Analysis

  • max time kernel
    121s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-07-2024 02:33

General

  • Target

    4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe

  • Size

    30KB

  • MD5

    4c71fb33ac694031e4e1c5ef09fa4578

  • SHA1

    4f5375388479fbf9ba5851bc5b3565e0abc67111

  • SHA256

    f2d2aff9b441c6dd54180d1431bd241a56367ac1940ab62ad96047e4625d1a28

  • SHA512

    e50916fd9f37f359624dfb96fdf26aea611dc59603b4fd4c946520cf53bd37ac09b7ab933adb24599fbff03612aab54c70fb95649df0b82716709713e7e6a672

  • SSDEEP

    768:8mvGIG2gMVRZ58JSGxE+VOWJEDvwjtQGQEX1nyN+gK:M7MoEyOWyD4Oi1yQg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c71fb33ac694031e4e1c5ef09fa4578_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe acrobat.dll,AInit
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5035247d51d8d4e26772620d9e2cd4a1

    SHA1

    77ad209d2e06d99fa0a5be5d69086a4b7441462f

    SHA256

    b1bc37b2a0cb99447a391b69e79ed2f68e3dbaa31e379f5f43dd4f76e1b32ebd

    SHA512

    cda4e0abfdc0b4c9c44b9c558cc97d89f007083cada3a865f121ca0a1b93f494a10d568264d9880b7cd0177db6736b34a1a96e8216e1d0ea9637ce96625d65ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    caf557c0247bee1ec02d5dcb2d06e03f

    SHA1

    21f31972ffa9819b284a363e36f1d5900f7b2a4f

    SHA256

    12b7160a73110bcc4b8e943c7e205e13be76636464d37dd5c3fdf7afa3e6da7e

    SHA512

    6ba3ff7b5a78153d148b07581d83ec0306f319b9fade9be7493aff4ca2584f58098056a3e67576660ed794a42219d0020ac127a0bd68e520c1f4a9e8e302e695

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    bb23c4f96bff8b3087513cc62c257af3

    SHA1

    d9433e5261d22aad4d00d36a0186de3aefcff08a

    SHA256

    61ae79cd605bcba394ea36013245579d03a511d338987e7e7f736283eb007f1d

    SHA512

    caa3d317378ce936c0a094ecfdfe4ca1bf457d743f52e279e02dfa712cfb01dde30079469b528c595fd292ec1291644a254771d5c595616f0b9178b276a783cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    787fcbbc0e2971bbe4b5ddb12ecf625c

    SHA1

    51e9d6adfc81e83b45b4b4805536cd874f8cdaa8

    SHA256

    555bcd84358c4a9b4a49aad3939c8356d721719e1eadff475cd50f5bbaa87f57

    SHA512

    2b351024717efb10e4d356353ea4a847b9bccdfb0f31259d4e9af23b9e7b180f6137f103a334ed338b82f2efe44fc04bc971c94d312b1d43e0b8649cdfd34785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5a4c885f496d946cf0ba4467087f62f5

    SHA1

    52247d2eaff06a8b83eaf0e4362d2306b91e0e60

    SHA256

    7e81d4220656bdf5efe7fef293a166131ff7b9dbce953d58f63f3b6ebe14bfaa

    SHA512

    a5f6f9f7b22751a28ee864537e19bb7f1f8d26a6a33bb63e070fe183b3813410a4eece98de2fd02cf20f6ca7c53e2c955dbb18edf3078223938711544968ac38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5858e893b5f4c6fb3a5ce88a524cb661

    SHA1

    04f4e8429b9a6648c0719c72795959796f765c8a

    SHA256

    15a7761a9db84b00629f5637462e9aa0cc25e6e30b2cb7a01a93f51a3b3cc380

    SHA512

    a75cbaf7114a7dd6415420012c8e9809b94348d75121215f9105900e80c9c3c0a52ae1d43e55e9fb22ab1cdcf109dc613857c0b30b9b8111058e351f6ca09f0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d71d03716f59ca982834d71d0a69da75

    SHA1

    1374e5d7ae1d6eadc2f4e2d4808b26508becc35e

    SHA256

    4abb1d1698fab2c3713b750d9034d605d48c444ac9595b230275384355537594

    SHA512

    0cda6539a9ed8112c857b4f022cb61ef6ffae83edbb6a4ac6a4bf3e7a7eb025aa006f6ee7794e3a70dda2de462735214547270de92c7af3de231217c0e49643c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a72a936ac2fbc4a26a61becbce76d856

    SHA1

    3b968b005441ba45b59fec7784d75f6ad75767d5

    SHA256

    b103fa49368c969dbdf9e3a5bf156db4cea55e0cd8d0cbf6e70e22e9a3a3a8f6

    SHA512

    806fc6f4a49109515336eb6482d4d54bdf41f8844f089c6ff3984f1ee3c8b2b26e4e864ea9b913ffea93f2f5dc4c96f771657ea75702bffe45979e5bc66bdde7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9fd119bef70afc762dc2f8885d5982a4

    SHA1

    1778ae0e408c20bc277835949d314aefcb394203

    SHA256

    64fd5b7e2016f62f8ccbdcd62b2db7eb98a453f91d8f4fc82291676758bd86ca

    SHA512

    58821c2a97ea5abc9085ff86aa03f4497ba96ee4bf90e30aad2007f91e921298f9f535da835bd3b5191909f4205b46ae45d8839dfebfd4d3c46564dc41380832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    94274fb508eda649666f288d6ceedcde

    SHA1

    e01ba1728fb1264eacd5c9686621afee5456e5b1

    SHA256

    333e438cd3883aa37c4413d70e2c6d6fc82134ed42616855309ca83119cee74e

    SHA512

    738b6dd66ff8b443054d92e286361f24c4f28f7c11fab3fc84a983414629e024db1ae85bea48017ce17fc98374c8bf5914bb5a6627f478fd525d93d14cbf3b3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3ea862ad6d4440b0a3f8d6f4f370d2f4

    SHA1

    ae1ae4116643a024157738789c258eefadd597cd

    SHA256

    fa94adf20f926fac2284674206bc98502b09291ab8bc928d92babf8a28d7e630

    SHA512

    a42884be65b0483d884e5ab1984f179726d72a21c0d7c212b90bbcad908a047c672378c97b9fba6d3377eab4fcfca70bf4a17197007253fce00637b664ba216a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f74c4072a4af65dbfd68fb87b15497cb

    SHA1

    4c5fe339cd8b4b5f379b85f71548ac7726b2339c

    SHA256

    3889c253eb3a42b62e9897496b7dc7f9ad566a3325f91e3595d1f7f3a39143c7

    SHA512

    563681264f9e5ec78e979e3f310f42224aa57b278d8ae653adcaacde322cf8b4eb92c616e3135fe8fb579999bbd3914ae139bc9af6fa81ad075cb2a1e1ab2a97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f1acad0472246984fe5258c89f7a319d

    SHA1

    bdca0e43023b12dd5aedeb557c72daa1acf84027

    SHA256

    ecb6ec1724e62dcb2f34294d89fde81249a161d69d9cca272550799f1ccbf1cd

    SHA512

    c23afb27f22a0eab6e8dc92115a4caa257ff82534677ed6e09acac6c38d53e33822ef278a7d067b4cbace6ed038d0de2e3b49fcb80df87d7ce553eaf4953b605

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a4acf413147a63cde6cbf5bae235871d

    SHA1

    6eda093a97cf87af0d23646513da8b2d649f6895

    SHA256

    d27ccb43988225707b98d42f0eeddd7e5d5ce661260b541cc888e4242b92d67b

    SHA512

    56de2124f991a1208c1c99267ba1acfa9adc5039fe90126c3f90b34ef687ad7d3c0ca3c5a2655c8810c9fbd4b7875f76acdda379d8c2a945d835f60303707c32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2ac8489491b1231babfd42951fe851df

    SHA1

    229c8b04a2b21445614c48fe96958f57b136512f

    SHA256

    067ee2435a33d6d2b5e5d2e502426ca3e7f34fe9169103a7338ea335fe5dfce5

    SHA512

    411b3d51c3482b468dec9cabfd98264643edc7e63454efd8f789373a1c8d61850e0ce80b19a2f787e8a24462779aa2761f9b1af351b0bb3939c68db6e121550f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    97409efbaeb7bf8303154fc2dadc370a

    SHA1

    145a3324a500c6b8a62bf4891ef8e7f15b1dda42

    SHA256

    73b89dafbfa0ac58d69fead65a581e1b9fa76cb6d3faa352bc1010218971c680

    SHA512

    140dc71870da2a7a9fcb758959a48a5034432efc943697274d4e485782bcc7a27dc62702c2c9d09cce276948522ba20adfcf612f9b7e5a408330dceeb8cdd619

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8aade2cfdc77f3914551077084011b9e

    SHA1

    c2ad228c67867939d500302962f0df21b3f3032a

    SHA256

    e24e3f90a742efd0095422012d1df8180741d97fdce546106654fd110275979a

    SHA512

    570911bb1e474c2e25db86c610aeaf19d24252be2275f4ff7b9452fcce9f6b3bc76f5876aba39e5311304745eb221c4fb165f61996f0dc3b086c2d7fed07cf50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8fe7406609c570c034aa50d8a1463f72

    SHA1

    e3a8a8f6ca603309f2f79bc4dc51675d2969258e

    SHA256

    3552ae7a7b6249971f8388a13eee152042666da124230d47769aac69fe2196af

    SHA512

    a94a9012d9871cbf78889feea9afd98c8e53c3c461d00d65ab3eb8d2e8f48516f02f7d8abd170997b60604d445b5e87b33e60d0ee4ecaa5bdcd94f452bace1b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9b7f7b754db52204ec36c05de038df31

    SHA1

    71fb1dfaaeb6448625bd0593001a34e4afbab707

    SHA256

    470ef42cd57e7ac5b38466ba8959c50376fc50b45ec589c5b6b0e04ee74478bb

    SHA512

    edee923bf6aae5bd7df1fced1b24ca4f37058c72646dbe75a855f75d3b775a54726ee7289a0963ea6259848ee7b391ca50e58a023c0278aa1207a1705517a041

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    066c7a2a06f93c7094499655d73ea263

    SHA1

    1377a35702043671d2f4d6b6a3451b41a138688f

    SHA256

    5161156c9ef58e6f9983f5e30df80e342b60ddfaefd60b146e488ef9f92a2123

    SHA512

    2d7059dc32359742b3f43a15fc1a8134b1d837794ab26c05018efa123365f08030e44aed0a3e2c2c936c7bdc1145a6a5fd30b350882fc95a377a38891182a34f

  • C:\Users\Admin\AppData\Local\Temp\Cab80C7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8175.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\acrobat.dll

    Filesize

    50KB

    MD5

    d6cb8d33bf731f25f1d24a6f4fd6e5ef

    SHA1

    8f5926417a1f36d44a9b8a89dc5106c6a0de5b9a

    SHA256

    3b2c0341528da4e2e129e80e4b57aef63c6b307587fab96528cf00e1b1dd034a

    SHA512

    441aafb617f55310621f9d92c8dc6d680ed752a576dd53cee9eb814fb7ab7d22114aac8fe17a759fbbc51f9aaeaccadb93f78f5564ba6110db209bfb9bdb01c0

  • memory/2840-8-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB