Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 23:40

General

  • Target

    4be8ed86e17763d30115400b9bfdb325_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    4be8ed86e17763d30115400b9bfdb325

  • SHA1

    e838fb964812f7185a0d4d11373f63cc55b98e05

  • SHA256

    70888da1e4742ba9c39375af1a929736f519e4b7d85ffe5595404f067dcea399

  • SHA512

    da69abf8d9412a1b6c8367c5e6e7fe9fe7edf86439996c9f6cf049d6f0d9a239ab6ea95e305d9ef5c95a70240ee2af2945d992c2a2a4ab12cf8955cbdcb71ceb

  • SSDEEP

    6144:yRHUlXZmcUtyKNVwWJcsf3r1qfw9EYjOUt6f8H0p1SpaFqed:ZmcUtHbcsPpCw+LUkqA1D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\4be8ed86e17763d30115400b9bfdb325_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4be8ed86e17763d30115400b9bfdb325_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Users\Admin\AppData\Local\Temp\SABB85.exe
          "C:\Users\Admin\AppData\Local\Temp\SABB85.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c start iexplore -embedding
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2456
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:948
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2008
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "C:\Users\Admin\AppData\Local\Temp\AFGC12.bat"
            4⤵
              PID:2932
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 176
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:2704
          • C:\Users\Admin\AppData\Local\Temp\SABC03.exe
            "C:\Users\Admin\AppData\Local\Temp\SABC03.exe"
            3⤵
            • Executes dropped EXE
            PID:3052

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              abc6e0a83b0144139372029a7b03c47e

              SHA1

              56539c69279a6989d913f991babd685dbd09fc2f

              SHA256

              1703fffc9075f4dc1d67a85e42afd9895190fea87d9972b0e2d2162ea92874f5

              SHA512

              6bb278be84928f286468dda5aedf2e81db7be87e6dd15214b968693b549f0d0f419ed1c2ff98507dfbc4702227800bfd3ea1d7ce8331f86bfcfbcb44ceaa1251

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              0ca17bc32d1f7ea74e0b887f60dff9c8

              SHA1

              4f3aaa78430b38726df3e0aa6b3988d004d1161b

              SHA256

              a70251e4fb011e6976ec9ad019ba1f5f4718805eda0d38ba2ccd0a809babaa61

              SHA512

              3d7e69feb747ba19289a7b635c56b5bb330aa2a23ff8536fc978f89fc8252c868a2bcabebd8b2a5988cbd9b2b359b407999e7889edb13d60767eeb7dc5efbb4f

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              0306f4fb743a85b6ebdffefad2142f0d

              SHA1

              213ac0f5d066234cb64b0cbc4bd5d2a37eb1f728

              SHA256

              f4cc9c0e5a2eedbafaaba9a7a0885914d069204385efb56e06ef65cbaadc67a9

              SHA512

              ee8c0ba1a9b0d2c29d55427640e41b7f18b8b2fb97b25ff2499f6e22721880de63707b41a2dd3e47de4034e309e60f0f00507cd3ef0f9bab36351d83d262d174

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              8c9ccd9dc78d2422646589169add7e5e

              SHA1

              1c0a87073a0082dcb058649c3287d6b29f24401d

              SHA256

              846927ece056e7e4491eeb91a8709e670bed1f379bf2bc3f286103389f437689

              SHA512

              1de418803b2e6a0346557ef5ecb460db0f8c9d4aa3a574605e2ac7483be9b07d2905278e5064cae8ed4e4ca25510c786c721b20ae0bece86ab332cc6a57a5692

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              66ddaa5a03c6e44db7014353a84f174b

              SHA1

              fb607d37a9e5a844bacfe3925d54fdb45c0319d3

              SHA256

              150b19823536db018cf88559dd551b4fc690bd2efaf0dd4dee4f0b7a20fe28f1

              SHA512

              f2f64d556f6047ca17d5a9cae080aa01210152bbd3a64ad2ba0593c12d1be7325d26372b7cd0d535f7043d3766e1c2642316986f12f293438bd7c0e6234027e4

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              1971f2f8c3c08c95a964ca568b945ad0

              SHA1

              1e6406de3710a76bb489a86ce960452f4d7133f2

              SHA256

              4a6d8bbd54c945c551ab97db1c995bb649c7a01f3a5d362db08078c170215eb4

              SHA512

              68d5bc328869873b208bf90133e41521886ee25f1cea7189be0bf109bbd42b75b9b768459b5a6817b2156ea1f7990d34cc860df6b755669d13d21ffa80931052

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              2377ba54556a7c4fb795ddab9468a7ad

              SHA1

              d6206cdab8b16c8a5a95f6ae11ac405f820e580c

              SHA256

              9560686cc5a47dc834c0df15b3916c6f9019f989ba305e6a14713e6f198e2896

              SHA512

              48719d5c204b804b08a548f03ad78bb5cd7a471dfec8fa73b5d79895697ca9bc494b14309177b2599786c6b78b3035c468f55b06524cc7173446f85403fb170e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              e156d57e666673e664b8792595ab3123

              SHA1

              d28b8b3d16d1d2e1f403bbbfce8636c350841da4

              SHA256

              990581dfeae70e268f1751c482f171db658d7f2f99eeb1488b6baa4fec504fd2

              SHA512

              ea164b2070ddce5682bc750eda52882fb1258b0d35a9385a7519363be5b0d33803b99818750da2f1300af250cee80f3e0beacc00dd8bdf3f589ca6184e8c3b29

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              342B

              MD5

              ccd0a4157e5db3c09697bbfcd550a453

              SHA1

              2b17c0095977942a9f4c83ee2ec4ee5810bb9fb1

              SHA256

              413a7ce42519a233a1b9d065a8aa96b2c1f48d9191171a68b131f7e165c6fe09

              SHA512

              73c3dec1b2771bbe26daf9b0000aafa1e86ac08c3d05969a6e225a887f534e54a191b8042d71c9a28ed3f5ac454ba7968ad864068704ae8b7ba28eaa6f63c8c8

            • C:\Users\Admin\AppData\Local\Temp\AFGC12.bat

              Filesize

              185B

              MD5

              5f876927f5e2ff6e12b13854310106a2

              SHA1

              3dbe2a4f5f790f90123f870d6d41dcd3216ad376

              SHA256

              eae095719b2d459ee451011cc94e92c5de716654bb75db18688f1293246a2917

              SHA512

              1596bf47b3630d549a08064b0268f428b81caa227fbd6af26ad2242ad804fdb3a17560e2b4833111d9ef237a6ad8d7cf2d9606cbeb957e7d3fd769b58a5a3beb

            • C:\Users\Admin\AppData\Local\Temp\CabDF7.tmp

              Filesize

              70KB

              MD5

              49aebf8cbd62d92ac215b2923fb1b9f5

              SHA1

              1723be06719828dda65ad804298d0431f6aff976

              SHA256

              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

              SHA512

              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

            • C:\Users\Admin\AppData\Local\Temp\SABB85.exe

              Filesize

              133KB

              MD5

              a2b3a7c27f6569858d2dbfbf1f4858d4

              SHA1

              93ed7e0517176342b7f70393776b54ba918e3bf5

              SHA256

              2a364ae850abf4ab7cafd81332151b19b5ec062e33ba71113cfda5a619963690

              SHA512

              1bd0c959f19b7d2b91832e878d5849e3184ce26c7efc4cab0f03ef510b7a9c932d207414a948cf8fdd7c1f17ff90c27a5874804268df996a65fc2a29e414f463

            • C:\Users\Admin\AppData\Local\Temp\SABC03.exe

              Filesize

              90KB

              MD5

              d3457d4d1fc2c4ccb383a099a6d464f2

              SHA1

              213f013aa924c5e957ae32ad5e94f0df45039ad5

              SHA256

              a82c6534fb86e5cb189f20b9b11cb76f6845beedd5be5fb4a6dd313db08eaf8a

              SHA512

              6f04f77886b6f21529125a46771637da74255f0f5f48ef7360cf7c66c7fdf161f706bc9423bc7f4cd584eb1f8df31677892b5ae2b9c064437b27fec42e16f1b8

            • C:\Users\Admin\AppData\Local\Temp\TarEC7.tmp

              Filesize

              181KB

              MD5

              4ea6026cf93ec6338144661bf1202cd1

              SHA1

              a1dec9044f750ad887935a01430bf49322fbdcb7

              SHA256

              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

              SHA512

              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

            • C:\Windows\SysWOW64\winirq32.rom

              Filesize

              60KB

              MD5

              e0580110d563b9825819840a3a5acc57

              SHA1

              8ad196cac4f4ba2cae767a296a5167b1b59404ab

              SHA256

              e55789fb610deadf5b2f1e1653ecd3cce065e1e79aa0125eb92af5d4573b2f95

              SHA512

              8e9c2cacf697bca7a9a2f84b4bcbaf626caf5a931fabbbc0617f1cc1bfb0625e90a28317ab708af9e178d7703d5f8b898c0b4950996b8f49b3924563e88b4852

            • memory/1216-45-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

              Filesize

              4KB

            • memory/1216-42-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

              Filesize

              4KB

            • memory/3052-40-0x0000000000FC0000-0x0000000000FDC000-memory.dmp

              Filesize

              112KB

            • memory/3052-41-0x0000000000100000-0x0000000000118000-memory.dmp

              Filesize

              96KB

            • memory/3052-22-0x0000000000100000-0x0000000000118000-memory.dmp

              Filesize

              96KB