Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 12:33

General

  • Target

    26ea91ed684c56bc7b567d3ed49b6f31_JaffaCakes118.exe

  • Size

    954KB

  • MD5

    26ea91ed684c56bc7b567d3ed49b6f31

  • SHA1

    19bf4ae833c958aafa17cc019fa0cb4b98262669

  • SHA256

    ce38c2568174b810a2132d54e52d1503f4c3255bf2dfd92447b8403cd2729a6c

  • SHA512

    6bd2170a0dd361bf4aa35cf99922ef7c5365e28953ec4d28c3685ebdcc62ad1c990fd8a9e83fcfcf599f3092adce0beb762d58e3429385acf3b4a2daffab5ecf

  • SSDEEP

    24576:aHrsjXLzoE2KIH0ekUm0PVUYCYiq0EMJL2J:OriSHtbv9UyWg

Score
5/10

Malware Config

Signatures

  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26ea91ed684c56bc7b567d3ed49b6f31_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26ea91ed684c56bc7b567d3ed49b6f31_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1648
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be6e847fce158c2b2ca951f43cc573ba

    SHA1

    8f1306bac0d39cf873960079f03463915bbc7b90

    SHA256

    86a5d34dbdd0550ff6939bdcfed09ee2b7bbfbd8ba49af11c4a1c68a1fcb57ab

    SHA512

    5ae15a339698c4dcafb0140102c7ee9351ed01699d340704a2241ecb30128b200f5ccfcf3c1c071fd5ccd0f60dc576172caf0da3a50f547d24d6befc154dfb7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c252d35fc0cb7e0102ecced622cf9e20

    SHA1

    ce761d4687c32b1277c6c006a81a9f8537b69eed

    SHA256

    1f0b4f5cef213f22d611a65a0eefcc12b8d5bf88ff96cfc6f4a437dd58d685cc

    SHA512

    743058d5f592b7ebe1944d4e1e77cef277b0b966f6cea2eaada183aadf7e8e100c4625d6e549156cde54228bffa7a09e1e57eacd692530557b2d6f69cd32bfb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8032fac6376fd9f4fb997302cc7991fc

    SHA1

    26cddc3a4aea56c0d273a3e544590c82a5faad0a

    SHA256

    74eb8d1fa0401c78ed09dcc49e231ed8b148871ea90d545652bfc58ed61d6d27

    SHA512

    28955f48785e1527a72b7d9e3b482b9e043066225be0b8211fb4bd2b5797ed931080f8bfb640bcce9774d7a8ea00f7be90dc751d0fc8fa3906ce03f44578bfa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd322e3f793bc254f6163c086d00a770

    SHA1

    2ac6f4428766635461a8f3f8957510051e355ab7

    SHA256

    ad4260d2f20849598241e446c5ca09ba24122b53cd26cc03e7648df178100944

    SHA512

    095305c5dca306a98acbf095e566ea061c44f796e5dd3c944cfa751118f0d2d49bc77c0f53bc8d7edab2679f11aaa5504b861685ff770abb1a5e6cf487d5ffeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dceaa2b46437f2a48c51365bfdcb175

    SHA1

    421405d75b660a6ab61ab3b13a78273b89a409f8

    SHA256

    bb78f3602a5c5eac53304c8e5a0c15ecff8babf7e3fdeffab558b5b912df0a45

    SHA512

    c1066abe3fe5a4f755daf772714b5f492185872de52bffd8db14a93ed198d7e06c836db2551e403520d2a2c5188deaf37a229813ddf41def2c6c1649ee703dc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4b25c50e5a9eb5a37b9351d013c7c40

    SHA1

    dffee61decf5396e6b987d83600cf137fe86a6d2

    SHA256

    410f2550ebafa5b980ad2795cb3dac0b21eb90939f39c53fb0a09e8f76386f50

    SHA512

    02f5f46ad8a6ac9c81437b18bb2cf594de8fdea8daf2d7ed29c4ef838b51ee8cf46f7a20c4e4307771aa1f4ff65fd99c6c1532ceadd66e6d427efdbe09cc2a86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    703c8901b9e4b47b7cb69177f360e990

    SHA1

    3883f4058ce1b63420a05e15df94ed6fc14aa732

    SHA256

    ee7c6e732756f478c3de02082e50370b990e9f3081ed5437ec416825de40a7ee

    SHA512

    1a9a3e43e81da5ca55798054fb324723d2ff953226fb8075d51bcd3f66c56fc7fecff75afc2dd944d70e4ac0d3692604c00627028d51f220916ea82aa2ba557b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42525242fb0fa6a285e8fc6f1b46516a

    SHA1

    2ee414aa1f1d441bd291065ff2303d3a8484b942

    SHA256

    c7ef8d279f6ff449a3d2746842a1dd7eaba72925bd46e1e1bc3837132962bc96

    SHA512

    6bfbe1c498598baaffb5e6dcae64ee7a40a08427da7be8ba07b192077d34864cd654066b835b919f21da54c66c1301645e7b1c3acf0258f98a76fb8e3e14e504

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbecfcd7e83a72528a6a9309e368bb4e

    SHA1

    0bdf240cbd697b3499c78b05b6c6167a1a8058b3

    SHA256

    fdac1cd086747dc1a8ce2da0b033ad709668fd912e121dcda722e5803555f52b

    SHA512

    b08bfa18f823e00bca92e3942329fb6af378b0e37f6e4038ce441d15368cbe624f8d2cb560bb39a1584f68a087e3917ec3b10298519a2712e6557f2435d05fb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b25b31b14b1d4cb1399e75c90ebb7b55

    SHA1

    ef305fb03fc9604676fdf3987b7520c499c54be2

    SHA256

    6de2e2981016d9f1c2ccd78306e83cd0308904b55331a11c6d8f048ae29fb187

    SHA512

    2fe097c00dbefe982980c1b8b525f136f625a648f09f1df5677a1453700c9e0786046bbce7c54ab5bfffd0437d57ba82e404a7045258bb379f043387cd0127d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b8db646b0534a35d466b99cdfa0c51c

    SHA1

    0d6a24727755c92d8369a0826118f6ac7f40e5fc

    SHA256

    0ae69d98ff3c22108bb2c9460b21429f1744ad78669a22d0fdcd5ccb68cf101e

    SHA512

    a5da357f19ae845c21972f8f5187a780236c33e25788059f57075cf070dab031be8bdf8717b2ad9676ac119b8932c40611a025398c860d52ba7588dc0ca206b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88fcf867aefdc03b734fadce4deaf867

    SHA1

    8be1b5786ee9175984cb3a38a90dcce0752f04e3

    SHA256

    1f919e041a32be101f1a586b21235a495a7c4fc9cbd76ec6598bd90e97c7f654

    SHA512

    357a02b4055db020ccf857b8259e3eb322400566d8986026755f5a3f6a98d9a7a25d7bf7b15d94ecc805ddfd9fb61e9655c135b5131377c12258cbc763126f6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1de733c825f855566214d050d55d57b

    SHA1

    15db68fd3ee39b23c46a0ba71473ec91262702c9

    SHA256

    609ce3199a2970b6e1e04d42e7c064956c2e9ffdddaba3158d1ea185f6e37965

    SHA512

    cab73ef52e57ecf01fcd41d53c42a40b2d30f41dde218197e6274ef75b5c6c8dedfc21a12d5639b29d4340e4181ad657faae68ea2fe6b00d2fc806b485f4bb20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65d176476985749c1f3e12dbd5f6487b

    SHA1

    4095a5b7855cc43ea549fce1ae95e8c5be73f56e

    SHA256

    4ba24137945d981a055e5ac6a9d77c31623305770ba2fe02c371cf2e45f374bb

    SHA512

    22219fa5fc8b47d750f6b07eaa4d1f906ce0c5e778a661e03ef1da9096594685a34d58386099fd50b9c7707c24a8854568b1bb9c03ead05d5af81aece7991b93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09b50125bc2c3a64403a7a60e2590bce

    SHA1

    e9dcf3f87a6fb0276f52dd7cc1ab391144e8b041

    SHA256

    6db77f0d2cf99d89c091fc061d6654c9349207ff8905c38821accd04f00b07b9

    SHA512

    82de66e2ff013e10f49a09ef84f639be46d3369283b5193575e5736f013d22689b10fd7855787e9fdc53adb2f53e47b9355ae1ea144a93f903d7638ada59520a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02a5cfefd938df57a0f37c7f88049fff

    SHA1

    b9b36c55e0e72209347d364013a06a829079b3bd

    SHA256

    735452846ebbe98f6a20f46e6556141677e4e58af2c1ec9513a8cce681a8754b

    SHA512

    66d9bf911f9222a1d7e76f1203c67ef6c475f12114318cb2eed2901bb974c0cccd2ee647c25e1980314a7222ed8fa6879f270c8091fbc99a4b51dbb6fdc6be0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee832318269b5943d3cf15058b4fa516

    SHA1

    8e3197bd5dcd559d3e29f57f6412105f594b99d2

    SHA256

    2cbdbbfa528edf67e9f06a396faa7ded14e57ef285afafdbf62b106e3485cba7

    SHA512

    871891c30a0125ef664560f416beda0a2964bde385ad9d6016df8b702553ff9cd1e97ca99afd70006820fb440c9022fe884b3ed422c145c0e6345b34a1ef6914

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    297404140a72a8bf2dd6e017c12789b1

    SHA1

    c04c15c493a045793568b153dc70d5094d4f84d5

    SHA256

    99ccdaedad904c15b2ee06dac99c90d665cdf20288f80e04b6e091d624e07a25

    SHA512

    1499a8a8e2d0d4c6b2a9430e865493bd52ab9b7aa30ff52216c6811dd23c08437e2d14b60c4650dc693332baadeda5484c3c30ec73746dab0dca5d7f85fb9e3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60c68fabb6c2c1a50d38ca1e0f9ac001

    SHA1

    da872d7061a3c9b3ecc79b8a1f84403465fdf0b5

    SHA256

    a1ea876d01956034bc9c1768a040ed169a122721788edb153277add359fc2593

    SHA512

    827435fd8ecf54dbced45b361940d6444aaa8b806bca71185fe39b4736ffe967b0f013efcbd51a0ddcd8b2795f92518cbc9b7acfea840c98596b535ed1f28d81

  • C:\Users\Admin\AppData\Local\Temp\CabD942.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDA00.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1648-435-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-440-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-439-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-436-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-438-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-5-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-0-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-434-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-873-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-874-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-875-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-876-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-877-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-878-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/1648-879-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB