Analysis

  • max time kernel
    118s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 05:15

General

  • Target

    485fd9e0fa159847c99fae2d1463a838_JaffaCakes118.exe

  • Size

    681KB

  • MD5

    485fd9e0fa159847c99fae2d1463a838

  • SHA1

    e13d2db455d5c09738671cc906069b09a89d0655

  • SHA256

    48eda05ebc3353d6a9386a9796a76c42395caa2ab9894936ee59484b17369fbf

  • SHA512

    52cbf756b6d652b2b11d2b9c184d08d1b87afe596cedb26511ec0baaf5f3a6df16e0e6603b237604c1274953ae5605b7ae8b98b54281fd750e4add240a45e345

  • SSDEEP

    12288:v0aOMEz2DmXYj1F9n5TBT3SXW3YoJ06N2xOqkaAqeUe532rGzduuSh:cEEbXYzogatKuGzduuSh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\485fd9e0fa159847c99fae2d1463a838_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\485fd9e0fa159847c99fae2d1463a838_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://plugin.chameleontom.com/?aff=1557
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d480b8e74280699d51aafa13ddcf0a3c

    SHA1

    6a1e173af061dac643528d5820b2a6fb383d0836

    SHA256

    a6c7ba6246ab33282ee31645a49685db54953482228a2772082e36b6df9cd185

    SHA512

    caa9e66cef5aa3b7b828041c51f1ebe98c0eb74efa344559f5c6ef6433744d2d51f28efd93b9898edadbcd5278782812dbfbe33ce844946f40a874d467bffc28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b286dce4c9b80588d7a0ea15f9dcd95b

    SHA1

    47e88a91152c23b382ea55da782aedd642bfd6fa

    SHA256

    0280e5a803d8262d968527ca26df260a49948475dd9ac39ec6ad4704c73b1a0e

    SHA512

    f66c3739e10646640b6893e306135a9d54cf14d869570fe42be79a6f1d9bd01c48200d2ea8942536243b6caf3d86dfb85553ba2321c9c4c47abb9dfd2943822b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e03de823ffeec54a0c67fe9a91a27bb

    SHA1

    8db0826231edee1a159a0a11e07cb29b8ce832ba

    SHA256

    c43e69e3c8d35db53e6291fc667ab9a32cecf51338cc5ec0514044174e10b28c

    SHA512

    898fb20b8fb3554d9277b0346c9103e89767021989ce0a1dc5c4be31756a5694683da55fe6045d107a15eb587adb78a6a5e0968a006f3db7f424b2e85fe25527

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31c633c27f20f9636408d0505a16b61a

    SHA1

    e67fbabdf824d0acf312ea5179787fee24536892

    SHA256

    c69e58dbd37dd6e70ae9dae7b0f7b4627a0fb965fb065565e6761dfc31cce55f

    SHA512

    55b136613293fc2eebb3720e9eb940bc9277da28eeed68e0e918f382205e4411a43f61b65dc08bf4f6c1527024f1f03528e1e751630dfdcf60bcb72b4baf5510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dd6bc21ae200de824cf54ae24dd8b8d

    SHA1

    bd6efe8c75dfa3d549820e6fbd31c7612d00c797

    SHA256

    f0de41afe141bdb82ea07af7db52e29feb0048daf48ad29b35ec1932fafa1c3f

    SHA512

    d119b9a50dbc52c016230b1f1afd069d6033ff555c3c8f8af71c940375b8aeac5d58df997c3176bb7266b504eedd208fd4b47ecec04755fa8359c6cf1e0f797a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17f1670994d39b39f9c8de4d21174589

    SHA1

    8091139d7f152e7693b5af94ce4862a30a43843c

    SHA256

    0011d116cbe54ee8b94c23031b4bd51f396045d56520c46de838417a144da6ca

    SHA512

    e450bf8c54777008a712d108db4c4e5c4f02a8c3af16b3ed7ae0cf9498cdf8a539c3e1c6a5533247c9c0659353057cdd91d55a4b98c25898f66419dcb1714105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1ad76c8ef6094f31c316563b5e49c97

    SHA1

    03c48112d69be08a4ce8c5a357d304ba0ebf818d

    SHA256

    ae7fbbc3488e58d298c7e56a1637b8615634b23eb286d8ce63b8b196ee022370

    SHA512

    6affc9272f71030ebf32f6c0905e0681927233ca5a3c2b18d1df7da242afbfd8f130ccd6775b5074b0a8a7263aa613394898a0a3ea83824a42fe3fa6fa8b3925

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2df3ef9f9157681bca80319ba45fb7e5

    SHA1

    aaa3e9572d60b0a012d7d84226b0e04080816baa

    SHA256

    7a24a44003d8886cb29763c82bce152c7fb38697f88f78605d64df5fbb382c21

    SHA512

    1b3f40300a5de885564f0fcec312aba377320ceb9d8b1cef9e241592ade67f296e4297388ca3fb08c200599fc25d97172d85ad0f271d23c571f6d2b5f6f74d61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26c0ae32e4c86f76b3e4accc98821d85

    SHA1

    442ff7edd9a836bf4ea90bc8c04db10fa6c12b59

    SHA256

    df027dd4a4f5b5daddeeb8b3edea701d534a69aa8cc2521a266385fa9265a8dc

    SHA512

    e53067983933cf86a8c79eadba8f2ed5b58c1f8f5df2b74ec5f69511da4d12d5ea403fab7315fc083e71f69bf6f7d76fe5ef85e7e7534ae04d6d3565a9857070

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dbc13c4316a293ff428bc6b6f52937e

    SHA1

    b7c24b853c0aa8f2c262501567ef51eb97f507b8

    SHA256

    76aa5655e322f91aa865e8b36eef9a5eb689531b1229369a352a79ded6191063

    SHA512

    ecee4ca8ded07373ab53630c0d525e1c83b4cad947e222077313a99dfa510a953cf4da4d4db14e2926dace26cf36da4cc9c399bffd53d154299739cdcc6cbc5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1a2403f590a48372fcd804725293d22

    SHA1

    161d38935ed062174c0a929c40cc69408ba51a7b

    SHA256

    088bc467368bfe84a06e0a9fdd8c3388d44f5093b98bbb867f3b3fd1ec9008d7

    SHA512

    beafda26797ecaaa79204f432d3cab5ca443683f2cd67cce2c20d6370f9150ee48d0ece1a8a8655db0deb5a59569d8952a99efde869fd1f2d00d5366ec0622bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1e59131ae19206d156043decd716506

    SHA1

    02ca471ef4e6732389c44334cb9426e728c0c24e

    SHA256

    43726238071b4a50cde918af24e5565fbc67e96045cebbafd6f79095db89e4c7

    SHA512

    453bcbd470e7b473c64ee62bd97ab17f61a213d92c3462b6b389ce766b9c66ca4df695414dccf2fb99b34da30077d325956ef074edd36a13446b1544f6e96ec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d9f4c81d85fe722511ba041e11186dc

    SHA1

    20a48a61784d4d58400743d30422a3cf95720d18

    SHA256

    f19cb7047d021a867af92e88a7cbcc2d3429a2df2fc9fcadd01c42095f528c6e

    SHA512

    61a86da30487d4ab425683080601fff8aa054f420a3ee74abe18d46948dd67fb8577a8b0f1662ca9e08c65ca758abe30d70938f2b41280a27ca8358a7e6036ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aa03d0ff4f4b8a3664b54649970983c

    SHA1

    1df23766dea6b0de6da827d53bccae6d1536fe19

    SHA256

    9c9f42e86be9c950b1f3c0581eff56c2864fcd84f195fb9a3d696bb03c4da95c

    SHA512

    737a2a296a37730b8779635e00aa1c29e18de37a6add2c0ed098f0c2fc7e9d44bef4589ebcad888df4c0d0d2cc397d1cfb081b3c7696c7145645e3e0a9934f20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f00dd5d2eceb92b09057de926e83bc78

    SHA1

    23a806bfc7a30e3f72d2327d65e5c20bf62b5f94

    SHA256

    cd5d5bdc9bfdab732b8955f25923e045762ca619a116a85002eb99928168d1b6

    SHA512

    e54a229a2ca61024a94d867cc4bdd28a70d5217826cd06a5030d6ce5093a29bfb289278e95c69238641d94f6bc38436e1d01964228ba6bf09e1007d07c367d88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85714a7320caa7731bdccc631da1ecc3

    SHA1

    a69f11e9edd32e48bae4b4fe73cdb563d1df0787

    SHA256

    852d2ffc44cb6cd6dd9f57e77acb69a23e90f2215316fc6cbb82b153fc36e27e

    SHA512

    adbe8f6ed477132953220f8dbfb6db674dd479241948f7ef8bcd125182caac63c7fd013b77b586b6b018d5d71a8ae8b0515eea14dd255ce8fc0f36c6efde95a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58300ff56618ed6bb41e7e6be81c4a25

    SHA1

    c459e32939f1ebd8d55cb9cbd10201a0ab13208b

    SHA256

    be3d736fa27237e60d738568591423819b7964e6edfd7bdd22ff4891179d248f

    SHA512

    215b8eda35d126c8444cdb9f7daf10ecc9364ec4ae99dda83aef5dda480a9f5cc6e4ea5fea59437a7a5698cbe9944c4176dfcfcaf02d394365333731e02b6a77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4011116fd441e05316d2c5f3ac1cc2a4

    SHA1

    ae7514b4b355b0f5d63d4a71439b40bf38d3dcb4

    SHA256

    bcdec34f649c91031b3e17a91082d2e3d1fa9c77bd208ce160b2ae1b39a266f3

    SHA512

    25d59b223b5c02320f5eb7ee0962e9b0a14d30efc80c0e9b9f5c3cf53d84bbe4f07bd6bcbf8034333eb9c51c2c190ec32939747be4c74489b93a7a2dd4245936

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f32196a2ae75d0e840d595b9a45c536

    SHA1

    ebb1bf1f747cbadeaf3c2c7e4b5125b5863aa761

    SHA256

    732e9e3b5cbb5c9f983ebd3ebd2237536a0a0f3ddbe16d8aa68cd30a0f881426

    SHA512

    d4d69ff2b866f87360424881b4f880b769c301f34ba38a04329d43685f567975466ab4418bf01e687a9ce0eb6233d2759cd80b394d82da7f6ffb28c5459bdc26

  • C:\Users\Admin\AppData\Local\Temp\CabF0C8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF167.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsoB270.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsoB270.tmp\blowfish.dll

    Filesize

    60KB

    MD5

    926e4475c00fb5254c32c876921b77d0

    SHA1

    8a55bc8b6e49021a4abbd441783c41d5e019798b

    SHA256

    d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8

    SHA512

    53f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8

  • \Users\Admin\AppData\Local\Temp\nsoB270.tmp\nswebgui.dll

    Filesize

    157KB

    MD5

    dcf180c820c7eca0409eca7c32e12cb2

    SHA1

    655984847eb8c4a244742ce99316bae8a0cc7515

    SHA256

    204199949dabc9708cd1e8f0fa40f37d7889f04b0b1b072599a8481bd97bede0

    SHA512

    9efbe1af3488278f9888708503d4cb2b505d57e63626c4261583d870ae7a04d1002ac24599fc7cfeb3bf7a718177d5645e8227ea48f63e98e540340b3ab7f420

  • memory/2000-15-0x00000000027D0000-0x00000000027FC000-memory.dmp

    Filesize

    176KB