Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 02:31

General

  • Target

    43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe

  • Size

    239KB

  • MD5

    43f1493ae2616ee8337c57b1c5b0fc0b

  • SHA1

    3a0b5c1c4a9272c2c3fe7e97675bac4affbadba4

  • SHA256

    ddaae5ce6dd6146248dc54d04599a6b0c57d9a4513feb2488b206801de8f2b57

  • SHA512

    21f1bf7b9f151150d5c02d95e58feaa6d395c941f3b181b33d8f1ad1ce891a1ced2de3af58e6ec4b774e1af26f9aa9181171721b4388a3a55f93f8411dc2949f

  • SSDEEP

    6144:ybPTZPIBXnMZjS4ad2003WNQiYomG5RIxCdW9M6H0:y1IBXyS4a400GNFYomGjWv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43f1493ae2616ee8337c57b1c5b0fc0b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\oaPC8E.exe
      "C:\Users\Admin\AppData\Local\Temp\oaPC8E.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start iexplore -embedding
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2748
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\BhuD3A.bat"
        3⤵
          PID:2864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 144
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:2784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8921af2f3da20100ed99a1953f0ce8ae

      SHA1

      b815b16211d7c624e45b8eab1b1a6e7cd414182d

      SHA256

      76ab12513bdb54ccaece950dfa67c7023421dcff1a7a6f2efc071870fdf19893

      SHA512

      fc0e8ac323cf0711604f977bc3bc60ef746a8ea738ca24c0f962c1a75796b8a87a1502e4f5f0527fa1dcbdf9d333fc90ff681a02bc2207a7cfade2bc145cf1cd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      87610e357313f12bb607833f5a889a2f

      SHA1

      f0fbd54578886ac3ff57b4af23e29dfbbe42e6ce

      SHA256

      9addaefb7a4c27ceb8b188b539355fc8373367f5c6bcf3b95cc53d210fa6eb2e

      SHA512

      b740355e560e5258cb2966fdce913334b7c5da77c5fe62f2a65e0721f873ba1bc7ca4b7a0def6dcbcca0db1188fc4a792bdd8e6e8207b50065a2b6f2c0d7cb8d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4f8e453c997abf41fb4b4598c1b51598

      SHA1

      ec55bd645959ad9112589cb3d4aae6e2ac425d00

      SHA256

      1bd114ce04ef42b4d232720f6621130ac46759b34aec1119d2ed3ee2e3b4e315

      SHA512

      84667c184dc789e65dcc38573d88fca15bf76fbd64280428ca25bc6202150fd3fa9d5deb4d5bcbc32734a222a129d32191c040e4dde8d3afb2671f221c07601e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dfc3e3920e8c3d18aefb8558b441e889

      SHA1

      18d09997663e85b27577611185956ef6c20ed761

      SHA256

      aa1b2dcde545385527a04c69a50dc336a2300c6b5e498b8131b0a2fc7047a09b

      SHA512

      97c822f79acf06ab0cbc801ba8ffc792b8b6c11a753329966f10e1fa5c81cce384c1cc398337e185035cb79334aa90b92a5d8f0fb4ebda18b421a2acb8f5fed1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58c57f2a76bab3796e0669ecadaf2516

      SHA1

      96ac81d87a6f9e4e531e1a76d3119b3125e8b275

      SHA256

      0736ee72ec23422c0782fb50d092b23e7b599bddb373c4ab4e5390e9a632d059

      SHA512

      7f6d0eda8026c2b798478f8af093a72ef862a3ba8e9cbc2353d9425ee25623690a7870e8b811e4e08fb92315abda5865827b8dba0c6e71c650fdab362e54e6b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bc24cdfc9050ea4bf3716cc2a7c384c3

      SHA1

      9e2e4442cc0aef360404bb927ccc18d7eaeea7a9

      SHA256

      6cd529ee51176ad3ef837de98343ae31f0b764cf4d7b2a7bce5e79563d778abe

      SHA512

      e147794ba446617ea8056b822b3e2dc96ac10395751d95c7a3cadf8432df2726b2a84210465715be5e61c488a73d537376e78b14b8bd639936db287d34094ff1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8c22d13d2884ee0b5b7aa59b33391ad5

      SHA1

      0b6ad159497d6d08c479d2ad206453e2ec88b96c

      SHA256

      c753bf79110b90d47ee3be930af7e02de3a16329392535c07f1c23e9a6fcc168

      SHA512

      436520d8e216cee84cfa186c08030c1995df243b32c05090a05021918aaed45b2bf4c58ca2d400080e7f89255050b09d2ecddd11aa298e56f6017a794e8dae6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f83e283869f16f5b1af569f41c91a904

      SHA1

      1bf118635939848582b6313d018864e4ba96f69a

      SHA256

      e72199630b16e8a745ff7aac21b15a1f30dc440b5c9a15d665f5184971da08ee

      SHA512

      b769fdd3ac543e118ccb34a5b3b34e29fed546f91ed6a1be133b969fb0e370fea5e11c3313fd6a5977591a8e6f68d6f0f371b165757f8acf51f942a11ca2140c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      57dec84690db6f5312031e0fab6bc801

      SHA1

      99b5895e420bcba2b8a55edb5266da8b5c46d975

      SHA256

      441083a28e3116e105c7739e3b08bdcfd7c01e90988dee2e45ba40c2e2c2b667

      SHA512

      26012bc19aa2fd815a1d76578275078d2a7957d5e4469f8f386db5e43e37a0b8af1d781686aa965f8d3ce00981edb0f8d211ce1890e7699143d8498336791dd9

    • C:\Users\Admin\AppData\Local\Temp\BhuD3A.bat

      Filesize

      185B

      MD5

      7164c32b50e976fcce5a7e2318b0f10b

      SHA1

      f6bc29574e4b9a977ce9845957926e7a2cfa9595

      SHA256

      591aacb80378dd3ef7458811bc9c8aa0a4a07f6dc6a2f8d6e40425fdc702b109

      SHA512

      627dd0aa0395bf34cdd3e34416ce8af12206b47333ff7bd3b444928319b6ebf4b7a4575f53c4a658531b3e93dea01d45edcad28b6ca7de6bbc9fdc5dabfa7e6f

    • C:\Users\Admin\AppData\Local\Temp\CabF5E.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar100D.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\BhuD3A.tmp

      Filesize

      106KB

      MD5

      c43f0e31674e0f4c88218c38b7d81ee7

      SHA1

      db6312950ee3c1f79bc96bf724aa2185b66a2a73

      SHA256

      7523ea71f532bed48c38938fcb494ccd76d0f2c36db06c7f4811b9d27b4e9a77

      SHA512

      9ea51359fc3e64da5eef9bf3c348040d4afb6a4b878cd08aad7ea0595216c15a27b8d3307e6ec575fdec206550cc058050f312c7722be47f6cd1f2f8a5a855e9

    • \Users\Admin\AppData\Local\Temp\oaPC8E.exe

      Filesize

      171KB

      MD5

      643aa304b3795c8af46bd189ec5746ae

      SHA1

      a39e2ae7bf09316b47ef00c251fce1731e67cdc5

      SHA256

      7a74bb0f96cc0e905b3b6f85bae405ffcde40b53f247e339f1a3f152f65106ad

      SHA512

      6d391791c187ffa542c5b287f2d1cab6ff5652e97031507baa865c6521787ab93207ecf827764f93b90cddb165975b08ce43bd1cc26f393a80a83327552b32c7