Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 14:31

General

  • Target

    4638a4e7faf5a9343551cc6e9668d143_JaffaCakes118.exe

  • Size

    30KB

  • MD5

    4638a4e7faf5a9343551cc6e9668d143

  • SHA1

    285ac0fb341e57c87964282f621b3d1f018ab7ea

  • SHA256

    28f1940e63b6fde028dd1ae55979296daa4f7b081df5e3e251b7f98825415a86

  • SHA512

    ecfb581b9f6e074cb0c5d241fe10ac56882ce96cde3a7375791c809948081e73fb185130e89180cd057c7e8a9a9675d036d844177e957f907d1fc06b5c7a900c

  • SSDEEP

    768:gpB8zue2cyohIGl2DoLJHq01WZIVVPhRSe6oA:xisIaLJKkI0RhY

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4638a4e7faf5a9343551cc6e9668d143_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4638a4e7faf5a9343551cc6e9668d143_JaffaCakes118.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_win_path
    PID:3020
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\B703.tmp.cmd "C:\Users\Admin\AppData\Local\Temp\4638A4~1.EXE"
      2⤵
        PID:2360
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe /s C:\Users\Admin\AppData\Local\Temp\winFEBF.tmp
        2⤵
        • Modifies Internet Explorer settings
        • Runs regedit.exe
        PID:2844
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8a9ad689f74169fbc999b78b59bcf7f5

      SHA1

      ff06026bd533dd3daef3c154190e2e2375aff1cb

      SHA256

      3cbde1b48d5cdf87a063d0dff66345bdd6bb21962055d1c746bca4c8005aa4be

      SHA512

      9b111804e70be73aa085e851506a357eaaae1935c3b7493b44f749b24ac7d57d9c31753c661a81f1ab6aab5acbaf51b191c3d6590af9832b18329657d9ec1bc1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ac518bd02c62a94c3233afe7ed4b66c8

      SHA1

      ed7954fba297d91447e32e7508daa5c14f9db1d7

      SHA256

      bc035c5a3ea08de664421336bf23f403818aaf5d90c431d3865d97013b4d0228

      SHA512

      bba30ba55bb89c4580298be4d2d541cfa571daa24b3d2e81e92fd1c316aec78d3f2a2e4a9558e94cd47bc4f6389cbeaaffe95006a617c91dab89a1947cbf46c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb9c82fd1f0a65f3b8d57b0f4078ac13

      SHA1

      f6ae37122c1a15bbbd26aeae23bd186b05dade4c

      SHA256

      7d3bcb6d6ef87107c5c3b2bd23ef82690aee06cc102dc5e81d864be53c444477

      SHA512

      c3725816608ebcc2ab74caef567bfb0d572e4ba1c221060b2b9d9ee76ef4bcb5b1aec2a8b11319c3fb96a7cc05603f7004f4401161c78a516766fe7ca19a8230

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      aa937c280ddd4db94a65e464e7d0e026

      SHA1

      293cb006e70747f9a1ee4ea2a791261041d18fcd

      SHA256

      286ccf0c4f04cd54a7a3c62ce162cbdc93ebd931f9cbb4259cfd43ff168738b2

      SHA512

      f6cb611dc8bb63351fafe2523d2ff708543b69d1310929f298ca69d7792cadd055a677f2ee9926dd0189d652c501c8e8e169a906918ba23cd3f9a6ff03a9ce79

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      71f5811c9ac79c90485172f1548092b0

      SHA1

      beb611ebb44e9b0d6ebff89c6e80b5a9d5963136

      SHA256

      b651bda1077eebcd707c90950099893b1a7292b0856de7ed994d98c626b3c089

      SHA512

      5c6b7e66650633a20214b4ea7acf77d77b0d1618008beb8bf2955b9c1be05faeb7b167f6980c8420d7a1067afb5c395a45df37d489a81576ba5e81233d840999

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0a383b84275924bed812dc90982d3dbe

      SHA1

      63cd2646824080172b87d40fd5fe49e51186dbc7

      SHA256

      345893947f1ecb38b95a7315b08bdeccb4021ca2bd1f4717f08e8d120af40b90

      SHA512

      8abaa3a2f983b6024676078423b5ebda1da2398425f55c88e68fea0708663541f49c9ee54d21f9d388bed5e217620e9fe3fdc9e4bf77771e8bc392057e278f71

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fb2e64691f92899218fdbeb8b9229646

      SHA1

      7bb515ce18199a3b9ac258239c6ded8bdb59c8e8

      SHA256

      ab8d3ad464a21f793304efbd3fe5321b02a788ea3ce739136ae1a7abab91f6b4

      SHA512

      2a52e51d15ebf88ddf2b6d7f99c3f38591cc926196643a0fceba215c2981c0503a5b076bb6eb606d20f1ab56f65348865c3ab9d175722a9bc813603383fecf34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      97722724039885a4fa10ea9910dd0047

      SHA1

      d3b446a6d10cf9b2c6804052db2abb3d4e2c4f71

      SHA256

      ae323f980e30563f4b793f69a09885f5984c58d115ab5fd9fa207c59721c4eea

      SHA512

      31342a1c3366ceefc326fc621860b23689250597e82c4c34eb5c65a0ce526538ce4e898975e1ae3e2270e4bb26f2478780e518e944f6b187240c70de04a6e808

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      281e50f50b28c1c1a0582b92749928eb

      SHA1

      94366c5f4973f7ec0c0937dc3e2af12c20390002

      SHA256

      2096eea3349a54a44497d8de56a9b42fee117326b83d87df3cfba8ec650831a3

      SHA512

      3da8e129b0969dd7216e3b7be07ed2f929cf24cd62cdac7a0e92d13b248ced4cd1efe7c3d7b386fececc697e55e98023c376ff78aa736388b5c5f508ba798a78

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1d50c37edffc8a924c84be34d790b7d6

      SHA1

      1bff355d89e866f22051941eede6f6c30eec430c

      SHA256

      b6a185d0dc51d88e562412cc662dd289aba535298703e8d7929dbc2a28eddbce

      SHA512

      0878f81371ff13d787aae5fb6f52191fa2820dc68d2766782f4cc2ef2239e28c59b4e4747292d6de771ae257b16216f17623929b4fb97f91d1dd75a69f76c6d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      21171e191db460cb1ea33702ce4bcd1b

      SHA1

      dbbb4239e8856d345395a09d82e4d9efdd468e2c

      SHA256

      96a21966ba3bbee288d33306aa0d1d92e956937e326d54a28b4d347e0d0f6af6

      SHA512

      fec53222a12845f4a47b910ea572f5ec6fb061104db9e9a9adeb82f73390c5e93683c850ae438e2952aa35dea4d45410821610427dc511c9b9fdec2716d8a29b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      40b5cfb1de15fd5f994505290fa61368

      SHA1

      d2dd1e8dd34c7749ef6ea9ba28f80c46c6f0d069

      SHA256

      4ef483d956c33e81347f860f9a51762abc4474629fbcee0fa2c0c3aef2701a0d

      SHA512

      ae0aea7de2a0f4d6c54d04005cf7cee5ae625f4e325f152c7a606b006e3b02d97274bf1e983c22ad3d20fbbedb705ddfd267fa7bd0c68513d7987fee8cb89bae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f688b41ffcae80b476e91385f45b7a5f

      SHA1

      9fea1958aaeb28640cc7561fff8a0273f6303c21

      SHA256

      f050c1bbb294a9001dad88b7968f1dca9224ea034114b5790c3e7596c0ee5303

      SHA512

      dba93a4ade217848b9f021067ba1e6e25f4afb0b164871175902e5771f1bd40e7f697a69ca4653c30f62be6869e780f967e62e0dc259efa43b8f6ce79eea8c09

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6cf1b9b4cb3946535d8aa1db8cd65358

      SHA1

      a250574036c2226a0ba039fbf3d3c8fe93616a43

      SHA256

      8ab8f6f889bfcc5a11054be7b9b5736fbccfaeb79e85c4e647e36b51dcf3d56b

      SHA512

      1c38b89f235b502fd089ba86181c1f3dbc3026ce192c6c626680c25297626bf461b3252318092663559388309f719eb0787e8a1a783387942928444072991c14

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      238034d20f4233526091cb657653fc73

      SHA1

      8451efbf7107ad8028bfb2ad56b52c2aea2be724

      SHA256

      6fd1b86e2370c091c6f7b7a5224410b9b99dc5caf4eb46f92c44605b056ed255

      SHA512

      ba969415048d596fce99ef3d568d0ea225b54d81071624c71e3aff3b77fe1d0340f826c93420239849245efee2ed942519549c6d9836fc9636bc6f847adb9c20

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      02ca18dca909c0ab1f6aa9cdebc3b5c9

      SHA1

      c46728921975074f6727749fe44fd2c71a547892

      SHA256

      069fd6ed54e7e581e4606bdeca3f02d5ecf605e5a2dafc0bbe857d3668a30f9c

      SHA512

      c9b51f2ec9b6bf5d86b30608dcae4941d741323c8788f6c5f95921300ee762c9fdf0fc86aac3199e9ac4a84a5c1d47718c5b6673d94be61db8d6e0921f46eab4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      34a9ad99de5fdd09491339f637a0ea98

      SHA1

      a0035493b4fe700fb011db687a8ef683cc74e997

      SHA256

      c91caa56fe9566af4967deb2f136733c274066117234c4b676c340be11e9a4f8

      SHA512

      64c8636c3d6a80702e811bac001591980bc151a61c28b9b0560ade99136b84553268bb4884951e9e35cb4d3794dbd6d357d8dd68fee4a2f3bee0fb862f9443e0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      39772aac453480beb3df78fa3944f417

      SHA1

      167ff65e03ddc35b6c59b32da609102da2c97b56

      SHA256

      8aad8f7820bfdeb2a3c6e171fd33f84249dd6ccd28290c38992bff73d151d25f

      SHA512

      7f43291a32d7b92b9e8e473d79ad5029eb629f7320ec95bd05a51fa0c2263cceadefcc4f33ad2f875b5de9ef2c4a01625277fa13b2ae5d15085a3865efe11bd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      15b89cccd1af7bd97b8c840a2b588f34

      SHA1

      b96e6e8588a39d0e33b63ad5144751b3e089fab5

      SHA256

      81a3e164fdd39bff983f2a4916c01b2799cc9c2d9766fd0e8846e5c408da91e7

      SHA512

      45d7d5463c6e45497c8f7664309a1031baf918f17fd14bc004053d7d9c6293c8f82a47570b5fb6dc8772f779a2ee684d957fe5ead3cc2bdc926a5b1bf8fafc6d

    • C:\Users\Admin\AppData\Local\Temp\B703.tmp.cmd

      Filesize

      127B

      MD5

      44143e15ec7c2bf219399f280e1f08a2

      SHA1

      911ed806fd6af2efacefc136b78c5485ff693dd4

      SHA256

      6db594e88f9cd6963ba8685c247d4fb4ef2239e8f8f3a65d9e80fd02586d26ea

      SHA512

      08844c4b77c161ee5532d7f9cb74cdfe59e4941d2fde0669ca007d970b8973746d293e8ed899d7d2e90707da975ae98454ecbcbc88dbe7c520fef1cab37b755a

    • C:\Users\Admin\AppData\Local\Temp\CabC42B.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC4CB.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\winFEBF.tmp

      Filesize

      234B

      MD5

      457015ae19194d6af680bb96b943eb25

      SHA1

      c7d776ff28414b9e2b4b4883b4b03f2137b4e803

      SHA256

      5fa9f6999d5d3821837a20c41a437b44d8fcfba8503f4a0016445a2a314301b9

      SHA512

      cf137b839457e07757ef1079bd3f871fb4aade5e1e6137d9bb024065d7157ab96f9365b5ec21be3aeda79ee7468651c9f1d8ea8fb0144c45ad3bcafe3d1cc03f

    • memory/3020-0-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3020-11-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB

    • memory/3020-14-0x00000000002F0000-0x00000000002F2000-memory.dmp

      Filesize

      8KB

    • memory/3020-15-0x0000000000400000-0x0000000000415000-memory.dmp

      Filesize

      84KB