Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 08:51

General

  • Target

    451e7b627befd8d42005864bacfd90c9_JaffaCakes118.exe

  • Size

    34KB

  • MD5

    451e7b627befd8d42005864bacfd90c9

  • SHA1

    588784038cb50e06b8e45fcb6a48e948eb2ce54b

  • SHA256

    12c6553395de3745b0891c77230103fb2c2493453b48f87ea8a99189e65c9472

  • SHA512

    b13a473db27bfadd01d4ab71d2e32172e2c3342e9f6fa67c04db19114d17cd5588c057e14a7ab0eaba09cec9a73bb8397d9c9fdf5402c0a0739edf0ef5230f6b

  • SSDEEP

    768:SF2SEgEaVjiMQFRQVQoxGpcvogcOaabAiM9umhAiPCWcC:E7XiMQFGpxGi9wriQ6iPC

Score
8/10

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\451e7b627befd8d42005864bacfd90c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\451e7b627befd8d42005864bacfd90c9_JaffaCakes118.exe"
    1⤵
    • Event Triggered Execution: Image File Execution Options Injection
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      Open http://xz2.llju.com/tj.asp
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0aad442b0c86223acb1d0da2d9ee380f

    SHA1

    4bc19e814430014bb6644d209d5c4a10b4f7fc70

    SHA256

    9f6e02b93fe8e54055dc680616dde831ef712ab336c0a3cacbb9938968a0767a

    SHA512

    e87cd2a503d6be35d3a7bd56c5f124fb52bb13ed0e276483a502e41226cb14685ca9f70030fb9f31a21fa6e2567ceab8241c9b27e6088ee8222ec4472317a873

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01533a2a8e8fc71af644cbdf5178bfea

    SHA1

    e7cb86cc1eb100da561acba5ce88a56a2cc19b33

    SHA256

    22fff9f783359fd8c8ce0a9d74212c470e04d40afa53bd1ea43312adbf042232

    SHA512

    02382ba85d92dd0c15b17b1db312b15f64e49214f3430543d9dce7aab649d0ab1d66cc2a76d900d8403fd3155008eddef388bb9dfb4f8647d1950d796c1c2efa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff52ba97c6d6dce6433efc90af9592c9

    SHA1

    25162ccccfb0b98dea22b0339c25c8fd3cf322c5

    SHA256

    3175e91c373ab0c2cf9e59fe4ca5a8f05cc94aee6d97a1447d9bbd25b74c7514

    SHA512

    992389d59e092a324c3d5bb8f3b0b474be6d7eeae3e85d11fb00d282f2f21b2874f4de781d60d1c4879ff55680d04558ead355a436e5101e3248341e79224636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55cbdbf10fecb10a820a71d0df48df49

    SHA1

    5ac5eac8b484e36e0423abba584b25bab5cc2772

    SHA256

    1676fd9381da0001ed66b0b7ab37db28a975494efbc3907363d3934b2cc259b9

    SHA512

    bc0901c270f8171a97c613529a0e828954e054acb49c567a5deabe8a4e7789c78223b56d748a2417f0a9618a7d634694fd438512661d0c9a080d2ce7947ccdc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23de1d6408450e853ea57d8045b90f67

    SHA1

    719ac28acc5d6e2cf46ca73d524b2380cc4522d9

    SHA256

    8f6a11334057d2dd336ae17f392ff52de11cd94344baa2dad8ae382e6a70ae1e

    SHA512

    40a726d6044723c21b8390e1f3d3650f0bb9c34b3d19114e250c28e1282ea6126850362fbc8e69e399a7f3b83993c2f6aa64dc4fde951411248b74f07927a279

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdba3a6f053b79f3ca89499d87b1847d

    SHA1

    8222816ca9a673dd7ddb0fc19d80cfb7541e0bbc

    SHA256

    38b66e37186d61b5e836df6cca608e074d4a0e72070cc640f8314d38094d3359

    SHA512

    6b933b0646939efd5615125f0c7b3c920b077440e740d41745c2d17779c41557cf76596336e56a56cef90e34ab3e8cff1f7ca12c24e1c777f422be9655637028

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cefbe8d7a620a40eccbc95f710f690ca

    SHA1

    97145ca5c48081d2e099112685498696f66dead8

    SHA256

    75cde12c3ad458bbd687a6a4197b7a3808640fd02e856d8c0031c64d3c7e7a69

    SHA512

    85a945f5402fdc2b7ffc64fadc1f4ecb8b5f7d1bab5edd5042cc5c1e713bad14d3511f5c166f40cc3f29d0a0061e16c12857358faae9056a9c76f11206b480b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    676e4913723fcb0ec8f7922828ddc54c

    SHA1

    fd477fd384504f423e53f73adf391854ffa14271

    SHA256

    58fbb336ccf5ddf4f9a342b36b90da5c41992299c1aa82e79ceb6f14118f2ea0

    SHA512

    f60979dcadb47ce9b3a015027c4de10695d4de7b5eec5a4e9392d0f796e1ed7a4e28fc618d4e4d8778d861e1278e369acd2d7cf15e692dcd4e745b2545e59387

  • C:\Users\Admin\AppData\Local\Temp\CabFE7D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFF1D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1312-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1312-432-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB