Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 02:29

General

  • Target

    5a189c3987a602e7056a4388f6bd912b_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    5a189c3987a602e7056a4388f6bd912b

  • SHA1

    98786782a42bb7cc262e65abcb94d8a5324ed5e4

  • SHA256

    9d67cdc1c338fe2abfacaba4b7f104aff35b5b277b22610e0638440509b632c4

  • SHA512

    83b7dda64ef357dd202e7708ff73f9588ed1c1ae6726443f20e05aacb2e4da3eb5638f8466aac9fc18d716fc20bf52c694c256d36eb5abe1c48c51da11c07298

  • SSDEEP

    1536:IVNVuA9uox768RPlyoeSyN6/J86HRwwHJBpetl5A00WPVfguRQxg+HdU/cO4Fd:I0Av7Lf3yN6/J4SMtl5AADitHdU/3

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a189c3987a602e7056a4388f6bd912b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a189c3987a602e7056a4388f6bd912b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.on86.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1824 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2200
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.xingkongjisu.com/flashplayer.htm?52c
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2680
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\5A189C~1.EXE
      2⤵
      • Deletes itself
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1393b4dcde88f08f80c14712a28266e3

    SHA1

    1ad3d6fc91719845796af5a1d4bc415c2866eee0

    SHA256

    d4707c03aae2416d8f1a2c0fa147bed5c3111e523c98a808c546d03ec7ffc233

    SHA512

    c246ba7ca695b83b73e1f73eabcf8debe94defbac16cf3cdce356195c6edcf29a93a966ca58f5d68175f2f36387f655dff1ac7e45235bd50183ac2b825b4bd4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d91cbf5d15745ee49057848ff47dca89

    SHA1

    fb7dd879c00bd5b1ed13b557122590d82f59f394

    SHA256

    06b2182f67f8e4833d0f0f4c125cc702aa002804d9f9e9f7cb30ef4cb21185a9

    SHA512

    e0256d20116ca3b976296845dea57399472c7070d003a9ebb759b9a85cb68339f904338f6d001ef90f21e1561974ebab1ac6e53b28547ac6f00572650d49dd6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4589aea3a70fb66695b25b57b71539f8

    SHA1

    79358afe87f430943411fe5164fc63f9c76dee19

    SHA256

    001317bd9570ca7b68caf709aa1099e2844af22401a5e64b7f13f02f80f10daf

    SHA512

    0a1fa5c799de534cab45b162d61187d55ae3dca86104f86dae1d193127af271cc9e9a202c83753fd412a59326ca053b57ec8f93f36bc04fdb9d450fe5a276caa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    105f8ac4c6d3c8144da47e86c58e4da6

    SHA1

    da1912a25856f4aaaa4f3220ed309da935accde5

    SHA256

    54f53ba83937cd4ba0cf701a6e25c322590601817606b756b7727f6fa3765da8

    SHA512

    99923a87e5027a7e8f33a3d06de73799cd9e9a98fe3c439f729eb80fd0560b9fa1a51f885d4733de4821a91cf863c7836601ce36e2f2362a228428b267432d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f176323a5b7eff6b7f6799fde9274d82

    SHA1

    a6897c069b7b7e72cd1f882591ca2d27ca26b8fd

    SHA256

    96afc57e5b13f1a0f79c65ed324f893710576ad3238963ecf277df48890a18f0

    SHA512

    ae58bb35c653f2b9a497d90c83398ebf777da83d8942d37b144e1adecc9c1eaa565d5fa12739bc8a867f1250a0b4fbd65cfb03255860ec572488ec7f6db5aa75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3e6ae9ae37f0a063c75e6d91b210341b

    SHA1

    8470f7663f5a702f2ab60e8b9becd83215858e27

    SHA256

    bf58fc6421bee30fc12509c3f9e0b23d5710c29322947a14f2be7416bddd79a3

    SHA512

    5a5487cd79c625a1dfe7234ee1e22f0e2a230a718cfbf4df62b261552b2723682a4d1bf7df9d570c88f4ee38dfcebf628cb469881c1b4a4c71e1204dbd5a3870

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6e1e4c31344ca5d42407d8aa80c87c50

    SHA1

    ffee7158bcd6140bc3236bf11cf65b6b67e7027a

    SHA256

    90faef213bf885444615008bba937fc8d2f3c9a1039713e9cf264f6c78f8c8dc

    SHA512

    6d22d842860468b8135f46b88be00511eb4067ffa60403ea6d66c9083c1defa0870b959bfd3d0a9f6516d5706940dfb4c2ad3074734c4a1a37cb452cb4b9f44e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f9177911aa9f181a09cd45b7a14056ee

    SHA1

    73d4aaf1c08f241684bb4ad2e841173622d22f3e

    SHA256

    eb9c736c93dd6c4db9b4ed75c9b6ab5d409e1ca951539ccd846dd4777d638ca1

    SHA512

    a69ec78cc0ef6fd28ac69360747d003c7bae230721772d46a4b8273c829f483f44806a120dc9ef4d57c5572b3f19acab89a0f7f1a6cb379165955bbbb0dfcdef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0ec01f084ddaa973b8743e0970f4f80f

    SHA1

    c724e6cbea0a434ba6223a6da0809a21158ed793

    SHA256

    fdb55888361690c9bfb7f8f6adf0c3833e14fd736c2a8b1283486575b69bcd5a

    SHA512

    4dab2d6c4ba2d9609f493abe1dca4b4112c42ae21f1a84e0fb47a4d6df7b9654115d5a75e861ca1fdcaf32d6878bdb10dde26a0cb3342b0cce1436673090fc5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    308ea213fe9657f6bc8641e59468199f

    SHA1

    7c3136af037e9de21bb935aacf6f0f3f55dd5456

    SHA256

    71f08c7eedf6c82fa3d086d6cb0caa482aaf20804cb4c9fc9fa04e2065fe6b85

    SHA512

    af906a21def6cc834644ce7411c0412926bc147518b48de25dac9194bbfddad658f009049d077fa170ab65f95e97cc9a867095c84aee39af152ee73f14e30507

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    482c8855a020caae0a2f2162c75ff88f

    SHA1

    0f34170649ed6a1a04f95a2c3ac680906323b699

    SHA256

    b93bf628bcc733d8de0cee29d020a1642dd13f262f38b3bc83a6eb9e4d892352

    SHA512

    28f41bb4a0fedc187b85cc9ed673c04356d9130139b1c162b22ed592da8cc35784683e5b739a3871c8a229df0f5a8e49e2376e08a985400906783fb39d443bc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ca4d5a7908ceae228b025c8c83daacd2

    SHA1

    3a7dcc7b82b23ab8a1a12b2669379db25ffcc481

    SHA256

    fca7b63c853ed365c4755ecfd70e1756a754380a4a24ca85e70e117ed455caad

    SHA512

    0cf22de141f630025363295ba1663c4f19580c19f7c75b1e19508d8a4584e4159dc9382c5ca5a4ac6628f304a80dfc65b45e135ddf293b596ed2fa5e84d69cac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    12eb5e7e1ca9c82b7abbf0e84ab21ef3

    SHA1

    1efc27f65329d4076199ff87f7f45a5a1d6ecb1e

    SHA256

    221b94c7afcd60df59d93860809ff198d86d3d61ae63f502b440f4213434aab7

    SHA512

    ba9591331a1e41bcfe62e18f096721e05491b19c8f1c1444ac21aa07be267e661ac324c2cab333e7f15990db5f809a80bec1ded198f3aebdbb925dbf27b61ef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    01b25a12ace8ace04f7a2df763f4c091

    SHA1

    f4eb43869904313848a3abf0be0121299fc09a44

    SHA256

    91c604c58fc02e45cb0e8b7c8e61c5349a56e4ff18e8dfbca4d92cffef611a58

    SHA512

    9c4c83dda2648376d8f40cd9576b09c3cbef2580ffab02e3f0044ebb9e41977d378aa48ed6f34c0cf63db46a416ff3b544c00a3e8ecc5d30d892820a09de3625

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    67f01249208e7d975d60c95f4a89c3e4

    SHA1

    4e100f16290072220640ef164e6e4f6ee9c6c0c8

    SHA256

    fcc7fabe5d6978650ad88cf3bd19d5332b4c500edaaf1bbe3b205f3ccd5ca724

    SHA512

    fe36a3b879fd32204e259c175be70b2ad66836fe7b78215d974b68b325fd698a993ab022e2a9506ff10b4d7017f6147f130ac549c81d3a8b9c523189e40f7d33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b4bd1bb3ae1bedae9c00ae5da7f2bb09

    SHA1

    c7aaf031c64e78c488f19825fac7dc847089e857

    SHA256

    ed676feef08be550773baae8fa2ed8c26cf6cbb746cdb1a8dbc91cc60c919f7f

    SHA512

    f2b630c7301e1163f9111524dbeffcc44165abe85fcc0bdef79d307f27ec8415de801c6f471f9412e1c2bb883da637623617fbe486f0e134ee12ad2ddb9b75fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    65c2e687b9a72ace78ad20b936b917a2

    SHA1

    1d868b772cde078c394bea4d4ae28d91ed5981fa

    SHA256

    c7ebb4b284d953b45d89198c6b00504cdcccce1b69f0a26e7f0e153d4e3e2332

    SHA512

    a2dd8b66eda062145b9c23586bbdb93ea95766f58e922f5bc4218ccc581748d13dddf3bdd07be3c6be234c43b35224d0439369741fac550a51a2334db70656f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a9d462719e092836a692b0aa02ba035a

    SHA1

    bf193d1100f3a8da42003c1d6067f7ad9952e37e

    SHA256

    ca09da50878b65be09b95dc1600a799b1b678fc1c9d1b295fa81bcdfc4c2f799

    SHA512

    9152b9687e5fdb0deda0bfd58eb2d76259d45cdabad8c4bb61adfb43a6ce6d1f066f3f8284520ef5e0069e806040775ddfc3fa777141e1e62ce1033fa8ed1b5d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AB43C711-4576-11EF-BFD1-6A8D92A4B8D0}.dat

    Filesize

    5KB

    MD5

    9e8b32685a9ea4ce256ab07503058656

    SHA1

    58cf23a17e5d4d42818e9240b896129795953ac8

    SHA256

    ddcbe6629a644128d47adabdea5161bea191b0b359c335f6142eec7a62e119d4

    SHA512

    ec330d5113415054cfb893e9d257ccc0f896159e89dc43d0cc77dc24a5e998b7104ec227eb5e92edfdf4349f7f39e8b2bb3a1ce5a987d197420ff5f6d3a7fc3a

  • C:\Users\Admin\AppData\Local\Temp\Cab6B8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar757.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1656-3-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1656-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB