Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 16:14

General

  • Target

    4a6e402b32e9aa511971fe9fed794e3d_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    4a6e402b32e9aa511971fe9fed794e3d

  • SHA1

    d0a06b802a768cef53420db8d2cac5fe89394839

  • SHA256

    42a63fe99861ed6bb09167730a383db9b4c2e829bd0e122d662648b0bfa5dddc

  • SHA512

    42c42c7aa850818227f0eaa61aefd800691274999fcca40a68bf38449a7391ba63f735a1f1776ecf20276aae026c962295a235e3ec792eb0c217a7a933f7628a

  • SSDEEP

    3072:tv/q95gcctBXqO7Gdxl2430X8+xWyiXWVGb6awiM7b:w+6zf24A8+xidLwBb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a6e402b32e9aa511971fe9fed794e3d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4a6e402b32e9aa511971fe9fed794e3d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\4a6e402b32e9aa511971fe9fed794e3d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\4a6e402b32e9aa511971fe9fed794e3d_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Roaming\Xdqsqp.exe
        "C:\Users\Admin\AppData\Roaming\Xdqsqp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Roaming\Xdqsqp.exe
          C:\Users\Admin\AppData\Roaming\Xdqsqp.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2216
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2660
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d5efdcf6b59df0f4d26f1bf741a2608

    SHA1

    c3c388f31999ed887b85ffcf2656b5963245d553

    SHA256

    124f52fe3498b3413892f437473de936fee7419be830ea4d97a4c97cd8902dcf

    SHA512

    9655398138dfddebeffe44af340680c6dd17e9113bd658eca4ba6ed7e9ee660ef8834e5ff0a472e7b08104783c8d54dcaa4207f2435c197c17cec63bb7ea9b6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eb753f6bab7cc5934a8626883b36cd1

    SHA1

    d53cd081c662ad6887bb6367cf2757a21e0cdb9e

    SHA256

    708193c15e135a768a95c92d8f366f9a5e6777ae70fa53a57e839829d220d44f

    SHA512

    1fda05427c0c8efcea2815e10817c082a6c09dea36c31320a63faea60d664f1a333718c98c50a91ff4fbf4058ff6b2e249b7ed0e72cded5bfa44aac7f4a75774

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dd7170dec562363b99cb75ef5bdbd28

    SHA1

    0c9d3cba12789dd0810f71cccdf6adfc2ad0d4f8

    SHA256

    8f53f0c9f72fe0276409bccaf899cf2c7b8b38931c2dd88a418cba6aa0d95b0d

    SHA512

    59af560238772923714b72a6609cb302b360ddeb659a37d241d529761b53d62260e7b6ab57611c7d0695dd2980ac803e03f86a6dffae9e02f359129095f19f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71a1f1612c85a64b1a62102eff74a995

    SHA1

    79cbb562c73b9a95de3ca5dd1aeb5710e5e3fde0

    SHA256

    1c9c22b8c1da2805f449ebbaf1c1178ac77d94300b256752d5887663e6c64179

    SHA512

    d9cedf74010e5a50a59934e9d339e06482931a03cb2778030c4772ef9fc24355da1e20aae30fdc209242162ae3e8308c0fe642be3253a1292e7cbfdb45bb6b5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    663d7938d343f827f78af51a731caba2

    SHA1

    25fe512b0e01e38a308ab23d9ef6528a58b4fd5e

    SHA256

    9a222fe516cfa71ce43bd3617207d93a0e92d003feac06aa3f49cc7ac13eea20

    SHA512

    9a8a415f63e3927bdb5b7317f5329c27b1b32e702ab8ee11b22ca75182d3a11f92027d13b08c0d04dca02ad83dc5798495d509cb66f0f70946738eb8732ec888

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e05cac7600dc50fd966308183e1234b

    SHA1

    d8dbc514212605d996e6f75aead46f899ca84ff4

    SHA256

    c2417e9c3642e7eff1bf082180b5e3a54111195d197dcc60f1ee6c1daba91cf9

    SHA512

    491c99cfa38df7123c1a1d2bc100d975eea7721f13cd2e433389c2771ef2663fb1988578f683989aa75b84a49d28fbe6414eeb9e96c2000dd4ee0a18073e3a4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    332caf4dd4984343201ec8b598e8d73b

    SHA1

    3bede47a76ce0b88cd2af2aac50da41859cc2c7f

    SHA256

    787f4456355ba027e5f2d037900c7fcba36da17ec9b16cb2906881bceaaf66d5

    SHA512

    e68bd52fc2d4e8f5c9303231b97e7cf8964a5f3e711fcd97a51872cda3eda3bdb0ba79eb50262d0096652d1cbcf7262f97bfb0dbfd5d333933a11c2779cecae8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a63478132e7442bb5298bc8f0da11670

    SHA1

    d5893eef56c87480dc584fc1009575ff829b9f27

    SHA256

    e16f35ba13e5de5f1a580c85a00ae175e78379dc096eb43ab0fe63d33ae1c8be

    SHA512

    f1b2b7c75892fcac6f2ad5f3398cdb91cec26d6b4f1b1455da4ba7f30fe1b4133efe537bb4bb671c453d8572865f13e68a959b3bef9465d43dd0678d2cba6269

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7692f67697a321df04377c1b5df45a69

    SHA1

    6ec992164fac51449e1ee8917d6e3408371bcec8

    SHA256

    165d8d54cc0d8468df8574eb6b232f9c5579f8aa50479b4f0cfedb3a8480ffad

    SHA512

    3ac85a8bf1544c2977a3908f82d3ecfdf0b5c88d171923241e1b17bfd20fecc3d139f2645a1bad20c29ca57b689b540003236ef7dcb94399ec0dd5ca0b5d8545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c620197c8dd62e28067f699ac8d25f95

    SHA1

    0cf6973921c3a5e2c9e821358ba3810128c4c888

    SHA256

    1fd08d68c4b85c9d37709f56b9aed0a8bb5e88dcf0ec0aa0921d00888ef08017

    SHA512

    bf2b06782c9968a711ec54455404d7b28debe0ead5886838c1f6396102d95b1dd7c801cc074b9293c217b20533da9ba9a1187d6601c4efbd06f0488f6203b1a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61e38bc5f228e16be04e075c6316291e

    SHA1

    8b35eecddcdba40761a12bc0991ebf349b277058

    SHA256

    f41e86bc7485564e5246abf4176ac4e8bbe9d8f01246e8611e9483c36a54179e

    SHA512

    235f5150ebe07fb5fcac399df75deee6b31f9452826d4f53cad750875f020795aae3514a6c1ef812fb2a099e3ebc8a25f5dd45394b88480823b1cc6129e6a3b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaa09ad3dc54c5f050804c7b61f894a4

    SHA1

    11fc69d1f51403de829adb99f993a119350aae5b

    SHA256

    5fd7c0ab3279c1bbca02af15888510f832a7f3b0bb10acf79fbb3fc9854238d9

    SHA512

    f7c8224cba9bc3d3317d3d8220bbf587f66e008533c42141a49ee390688a84983fdcfa3c89e3d6452bd118815745015b4c4690cd56b9367d2834620e932930c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73242ae9cd35a6da3e9f9feff1bada17

    SHA1

    46e9da1d6a3cd78b6a3bb174db4e020b956a81c7

    SHA256

    3d456ccfc2dd211f344d4807b64cbc2506e6cafb5b2fa71d38b2505518989f63

    SHA512

    ecaf500e71ccdab73a66c1de7ad5c20d92b3a9d1abfe93bb6e918cf42f0d71303aaa99baf9daec7f9563f752614682d1db9b6507e8fef6d547d1e2da05a4eb8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    924b49a42f8e8e1ce85537a0c839a8a2

    SHA1

    1e28ff6c802b32ac99dba08f0cf689c53f627735

    SHA256

    412970e4c1c65f18feb7e68c8941be8b7d1eea95e58cdebe3d2ccd2ea62123e8

    SHA512

    d260119630b110ea9ab7a3908423bc51af90245245b2330bf771b46217423f23c04e0eef9417f9cc7fd1d957857543403c3dec2da302f1bb8b8533c1330bbe23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beb8488e0b6aba79eae9711c2e6d5c6d

    SHA1

    0a4a91134dfd9250329439080ec0381d60e8b4cf

    SHA256

    56c7e0666b3ace6fd617fdfffbec0abde76d2b79899bd1ec70d36472f107e503

    SHA512

    c5bb5ec08899b89602960d05f99c1de38f257dbe02d9fed594ece9de82f2a0e0bf23ebc84c35f4019b9a3a2f89dc4f68e9b9dfa1e72c83eccfd7bf3e1fa89f25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2096c6ddf5abeafbfcc47ed03f071beb

    SHA1

    cc5f7dc94bd3690315e7c6a87419dcfea39b0e1d

    SHA256

    e88c5ddf066f9597a7d4a6780f818528311cb04682a508720214e8a9441d5fbf

    SHA512

    57d217d08a2e7951cfbd40ce0f5cef30410ba1c45de5e2ed88aae40bc2d7626eb64f58b5513087d3c9b10675e9f703be5a28a041d12cef0658ccbd32e68882e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0f3f1e4b858d96d15714812363202d1

    SHA1

    8b9a5118961e268ae818fe3da171dc3a5ff2248d

    SHA256

    b15ee5806496011e7c7d38fb4074904c2021ff7909fd429221320ad2aab6d32d

    SHA512

    cd77016b2c04d64a87c7f79d865a52eecd22b4f728ef38363c2436b6fba20a7ad52245443a70093ac301abde5247f2396e67367aea8994824365eb36b33af916

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7403640591864a17559897ce5923203b

    SHA1

    8b27749d58c7a8f039417a8d3a7a43a1798998f7

    SHA256

    e1879233c07c1e7db8bc3a96bda14e121faf714b294f1b7df471b631c72cb9ce

    SHA512

    cd39c6ee7e8372f4d2d7388c9442ca67d3bd2f01b8eb080bc1a9c428f74ef2daa3b6d1d08c4bf463f0340723cd69e63a1d4a45da9d0e8a5ff3e63ef65b1007df

  • C:\Users\Admin\AppData\Local\Temp\Cab49C0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4A4F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Xdqsqp.exe

    Filesize

    144KB

    MD5

    4a6e402b32e9aa511971fe9fed794e3d

    SHA1

    d0a06b802a768cef53420db8d2cac5fe89394839

    SHA256

    42a63fe99861ed6bb09167730a383db9b4c2e829bd0e122d662648b0bfa5dddc

    SHA512

    42c42c7aa850818227f0eaa61aefd800691274999fcca40a68bf38449a7391ba63f735a1f1776ecf20276aae026c962295a235e3ec792eb0c217a7a933f7628a

  • memory/2404-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2404-17-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2532-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2532-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB