Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 19:26

General

  • Target

    3610d5c5fe294b373b00757b74bcba92_JaffaCakes118.exe

  • Size

    161KB

  • MD5

    3610d5c5fe294b373b00757b74bcba92

  • SHA1

    e642223b4fe994a1e91d317a6cc6e49128ff7928

  • SHA256

    a158f875a2188007fdd32f0bcfcf7e57e7fbfeb59bfc3576c721cc382330bd1d

  • SHA512

    bb058f587d9bb9f6699320de92ca34c193b013a49b34bd32cc5cfe53ebab263435f5da0ad80ba715f216ef7c23847be7e0a65905506ad0b2335d34a2f7272d33

  • SSDEEP

    3072:ZTifILaAMNBeq5gAwttb5YwXRZ8SbUj+Onk3ZWHmmGvEWvEWndfbVcde:ZkI2AGBj5gp+IRZ8SwqOkYHmm9WMWPu

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3610d5c5fe294b373b00757b74bcba92_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3610d5c5fe294b373b00757b74bcba92_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\3610d5c5fe294b373b00757b74bcba92_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\3610d5c5fe294b373b00757b74bcba92_JaffaCakes118.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:528
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1028
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fdf956f6dd83c4d42afc710b831ed233

    SHA1

    7391ad54fb80e700f12275289ee9ebed2e20a2ef

    SHA256

    374d70a07a7d5f8581a8dcaa5077faf46efa7e7240d5b3f69d637e4e98efa2df

    SHA512

    99950e1006829f9459a925ae4d0be9ca3ff30c1cef9e82c7b0f5b3843d56709096a53bdaef374307e0b5972d7218052c553eb90aa38235c5cb14438a2feacfc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7470a185a7331fe136c67ca60a30f413

    SHA1

    6ed368b8e97063df118d5d7af0550e23c01dc996

    SHA256

    5586793be988fa02d8aac06d7e1cb7f7a4286db39e77d193c9e11549f0a089fc

    SHA512

    c26141fc416a3bad51a3030e665561c28000478aa1651d4522e64320abdbeade242353da940fcd3ca038fab77cd215b7da4f44cb9683bb04e5cbe61ce64eacfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    df04ed77eae5f8db3551791daf56c3a2

    SHA1

    f4dab62e1c3386f1d304f15a62b48aa6e26e9f0c

    SHA256

    9cb57aa0e619817bf92051e1f7a3b8b8f3b5f6c4ab75ae4c034aa7b392fd2a32

    SHA512

    2a9faf5750d46a8cc7a147342fba22eb1bb7fadc025d34cb414492b885e9b51a771de9edc2b8e4be673da56614411ab74499c4494a27ba4ba74c78511d0db623

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ca85c59a8211101dc44a682e145904d9

    SHA1

    1d4d11baeb1310b095910d4cb8fff214f614d2e1

    SHA256

    6d2753136f88ef9ad2b3e49829a2db7832b65d70c9f6af5c5e7df752213f41ae

    SHA512

    ed53ae8537c0319c73353dddc0eed3e612824c856be6f54b7ee5b13fc4b58f25279a1d4da5f93829f6d76a7a950841deba52294832f38ad57cd0a471232741b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d62ef4d25539551485a0d2f4e59723e9

    SHA1

    38550bf7aa765b80562db3dd3b9512cff575ba4d

    SHA256

    d2b0fd7b8adbd9c92ed1103a3f701aef43b03f519898ac0cd9d7aeae7b5b9a05

    SHA512

    23e63fd10869d05babceab1eeaab7d6efb8fa35e7eaae2d946bedf90dc9acd134d640d3a5481ad65bd2b5a3820ac0df0f68ea1ef81da7018ff643a321d8c35c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    44677f2ec939559657b2c68a5557d4d7

    SHA1

    a5c4a57a93f4e674216b6588cde3a1c419502258

    SHA256

    1fc9242993b35b36eeb9fd374233a80d31ac59a0082a9a7b0f15e313c36a9f47

    SHA512

    99fe74ae5c67f9ca8f6216a93e3a726e11540d6db50fb66c7d1873fd1f77e77dc9ab075250e3343cf323e1830d5110c7826c4d85e20bb54bade0b5c2882c92e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c36a77008c67092bfd7f38d82efeb844

    SHA1

    44b37e26d841ddd1a34fe389dee9069ebc678ddf

    SHA256

    387db326694a83b28bc9de4819c2e4f9d18067b98acecc745c28fc40a5c0c440

    SHA512

    081ae4d77735e454a596fe98c32928206f5be22a22340189e0bffe4d707de7d47bf363dd0ad246442998f7a21e5b2357401adb98f82a3d02f4eaf64b69760b40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a9d7830e5052ef7928e7ea727a31ca60

    SHA1

    2fe030c0e0b078007450dc2aa5e5937233569134

    SHA256

    5def4a1772648f2456f39e44c8f16d8bf711552acd98498bd38a0517bed51b48

    SHA512

    6a6c7efae9aff1f32800c7415d2fcc592bedbb526318adbb9164f3264061509dafd2546d5fa0d4d755fee8e771d6aa9b13bb0b7d6a815fbd2c157c2ef7d81eef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    90b91b10c61d4f325fbec946b830a03b

    SHA1

    9ac02af97943c6044a94733ff3dc8aee418a623e

    SHA256

    5dffc78ee15efaf27fa52776409d116eed7bdbb095015cda44e3a3d44885840c

    SHA512

    86662144bb68ffaa506d1958d057a4c66bead6145a24908eb7aa61d11050a24a1b4886e164eebb6d1f0edf8eb1f63eb7dc5dd494093bbcbce42362af23c07ce2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d17d69172d223831a1119f2fd7a91236

    SHA1

    91ee6795e7ef859949a4efcffa7f8a2d084e313f

    SHA256

    cec76548b691caa85d525526fd36469ff7eae891f2d8ddc1bed70d8b5ba1acf0

    SHA512

    ab355291839d7698bb74d8bd5335b04002c84e2958951f19027f666f5b27ab7bbf6f0ad6e8a58abcdac072d59bcfdf3aa9e7101bb445eb5c1434c82413eb6907

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d56475b614350da5387ef73fc0c1736d

    SHA1

    205678e15a30069154d0a5aae0f266220142f869

    SHA256

    b85ce06365d5e045ea494527014458d02616d893df7b4a74d1ac30ea2c08a944

    SHA512

    a67dc2703ac93511e8ae15d701e5bfc6d4f5bb6551c150a3da871124d3e54bd2e470f9b8e4b8a60770fb593b12daa5749517967e2f0085e20221181395ab6b76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ddd32e6658c298f4e23f410bdeb8fbc4

    SHA1

    5a9e98bc3436691b9e5deed385196c5e7bc5eb64

    SHA256

    e38e65f271136c367c63fb8b3e946cb351545f9583878c861fef73d4cdf28911

    SHA512

    2743bee71a48dc69ff0ca6479a4e0924fd7a7d3fe0f431ec22771490eee9a33a2d78a5edba4a3d99712cad73020b4f8786370c8cb11e332305b9c588f816bdf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e06381caed153f824b899b429c5eddfd

    SHA1

    d6dacef6bddbfbd97a53b310faa04938d2b5bffb

    SHA256

    f84defff2476aec2c35c6e0dcfffaadb1aff9cb27b446ca30fa315270cd236be

    SHA512

    129c95ee8662760076396a4a458ce1e79b1e4df9245b0a539ba3a1998885b14a203296353f7bb555efac15d8bf3ab6a7d782594a540157e9f53f932ed8d4ec9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cfcb91a0662707a4c60e541903bec488

    SHA1

    e63a4b91ee1b467ff87f4faf235ad08ab6a84947

    SHA256

    3d5694ce223138fe7782fadf1b86cc5f4d32915e99cd2b52cc6c75b6cf2b4d3c

    SHA512

    f23f20dc1c8d0b20283deb5b70d355102b0902cd461624188e443529bbec857b634a8909e6736244635cb892c6150dc9413cee89be76dfbc7f84567c40f0f206

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0f909c176c076314b7b4c79192308a2c

    SHA1

    2245e07a1249e84bc95bccd421c914cfe3de43a4

    SHA256

    4b7f364d13cab96103f7a3d01886618dd936b081512d86d9e45836ab06956589

    SHA512

    f424ae68e8ea6ef5e3f310f3f7ec5a8140a030a5b49760faa650ab15c97adc7e1c67b0183fe20ae9d2a48429823b68db0ca5beff3810ece56410a4d607142e7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4b677c8370ad0861e5a7502233adbf45

    SHA1

    1bdcd72cf037bac53fdebf97510a12fcd042dd44

    SHA256

    ae1555d11cf05796e5051dd4a567db763a7f31a242ea8bb9266ed25f74853a81

    SHA512

    a2bf0b4b52c123cfe2a12a95c81da1b87cb4e6e81206deda76c62df18b9cd607d6d0eb524b2f26848b84723e72ebaf461110ab742b2a2ae4ba55608f17dfe941

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bb41071f0416eef8ee8b9e4bf163ed9b

    SHA1

    417294052bddbb89703d770983cf103d0a3a92cd

    SHA256

    de0bd4693dbe5aa9b72bf7dac37a2c9008e4af201e6e89eb8b39b2e66c1af842

    SHA512

    d7548e47a32339f17b590122f8e341b80c37653ed0081aa7a51916dc5fe1fe5698b27dbb224544cc787e4015b8b590ffe816df80dd602767a074d67a409eb6a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b393c236a6c26e4ee8e761a3d93412dd

    SHA1

    3acc86387b29cc79df3ad98eadd3e8382d37debe

    SHA256

    cc95d9247d98a76b955fe39ed54bdabe3745515ead7a1a542d2d2798923b6ed1

    SHA512

    308462c5e06a4fef62fca8bc764276f33315731e0d814fe212cbef7459652356ca25eeb3d30e9233a05a01b5bbf8fee6d1e8090f3de205d0e50dc7025ecf355e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2a77d2e28079b7195cb18a523abd3f2e

    SHA1

    7e7cd4a0fa3a5884e64a3d45a835a925dc8f35f1

    SHA256

    b0ef075b0e9c5954b25dfccee9407b503047cf3f86f958ff1a05464e110e9e48

    SHA512

    2a33de99e5ef31ee39db0f5598d23ee518c779e9a913f59a9b692e04c7e6faaf4e67cd738543fcd5e6b5db25804c92097f1e106e83c45add19cb7e00e6a12ce2

  • C:\Users\Admin\AppData\Local\Temp\Cab428F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar432E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2092-22-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2092-0-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2092-3-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2092-18-0x0000000000490000-0x0000000000515000-memory.dmp

    Filesize

    532KB

  • memory/2992-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-20-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-27-0x0000000000490000-0x00000000004DE000-memory.dmp

    Filesize

    312KB

  • memory/2992-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2992-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2992-23-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2992-31-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB