Analysis

  • max time kernel
    138s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 03:59

General

  • Target

    333929f88dea45052395c4d6d03f21f1_JaffaCakes118.exe

  • Size

    94KB

  • MD5

    333929f88dea45052395c4d6d03f21f1

  • SHA1

    1a7eca90771abb968bf20a4af0ea66feb69ecd2d

  • SHA256

    04c3a2d8bafc35a5e16bdf110ce90673e642c3eb92f9c6fe69aecb568cc76d6b

  • SHA512

    4536ed259bf68119ea6a69ea501f48a0599bd82163d5297099dd9240345e8f5b999114f1eea6278a00592449420e3cc0446e89bf909349cf6e2a052309a1e533

  • SSDEEP

    1536:Zv6QFiwYlh1o0PSqbe3j7d0Yl/TyC9R6z8W3J7PVsui6a9/Rwx2N4Yj:DFi3h1zaqi3uO/hQJ7PyH6y/iU

Score
6/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\333929f88dea45052395c4d6d03f21f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\333929f88dea45052395c4d6d03f21f1_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2232
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1252
            5⤵
            • Program crash
            PID:272
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:340994 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1576
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:209932 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee43417ba853c20551cd6df3b6883749

    SHA1

    2a273a2cc87d376c49c56a5d1d341a531cf6c5e0

    SHA256

    c6a1433eee156f786e86739e4cd692fa938cda48e1c2ff0d2a9bde3906b889ed

    SHA512

    80eceedb51c65433b843dbe269cfe3f5435ba3c0d91b02aacfcce4b4b915fd396b8b864c29e926899867bab9cf4e0aa2e2df76801aa7929424a2188253e2688c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eeab87c9f8fae7d78e70b4e16735efe5

    SHA1

    54eae6ac6570151a933464c541fefa0ed1f51dc6

    SHA256

    83da3d26354ad3ba9797b37f6a320396f86bbf3d8aed340c6976664523fe7ccd

    SHA512

    bb861205fce612f9916b4862573a3b5de5cce962bbfca0cac157e4eb09057ff079b674c2b8996e153953aea39eee6ad890a769ed017141f892570bd3fc2ff147

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    386cf57f82f54e853adc1410fa40a26b

    SHA1

    d31cab0e24fd6bc32e88bab83a9583e8f870b154

    SHA256

    f7e404cb81a88824daf726c52acf3346dd2e223a8465e2361a3d7055a88ff9b8

    SHA512

    f3bae445355e09ee56f5cb74a32f4c8774d79f3f94301069fc070a98780ef56c0789e39b876e30e3a1272cc036d6b21958bee951b14ef6651165b78dc7daa226

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd453369be0eb1e59c6872dbe4f2c16a

    SHA1

    564d7040e6cf1f9a227d3e9159bf51260352ab05

    SHA256

    38feef5ba956ecd25913a39705fa1951a5e7b4ea7a917b47821bb66c60b1c4b4

    SHA512

    1124fb773b5310858b9147972b2bc8f38c799800da4351a559c0d9380c9d0e66a44572fe39f660fb2334bcaa062b562fc4d83bb11af908caeb2fc17a5f90faaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a90cef1df9fba77700c44885775f0fe9

    SHA1

    d4b133df81a58355054c7ec83aac8f1075775c3e

    SHA256

    32145b1c204dae497e6591167b2bf7da6cd073deffed4192fcd037ffa259d24d

    SHA512

    35021c2e8ccb9410b775529427e9c290f68347ec3d8831d6dfeff773e550cfc44aed6c06573016ed00ef706f0be2e0fc25b7b22f1f59cf57bc410e5b1ffb1937

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbf6d03cac2452e0e03d008b63801515

    SHA1

    a49a0317b341b278e0e830ab0c76555305b25daa

    SHA256

    10434e5b82aa5d0d3ac22810aeed91e117f29ec4edb229bef15c9663022824cb

    SHA512

    62f66671e640aa0ec52eacca020599a11b3fd1a585ae7a1fbca745b1ed379d12184f2e00f86bde13a3861aec0fa4da0cc5e3fd1b1732e226a47e53c9e31dee81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fccd007b4e21b4aa9b9e2629c9043f2

    SHA1

    41a005fd5b6f7138fa5330b94ba5ae93992e3649

    SHA256

    f8f2ed13bd16ee373426e77f44aa0e4e1209acbcaa1f7d975cbc88e2560d08e6

    SHA512

    0b00d375e758cf7b23228868231c7f8d196341222510c05a8f627aec008fb8cab4edcbc576e37fc89257fd81b1b20779cc90c295fca907e0e5c9569b9d8314ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4ea1654dffa8a13394f9b144ee442f6

    SHA1

    5332b08be2c096dc8b40338b7c79eab712590c89

    SHA256

    9d4c3f43a6a908fa6e52e31dce5236dd85b2b59babc9d141d623f7476c1bb8bf

    SHA512

    870e5879cd80f0f47b673c2aba05255cf8fd5821f962a6e9872523583b31bb7c0a3a148a1f847c0acbb4ffbd7b48a3117d8410482c54c8618f6e4d426de655bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9a95fda26e0a0a5ae2dbaa44a3c9617

    SHA1

    9755cca8ef541627c9143792beb09f514b3e5f3f

    SHA256

    31ff4f7d421ad0a3d2f38bbb830e26059d73c4edba0a1770e799a191bff0a25e

    SHA512

    4550319aa6b5703ce666796bbda527348c584f72281e63833ecd0ff3e18558a6fe3eddae7859f37218b2bb011ed69a8d658523d7214e3327f6761a99c94b1d78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    150693222e7313c4bba457816975f444

    SHA1

    414a350521556230657478b8e17470c05f28a72b

    SHA256

    cf17b960db486ce42970d000569f04e569ec7381c48c533b755bfe2ef3e9018c

    SHA512

    7d1211d948a1b9c1666fdfa9af7fca6e1840b74ae3b908fefde6420aaab490deb10f9007fa13792604d911445df731fd69dd496b45fdd79721cd962f70841c32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f36eb46c0f186eab28943140061a45e

    SHA1

    f105da34915457f1fc319c83f91aa984c5bbd3ae

    SHA256

    a96c9cf187d4096e5bcbf9203eb44d5bcbbc783c20c456134a86cd44eea9af1f

    SHA512

    b9ccb648c7b9dd764b34f736be83843ae1c6c6e86fb33820d98616aec32415df0bb156398dfefb1a92a41b72737a9e9866c6fb1647596d1ffc91584ddc26643b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d54bfdf6896980dc8fba401249c08440

    SHA1

    e5fe7295b6009c80752c79db7c866d6e8bac2b17

    SHA256

    252c190724de5e70e2789980e6b7d86b5b250465d691a12cfa8b6cdacb1c104a

    SHA512

    d6a64e5de57f78c650921e134bf2a55a5d88883849b9e96dafcdab95062631c3dccd1d6aaf7436dbc4ce22d7ca46dfc323ad1434a7723fcf822825e4d332269c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    229bfe9832d99f9b15e98a3b5b88a921

    SHA1

    fda6c4b801b256f2336017a1e30fc40888cdd1b2

    SHA256

    18f50c785139304c3f86e050ea8da87d53c822af138d51fd04c135a75a21f150

    SHA512

    c6c2e7676a8614571cb99afbef582892813bd9d3fca77166dba35ad0632dcbc6eeb98c76bfd1ad64c9b7798e7ab5f77960289a34d1996a7c02ed035d41f61209

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd468ebe9dc9fbf3af5d7d515658c34b

    SHA1

    b8189d0e3036662fe43d4945a4890553aa3b6067

    SHA256

    243be3906f8d7ffc788674703dbd7da5781a56187d48fe5d129c6de43368a13f

    SHA512

    29c4cb31314a67c272938accdf50e270d29bd0c84328b9004dad8e975134c309447f8fb5774c6220262c5039a590d92c5f331ff196a3241936d4a8c0da4a1919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fea2071b8aaff8c3afb6f956ffc2135

    SHA1

    3ffd23df8c5be59ac82bfb96615d0a6b8ad05e0d

    SHA256

    6a42f34ed388485587ac7288cc52de6d3bf1eda71a188439a1a57e76249377fc

    SHA512

    71c7a6539cc55638f55aea32cb495c2bbe8fbdb3cdd41be76ac8b4742e40ad8fbe7e6e6bf50eb5331d1db9d31e94da61df0e2887706f0de2f0846625fbc7ca87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b926362b51f4deb3fb84bf51e91bff88

    SHA1

    dc7d3489daff948e77b901b2bfa5d1f4d35ab67c

    SHA256

    a1f1d4c342031306e304cc8bf11aa5dccfb5694b72048d1bafc4cae3915d5958

    SHA512

    91167275ab57b91e8945c5784f166f37e6b5f69f24b27828397de0890664408f683e42b81fbf7a93193a68424eb4e1e99e5b13af7955e1effdb0c874ac4938ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b47f430d204635dff69ec68ad05c02e4

    SHA1

    0d15a28fb16db1c67d3edca65ff21ad76b10f50a

    SHA256

    e36b9c2cbf03c88caa3109193496dc20e38346f9245bb2dec09126c8eb8efad4

    SHA512

    170c56cc7682064bdb9ca40e9c0d57a18c165480fa063351938d30602c90c2dac2974bbc38cd898170f0b65b0cfe06c204c8dc9c16b1c880769a6436016ae802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba542e6a8347902531466638272f8bea

    SHA1

    87ed5abba317fb7c1b267ffcbd8a13bd695b5204

    SHA256

    de00f5854fd9289920b30c3dea146fa115eaee4473e915148b7c308328757cb6

    SHA512

    0dd4e7fe262b113e2ed92aab8f280decffab8e661237a7ba650eb6e9942276b2dfe5ff2c976269edcbed84f5048c9d83071f58c4abadb224c44b72d091b76d82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    235380e33aa85bb4bc4ccc876acca976

    SHA1

    d474788331c07b6a0eacd29a33433b18686d9430

    SHA256

    7c2387eb69a02fbbd2906396e5b6204b14c90c38c62b3102a3c84419cdb4e13f

    SHA512

    515923c4f9b8a375ac2d1fc4e6f92b6c4eaad3025ad571b775d63459eccea1d30c855dda7458163ecefe3cf75056de5f9c7eae50096065a743856fb9d0f480ab

  • C:\Users\Admin\AppData\Local\Temp\Cab699D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6A4D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2360-3-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB

  • memory/2360-4-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB

  • memory/2360-0-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB