Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 16:21

General

  • Target

    2d00dff4094ccc926f8afb5efc6825fd_JaffaCakes118.exe

  • Size

    37KB

  • MD5

    2d00dff4094ccc926f8afb5efc6825fd

  • SHA1

    0de722704be3837e1c29002a69552f4f9f29983b

  • SHA256

    332cfcf2835550e0f350150d4db3854e25e9f19df06eac67f3123ea976ffe96f

  • SHA512

    8a090acf66515e165022759294f519f5fa5531d76d6bb160ca110b5b3d09913f30ad783756b97154eade69a892109a444fb0e2eb4c1d465725a887b4553b6c21

  • SSDEEP

    768:jp+7CWq6ZpVDbWZ70zQ1ht//9Za73g6PZdHSWpCOkIoyRC/JHfS3Y:jp+GSZpVnWOs/l/9Za73g6R1RfkEQ/p

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d00dff4094ccc926f8afb5efc6825fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d00dff4094ccc926f8afb5efc6825fd_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2768
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\dfDelmlljy.bat" "
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\jjjydf16.ini

    Filesize

    108B

    MD5

    4445bf4c9be817dca4982c556ec4a432

    SHA1

    7deaaad0318a96a9df6a6372d492416113e74d77

    SHA256

    6b6ecf22bf26fc6695cfff6a5312e955981117abfdfffc7ab3364fb6a018cba6

    SHA512

    8e6d1fb27009b6bb0c31e79a636aad0115ce691a7bfdd9cb6c36d926139f4976ef19403dc35dc2fa33a02302f973115275ea3974e32d0b6217bfda8b71b0b3fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6a8ae78e7e33b8e0e2ca9e41917556e

    SHA1

    4e936f129808ff77ab41b6c5711b6777d1129c77

    SHA256

    e52b2b6f63627fb6a1f4a0df572a74be2c38ea26321ec5a2315f75086bdc3ef7

    SHA512

    5b57810e8044932141cca9eb794b353bf8651a0796e7eaac8eeeb29aff2e9173f81716eb752eb1848b52f0bfee1ab19d8ce1f6e5ebc29a037aa50ab9b05033d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b18b0cdc5469d6a8696c191df8d90129

    SHA1

    f1d172a8c40b126c4b5207f81384c6b769a3b1bb

    SHA256

    5e55d72d91152902ca727f89c27f6cf225b4f0318c2c841e7e725653d89945cc

    SHA512

    5cfc916b9bb46fb9b66246fa944642f17e2f7c7e873d3a0cf2c787e44da44427ad0725f2ab0f20198c62d1fdeb055c0059aeebc1018216230c9fbdf5cf3b4ed8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1ce1fedb982bc9ec9a4c7f62e85d369

    SHA1

    dd8672e4fa1bb9d17892488c40afb96885287379

    SHA256

    626d5cabd3ac7f6ffe8a5c9255e6a86aae26666b5300c4af2ae89ce2226d8e2b

    SHA512

    135fb65511acfac21d527d54cb72c8587ab6c655257604d4c63d504549dc8173f5d6430bcdb6e5e6233d666bc2cb32c73bfec171de160040e7b46caf6dc26557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d640338db72bdbe29131fb844837bc98

    SHA1

    0be7a6d28f9e4e0cb212f7705d20ce83d65eed2c

    SHA256

    53b0e7122f825e2cd2f4a6ccbf5fbe4a257a713ea69b59a07f4b3377bb9e492a

    SHA512

    0116cbb653d6eacc48eaf601d3e49f873ec5943356ee55f34fbcd3589a53a98d07e933b0e02c2886b5428f3e0ff35f65d7ccb9dd9a166495061613e50186612f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e00c1159cd54f444abcd643764045036

    SHA1

    419fb1337d658943646def2975e7f6904430353e

    SHA256

    cfc78fad03e52c117c8f4a829fb580cfe6369f15fa5951baf646b3b64363c2d3

    SHA512

    c3737b07b5dd6aa8abde5d97200eb00629043e2da85206a0c52cf08fe79137545fd700d34e80725d0ab42f613968ea6f17a85d3fc88d38dd24caf58c4ad3fbd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d2e9566c07f52a4d41006f7a74e5c31

    SHA1

    01dee7e824b94bc5307823d032a2880610eff195

    SHA256

    f920fd55cf003ca2aead9b8fb289b878cb73e777a1c7f4ad9db2cd1ffc706984

    SHA512

    d7536725e603a52984cfe7fda79c81902601853742cb954c0bf0c3c20fb1cc28d682918212fab195373e56171f4eec62daa30f995d986c650e60cbdd06e1ea7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3e3af9cfc54f4e1e891f13463a10d8a

    SHA1

    5059cecb85f621f50c684f2344e480a8a69ddacd

    SHA256

    5fbbc9d8227087d05c70b87dbe75c11b8036556b765b78b6a4b1c2e553f15a79

    SHA512

    0ae1f61833f8d62cfbe76a9ea8450ac4e589d6c1b86c7588d4e82d40fedb1cf04fae6157ae97476f273207177b0d7c868ba7dc8b0f7e866326403e9a596f7aca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5b55977484418fcf10c18d9a6d14f97

    SHA1

    efbd632f3e8f93a3927147cb881e53e49d3b708b

    SHA256

    b47a562e777aaff2661d0280f4d3970900015c1a06fe17a5b3143fbf0018285b

    SHA512

    eab07cf9531eb5056c0f210c32e7218edca6cd5ec83f801514fe3186a3fd04730e79d44f21f2cd5c0b698c31231283d761d7581d881b834b035b9e15d14a571c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7cda0022ed46b800790c68d813d2645

    SHA1

    c58308e40f4f5233661acd8c3ecdf1a150cf874f

    SHA256

    ca32fa219469e2ea100a825ed1a10aa0ec79c0db318c0e0eced8c8ac90e17052

    SHA512

    89913de18fd5768679532fa5d4c22ddca9c4068629d4a7ed1825e06ae95299fae9104a012a437ab5281d5fa423b821f8e368c667b1a60b1f28c57300d4de5009

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60e01e0469d7e47513b9c43c615c4b6d

    SHA1

    192e70990c7daa73b0ad665931adc8071d1835a7

    SHA256

    6f246001bd98c42bf917f4eace2cb13ae0dbb3d9dcba8eb76d95cce354a73ca5

    SHA512

    3a0ca76a0cdff7171f011a212e01a16e366dec198116de45c936e1176d585e4ca847db0cb611525ed6c2cea5f0d7d8554ced5c6ad71fe6dc3155882fa6d110db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11f04d1624494488eca0cb1739a5dabf

    SHA1

    f809461c4703530aea7947e87d1b9b72450411f8

    SHA256

    4c3655e10c50b7c450fa64e8cf09af1fa29404c6655722d1535ba7d138142659

    SHA512

    14471afe20642fefcca6a79e6bbbb5e641314a299138d26acf18c5ccbdd35543554b5d3b665ecdd1bde5d49880502a383abce52187ba8a0c9594b968afafb73c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30a91118499cb02bfd7a4abdab27eecc

    SHA1

    82c79e5a476a860debd3e0733fee74715961eb90

    SHA256

    9bc19e0917a596258d757bda0bf1a81944e7d765ff2808f5e430796349e0f9be

    SHA512

    c7d6c7187e6228bd46df5230d7a1f72e2314b4c8bdff34075cd28514cedf8c774fb029d50f142e66520dba963bc55753bda8b735567b9f42a50199f11edb210f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99fed9ce9955344a42e0e1a74649a5ea

    SHA1

    c631febbd13dca63b85587da5a122f70f078d1c3

    SHA256

    6b30ab140ca97d5ff55de49f3853df8573c0aa7862058d968f611efc81e77fe4

    SHA512

    0c316e390bb6046cf8c9ab4fb8840f03e4e74d40c9b7bfce4dac27c54c525c9dc1c48c2f23bc771e82d686776fd0ac780d436936d858aed7716e7099ca046705

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f90e855f5388d8146732b0763b2ec09a

    SHA1

    2d01bf5f1f76e29a8207c41a4be1db678cef961e

    SHA256

    1f333777c73ad539278dff3e1d030a38f0bf1a30ca87b76ec18d18fc73378bd6

    SHA512

    3003a58b6907a85281a451293a54e2679c1b9281b5d032bc05de562744dfffa52582607e0348140f3767230cb812fdf48c02bf16bc0b1650c52b11951f080cac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fa6166601fb5518533efeb7bf70ac14

    SHA1

    e5d42116a714cb4aa55a67b68548c835859bdb87

    SHA256

    176d3f3c17180fdba02fb89e7ba85d453f9fcf2c2d56d2abe82111448f73b30b

    SHA512

    18a832c3dca0f0b5a93b5f03974130aa20a6a9cd91779534f378cf5abb795190a874d9d91f28decd8365fb6b491bec4dfc9af0a5e5f18940511be84640e350cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f82037fc79f0af83d2ccdab0475f92c8

    SHA1

    6f5485fa55fa7e8d024d685b82d937d6e9150dc5

    SHA256

    f84e5bda66c5260dd544650be8af8f9e03aee72833c355006828b3691cb041c5

    SHA512

    e0646085ee696ac0713a0634f4ae1154f2b918694bfd3ef54885f7b5e3ee1cf1a661a6d08283135fd9f3ffa9d79649ee59d06167892fdbb165c531ec2aa6cbaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39277c02d57df4b38e4050b3651bbb39

    SHA1

    9371330a9f4a71c6e6811580a8c74880a40f084d

    SHA256

    cdc3a2e4a8ff6988c1d7de96ebf50a3697898c33b73c0087fe88daaf32b9a1fa

    SHA512

    b4b549c7870e3ce7754b6308bef79c3f545db43f798f8eb2855c248dce6a4cfa85fa4cbd106b1192a83f8d5b4c1b6725cb6895f6a4e4e7ba4cbc6ec74d9d7fac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f8e951ab582a3c372f445cdc097e20b

    SHA1

    d060134b990204325411c9b270fb75200e884dbf

    SHA256

    195398e3bf4b72e41a2b18b13331e0054957bda264299236a55e99b607bf1eeb

    SHA512

    48670a626ab69da256b0953896aaf14892a47c5844a655b3101197d336f21eaeb659f183b063b13928219471282c0e520532ef3e4d9b7f188dad4e7cf6da7a88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c7d49338135b6f0f3dec2247dabe2c2

    SHA1

    e805dc3dbc557804c338edfc89e31d609a85b79f

    SHA256

    9a6f98e2cfc146368b38e34b2fe6266c6f16aeef7a7cdd7acb1eeed725c01840

    SHA512

    b9f41665a5877785c39aeff6ad35f80f4719d0b8dd9e02c1e28a127cdd9a64dac8d8a1734e4f6746618148ef7d41e50de37b195bceedc937f3a55c2098c94bc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44cc29efe768b3f0b374ae0df2daafc4

    SHA1

    3fcb9814ee46f5ca31d3bf855525957e3667dbec

    SHA256

    8b25272d7cffb0e3747ace2289b2a9650bd8bcda8b2f07a3497a5ae27e411ff7

    SHA512

    2f446cd9ebc10c576c6fcf8b4860dfbee4dbd3bbf0e02b550aaad0e5b3683da2c4b19266b8dd4bce3fd586ac1147bf6e13d2ad6a17c277da9b1c340eb0b29754

  • C:\Users\Admin\AppData\Local\Temp\CabAB5D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAC0F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\dfDelmlljy.bat

    Filesize

    233B

    MD5

    7976b847b8ef0346e0d08a60596fe23b

    SHA1

    03421f84670ac96616bfc5529434725708543b40

    SHA256

    fdeabff47e2e9260cc3e918f101b8027ed339c17cb8dde720851b81314c21eaa

    SHA512

    00166c3954c65c2507c24ee0fa79e62b15a80d20d458ca4b966a4813eb6344a714dbacee3b564c5f40158aa6f35cc5ef5d5840ab452d7b406affbb89ab3eedf8