Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 23:59

General

  • Target

    3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    3f65a714f4db1d2f7d585abc7d60656d

  • SHA1

    cb96a4d2eddde21a89e3d8ae98fc82fcbd5a1bdc

  • SHA256

    6b5315d5569d448773a9d4c334f22475bf820132f65c824b733a5a9fefa4f845

  • SHA512

    e64ad49d79fc59d98734766cf731d5c431635e960b023f288e2c3cd5214d13d54d303296eb0cf0f7d8c41da66e963293082ba7c261cd112f0260d19c9d474497

  • SSDEEP

    3072:8B/yfWqIm2ToinfY86s+g0Sfh2WYhdH2eluFkVZH7SLmRYqC:8ofU3tfpj0gRUdH2etB+L

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3f65a714f4db1d2f7d585abc7d60656d_JaffaCakes118.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Users\Admin\AppData\Roaming\Fqzgzl.exe
          "C:\Users\Admin\AppData\Roaming\Fqzgzl.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2372
          • C:\Users\Admin\AppData\Roaming\Fqzgzl.exe
            "C:\Users\Admin\AppData\Roaming\Fqzgzl.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2656
            • C:\Users\Admin\AppData\Roaming\Fqzgzl.exe
              "C:\Users\Admin\AppData\Roaming\Fqzgzl.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2664
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1668
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2376
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5176b4eaf6bcfa54c32dcbdc0c1415af

    SHA1

    1dd8688043b9ec5649010329e69d757ad63dc7f2

    SHA256

    ff2f19d47429449e24cb18756ce700d73a7874d0f2440a475f123adb28c004b3

    SHA512

    6e4f18485c86398fc0afad18bf3b0e7a0eb29f00c2a215a312cc4cfdc841b6e26850986c67a2462c0e7de4d9e071e4d7c1e160076b84d518832002f90facd014

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82a58621ad9db5e3ce3addc5830b9542

    SHA1

    afbb98e5e6d491235357400b210e01d0123dcc35

    SHA256

    9b6b7edec760b877c8438d6159462890f44a646739f452665611b04dfb22f026

    SHA512

    4d140fbc9fbb0b0ee95b36a7cff2766e74b59e388cf44178afc2b0f610742a334382b8a106952806ad00a0368e029a98da90e9952cea167ad7f71ca4de89d206

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2eb454878d8a5387dab5f6b76464d8a

    SHA1

    507eb451872d1698d22741c6cbfbea5ed742fe6a

    SHA256

    106b0fe40db736492a5d3cde387bafc120da37e1f77722fc780c486cbf26fc61

    SHA512

    b335bd607bfbb93ad156c14cc124e7d7c855c3cafd8f85eafda61bf4d333e95d7fdf36d237f383284e19bed1615d95ba0b776be8f66b79b4d3acdebcb6fc720f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8dbf083f2df5c23f2104736c0b45f04d

    SHA1

    fc72ffd72d77892d34a222e6801a907e718f88ea

    SHA256

    87d79235a1d3e766a60a9c5123426ade962a935ab45849930260f8464c22dfa0

    SHA512

    fcde9499c2c662324ebd4d20fa6880d3cea4db30ba4a38a0e4db31eae0cabc6dbbfc09d84a4dcb159e549cecd27e5879fff5a1863e9e876d14895e59dcef6c50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7cd886dc9693e307c4015866f03ed33

    SHA1

    e45b970cbc03d36e43e50b3911da225ab8d77f61

    SHA256

    205ba996fd9e518046a90fff87508deea43e5f0a27713ac4b4bf9330cffae600

    SHA512

    7ab72a940bfdfe932f7ce4347d36efc6e6def55ab0bd87161c63105ed9f30954c9f7c4010c7a6ec7c172a8e293fc3cc16330a1677ec8323af13f39d2e7265f1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    072f208003f14861b2551e51437daf3a

    SHA1

    77235cecaf09be6dc4b58475ebd03457ce24132b

    SHA256

    0450bc792b94755bbc60b6c145d785f0dbce765bac8e4a0c81ddbc1458b88a78

    SHA512

    ef6244749fcaa8ff73612b4a21d62f252ad6a90a53d154058541d2a1f5ca2f750247241a9d3d5041d57bb5f5a5e2e052f7f1dd5a7dcb536ad4d68c7e130e7fc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c1ff2b1d921c8a1c1771ad27cf27e17

    SHA1

    4d008ee9b89727b119b52be5aa22d2f2b7bb414a

    SHA256

    d2a34f0ad48cc7324d675197afafd93944a76593360fcb386c86a802364196a0

    SHA512

    95ad2ef378101a775712b3d9eba556cac429a3e764d1c9d236b32b428e3ffbfdbce2628bbaa1a38100a327582a72c8a04a24b94a126fb7ea7a0dd57550fc6148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a34bf9bc0fdb9ad2a5d4b0dff4f16b83

    SHA1

    2eba152ca7838b03e5a53e2ac5fffd8b64a988d5

    SHA256

    63e73d476dffaa32ee4d0b73e77937ed43d64b5e6ba3f988c4ee31510a6edc3d

    SHA512

    4f03f522b641a548a9047a59d3413d5d6fc4a53f6126f892e4d2115743cdab76200d37f9c4bdbaf9400d0b803ed056ef2ea655e37d64141b321a8fe34f9bd096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f452a26a887b3c9feab5abd02312479

    SHA1

    dac2a9f776c677c2295852eba493199bdcffdcb8

    SHA256

    6e3b4561952b89df9536e60ff29d08946fed58e1fcbc2ad35aea3ebd18967dbb

    SHA512

    8ac900d7ca22fc15be2a5a9139afe774a97a776e8d590f60d71539023ed8ec8675992b7395245876fd2c79a7b59b1f15e8c634f0af00d67987b739d673983e82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35ee6db57f597a49d134d45773b79180

    SHA1

    e8bf5f22d05282b1b59511c7f3b5f875c0401446

    SHA256

    40db590f0cf36d55070aaf2e95f66cf1c438c3513edab6c87db9e88f401f7b80

    SHA512

    c7dbec8187ffc5ae4b0cede0c729017e8f90f83309f9b1ab14304c835b0c0e73d9e90e9a5746b5bda17004f6496c5b9d08865cdee5789fe89e0167e41b64f743

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    809af9db0ba7f1632b234a73d3c3c36f

    SHA1

    3d9b5756187254f4e6872eb53ae3fdcdc50219d4

    SHA256

    1aa01a3a4b9db908e325cab40a7d6ea169cdba16c2e22bffd67ed367beeb6913

    SHA512

    8ae04a61a53caf91d33e8b802bf3af40f1b751c2c40de785b75b239732bf7a04ea9c879f09facf8076eaddb346416c0786815b940a83d1d7370fac7e5bd24526

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee210451947d4dacb1dfe328ea83cc0a

    SHA1

    aab0c82da9dd35c29c8b442eaab56899b0af8209

    SHA256

    be776d72bf9c2a81523ee712950208fdcf24f83a4d6f07179f1c472a24002d08

    SHA512

    12776ffe39eb8d5d5ce3ec873d66ed92bb2977dfd3f8ff49b727dc9ec89d9130a02b254bc54040a5d5fa353730b174107aac9159dfad34566beb420d0eebbe6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa17d7769a9f0f15cd630bf16ead2b62

    SHA1

    dfd5a9a5add206d1dd277c7df5e9748155376661

    SHA256

    85c909272dcbe15dcf26e2a904cb0283c1b606a5e82e03d767e867c7200cac7a

    SHA512

    781a1e415298146ec20891182fff320dee02a9786084e85930f7059ffa9c2b2f8f464d3c5eb22ea904c1c7f8f6b61a2e219bd99402daa61478924b7c53255f4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5aa131b7fc1beff8082e15dfdccea87

    SHA1

    f20756b35de238cef773bb86ceb1b1ef0266a749

    SHA256

    d3cd25b8d2622351a52606124356fdd18081c4d535ab6d2d7c87789e3ed29479

    SHA512

    5efce37f857cfda9bcad2f6fba74163fb8b6a7089fbc5c6f8142ded639df5364b282aa498a3a896ef27bfdf318310e4632cf8a5cb514b45a67b097f61ef20c4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ae3b2b733ddb45c8122a4e501d5f3bd

    SHA1

    2db01c17ab9a7cb2c80c2076f6d3579a1512046c

    SHA256

    810e44a5805af375d46f58c493d1852bee0a0003fefd214f5a64d2a434a7154d

    SHA512

    a4446e3f52a86282893ac9c7db29cc1241a39b5cc79921d92f4e19e333c7302b624a0e531eb762570380618feed436507196738bfb22d3ff0bacabf5ac95c0ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10a5f3624eb642fc2af5db4a3cd1933b

    SHA1

    468981738def6248b4bd8195acc4d49b7bfecb58

    SHA256

    2d31648a678144bf6d8c0660ca14ced4402630774095f4a000542925baccabab

    SHA512

    418b40d85e9ebb0129dc5107f1ed5010909bfccc2314744494ae407fe7b2433bfcac0b9fd0b6592e95b676e266775f579564b32baa36723d3654bef7e1352f16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e8d32670bb6957a543c105949f9fbfd

    SHA1

    251e1c5c893dda43f32c55d3cb9c39aa3c6c3fe1

    SHA256

    467903190b79c84ccaeb237ce51e82327561c4e0c2d953f3b810f2a15268a8ee

    SHA512

    03aa898699b166f49de5e9a0351dc089391dc55b8ee49a7fdc56df749d4f2720720b94fb692e2f8e1f0e2fb916d5b08dc06fa8f53ef8d4b05ae947d478d74842

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cff181e8f06a22291fab11fa03b444d

    SHA1

    e71c014d6e40808e33448f4b47969b79904db9b8

    SHA256

    e18da3b2dc60cfe841f88479e8e500e0154a4000c4391df435a7f2da6090b38c

    SHA512

    f776c1a790d6ae80998ba0487371adf9c574b13ffb1a5bff86bf59e2b0e16942ec2ecc2acc3070dc8477b4d1b000f35d2914c574ed82f708dfcdb1751dfd4ead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    018c7f00bc61c5a0073959fcb71a3c6e

    SHA1

    e06f5db4d3379c6414939517c09982b388150748

    SHA256

    0c612cbef8f14e23b983d8ec55ee7295dd3ae936d2060ecb703d17290f019d79

    SHA512

    13022dec1f8030c587647ab67afb73d430cf0733015a81053a5fa03b974d5eb28fdd2943b67c947fbc3d87715abeea289aaaa8a837a8e1cddae698f9d09dcdfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    166241f377cdc5b88a097f174dc76bab

    SHA1

    5efe6b6faf9889888aa6ae950922230aad3e6fed

    SHA256

    dbaa3d1613c4ada7d9de86504f7be226473664809e33f3b1d691161009ce1687

    SHA512

    08749d54b9bd45734c292e01bbaa4120ae9a61b0ed9c872da3522378ca45d8eb02c7523aee864f7e62dfdd7a710e344875cd8e83ce55c4a40403632ce560979c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e74a4db167653b96f89e5e704492436b

    SHA1

    e3fa0fa220c769f620978f8171c5898f7c55b6bc

    SHA256

    cc4e60f47092af5d8978c8610f9e204f34c1d59e003ec850fed69478134e3f83

    SHA512

    862ac1999d461ed7ce5700be227364c91f77896103429ce50322be7bad400afe3df8c1c55c7f9203c25ee5279af064f0f403294e244b4566ec196b14c81a7c97

  • C:\Users\Admin\AppData\Local\Temp\Cab6165.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6242.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\s17g1ob91sdv56h9.tmp

    Filesize

    3KB

    MD5

    95f62965058baacadb83c2da94ca47de

    SHA1

    b3115c8b56105e1eae02fda8b3536b3bf38436ca

    SHA256

    d76b2bde3f59d34dbf1bba5917bfd17470703801b17984ad90b6cebcf914deb9

    SHA512

    9fbd110938f1c0a97b1f2742c8233e28a7e2802477f9222d3e0db95c1959ed3a1183b57ca1c92f006e6dbdf3ab03297cba0c6e06e2e2778a6dfa1e4ac2d7cb77

  • \Users\Admin\AppData\Roaming\Fqzgzl.exe

    Filesize

    168KB

    MD5

    3f65a714f4db1d2f7d585abc7d60656d

    SHA1

    cb96a4d2eddde21a89e3d8ae98fc82fcbd5a1bdc

    SHA256

    6b5315d5569d448773a9d4c334f22475bf820132f65c824b733a5a9fefa4f845

    SHA512

    e64ad49d79fc59d98734766cf731d5c431635e960b023f288e2c3cd5214d13d54d303296eb0cf0f7d8c41da66e963293082ba7c261cd112f0260d19c9d474497

  • memory/2408-7-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-5-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-17-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-18-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-15-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2408-11-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2408-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2664-86-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2664-92-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-33-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-32-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-30-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-47-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2780-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB