Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 17:02

General

  • Target

    3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    3e29839f458ead98f406b4a3ac96924c

  • SHA1

    91bb2a7a796f0001e1e5803fa9e5719420d832d0

  • SHA256

    2fe4fd385c01c93398f38139498e55d2c93d925852a56d345af00491bfc7b18f

  • SHA512

    019f883e46f350b70679d44a12686f9aefe98f6b56e2cc00ea9bd335279bd5b034c58d6359fd108d8980fea56da62078d0dabca651433773db307ae9431f9620

  • SSDEEP

    3072:lKmim1Nc0BjKT5PXnaPLJCLlSOHFxr1OqKAlTkLEtTQSXhOqRHyKJ55:wZmDBKTx6eHHPIBhcLhpRHj

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3e29839f458ead98f406b4a3ac96924c_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7c2e71d8a761e110cc83afe9ae0d13e

    SHA1

    6c8cd2a2b69126f64d0d7d95157b57183ad5c9d9

    SHA256

    16891dcc876b97c5d1c1a47527e9d0cfcf2eaa48369473d5ed6af6167f5dcd75

    SHA512

    44653a3a4f453a0c86b895f2017ea7a1c7ab07ee3849042939f792cda40cf66c132fa5bf147578d26b9b091a08cc240a50cb810510e70fdbd1ac478deedc37b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8edcc3c36602f3e3b4eac188675d267f

    SHA1

    00648149290f306ee3ef5295f309b2b99f3c4efa

    SHA256

    a41703adc8d1bbd9fd8de959522ff99187259f1df39ef475851f65c7f2d5312f

    SHA512

    91d4ef58e7dccdc77d6ffaeb674f91cbf38ba8abf2d98de9e3575f93b278790be511dc037dc472791258bd01394fa5d979e6042cbcbcc47c1ccab34f2e575fcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39be36f5232586fc80e97d7c06ee1ad7

    SHA1

    fb390376403c4ff6c1065e3898e8e65d11140812

    SHA256

    0d5fba3f15c8eef89fdab82e478f98876c9b6bc3bbce5e563a7d0e348ef1e19d

    SHA512

    83d33787a0a3035ab5e16c1e73de3e1392fe234ea14500d6446707289ebe1bdf7de40fad076183aa3b4d0120915a53ea99ee1ffbac9b058448ce187541e274fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d73a2a960d69a7b43081f7e757a6a456

    SHA1

    81c0830a55eb3c42cf6571112ae4042f315143ef

    SHA256

    57d36abd1fc328fcfc3af69532c5df44801d862ae40c7a819a2d253ce3fa21f8

    SHA512

    66518ad7924188433a40de85d334d2a158d5d0b706998eb71e0812c4a579908df3597026143a915789b53d94802b4fe8f24a8ee269792d6d25a0cec30a3aa209

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55c23a6781ef8d04010660bd62401250

    SHA1

    2b376805272ccd012e46b060f2a7288eb735d2e2

    SHA256

    58d03758bd036082b8fc36ebed6e0fd40df6c95318a444d541e3c340c5a23334

    SHA512

    1642d06d0196600d4e678f27cb351186ca64e3c5f22f45b155ec0846fb39a7be9ea594956bc03b0ffd5c40123bd564cdee8e42f628972b2dbf0c6fed5fc87e22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8783d6ba1845d1b8f6b1bfc3f0ec5ca

    SHA1

    47b94a3951acd8ee885cd48d73cfded3edcafbb4

    SHA256

    047bcf84437df918edaebb51f32229fc8d50cc24abb0d9e090f0391e0bcbd365

    SHA512

    d7b929ff58d2afb06e5eb129f4741124320bcddeb6fb4fb9e568014b1477e6839b9355c0dc6c8cfb50fe09a4b4e947b067d976d1cfdfec78896e7de66586a2c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1730cc0ea6f456cbc67d3d7e478f50b5

    SHA1

    9e5b8ea1fdf56a262f588b3a1355181146179187

    SHA256

    e8399337ec53437d974f338d0d723f15b03b1a02e42d7e38dd85f81424b8148d

    SHA512

    274e1cbb642797a78095bee3d14f1c8dad9086fa4f74da5be16040084b9cddb7dfa0a22ac5c08b9769c603bb077ce502678e5ff8bc2272725ff38934c48900f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a8633f875f4f7b1be83cc61c000a549

    SHA1

    0fdcc1e6300a81709a5fec8127d7671d342821fc

    SHA256

    4f8c4fd94873f117235396e2b42ab3a0fe417cee28d6698f8c2dab95a072488b

    SHA512

    7391b22b0bff7728b1cfd3510d205f0139a49811077d286a0ba182c3640fc9199b2421fd8d2a31b4e78909454f31de7344f709b6d336e3f21930f5ee82e484d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3223231de3b7ea794041a474c344dea9

    SHA1

    ac92f16fd1814e9a3619bf979f370d82f6e612f8

    SHA256

    d6e682faa6faea405fa6d3ac471ec7938d7765aaf866fb33f63b8bd87d22a2a3

    SHA512

    30904f43f8078e43df7e177adcc09f09a3ffafdf03b1f4296d02892ba71a4ad873341876199d9e59ec1aacca4887bdee85726b31e58091cf6db6db05688b4ef1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b37be211ecf73caa9a27eb510923c912

    SHA1

    25b6726102f6a39c3d6ee26662f1396e27cec011

    SHA256

    20f10300b4c7931f4cd12434b6ddc39463047631cda3deaa7903b34b37cd5c53

    SHA512

    47f48d9e6418c871295683d07745211acd56ff0925a571dee9455439081fa2c69debefd1c18e07a94076fef9f13371f57ce8bda4aa783ab8933a807bc4b60dee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc23cb0a1b2c20f933664a55b0c6b114

    SHA1

    2e9eaf13e91d384faa7e50ef81dd0b6c238d1d3c

    SHA256

    ac78e32d2415cdd90635e01f4dcf3d4a46eff82ef66c3629ce5f8a94d5d88828

    SHA512

    14047ac868056c138ca12f6c5b846f0a5ad879a911e7af385c79b65dfb65eb4727a662eabada18e909f8c8c61232b1d21fd62934eaccca465155cbc02dbb2c02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c79d09813eb14194abb19e8190a0ced

    SHA1

    fb3534b6fc3b7629974ca5778173751921019f1b

    SHA256

    2f85c4521772bf7a08fa96dba5db7f1aea5c8c97fe4e7f05186023b666fb8148

    SHA512

    21e85e693c7ebc7b36b365c7d95b0d203d7ba9cd3cd3bdb4c2fefd0beaa6acf400c0facd23f4a7be468f9880287da49d7b55c3bcb6bb381b46937e72b40e6708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccd059f8f4b9c49a68d38f66e3b5d3a7

    SHA1

    17662e60e3ee767af375ef9ca9571a09e839aa0e

    SHA256

    79b6b8f7905ac8b7fe3f617c5f5ab273657db710830e5e78e3e325d0c6a4ae33

    SHA512

    ba34841ac100437bab1eefc62a65337853b6a9fa70c7345ffe43409d2923f3361151f67720239ff185cf5ab6fba45c0b9604fdfbe56de95be58e3d52eec7ec3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8440236584f9d7c041c1fe4726d49473

    SHA1

    d714f412b5b3a2a9879322fd41a2ee62aac238d5

    SHA256

    87cb7493756a0d8c128e8808b8603b663c085d209fcd0b4e7c45d9cc42385fa2

    SHA512

    500b82fb6c57d439977095dbd7ce1da0817ef743d368778de43cde252b4a297a1913159d5a014a06db43d53de0b962f49217f809031729d44951a146ee3a6814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6931d3860973ebebdb43ac87f5eec7f9

    SHA1

    0af4084256af71c38afbf95262c4fda589f2df1a

    SHA256

    6e0da48bb55b45a9fb1899452bd024d70c1670c944b4c9c5cec29da72ab1d5a9

    SHA512

    db019d67bd7cc484fc86252679bec69411610a953ceabb9edbb53e73e43f9bb6ad605e8319a400fcfedcfaf51f10544d77f70cffe4af3426cff247c3ad388c23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f776b4bb0249058a2d5cad92bf3f8001

    SHA1

    5f2c4f18d9c45fcec2ee512c073fe035e77bd6a6

    SHA256

    0c7108bb5568d31e40f0aa2dcddd278b80c2beb23ab0dfcb89deafbf37b1baab

    SHA512

    cc940553c9e2903aefa3dd52e1fe5380c73ab94e1cedcba51b68b598c886898b99a26c91f2cdd75962ca70c6c6fdddf06af76e3b9f4f647fb6236034509838c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acdac886991399239d82f92c296e7cad

    SHA1

    d1322043d8fb15e16eb6ad2b357fb44b64aa2d6b

    SHA256

    82cd0981f4c3fff5353db25b9f368e788b9a8660bfb075b8892ff8cdf69c4b65

    SHA512

    f9136bf0d0a400998b2feaa64f3df5a4c146919ec3396a9776f1d72b9df0a8071a76a1f5cd452e51f8d6db70595a4b67815832784ab3316bf36e75d85627cbee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ed6f67a4c3e36551bf3b13ed47be014

    SHA1

    f5b1abf1ec21960d6ba9bb6ca10864a719a904a8

    SHA256

    52ddbaddefdc4a58cd059c7df990c59fef9dfe8f52b5eabe60353cd571ee8ad9

    SHA512

    95522f8b17e89bcb82c9aa342995ff4bc6a864467fbadb4bf5135e0c532e28e2a7b3c4ee45103173e5801f433bec01028dc5f107ad8f030ca845dbd9ba5e3150

  • C:\Users\Admin\AppData\Local\Temp\Cab67AC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar684B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2084-22-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-64-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-54-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-52-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-50-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-48-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-46-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-44-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-42-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-40-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-38-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-36-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-34-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-32-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-58-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-60-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-62-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-56-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-66-0x0000000001D70000-0x0000000001DBF000-memory.dmp

    Filesize

    316KB

  • memory/2084-19-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2084-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2084-11-0x0000000014EB0000-0x0000000014EE8000-memory.dmp

    Filesize

    224KB

  • memory/2084-29-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3060-28-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-17-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-14-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-16-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-1-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-3-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-5-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-7-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-9-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/3060-27-0x00000000005C0000-0x000000000060F000-memory.dmp

    Filesize

    316KB

  • memory/3060-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB