b4aebb2991f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    107d89fe08b7b7bf6b532c5903947889

    SHA1

    3461d8be007660d7feb725b453f02a8062d49d0e

    SHA256

    05ea0bb3c0f7becfcdf72754dd3350dde5c628d417657e88f66d00302da5cdec

    SHA512

    d8492f2d2904a4590da5b6b6fc7f01ed7a6ba9f8679db689bc8410ecc254e33d0d5f8a81ee8f825c531cafcbfbd024e72d8e558c75cd7ffef3a2be7bab2fe8c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fb4c48073cf0e39f7343596fb10427b

    SHA1

    a81e73f0b9828ebd27f37450f94d2f8072aacfe9

    SHA256

    9a2d5d0f4b0dd7d524389356fe8f71eae53348b84b42b2cb46bf51db034457e9

    SHA512

    66ee022deb0fec8357840ad80952abf5f89984c371f01fae75f9fb14ed09cb6d7616badddaf3cac6e876572ecef22c8e519e36913015b1c3be402e5aaa87f950

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abb2df2e5bbb37ef7025b4b7257829bf

    SHA1

    ab273aaca8338d54195b12e42bbaabf5045c34cb

    SHA256

    68d76900f82d68be520f4ca82c4770be4577e4b894f38432dd80fb21b15a6711

    SHA512

    9496eb350f7090d31618b9b52f3b6a023803b5d0b9901bca70236a33829bf664ea276fb12707240ce599faaa6028553a13335510b54db812dbf36fa761bebeac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14f5b5951e11ba7d12f5cb5a4e7e801f

    SHA1

    c1eb566a31acf9b89446eeef214bfa46199a8a79

    SHA256

    b06c4cdce6550fbc078e462b0b8ae70469ffb77556f2c7ee83c9de31fec8bc45

    SHA512

    48b99c4c8985f2381274e65e9842abad4dd9d13fc87c58a5a7a9b090a167662350ef8494a162e0b46c43d49857df8071ed45c74656926a7f1be7936466631e09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75e9466824d7404d1e6e797733a6d376

    SHA1

    8b2e86dfdb76067d21e2d5d3b615fc1165100122

    SHA256

    9104d79f6a08cf97f77f4e2fc4dfefb7149bc02908473a86f6b20551a8968b10

    SHA512

    a5f24c34ef369a530ba2365a6ec4a06428b3bc828f3392e271662067a20f19222bd4f6b8ccbcea0ad44854e7f2476834a34af71d265d10dc61ad9d90981ae55b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6110a05916b3d809ae65d2260a750ff7

    SHA1

    4e51c04c33a27fdcda5de6e9d336360248d7edd4

    SHA256

    d6a5ca40923b9d555ba9407bd77b67a6f0682448e4113b37433d7f091035a52b

    SHA512

    f6e2c1da89096b65ce546fc97304abdbe08058a1e3718038042b84376de6b56b5aa73952d23e3a90f507963f21ecd2de57c975eee659346b14687fe7f2ab95c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a314b24c0355a4bb52c9a2d2ef73f8e

    SHA1

    9bd433f13608a317b11626170e1b360e640fac56

    SHA256

    23e8fa5ae289937ad314578e0745018c3507196eaa2bc3f5976c10380f73b560

    SHA512

    13a350de80a0e440dd3ce5fbcb22672b4021c2eeae44af8f5342657ed6f31eb34dec28ae9bed888bf2288c781c5ea1bb9bde7980265386e3c5e2b9ce2d6f9720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2f8fc1910c59e5c5c329321e39811bc

    SHA1

    03d4bfbccfac6728689d61dfe077589537a51cd9

    SHA256

    cb0302600f0d77a8d2044ce3c1c77e9ce377738696b8130098f2363100262131

    SHA512

    c2135d34b173a81fdbf1f883a2c9473d7a6bb042b03ee59f983e777b1368547cc6a5b756f5badd38ffa164963f8bf204e6c36c41864e71a7c0c2687142650788

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbccca9bc14c5db3af2fe4ddc2c9a715

    SHA1

    ef94f402aa1d12402aeaa1a7e1dec9ebcba6857c

    SHA256

    30e5b6bbd28600aafe0d8e91190acfe00c5b586772e16d7ac2872f9170eeda8e

    SHA512

    208cc80f929da39e7be1af25d0340bfd534bcb59df10a336324f90a860567e494719a084c8ac4324d0b8731af46c643af6b0b38c8607d5c0b8da256133200299

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aae3a279475b2d050d8b4fed112915a1

    SHA1

    9086f276e539ed9b0933372c15d4d590b1789fcd

    SHA256

    9456b39209d5233957e77d169673fb42c38fb139b66ad53c0e04cb442f4972ec

    SHA512

    e63320e87ed96b9c87064054d26e25a9101ed50a8541f3225e274f4c63ff696165b3b941a012ca75e9026822f0b4179e666594fcf3b029aff730def679aa1e64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5288d93321e15b249d96c5167ce1cde9

    SHA1

    06576e8b4ff10a6ad56eca007c775a95973631e9

    SHA256

    df2fb829d23f8046fc06527eaaed914390154747dc834430f05cfab77e9e1a7c

    SHA512

    54308c027c9dd67f15ff4e5add16762d0536556731676861289fac4ff6a12b54c8daa1c10e7745d64bae7db810213e197b6fd3bf1518ff2b4db2bddf34da16c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f9441c6c74bd2b4b4335e181041a1f6

    SHA1

    7333d575d51ac9b1ebca0d2c8b25ec5f6a5199ce

    SHA256

    0bb3ca8d62832190f829bdfcb6fd6dd978653a60482e452bbc7971a49e433ef7

    SHA512

    2d4bec45063b4ebbef367cb0bd8c313a453775283c3c57fcda108ce3a175380688847f9cdd6ea828f8393796e83e77da3ff09a6b4d3e4450ffa8a392f22b110b

  • C:\Users\Admin\AppData\Local\Temp\Cab7C16.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7CB5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Ygahaf.exe

    Filesize

    124KB

    MD5

    18cb75ef613efe0082826088f03d9b09

    SHA1

    292b5facdb359ea3aa946e676584acb8a1ed0ee1

    SHA256

    b28707d3069f70d00d396a14cf1818d7e02999f8b72210a2ce6d5c13b108b073

    SHA512

    3182a81713d2afda2b9e10494e6237902abb1a4c4766a98ce6f86f77cdea582366e94fd41efdfa8231919043b036884dcf58f72d9fed8dcf40ab39ec3a3fad72

  • memory/1780-27-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1780-28-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1796-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1796-4-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1796-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1796-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1932-2-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1932-0-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1956-22-0x0000000000320000-0x0000000000350000-memory.dmp

    Filesize

    192KB

  • memory/1956-24-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1956-18-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB