Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-07-2024 20:20

General

  • Target

    3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    3a955f87e132ba6ce13d84d646a0641f

  • SHA1

    ab19c82ad410d256b8c1f86544d12d02f16658f2

  • SHA256

    c7f189619f3769144632b1b140bbff8e99512232b9824bd27c93822a66de1228

  • SHA512

    090fce3a2c068e6b34828c38c4a716a7411783785dc4f030bdfa43b02b61f404deb08992a811d3d357c28dac33e753e4abcf9c1adad28e809c09fbe55e59d4bc

  • SSDEEP

    6144:ycWgpsyZezlamVOlB3YERWD9pTUuyHrs8+TTTTTTTTTTT7ZYW/:EZLzlupn0ZpDgrsdYW/

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Users\Admin\AppData\Local\Temp\3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3a955f87e132ba6ce13d84d646a0641f_JaffaCakes118.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10fa6f34c68cc96e914ca6c00b02abb3

    SHA1

    25b7b49bd2ccea00f211daf9d1ed0ebd1c558168

    SHA256

    717da932ca1feae712bd9893ab7c7f1b1c876ceb5d8ef610dd9dbd192266f5f1

    SHA512

    a8dcc1f3fa6e1002c8deed2e76176fcdec6065189d3c6b67d85d23d21dd865ffa60810b67b902cb6a8a321b19f12a7ae48eab5fa56ca0ea0924a2aa97111dfd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b511bc48eeb63ca29472684ea2b52ca5

    SHA1

    9d412d9afff393eedc0c2eb1b6110d7c5574e7cb

    SHA256

    5b45edfa047bcdb049869e130ab539213f96e6c2d32317aef97ba0b6f3695e3e

    SHA512

    d7ff66d819df4abb70de705be9f914d147ae5afbbc5367aa14f4abc955ebcab5dccbfd40a9f9a20097bc92b43f38b162027e71f5b177e9f6c335174fbec5fe2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b98d0af62e7cba281af76b134962789

    SHA1

    d528fc156acf6b5549410ed2f59be0e58a2d4281

    SHA256

    ed507af6109c40f2b45fe4460ad6e06d8b4fd8cb76f721ea24cf3e331c057109

    SHA512

    4abe533e127a79f5cf70383f543bb6bfcf2a604a8e8ed8af66072ad3a1785c3bddc9019f14f87e97672e80531d178437a7e1686516989ad9ee3a6afc3a8c5bab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    543e5c345722195ad7c3055e3e45cc49

    SHA1

    c4c77a4d59b4a71eb1d8e1c949602ab0412b4b86

    SHA256

    05526841f69a3276de4ae75cd709b44f5b68b2037879187d974c765600233951

    SHA512

    cc492813bbda77968f4fbd8636c5812f7ad0c1cbd3f49a1f524632a4ccbd8c463531d74f2423f446eb9917f261752da089e3fbe7a12bd05a35b72f52b0bf9983

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90b4a05e7c55b10ee7857fae18a3cca9

    SHA1

    fe80dcc19afaf1513ba72c55b0f43be5c6bcbd25

    SHA256

    0321100051360d8a8d698ddd6496e3b1c5a0f7e2ff9ccf158e2606b162104e01

    SHA512

    e6dbf4c25970fb6fcd0cc18b1a1e2674f58ecb491dcc45f07f083a8650421d3851da112f5e399aa0c1a43719fdb9f51070efbafdc252f69e29821289a855a3d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0aa1621abcab8a741bf66dd1cd1437a8

    SHA1

    b8da822cc762fe2e43d1e1a5fdb3148f01884ab6

    SHA256

    807ade645d3fe37d33ead3944b5cc269bb8af150d76cafbba87a938932f983ed

    SHA512

    1b95753a5b362b506081668f5eb121be84588d94a23406c44199ede9db18c9196b5923ae91872840072333fe7a8511bef09d4153f8f4d7383b486ece2e1f2551

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bab8b212ac296c149d166cf73f8bf12

    SHA1

    96ca499fa1c828ce0c00a4418b624cfb256c0e99

    SHA256

    966ca8962101d58821ce8a7ad63f79e9d4557a861db51ba79b8789fc42263e74

    SHA512

    c642d734caaad3140eb4934b1d0e22aa4ad6c2f5acbb2da6ed0742174b3b19efd9d1e31d8f5dfba446ad604e3944493d43f2e34c693cab331790f6db0203facb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed5489ee0a31473dbea9d53a7c43dcb6

    SHA1

    c4d27dbaa3d000985769375490dfd274b81fc237

    SHA256

    28a88ecfa30e6edcc6a77a4c6116de5148aab6150f0df5bb11d6d0bea349c059

    SHA512

    ea858f1afa2851d6bfaca860abf1bbc32a0251180d814d64ff01daccd60a1a36cd86a146b57c14e3147a6fb300a7de3e6435ab52ef5f2f333e44f52b0ab9a097

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c72a5ceac51288fb16a12b8f9b4a53c5

    SHA1

    47653fb53cf9b7fdfd2f7f6613ea08e05066d8a2

    SHA256

    8e6e418fccf6c2ce73faa91c3d463a07ef45c7a5f00f97e9da732fc376cb5ec6

    SHA512

    fadd193954b69a6c8a0881be94dcad2c134b2489601f85f905c0835450966ab7dd426b7692137a1efa197962782200088d246708c62e5145a0caf4de49a52c11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae5a51d6988c3852c500a2ee9d7e80a3

    SHA1

    920c290d6790430beabf69fd9b8f70de3547462b

    SHA256

    e3d023c33fb397eda10250319c358a7218f0e477452f6d3e005c28219ec020e5

    SHA512

    b6153cb5d89e4393b3cf6448861f8086fdcc0faaa198b251becc6a1af844df02d3515a7e55a877fcbe80a90af8b6cae18e6d21df14f46c43bfb38666d02ce5f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    affca69136a11c9a8f202f6a7f71fdd5

    SHA1

    093b806cdf58b39b4acbe91bdc3036df5a5b2827

    SHA256

    b1409bd02f9cf7f446cf75a027e1b21d01cfd84b9af1ec10678d349acbcd1aef

    SHA512

    bffc4bb1414209ef28ff878bfd61cb7e01da6fbc1db5347d8f4d5fab37243b17f3880f6d936e8b39c7ee618e5d1ad2822ab76da5aa157dac4c717a5f0baf385c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    055c08a6b448c54010f4a115dc7cb11e

    SHA1

    4a8d47bbb28444e1c8f5f652aac735d8ab78140c

    SHA256

    098248d927042e64cfeac6d17abfe1843ada20769aa89a2e83d1a755f9a2a598

    SHA512

    08f837e582ecd2f7b25f1529fc745abf79b4fc24379b8a68eae85a656feab530ae5ddedf3e6eb63041327210c2db40a814ee2f003065f7f4f404d46847a7f566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ee72bafdbb951abaca571da92b95b16

    SHA1

    a8a2bd4a0238d4d9c333c012c6cc4b6b68fa3599

    SHA256

    9c0c3e44cab348f5ea1266ab30a6199f9631e1a55f97d5c5876c71e3a03d9a7b

    SHA512

    f5364c2f194dbb4ed6fa073b21a76fa2e3e59d1d36205507dfc4466300ff9348cf42596a93954c90ebcbf9b297e03ab210c0a2523a4221f538ffd651b23396b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaf67099d4177f8d65f810265ea93d59

    SHA1

    455cd40ffdb36ff781af015aba89a07555544ac5

    SHA256

    33322f1507bb0fe0d2f33f1226aa6d772dc2b13bc38cb0b980feb5a758e1dfbd

    SHA512

    df9b8cc5db75190d51beee63d609d00c19d9f21f6633af103e5feccac643d403c4f5a6751df6415944061f0b9a4fc2459ee0bdfb4a25c8969bbfbc7837bc43c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d9e637060f82547c3132157d551ec5a

    SHA1

    63f092b79817d3243ba3892ee908927628630163

    SHA256

    c763bc9bcd9e241c1fe96a6bd9247ec04bbc44aedb4e9b55a4c14e63c0a945dc

    SHA512

    80893203fa394f57132a822e8a082749f50cb2513f0d895e30cdd8fb26a8c0269f023eb1a12e040e569d7188fb50a6565d17f50e43d01296d8dd3d442598bfd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51423ec7269a7fcaac8feab29b74649f

    SHA1

    a25ace27d703d78eb5846487682a322cb32b5079

    SHA256

    c2b4bec1164ed785ab0ffe530409259dd32e7b5a722a82594e69ae0ccc5c1ef9

    SHA512

    113f581d12f88b9d902e66d9d83807337cc0c8d2f789a32f91fc4b269a0523af439fbcd6fae29d233fa73f5a3c783743da2c7a8e3476bf09bf18e9709e5c2004

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c50776fecc76da212d11930b510a490f

    SHA1

    188e384a8e3dd016478e192f8a2aab7feefac62e

    SHA256

    7ea2059fba80868f7008c3c5d7e14d06aa8008ef3bf4a450dd58592fd4381f8f

    SHA512

    0cc28c2401a41308debb3c83de68c293d5286a387d399e48e9405d48aaedcd81e68f51e7efb20590851280d956686bec4afd5fa5345976c5ebb0c3cd9ebb5034

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ea995a7a1287a9956ac5ac445d612f1

    SHA1

    121d5120f1eac1205f64f9bbd96cd1ae466a47bf

    SHA256

    3214220a5fae19106e3a664410f6555202837ae857b2c21266cc879cad9c7120

    SHA512

    5a8ec3ab4c221976d397c536aef0bdbba5669fad1050c8d2d9eb8d28d14c1882f67bbedf6933a31cff3724ff0bb3fe6975ae153a29dad647cc18549e83b32f4b

  • C:\Users\Admin\AppData\Local\Temp\CabD0C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDBD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2208-30-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2208-2-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2208-12-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2208-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2208-6-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2208-4-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2208-14-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2208-33-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2792-36-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2792-25-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-21-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-23-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-28-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-35-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-34-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-44-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2792-40-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB

  • memory/2792-45-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB