Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 23:12

General

  • Target

    36c859b36c8f722fd280edc842349a50_JaffaCakes118.exe

  • Size

    653KB

  • MD5

    36c859b36c8f722fd280edc842349a50

  • SHA1

    11511d67afd2d798ec3ef790b545106120ad4626

  • SHA256

    3c61a6161c03bac5d04e90132893876613d01589484563d3626761b8111adefe

  • SHA512

    da871a9a78d5c866745af39df425ae274e5cde37e2214d9a9e32575b951e19aab6d059a65b06788d339a1217089d74217928bb52a9af650b928dbbc498457177

  • SSDEEP

    12288:waWzgMg7v3qnCiMErQohh0F4CCJ8lnyPQ/5:3aHMv6CorjqnyPQ/5

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36c859b36c8f722fd280edc842349a50_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36c859b36c8f722fd280edc842349a50_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.81830.info/tg15.html?2d
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:406530 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2764
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d4e4fc2adf4bef39c98e967543a5aaab

    SHA1

    a9387a2b00d2e4d111a9733ab0391fa4680f4f92

    SHA256

    185d5920f98f297c1de2c1b81dfe3ff067ca0af9c0ac84ffe8822c60a5bc8288

    SHA512

    e3069341889411869398ba7862204507daae30341ad10d597e318fe6faee5aa9c523d7436b351086fb37888b45f6e72ffb19f223ddd55b90a3c8f05d3fcd2423

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b1b399216dcd34665139e6094144bd3a

    SHA1

    c7ea6d174587382b7b911ac9af0a7665ea5a45ed

    SHA256

    253a44fb295dbb64a0a1ef241cbbdd998f302010fab07703018c9f69020549bc

    SHA512

    08cd6a254c45dc94052147648ea91a1de1c68f91266ae7f50094eab80c3c24eb820f3e09fe3a4846f2c3f48e66917a7636789c0657ae398e46e2f41492219470

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    623479d8fa3985f3106512550af5e93f

    SHA1

    06423ebc5d9b103988801a11924ce8cbeb39961a

    SHA256

    3cf256095c991550ba741aa85963cef65ce1c041429398f900277b11134e5f18

    SHA512

    f39b5f80b5096f21c61396732e3bffc2295e1be577f97eb736349c16742ca7468c001e51b4fd434d607e8a1de5317dd8428b44f5f3335894f35c79dd7ceed345

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    364229504083f1d9ce24f04a7ab564df

    SHA1

    65d91a97879ddf7d6a8f028656f2a075a130add2

    SHA256

    2f497d0c92e83991c58ca404ee81c49ee125c7160b445cb29f21da7f72e6c44a

    SHA512

    1b70f12f7f0aec0ef1ac4c7a10915662ec1659e93e3fef652256e7c59b62880712878196f18084624a4bf96db26d2b4e457224571fabef3cf59923f725fdfb35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    65547b8c5a86a5f2b9dfdef96c2dec4c

    SHA1

    a230d3b49330798acbc7bfe6f2e030a9f7908d64

    SHA256

    4ba75a8ac487236b7437d97d0e05de3c8f9ba9e52550b77647f2752380ab8b5e

    SHA512

    54359e75b5c4457b31000d193efce83b98232ec6b220c51096f2053945d416987906a75e964097b34bac1c8e7e7c07110ae83e53412e106594739ddd78fbc200

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    37e9af766a95684619f951cb62c81e74

    SHA1

    dfc906de3c4c2de2b0e1e26ec822ab5ff7432cc9

    SHA256

    79e31386ac1d0ed46c9a51e8b3fa3375607182fb418d16a78a7726aaa9dac74a

    SHA512

    662a79184b5303fe66ea6eec244e1bf23e2b534394ac2f2bc9fcb42965cbd8ec06bf1a1f9230fc6e7203cd843006be3acce608979a305fb1c46d848c72a24382

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c0cb075c11c079cbaa838976d8981946

    SHA1

    eb4ecc3115860a2f0be780ef30e63ecd79f8afc1

    SHA256

    068eb91d1f76ee2ad99ada57f6fa5c0acd465d8a334845cfce606511cccdd647

    SHA512

    c96629d9e63aea0e0921b591b8e1f0c369cd93311b2217c8346cc8551f4111c3012797a1e6b38bc83991acb1045bf5f05e75ef679f04e7ed99d75307c78a45ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9046438c45985aabb2cd7bb85c336fda

    SHA1

    37d85253d08860bc76f0954496d18ddd42a17082

    SHA256

    ef351c45e7440638cb518269db81cf2a0f1985e6748064864f9d8ebf2db6eb15

    SHA512

    1633b2d314da4b40c5a95f971342f6872dc2a92137d4845e5886a82f38f9b0ada1ad36f726352924e892e8bd280496c8e696c709678cfe6965cc6403cee6fce3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    19aaecca471cace119e9f82668744e0f

    SHA1

    fb60897b99a6681f9d199caf8e2c35e18b343f50

    SHA256

    6e9e13f6fcd0f8518f71347cd008fa0aaaf011306c61e44b45f474f80029d59d

    SHA512

    bea3ded9bec67c355db87acc9ca9f480aabee7d46a68ec1f9f657676926625f48b62963cb32c5093e1787ce66114211e9d21a6959780599f6a5ee879f2c0f0bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4bb9e1ac6f21cabdddbeb3d085050d23

    SHA1

    587a4284e75dc6f32735f5278f2118218acb77a4

    SHA256

    2e4bd909e88f540836cb163180a46db78fc80272bbff5e342b228e80e888bd3f

    SHA512

    30c6fdb823be790322391c8c6941ac3cb7a3555a41d9c7336cc19e803ad5c7c3a6909168be8805b8e90a199b5ccd16fa9e9f8e02285838039d3539f0bd33088f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bdd2da1fb52ca9138ed7523fd0703eb2

    SHA1

    a97a9bb19588f2f009d94799c45c0d7c2c6af680

    SHA256

    64c9c78cf1782bf7744de1461b90fab2a5c11279435a725202e22e8c3d682295

    SHA512

    258a208f92b84f8f92c4911a3c545a5ee0a5faab7fe617cb568ddf9e8821aba4ba1640d192a3b3029b8afd6e5632cdeb50c480f63fef844eec4b48e980a80380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    df8c7ae81e4b1ffd1b489142692804f9

    SHA1

    73e9a4bcb87cc8aef028abe7a3f2b6de5a43cb41

    SHA256

    69f9c4eb0fe0daaf9ad1b39a4fd7bdded04b33ffe267ab45a712ee38a9998c89

    SHA512

    4bfe5347a8b3c83972153048dfbc19e313bc48d062d92dbf17a0b183503a7c7342a1df3aa7057c0f076eae2cb48bc42721fc9eee6a0d425c46f03af637a1ad48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    81e370a71a05864660007c5621c18eb3

    SHA1

    406b3f9ea6520bd449dc7ce4005d6d4670a9c377

    SHA256

    e375a9f4bc6b47e85c5a3272288431cc7fd6581938445a7dfd0da56470c17f48

    SHA512

    5f96bed735171e16dd2373deae41f646d54d4ec91e41ee6c9dec1ad04d15dd031b997145e9c6639424070f580f2c078adc0ff5f8444ee98066a41fae7e8c2e43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8e23177f7ab0aced69450ba006bd74f7

    SHA1

    294ee2bc1ae3b29a27ae87b28d0fc76180e12c1d

    SHA256

    a53d1b36ed2b4aa277f1d8939325d789ff9a54c0c38a665a275371f9b98f5281

    SHA512

    5281d87763602c75bdf5dc2042c1b1b478e8fc6ff62633df3a0bbd874dfa810627c040bdd0bfb945c93c8ee78fdaa45442fda5af64b4c1a033fbc246a005182b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    921709d2f11035b76c677d5070591608

    SHA1

    eba0e9ee1aa5b552c66a23eb390b1cb6597d5370

    SHA256

    4833650965d08567622a4ef9e8891163c6a4d56a9cad9a67d11076e74abe4c88

    SHA512

    bbc3fa3da7f23155fcceac6bd9ae147b2aaf85ec69b1ab7058e09f1ecca81b5adea0cc5efcbd4092cb3e0964a06580c19abcb61faf00ede58be8b0af846fbae2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fec63b42892e884bd484dcdbccb2f251

    SHA1

    9051c2bc6bd024ab128b42a93a4939ed490450b6

    SHA256

    855beb40f1de1c39ad6d5735d25ce345078732e4b2187bb0c2a11c4a014e02e2

    SHA512

    0ca687bd2cebabe5f1592b0e75134f3f343f40c4b3532f4a6a442cdfc41cede3752e9a5d2f510d88c904c0b26bf506f199251e5d67252c28a66610342c8e548c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5a9e50bfb1d61060d1d149477c693c9f

    SHA1

    470bb38560a3b839f4759f98cf84b7be93675634

    SHA256

    4953cc099e50b9968793c74471fa07a6bc8abafb66920ca78c5792b94a069def

    SHA512

    045f34b1a5b1ff1e4809c9ed9b8fc218504c9150b8db9ba20dd52213f0988f5989ae369f341cac024b07b7f9a2856c0e2748e0353dfea9012c3db7faa2ac2a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f346e920ad8caf1d7d6d14191fff49c3

    SHA1

    264d5b078c9ce8c1251f36a9fea108725cdd285e

    SHA256

    c2e7942ff259cec15c0396cb0593bd81a24eb59158672a5f1cc8249716ec9f09

    SHA512

    b22b86ef2a34ae49f70e6207703154cd2b597d410c02827f79dc9a7c14e2caf01694f8d056dcf6abf8df5f10320d0cad5255e7d290a46fb7e1ccffba5f8781ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b1954ee049bda6c8786f98c89ebcba18

    SHA1

    a5ee28bf153b4dd3017218e9c92b6c20fff0d133

    SHA256

    4c6ca0b2e87413c32e1c44520cc78497f86a851e7ea5bef4715ef972767cd738

    SHA512

    117dd5643a8f9773357cf6a88f5fa1592512f6e5526d223c3a16327184d82cd966b539fedbc5173fd8e483d6d7503d6c1e697caea63398b0a02aca120b327e78

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D51379C1-3F11-11EF-9225-4E18907FF899}.dat

    Filesize

    3KB

    MD5

    153b7c152224bbef9b4f5fd200853d74

    SHA1

    20162cd034a796f8c7fb317126193b60d2765050

    SHA256

    134e84deb9324ff1192424357e2aaa4c426a740328149e276160849e806d00a8

    SHA512

    54c000e99818398a479506455eaa212e80c8cc4860890db54d6798b0bc54a2f6f86bf97f31d2ab0199ba7c5e6ab978736fdd5099da4bc71e1c03abcab5c456e4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D515DB21-3F11-11EF-9225-4E18907FF899}.dat

    Filesize

    4KB

    MD5

    75c5ed5ebf06f8ee3e610753e7a7175d

    SHA1

    0fcf7284507df92a8434638fe03b77b005a7ab2e

    SHA256

    f00a5d9307f036a421e4e09bcc2a3d09b70f7d8bbaf2437f6f663b447faad0ce

    SHA512

    54f9c92c94d956b79e135618e5f7118a315cea965402a4fb6af1dd1fbffd0ada2a439ac9c93d0f80c44f5afacac97a6733b8ab6ec5d2296287cde7f99aac498f

  • C:\Users\Admin\AppData\Local\Temp\CabCFB1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD050.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b