Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 06:01

General

  • Target

    3c3b6824eb91fba75f07b781e55eb546_JaffaCakes118.exe

  • Size

    128KB

  • MD5

    3c3b6824eb91fba75f07b781e55eb546

  • SHA1

    589325ffa05f2fdb4eb5e045314a3b188c540339

  • SHA256

    8b6d276e65ae5175e1d2c78008ef67f0b22ad392633e3dad227dbba3c0789e72

  • SHA512

    916734e139bf041f5e8aea159ddf390944d9c37199e1e7ddcfcbc595897863a57107630820d717553d57f5a8622e3988a56592a7bb0b3e90fd6ddbdd6af10eba

  • SSDEEP

    3072:vWVXfnjzN9lt1bjVds70VtRzeajbWsf6V5vdQIKGCgmWVk73jXTBd5A3U:vWVXfnjzrlt1bjVdgieaPWv3xKGi3PBz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c3b6824eb91fba75f07b781e55eb546_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c3b6824eb91fba75f07b781e55eb546_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\3c3b6824eb91fba75f07b781e55eb546_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\3c3b6824eb91fba75f07b781e55eb546_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Roaming\Wdgpgl.exe
        "C:\Users\Admin\AppData\Roaming\Wdgpgl.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Roaming\Wdgpgl.exe
          C:\Users\Admin\AppData\Roaming\Wdgpgl.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2372
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2808 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c444c11ea11ad3fdc0b1f501410123f6

    SHA1

    2317ab7511fd40561dbfdef7462cad106c345308

    SHA256

    977bc8e31c7883d826403911830aa624d623612f8c04b1e64c5d71d4323f53ac

    SHA512

    0facbf4ad8bb48c471f121448338413f6831be91d3c11e67d91175ad4e2a8497486fa815a3b09db47490e1e3d0f6be5b6fc305179fb62a665c233dbd72969047

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b15280482080a373de232ef47c44c18a

    SHA1

    030c6c44c02f2609e18692266dcd2b936367bd4b

    SHA256

    8105e22f7fab2a248f95a4cee3f870b5e57239469942b52c08199993d350f0ec

    SHA512

    475d111d5f1aedb55d63c8461e65d98dcf057d506e7160304652a5684ebf18b402f0d58354130a7da81c7d4d0222e21f74ceda3256b130b854baf7e8107dda47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5223611ea17b030a9650fd0d059778af

    SHA1

    31e30347487584192e8cd1190cb68b6658d01058

    SHA256

    0fa2d06255408177e0835e9721280e32614961ed370e316ae33cbd81a73a7bd9

    SHA512

    6b2ae1920e4c70fb646ea0267ca1fc680ae00669b0213acc54048842d6e96734b4ba316f6d7cd35c37f1e3548f3aaa1ed15344c74f1ea4a226e05f516717ca6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eaf4dd1b38682e36d990dd05e75143c

    SHA1

    c5b973c7dae833906b5fab71e3c9d327179c919d

    SHA256

    26b64c2b7384ce46e3433e771aa985988fe05ca282db2cc46f8b07131783b9c2

    SHA512

    09faa639834b3157bab264ced63d64ef2f39f192d85518975eb8d3bd030bc3b86896ad4e49773d5b04c2721d7b5c05da5cba9c7899998d0c2209948bbb41f14b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcffdbeeca3b3ca8a57ca0e55d969f93

    SHA1

    26465454aec7f1540a6e1170029e49ca4c13e40c

    SHA256

    be0d2e6084ec82c46c1b15a0a7fb1dba8c5a07c36ea8ea7911c587e2a152b6e9

    SHA512

    e45d755307aa66a4a124c0a5409ae7e6cceb0cc5b7f7232349c29d2df5037d3babbcb0495884b6a1da7ab03300b7f82ca225e77827d76d0232921938bae92c2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9018aebf97347bbad0989599d010849

    SHA1

    1390040de2e93a9355637ef32fa0f526aa23860b

    SHA256

    c00c9fdbe9b9edad56775ef7bcd12bdcdf22d658599145a57daa822f2dd0b1c2

    SHA512

    d1bbe60114fa0604f578243b4f2576c0c19a05a10797ab4786e0be839f7d439ade764b6111446339361cabedd9373d377167d78ae3466368177336f72fe06fcd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffab169d5e153957697569dff3ad6938

    SHA1

    c3560214ef14b2ab750e428aa993a472087cde65

    SHA256

    80af6a1b5543bc7c21ca9bc63746787f9934c334a4c8499d5214ed78ec0d7656

    SHA512

    7d4edfe3818cc9082f454baacee90fa1e2fad1f9e1e87af48613bb4cc4dfd5d17374f612c4deef890344197c979c5b5e225378b2bc9a7c01024880330eb06a26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dee579bf98ca27fcadc92fd2eb70e18

    SHA1

    1ae7b3d1ed53aff7494855e68348a623048bc85b

    SHA256

    6a0293bd67095fe8da208d2f8a770ed4e3713684b92fd2d96dafa6bf34ee28e1

    SHA512

    e36da9552866cc6544b3031149bbe03021906ab49e1cdf2e3495d5263df7a36009a5b3f2d4538f27de31863e36ce367dccfd4467d16079f7decb7f09e71f3e3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37b01387f0efcd881dfb2a82404cac51

    SHA1

    eb3a6e08001dd2946d02c1a3d7ad5a932b4a8b15

    SHA256

    6b5852312931ad28968d97f9a08c5fd32958cce0401eda89626a4488f1339a68

    SHA512

    60d059c95552ace619102711f202eb56e1054912e807db872865c7145516d51bc421110be9374f077f2acb6002178dc6c4913d42ee122f3b8165c2609fde07f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f65378f851d357015c2b998d6343bf0

    SHA1

    2fedc51afb9b14711c59fe92436d413fa52e5feb

    SHA256

    af99c8c3796456fc6cf6a133177480e7e1b2222dbee8e6318341e902eee3247a

    SHA512

    575ec402101acab4fc351b7ac50f0b548b7ca8dc4e70e4918aa1816ad66e52d77020a4f12cb8529126366dac8e751585b6a328c7fe7621578c46ac1a32e04eee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e22409187742d65ff7b3087416607a0

    SHA1

    2aad5c218e349f500468c50752f151e086b82581

    SHA256

    4709f592cb609f0521646ebccca27fd869c86c9c327acd89b9077997b54bc7a6

    SHA512

    11d5d58022c3cd5433ab77e30826bb1cd640db53c218d5be26d178bfd5f6e21fc53a090660047ca831c8ed564c2192500df3eb5e46ec9713cb201dd6f5183bc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    035ec10a6e518eb6c542ad8e7785ab5b

    SHA1

    50b03b150146534a2b6ab11d393f538a1b8d7240

    SHA256

    0b1b2a4af7410ba7c101c4f01c6f42f3cfda4500d325ae5107e72f3292ed04b6

    SHA512

    cee5fbcd304e470c815513b104a4e6e51e7de72d6b02243048bbb624a482c4a481df4fe6d1847158123bb00ee67a0ebe44d1c2a2aed407b6937f1f6395b67b56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31709ca3e9e52db1fe487b1ba3668c08

    SHA1

    6749a50e2fa19ca1df32c05e11ac80d07cb107ca

    SHA256

    d48ffc284b17043070d438d28687d9fdd9c659c4099c619bac815db89651a54a

    SHA512

    5778019086f14cbf9b00320513cdd49af5647425dcc0539f7dbc57c484e5c2b742f3f110b9e97b847208fc76990ed72c9c27ccfe60f3664f4b7668ccbf77c01f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4bc72fb1586eaffbb7aa2ee53aec61f

    SHA1

    cc25faf0b3e909194397315f54d665a87a0e547a

    SHA256

    2f7385a3df1206d14a648c07277ad0827c125bcaa2ada125b493223d478aab66

    SHA512

    0262a48ddaac5c30713ddccce78aa5d2bd02f97945d6ace9666dbacd05433d21259bffed339ac6bc3de909d246b164dfd363df5c74d56bf4a1e6cdaad49172e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f67e4a7174d39647374b8d9a37bfd5e5

    SHA1

    222c3f26fa6192805ec707b386c7edcdc039eb80

    SHA256

    af933281414b75663f277f4cebbad842cd11a1350ace00a9ca4d440a8c31b0a2

    SHA512

    470ead18d82a3f106fd1952d7ca43aebd8239896213c507e7e49d126c0e09d6031055d576517d4a16a66f85572916b4a6e7b24ee83344d154a773ca623e097df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19bdfa6549ce2bf85dd8d88e1debde8b

    SHA1

    e57f74f94ae826a45c696bc41d8b50f9c474fb9a

    SHA256

    23a522897f7621c39de95635610f0cacff1d2eacb5e02ffb28eb63f006b651d3

    SHA512

    e2e9122a4cfc3ed57259cab567293046847b4afe66135500f62da191a9c5ef6d64d212071922295c4f4046664382cc09694ddf9325ad6bc893bcdf029c169ae4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2707ec2d11c3afc4ccc648b2d7f2da52

    SHA1

    5a37b4a75fdd428eed98cfe4f824ae6d9140553f

    SHA256

    d05ba9c8f5c1d199e986304f36856d49584b79a2441c8b322a967d7d31911e79

    SHA512

    b8015c6f3dd6d8c534cde0a4659952204bd99943eed423cb93bb0c13cde4987691a5667698478af0a466efa584c3733216a92852f4577b230479fcbf7e139690

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f2d64e52313e4c74e61dcdd04ae5312

    SHA1

    859f2bb0fc85703798ee14b96bfa11fee1628da7

    SHA256

    f55f6bd5a5fb78353de8651984012b0ea9dfa2fe8ea477ac4e784b7b6c527628

    SHA512

    e49a78df0b831f66d567b67d68c68276d2faca6eb667bab9465054dbbbb6ae6f559765828ad2f481329869ba3f0b9dbd3384f7e225f04f9a4427a68f4979acab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7cc91390604021e95497e77fb323113

    SHA1

    459638270c6f56d1e315fe018a56da46277bfa68

    SHA256

    489b2c1659928cc6c1aff14005900c2e9515690a36a03e49dd91ef5dc3f549a6

    SHA512

    45823404147e8b46e7e1af3f928a9e08275c920851aaa652e1272dd8e374c202452df335f2c45cb05c932863a1312c38d5e56b5d258debc0224327d0338975e1

  • C:\Users\Admin\AppData\Local\Temp\Cab6C7A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6CDD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Wdgpgl.exe

    Filesize

    128KB

    MD5

    3c3b6824eb91fba75f07b781e55eb546

    SHA1

    589325ffa05f2fdb4eb5e045314a3b188c540339

    SHA256

    8b6d276e65ae5175e1d2c78008ef67f0b22ad392633e3dad227dbba3c0789e72

    SHA512

    916734e139bf041f5e8aea159ddf390944d9c37199e1e7ddcfcbc595897863a57107630820d717553d57f5a8622e3988a56592a7bb0b3e90fd6ddbdd6af10eba

  • memory/2692-3-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2692-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2692-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2692-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2712-22-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2712-23-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB