Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 07:55

General

  • Target

    25301e7f50bde1c3dbb440698fc95905_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    25301e7f50bde1c3dbb440698fc95905

  • SHA1

    f9234c1167a3e97796b781838344b2eba3eeabd5

  • SHA256

    4714700a97a84d56bf7e323f7827530703b116bfbbf50b20dc74a496282760f3

  • SHA512

    8ca2a1c814508517cdd8dc020660502da15d478589d682b2483ce0c4bac304f084a9ae6b8bf74de93924fc3eaa07da244beb590225aeb801ee5ba0a7c7d02465

  • SSDEEP

    24576:Dckf5Sq8uk5taF58MHEe69M0+hx8MHEe69M0+h6KGa3iSz+S9Xvgs1uD:AS5SSCtmSMkeTBgMkeTBQKGVS9XvgsoD

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25301e7f50bde1c3dbb440698fc95905_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25301e7f50bde1c3dbb440698fc95905_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://vcoin.in/cf.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20b1b459b145aaadc2f51a121d625f55

    SHA1

    b84ddb6ec6c61576603e88475548c2b2f4cb8561

    SHA256

    22dd9101ab685cada27adb6fa4b50848c60046f4acdd8f1375d694f673c78911

    SHA512

    3862cad0ac5e323665dfa7f4322bf0beeb0ae2bf1a3f9dad86a756b75fb90abeec71ec65ce708a6fd00443aeca777f2dd4fa865f3602223ac62251f0d6de19e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c052eb83ea0a733456936b5966548b66

    SHA1

    0781724bd4b1498b4999c67dd48d5ff615536822

    SHA256

    c430ad41ab462661020cc4c1a29d6335ece80ad410e688cce921d16a2d684889

    SHA512

    2832672dc7d50cf9fc2b96edc2a610a27466c81e3db2ff4128d43dffc562ab4855537ff2a4797584c59165dbb838904a11b25637ea8ecdad854d8939aa2d980d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81320fca31bdc40721d177438680757c

    SHA1

    4df2e199b9628aca82965f50b54f1f113d78947c

    SHA256

    59c1c3f529d411d7fbf4bf63b8febeae558dfae7a8f853e7ac345cd7237d7de4

    SHA512

    9884e2c0fcc110d3444f55445d55f3240401b80cd779895e3bf0f4a55966d1445beee7e8e1a276cbf6ff849024b8b60e2a27b0d8329431dab018dd5f9844d1f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57ed53f0f4d7669e7300ff1be0e8c60b

    SHA1

    33884ea3e32bb4f8b079ed3b29252b96d399a8ec

    SHA256

    a92a5a017e7abc55e879e1050ad1f92f379a07761c5372a0d2b8de4731777ad9

    SHA512

    fbaee1e66dbd2306e226d82ecb01edb58652dc2da2a75eb123878e8f27c098fa1297dc0233911d67fcb4a7cc4a283f43931f64b4e5b54b2972240dffce54a9ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdf2b7622618b6b6c4ab94c8697e00d5

    SHA1

    ca495daf49e292df80e8d08d0d44d23084590273

    SHA256

    4561c76318f72cd71404ca5ec78aabbaf264bb2bf60e86ad9707433ede019648

    SHA512

    a5262b3762b4faa53233e17ddf529349fbce8e9cef286acd0fe4fdc8b9e0a6fa2f23a58dff7a75d2bcd12169ab6f23b1910deaabe2b9359f7ec538524ce5a9ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbbdf1f9a598c05adb35bab38cdd6ea1

    SHA1

    2ad0af3fd62453d76faf2b14a5a26ff1ad979195

    SHA256

    4211d5e1ad31b70fd25813b5cba2d62abe18c92f56eef564c658be7a034e137e

    SHA512

    754710b6a15a3fd530f4e5062bd866b313b36a1de9973c17ad214f2b2a27fccb7181b584ff3cd9e1daa84933a75911d8367513de8b9f8678c40569767f169217

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1882ea502bf0512378d91c971035656f

    SHA1

    ee846af29c25419e0c54b58e4ec82d6de103350c

    SHA256

    032bf7bd6aea33d1eed1846d9c38dbda6858b303dd13b01d345b7d2606b0b802

    SHA512

    228bf95cfcf02e4c5562dc701aa7cfe9b467878cb778aca260fc524e1a6396a0f5e0ec6e9c0b14db1fd28fb76a632c1c7226e82f9fd4c7e9c5d03ea6a2246e91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bac3aee4376cb030ef4e0284db404b5f

    SHA1

    23dbd1c90c773347ced7fb5152cccea510a687f1

    SHA256

    fb0bc84160ca393c319ca0719aa67d14a0eebcf514b226c057c4068c58285977

    SHA512

    9f81a1a0a5544802475d56e184e7b3e751f674c6715f911bb89ac6be8dcb7f4140c5b04a7088b9e4ed5d1524cc344240a47c3d1757ad28b6c6e94101c214e8a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e61860f832528bbdaaaf87c2ea742ee9

    SHA1

    3744e63b3079b6bf19a474d06f74d322118ae902

    SHA256

    8901cf6def1e91c715e030d56c15c83cf52c22c41cc960c5546f62ad74b14680

    SHA512

    28603c19605a7521e5eb74a77b2d6d21bb6c4ef0f1145ea8419eeea75127603f45b7bcacfdd63f5b6dae1e9929bc7450c3c483fa2093c0bd1ac0c6e1ee2ed6ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96a7d36ee2e07d5ae264092317a61799

    SHA1

    51c6616431d57b27430d89b8ea47d8420cc79c3e

    SHA256

    6067b428519408543971f0b4b77a914c23621ff2db582ba08c60714923ee9bc8

    SHA512

    1e50ddfca9ff40abcc4e810ec15470f2fb99baa737d8ced4783806b4a4c67c2192fae3efaec337d57abe4bd67285b8cadb31797bc7425dba3239d79e55b7670e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    345c9c846b7b78e47a5eef107fb2efa6

    SHA1

    f6aea614ee8347abbde5a88e1528f8339b0125fa

    SHA256

    961a59415db177702e9b439cc83d3f3c358dd36ec5d19e0bd350d42b8a8fd521

    SHA512

    94d41eb584fa11de9699a36612b4f289bbb33b7195b7e19b633fa55ce4d267f632e0c668e0ea3f32f66fa0046a51c89e0b44560f340d9ef15b0e6ae2d58d3d1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47ae7579b5a7f23af82a99b4a30d063e

    SHA1

    d8ae922494445a331eff1365b1e798477f4704b5

    SHA256

    fd8a0b37cce42c79227749b3d1572cbd26a2796975248ebefd1098b4ff89ad62

    SHA512

    ac9bcd19126e578efdf6ea986df44a83f3fae0d485299ed5444cdef23b82b9bc0f56d5144fdf9c719167cf0750ce6106e1fbe8ed00414f9571974debe960d50a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa31daa7bef47263247e40057016f8d2

    SHA1

    ffcda07bc6326d0e5dbe77622aabb3b5b06dd688

    SHA256

    aefb2490fc3c8995c3c28847c3722b2c9e9dc8cc9d224b6b1691e4f17cffa685

    SHA512

    63975ac40ec71f3fe735b9f292444d9f9ac17e32383581007f40e2280c0f80abb118525ccff8a485e84e71437d2a5446a7fa3107d48f2276e7074d625c8b05cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0200a15f8dc62bf7f7b2676dffe469d3

    SHA1

    c1039e372f5379b96c4fbf273c40bf672444a138

    SHA256

    4000335146fe6bc18f2c2889c5af7372e9965d13232c455a668b62fe4253e210

    SHA512

    f1fb866d0c0ae4713f96fb8fc586a523534ad507a3d3e15f75251a941ae4f645731582615cb9303a6ef5fe403fbeba6dd29560674711073d3ab2b891749b60a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17d05008983211397f76132bdccacc38

    SHA1

    aff113a98dc726de598cd1ee45b160d163c6d903

    SHA256

    0a57dfa231622c8a7c817c00a4fc624a689cd724c3b11f415d697dfa2ff0430a

    SHA512

    9276bdf838f78356db7b29bb1bd90cea22f3e831a5aeee47136dfec4181f3f6988d3f1a8f8a2c8e941bbce0ce7c51324342f4d5fa689b94f5a6bcbf91446b1b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcf3bb9e270ba1c122776f6ec069bf42

    SHA1

    dda90184ac87ec5e8acebbf2ba090dbe7d118de5

    SHA256

    dc31093e5d3ae92454e7113b210fec112df63a277c544d374a34ea1aa5e1e79d

    SHA512

    b7d86b71ce4b9d4ece69b4be830cd1a3ba00e187660ade0980af66f3d1ca9e41772709e0670d74ad933a9ef442a7300fdbd9737c685551f988eb3416256cda22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dd5db2b7c4b692e2f023b22b6267b95

    SHA1

    55eecd8729f3c3caff87c96fa52bd5bb1f2a0822

    SHA256

    dd6c13e734028f04261cce8f2b1a0b688d60c4e6eb11f7a527a5db6be3928e6a

    SHA512

    c8b478be949d35ccb910a112c66c4b09f2d8b65c7ecf78f400df265e3b10259cfef44d2229aea608d9b418eeec039e7e4cc43e10a00d55f941b11688545b09b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e75b708086c9d737f6b098a8ca157a5a

    SHA1

    80f9040cd73b37d61170a8f1dca61461c3607b96

    SHA256

    2811ef4c93eee533a618cc432406dac96199b558b557ea77d7a9caebb2b2c8b2

    SHA512

    615c8bb9590aee9380b7a75d6faa0c39ffdbda251a684bad2e4829789a6e5bbade9191abe8394f42ac93167b5c2883f9752055e2a8ea5c087b3893a817da20c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0f7bac6f3de7a951ff2258cd8cc1ed2

    SHA1

    4f97b110de0895d1ec026a8f293f57e96d19646e

    SHA256

    9c731883e4f38a6a8df81efb580681c4ac631fb662fa8ced8e0e617d2957f22a

    SHA512

    16c7d81be7e92f7bc36cad6bc0309939b85a94fbbff789233acc4728e2c47d3270653b19ad15ec6b9479371849f882f1822e44540c3477aea7fa1d21ff714d56

  • C:\Users\Admin\AppData\Local\Temp\Cab7B0B.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Cab7C39.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7C3C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2088-0-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2088-1-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2088-485-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB