Analysis

  • max time kernel
    145s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 02:10

General

  • Target

    3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    3fc971b00f3a60bc8e2580dd8f17c363

  • SHA1

    eafed74f305db1956f6ad207e7736b285e92d4ca

  • SHA256

    5e2d9c5bb916ab17030009893831cc62c1810c50d4eadfdc1cc74c18cf1a062b

  • SHA512

    17aa2bc133649a78d8134c6a5bcb069b2ab95548893d7db3428f75a5777cc064879c30a4295b941b6a2dc60299b7890f90d9934dfba2daced62b73118f48a5b1

  • SSDEEP

    3072:pGedg6ecOly0mj9LKaV+k60AT7zo03JXqIFy3qvA72KjjY3mUXcU+9:pDdgPcOMrjNKq60AT70+4c9vAdbUXc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Users\Admin\AppData\Local\Temp\3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3fc971b00f3a60bc8e2580dd8f17c363_JaffaCakes118.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Users\Admin\AppData\Roaming\Kyotod.exe
          "C:\Users\Admin\AppData\Roaming\Kyotod.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2592
          • C:\Users\Admin\AppData\Roaming\Kyotod.exe
            "C:\Users\Admin\AppData\Roaming\Kyotod.exe"
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2084
            • C:\Users\Admin\AppData\Roaming\Kyotod.exe
              "C:\Users\Admin\AppData\Roaming\Kyotod.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1364
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2092
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2096
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8b08a708aeb08b34e844728e11b2f98

    SHA1

    93e5bef42829d6223ba5eacc9423351eeb80d1d8

    SHA256

    462e1ca34f343b0c9a845c61e99b31f1d994437de69e8d590171e07f517b6108

    SHA512

    1a42a2b268f0d75a3783e2d81d7b3525146d417756031011f9dae42420103c8c027aeab7ac0bc2c03f15ca5792d2ae7b69c85f8e4b8dc11c4a7d3ad1a58d80bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7402b89622a96c1fc728f3cb572b05e5

    SHA1

    0a77c6a1101e45476b8640c94ea7098f1ce2f4a2

    SHA256

    12abb005ca33c444067d959c17911752d446a3fab1dedb66242d85325a3844b2

    SHA512

    28f5ad3dd5aeb5fbd40370b1058f69d3bc10b9515c22f63f0d8f788a281423312626cf186e9f66c4d7650b8646b9e061c690f39e280671264e29240653822945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6d93afd2307d3c9cd984cc91f1219e3

    SHA1

    92f6e7fbf9bb1efd940d78e1bd0b76692ebd3095

    SHA256

    503300451584874209cd9e2e7a8fb90ac6ada6208db0154a53a9e537fd7b8306

    SHA512

    4e0f4092ffb222331ef8864ab750d803aa6f35d6cadb6114632d4d8b71bfe565f0c7e5a16e0eb4e970bec337824b54f8427e317cb3ec6cf41caf2d49ebf056da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a96090c583ef1ee54f1593a6a0f9dd6

    SHA1

    121b4ea31a7206a52d6fd0f74ae455b5aa7f368a

    SHA256

    865e927b4a3617b3a62e3999265d4d103327dd3246f81abb03d0c061af42c262

    SHA512

    5a4ebdc41e74b8d825732fadb48ec1057ccb91756cd30f149229b43860f13b6ff2344756bef335fa3e7c9a4b8dae25361f231a77129d3b71353a10e43900e1cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e3e3d2119b073ff4de8d285a6368dfb

    SHA1

    843757cebe4936c8e9cbf877d376b1cc5d03f6ff

    SHA256

    b2dfd7cafb3d3af8fb4f8722a5fd01726a240a29b0b9d64716f4b7310a408018

    SHA512

    dd835ea107d0f9efc253cb5d1e9a2f335fd1981e973525a1ea9c26b16ef92b5ecf365fc2fe626c866fa31dc6603aa77806c47e8848d0cc140bd4665a6263aa65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e277a622617efaf794d729bbda76fca8

    SHA1

    bd57590738ce228ca41d468ca4e916fe60899e7d

    SHA256

    add57859f963243d028de97252895915677ff71359719675f2678905bcc964ad

    SHA512

    7b4bc4b7b408546ea371b2be596a434aa7aa71d67a15d25e85e67bc588b74f5cedc3489fdc16371cbdcd9963c315fe2d514a8c03bdc8975add18ba6e7b7f0ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07ac39ddb7556bfbc1a80095d4330468

    SHA1

    1c1e9a3e29be285e22ccf550a44d8ab5996bffd3

    SHA256

    ca510bbfdb0ecfae3abd75355bb4e99e5f3d8cc73d53c390907a35a2b9ecff5d

    SHA512

    73980bac4343a50b1877f21819bef9004b578fd9746db16f97fe9bb49d6529d08e4d029b3cd1d9dbc213f5f56d7a4be95485af03cbc242608da697f2971bb832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94841431e8cee3cabc0e8858afc42d50

    SHA1

    6c8dc51adb7adcf92563d05de91c7bb84e273f1e

    SHA256

    99b403b483af89c065dd6b4c0f57562fb33ba8e9923c1b0a1c2d62a87fa7fef2

    SHA512

    6aecfb6cb22eb96eff676d49ae6631128145d416a727faa53287177c3c295779b962a8efb252f45434bf08bc2cfecf61d771e744287d33a61a0a64c0aacb79f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cf06c6a537119ebee374db116aff823

    SHA1

    677834b2ad41d80b94ebec33802f1104411721be

    SHA256

    799c2396b2eb66e4bf1c241147e78628c98b7410cf3fe99c52756ea2eb3434bd

    SHA512

    e9ccb5eb749e6bbc7229b0f0a59894c30130e2a3f8f6cb51bfe2440e6f60915ab206e18278c23bfef92a28f86d8934c9636bacd34fe8c2548bd7a7391242be99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b8b519c8c9835211c3d89175815d075

    SHA1

    2d5376f2e4f3439313c512e0d8140bbeac14ea5f

    SHA256

    5ce28943c688e432df7392ee95f7995bf57c1ca18f17e9483460498964052865

    SHA512

    c08785b1a5d0d94b97b5438c06a8cdf9f4b77cc24b148e23411004f32a093a0e5587bdfd1fcecf221e046386fb77169d50bd9cffb3781d500031865d5e681848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7e9202695c3ba7d1b51dfe1a39daa22

    SHA1

    b883bf1a403c1b86f4d97ce111b0666e912b243a

    SHA256

    0d3483f8849fdf9afa335be1a088fe054f39266eec144c3aec79f5ce6f94da84

    SHA512

    66f9d7bdc5a229d2f233c602743ca6875d6aafe9649a2e40238a406ba709e37372e375cc9c7944107aef18cf7ccd7cd647e0db658f719ab4ab01409ac63c818b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c81bfd953f2543a7f0301144f81182f

    SHA1

    54cfa4e2f4ef471fefe4bdea763b5535e10ad260

    SHA256

    4dcee0d2be436cddbdfde2e3f8aff430b191dc315c8292932bf57756191b6f25

    SHA512

    f2cdde7f41d7745a64f0934579601a3052dbcb7ab510e33bad901942b349b78f7e856a76e27f1406b413aa51425ade2f520352e709383599a54c9d3738da37ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae74bf45af2eda2de8cd85024be4a2c6

    SHA1

    cd9fdfca5c3dd5564ea32c309926623ee10012ac

    SHA256

    aea6f627adc0aa9c40c8dd8dbfa6f01736f87e06d20f54c25e88477924740126

    SHA512

    816b22c76bdaec0b30281d97fac2312e05f912b96503efaa2cb0b1628e9d96e94e357c5f9c6aafcae5fa0d969f7e71d7ceef733ebd166732809db13b58cdb9fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    803ba483d0bd830126b8b501911c0a92

    SHA1

    8ddb63086140bd340d95dc0ba0f761d04636684b

    SHA256

    f7f80001100a63ecbc55b59d4421a1b2e920a56af1dc2815dcd3102828914cc0

    SHA512

    563d30ec0caa777bd3824b5067f0bc927a23c4e07883bafc4dcca560be8906d35f8acb69dd0f62d8146515d18587da7fdb3bdf52beff3f66419e26746af9e542

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dd2d8960e4e703eebef137b312b8465

    SHA1

    4f6f7efe09cfd71b8e6af161f9a43f061a8a2c5d

    SHA256

    87373a6ddc1323c271a5db57892948689f1ddc6875b9bd25e00751d3a25e6862

    SHA512

    0b0eb89aa9f19f4812e17a1ae283748799f8cb318e3ed9dbc0341469c243e019bc52ff253427f5dd62ecd001013aa1008a26a4bc1c7a099ae299587d1880aca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6ef25a9d8b1e0770ec4cce81a9e9c91

    SHA1

    a0637d90dcee9ef274474cdd21cfbe2150f1204d

    SHA256

    24b1001b65f38a2ce11534bd607aff09953a190b1b3986f109830004b87af2b6

    SHA512

    5bef588edc24c6d159d3cd9718d5f19a6cbe0b30421bba360f7d1c3a12e50a4f83980e370bcc1ad0f9cbada28a1b62dc502a6c39a17656347fb707507646b013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b30367df3cee1751a1be9e42fbd9c95a

    SHA1

    88600ce04b8e3c6ded430c2ca0ad497fafd1ae21

    SHA256

    c190e2feb6c32c5bdff8ff553a14dc9804b6bede0e0ac030229a7c04795a9809

    SHA512

    a6a3865a2a7ff265f91c403f398e5b5340b8f21fb6e8a339ddee1b4e3a5a5f3f53815f27f8d527552f37b65bbc0209e3a5441214552d3a98910257c1136976df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdd728ecfa19f8be3d7a1c2ccc0c2db8

    SHA1

    284c1b90b3be12a475a4616614d757062cfb5fff

    SHA256

    e40c8bdbfac95799230018fcc5e67c8231939390fc0c643f8eb3cd01c06d988a

    SHA512

    c3d97050011290bb9f3c7bad203624e5a20ad578feb761d0aac9c30e58e8c9009d4cf2b1e1c1efd8de2cda502dbdd115d0e6d176d40d6a663b3c31a3be61f40c

  • C:\Users\Admin\AppData\Local\Temp\CabBA2C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBACD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Kyotod.exe

    Filesize

    244KB

    MD5

    3fc971b00f3a60bc8e2580dd8f17c363

    SHA1

    eafed74f305db1956f6ad207e7736b285e92d4ca

    SHA256

    5e2d9c5bb916ab17030009893831cc62c1810c50d4eadfdc1cc74c18cf1a062b

    SHA512

    17aa2bc133649a78d8134c6a5bcb069b2ab95548893d7db3428f75a5777cc064879c30a4295b941b6a2dc60299b7890f90d9934dfba2daced62b73118f48a5b1

  • memory/1364-85-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1364-86-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2084-81-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2084-83-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/2856-17-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2856-2-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2856-4-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2856-33-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2856-12-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2856-14-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2856-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2856-6-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2868-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-24-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-47-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-34-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2868-35-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB