Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 05:19

General

  • Target

    24c3830372ace082c8346a65942cada3_JaffaCakes118.exe

  • Size

    360KB

  • MD5

    24c3830372ace082c8346a65942cada3

  • SHA1

    80adfbd70ae74a92e459da5785b551ecfd3f62de

  • SHA256

    caabe76af1bd8354307b83eab3a05582126d2626d925c8afe14d5d8e32571ae0

  • SHA512

    c4516d43316b21151b16b9da27132bc780016f7cac110b08a65a72f8fde9117c3500abed3269494a873062be5c8aa1e894bfc2936edbd8535345e607e1c3d2e1

  • SSDEEP

    6144:jG8r+hAL5uOc9U89oI+jo+u7+68JSnxN6X5cUBk/so/IoHqPYMsrh7Aa3+P2vlj1:jvr+XOc9UYopje7+68CxN6p1k/so/Iol

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24c3830372ace082c8346a65942cada3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\24c3830372ace082c8346a65942cada3_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://playgames.fupa.com/?aff=newgateway2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    894543dd6f4fceb393a72c88a6f2b3a1

    SHA1

    1a5bfe4be27f8d9e3325670d95601b6e1ee580d2

    SHA256

    316f393bb12927b9c15304cf89ec00ccbd1aaa4e6b1b15661e641e3c58b381f4

    SHA512

    c3aafc9fc5ac56aab719aac14e74651ee341cf9be1b38d0a327c65210491ae0bccf7d3d09a7e7a132d056a7624daa16a1fd0a99b6e8dd613ab9ecd8f5797cbaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c74109a50052f6231fcc8feca8433680

    SHA1

    d09b409b6f5836c4095b834ac7d8b66a7bf76bb4

    SHA256

    34adecb56a5f3c102c1527a68c6fe8dfdee44bfbff3c1b6f332e58323452c8cb

    SHA512

    698cd73245e3c33978a086d9e7cc40055f29c0471941aba98180534372ee422dc28022022a8447150bbd990837b35c4221ee60b94446b7674bf94e3e9550ea9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bc845f6f015f94d250ddaae33605707

    SHA1

    3b787d9de7826f8dc94bde2bd895574bc66170f8

    SHA256

    25710705275c45cd8fb874fb27505c36d6b629d079f92ef2e9a765107f165abb

    SHA512

    99dc7d92634f62218a5c4cd9d4d46cf8489d1ccc2e2c4139d482fa9bef4e44c496e960660197702fbe3bc3e0fff8520879c03c5f7631c6dfef5ef6c1a1daf50f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    864be3f12427c540506d97ac86ff98e2

    SHA1

    834dee74e32968be5754dfa4a20fdd403d788aff

    SHA256

    8f044fb08621cfee1cb97083ae2f5f7b1e52ba5eabcb83ec2323f3a91e7e9167

    SHA512

    c15d24cd1c05d2b38285f4f608a65da4793e115d36d77a57f9c759a1e458d95f9b6e92b81da01ff34e9b07534e6382ae3ceb633896c41c84c8dcb3a04cfe5e2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b71b91e24f9e88646b0d2d3367ac3060

    SHA1

    a8721c34750e30756cbd4c0635d12640cfaea8ae

    SHA256

    7ec22ac6e5c68f0861634309313a41ae75a10f78177e7547475fd69cd7731663

    SHA512

    b6be7ded6dcfe5bc6b30be7023f13d2d60a96bdab033d9d95c28282288bd92ea231c2d1805fa3cf72ed591708e566aec92c8bcd09fcee1eb059cbbe65ffbf5fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85c6ce2c476b1d7446ad30575218c0c6

    SHA1

    4a7d4c4836a6fa4adaeed8f076815ec4ce850fc4

    SHA256

    368bd54e03b91ed7c547daea9ae80bc19ae270a8dde2e93d92a167dbc8d5def3

    SHA512

    83d8a8fb0bde2e5d47386caf7dbc6610489878edd5525d987715b9e8a6ab87f3716b6bc8fd7449e02e7f7471fe83bbe64d114bc1f8c9889184897931dfd86412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1490687b8a8034a9defeadb9c762c82

    SHA1

    9344718029dc80660286fba2b5025b21e66ebd70

    SHA256

    d51dc6409f02268586bdb35d49575b18028b9330067def17d1cd21a3083fd79e

    SHA512

    dedcc1de20e7d86dc5d1d973b89acd962f3263194eb9ef8580afc3b65574fc774a0179ad9c5b4ce4801badb4b00b26d2d2aa78d845ee2ec2c1d72655f08277db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e64c8ad8be060bc4b63e734838baae7d

    SHA1

    ea515661e5f8ab59c06a8c91c2910af39fbe99c5

    SHA256

    504729452b261eda7b91e3e151e719e5b93f6ec5af9aa0d9c94cd335da2111f8

    SHA512

    acbfd86cb24e169c3847d3f746164ec52664bcf7146f4226a7cfa2f6889a27cdf6692ef71b55471ef33e1488573bef79476d77963efaca61b72dcc08df432f35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1253efbc6a7b519b828297fc8b3407c1

    SHA1

    53aff4b22ab91efd6f8b8ded6965c208d327ba72

    SHA256

    fe9db4a3a65d4690b245c4564c72a45b0ee0a3eb0a8cd341a50a713593786def

    SHA512

    26ed5f342e6f520b5890798612912d0535dc449b5b45d13eff7ad66096f291aa3fa79b6c2af1b28ba711b6b8bf3b2837a6cc2bbb96d169bd5ea97aa31814dac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce31ec46d5ff4d62c7a00f1543738e14

    SHA1

    0fccc25e66885a4a4d5267bf95ab0d96b11a6756

    SHA256

    9a20a0ab2c95fa0bd71938cf4b6a5bc402072bedf0eb6fa534e36fe1985887e5

    SHA512

    381185f1a4efdb33e69a85938c34353e0d132c4e497396b3c8fe8c9059436438eae44660ff25d584217a6e25adb5ecc3209bde7d9494ba90ef446cb3722afc44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b51fd786f174809fda7e8af7e4fce61

    SHA1

    ba3f8bc948528aa644c0e32ad8c7fa780083c6b3

    SHA256

    e75bb963579eae79e8f80e585a2e601a814e4161df296e50066df6b99dbc1109

    SHA512

    669d61cdd539145fb1c4e5699424a94a2466fb94c5941c66d5a1822053d9a9919cb25f88b8e96a2c1eebf6914fd44763415472ab0f4288e7ebc2cc8f75221730

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2fca40343f9e46b531e72e57448b0ece

    SHA1

    1b3e855a4b6c2b886f59d55efba41a3be30e5625

    SHA256

    d25cd64e3244642a74df2070e6b0b0d824905e180e05a18c01099c7d661294fe

    SHA512

    af8c45e0bc5f57b5019b0c066b75c5ecbb8e14ff1574d7b04dc4f6ccadeb2ae8c6158ff4db497a9a404632bbede45dc1ddb59a21f95399284b3c719f4d9874fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c9d26591eaec9870a15ea16040f4fd9

    SHA1

    c4a426cfb6e4675fc32514b7a34992f8b0c3353b

    SHA256

    e424cba5f98f40ba52a22843f57fb85ab168d362813666fb761752021a29bb72

    SHA512

    bb433d5bf857ed272008df35852f66dcc8fde546526fc295e8d545247f5c9d70c1ba8ce55d3bc6e8d1656d85dc645b18050c495f39f9beda269600ec5dff92f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5539cf454a26e218ee94896b88e687ed

    SHA1

    385cbfd820f6dc0ef73436e9618ca8886df348ca

    SHA256

    2af9ea7b1367504213622b3f730f4f7cebca5b1e77b1574140d9d2786c3da0e4

    SHA512

    ea2b5717eb233f96e39fada8f739718b4bc2ef0807e37eb0dcc1d3df4b83378cd9f00c85e0b24d8b65e9cc8e80d5437a0c11084d8eb2bfb84cb0901cf4eb1257

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf27992336e567d1fa066b535d3bd4d7

    SHA1

    d5109b9c8a45ac09d7569757eb301f25ec7bb3e9

    SHA256

    53ff51857af3fadc40258fbd23a4184ffabe882027ea391715e67be98740feba

    SHA512

    65343756a2e8678f913238910494e1226999a75bd7df4748244a15c708e8082b817e8c937ca036ea8eceb57ed729496c32b89bb42117207e7e6bef3be0aa4ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd3115f6034f2b1fcf9258cd2ab310c6

    SHA1

    e9beaaf113bede4835a98ebaee6c97e9ffa46842

    SHA256

    5f6c932b7cac435b6e451ebcc9eef26722a122ccaa243be583a2dccafd14afec

    SHA512

    2baf2a3ef64c341862bc52f1219f82a2bf637fbc538fe312346d31bc87511ea574d01ae54b405bf9c5f8c7688be9d863d1273ca08c7fa879dc4f5a4ebc35c40b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26015527cbda6c536e086df7f74ab4ed

    SHA1

    f5d3f3272db606c16b73c72a1adc2b9e3b0afcfd

    SHA256

    c156d28e8132549e9d6da72a0153bf25a60dc21a236d91051fa258bb779a3de9

    SHA512

    6df7709f15c6ab65a2264c247618c6410191802c1201a324fa1326480a365222557bf8c4f58284b57bf1ba2ee1bc933e4c0f74ad1623ba09a1e20cf83e65c74a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6445f96545fc79959ccbd289d2bb6df

    SHA1

    01878a24417a502a4a000bf923ae73c09f9894db

    SHA256

    dc5261a226356921aeb8c8c5287cda5b28f2ad53c8c3d08213e9097e91484c6c

    SHA512

    bab5145b0a4ba389b55c21c628695f6aefd98fa81c35d7028f15c44520d5bf41be20a592bf95cd69ae904742a30dcc843001a2bdbd61c0e4e3b7b91c5476f9a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18468049da3451b57d38c2bdb9f9b4c1

    SHA1

    64afa270e520dd087bd2e0344e5499087fa9ef58

    SHA256

    31a3b3e55f5755727e87d42dfab782bb3026fd0df8308bb14849501dd9b30d6a

    SHA512

    4ce615754493bcb4939bb31e755426aa9649eeb7280cdef4d28152bbe73eb4cf9ca079ff251bad717e25a0706558c9826610b50b35efd69878cf487e2f6749ba

  • C:\Users\Admin\AppData\Local\Temp\CabF4FC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF5CE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3048-0-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB