Analysis

  • max time kernel
    138s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 06:26

General

  • Target

    5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    5acef71913386b1797fac9c2a20b1586

  • SHA1

    ddee4ecd39971b4336e7689659c60230e2f58991

  • SHA256

    b64e5578b24096c6592ee7fbba2661af69397d10fd65317a2cdd1e59fce39235

  • SHA512

    8efba606622a297646f83219b186976a82e4c06a5de2ed455d28576dfa0ae04bcdee11a60027abf546fb4f622ec6d6a7302553116f26dcc914c9852f49fe09d7

  • SSDEEP

    1536:dtq94r/A7amvIThkLZsRwYSpRPMwPgAa8n/6OVFrTP6m:FTwIu1sqzVPJNn/6O/f

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5acef71913386b1797fac9c2a20b1586_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1060 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1864
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\dfDelmlljy.bat" "
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e89a2fc783e57dfb90d5c2d5de6957a

    SHA1

    4dee7f58da9dfd2ff1ad5317f2866d8dd3973769

    SHA256

    b4a74b90f32bb53e519bbd374ff004e57df8839efec9b037ab00913f9c00dc1b

    SHA512

    6f8b59a69942978d8eab60864773d06a47170449685f368d7972c950c911029b3d8458148b6ee69911b63cea5109749ca397ea531392869db4399259fceb3c14

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08ef78c557310c71bb8462fe3fe9fb0f

    SHA1

    41ad477feeecb88e5110a4cf9e556c6141279d02

    SHA256

    938ffc50bc38aefec20b9a5072cd2b5f6c967aada9fb28cc6501d760fcc562e4

    SHA512

    944633d45bed961aba66ed72ba91dc1ae232f1492fd37f19648dd1811230cba66368db6a7791a727335eb102cdd7887633efdfacb20e0a00a9c0543a98905937

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91fd41800390c2fd16f47a528911f3b8

    SHA1

    22f59168364895c21486f156c52d5090da72686b

    SHA256

    8da8b7b80c7858b6605cfea8de397dfec4984ad3966ecbc799d4c981b4bc3eb7

    SHA512

    485a41f673d8ef44e030f78df1e8266dc6edd2bf3750da69d54b2bd710336b2d3f4d1cfb2a24e2480c8ec6f5658f3b0318b38a11db3c8e359e56186d818b3c64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50cd35a2df67d88308e4b4247ddadf7c

    SHA1

    cdb7b80b8cb23ff844f105eed25e6bd72134bec3

    SHA256

    e89a103fbf961683f756bd8c2c657dd649c72199e53a9566055a9678129097f1

    SHA512

    b2cf2930b550d312004743d5affb23ad3eaa6053aae94348c767bc2dd78b9e182bcb048cd4db65688432f58e17646774514793a5f8070e18ec104da73f7c75a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9fe1513c8fcb930c8520cfb87c0f5ba

    SHA1

    e29b5f55bb1871b4a2e17e1c47bf38cc3e58e058

    SHA256

    1c10aa4aafa9a1ef16c8225e335a6c1b77062f97b035161a98725c8ae2f0f37c

    SHA512

    31364e7d1c0f4fdb3a52cd602b546b674b42c2d7ac730fd934b8d6d41cacbe9f3ad1f3d1ef5c085c3a31fa6668837bfe00f8e6c40d36fa7021a0bdddd5a9cf85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6974b100995770998e3f1275cb6bc04

    SHA1

    40aa7b9426cc2212b94c9a1876aa117c7467d017

    SHA256

    cd46e885408b2476a2a495583378c98b33eb0180a0d299013f3cd6d3acdfd6b2

    SHA512

    2a41598175a8305d10e5853623d5530ee3a03c27ea71d7dcf122f8a1fe34e5a4f30312c55ba03581a9eaf8404c899d0993c23aec19f5bce68e882476d817f713

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a48349cea1fe9ec310f340fff4d08df3

    SHA1

    3b730b687e30075a83b3b86049f28d07ebabbefa

    SHA256

    17bdc715e90fd8db2037ba162c2408f9880f42ea4375e2678bbc368774b1a40c

    SHA512

    65034dda1f1003a6ee84a52d419c429cc893cb6a93ecd4b2f48681329a46973683cf4c494061894e90c22450768ee649af07bfa72d9c985234ddb814c8fdcb3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a634654604858cd85f5ee66f1eeab475

    SHA1

    732384e7825f6ef1c72e6a2f79ab58d93b37a19b

    SHA256

    75345c650879bf8e45f9da791b481ffc2aa5bb0963cb8cce0dc4d2fc4dfafd37

    SHA512

    38c62a18497824130b6729e24dcfdf2a6b2665de3601194c336af74736d41639ef0aea485bc22a14becd46724ad3e7018ba3dc974f2ce675ed7936ef1ad5c889

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c92e75b3bc23eb1b7bf809f8ed90b9cb

    SHA1

    0d95d979cb23e76226cfc48295fcd3370af5f6d4

    SHA256

    f069b869511d9a2edf96c0ab92a354f299eef718a8a37e6e38840abc4e4691d0

    SHA512

    32f3f4bbcd32adcced0c05e168ac26007125756843cdf539e7f7a5abb3de47bf033a53497633229bf52ff8fd39280a4717dfd9546298b36cf8bf9226fe850f5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a82f3d56e162092303009d8e610b344

    SHA1

    62b316f94017ace48f84cb03c591b338b579a69b

    SHA256

    3ecfbe1b26da60b44f885d4409e97c5d36c4984fcba839acb69b7ebccae771d8

    SHA512

    3fc9e761f4dd1948d0b575941080df24eeb79f78022187eba75a502bee073d9c6b52bc8809698a6c5a4061b65deb48d290b26a6f82e59f62050cc66799436245

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    515825311a02b90c89e638f792a898c5

    SHA1

    f43b84b2306ed3e5a0afcfd19a40aef12018f73a

    SHA256

    169a43954ef01459c5627d605157e4eeb5e2a3f763fd945b0fe2f01af28a9aaf

    SHA512

    bed8f7b0d198945370b1db9ae221abbb901e3237f9e64fcb0ba42de3512c02a75f06dab2490586bb4218f753298c3cc55488bcd24d25f23c776e93aac1dfb99b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e26b4a1688dc6fa940a48ea17f1dc553

    SHA1

    14d9f5afe7fd13827a84f1987b7ab2cfc234a96a

    SHA256

    1603e5fbefbc08da9509b7d33bb4f4f1dd5d3ad0788d833be5ded00f6ef2f304

    SHA512

    90f2c99fcd39e629ab3ea7ea2cf0919374e6bc1228f415ad8b3c66931b5a5146d0a24f08d4964028808f719348a8a4ea13cb1d18caf35ed74809a5bd17d6936d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    006039a52a5871cb990b60c538ba2f41

    SHA1

    156101ceb5d7adc2961141905a8b63bbc960ab6a

    SHA256

    942a23d9f265173e8b5cdd909a160eac744ecda5f304875b22e8c9c6c5e264fb

    SHA512

    3baaa3984db1f8fffd38f260f75c60846000147f111ec3d5516dfc96415c0d2641ebf949d9534e69ed1004d846004990d713ddc543964112c21fb5917abd779a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    718fc2fb0f1729395c996ddc0ed205d1

    SHA1

    024eb7a800e24ab3a55a22285709f4ad29e7be26

    SHA256

    7313972bbd8377b30a97a9829289bdd1e968c5073e139748c37d4f1a43317664

    SHA512

    0c0ea9c1ed1f4f08c2d5da1c73844683ce594f950cee9ed2143e43b35d7d622b27ba2b04eca573651e487a5b41fae597ce544f104d840b4ffbaadbb86621b178

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9c2b82d56dee08dd14296396f0db3da

    SHA1

    8e0bf55d245fc0d11681d37ae99f986b48b284a6

    SHA256

    a79fd42af5c430eeac1855d61f9ffb09d7f8fa3e43e0295b3ebe267a149e4241

    SHA512

    d6ca9a23121828d8a44e39d74b6f667096725e22b8778fdcc87cf1f6ec9ed5e5d5d1ca1a027e409c1868f52892951f457b385979d4c525aa5f0470382821c411

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    678b78fc5e890f905fe221035e413d54

    SHA1

    ce59fa0398e27f8fbf73c82e6d594fa3f0444f77

    SHA256

    045c4d06c2783eb19bc16fa37ab061fdf5c7e9fd2604784448558b248e4dc0f4

    SHA512

    d9e1c12703edcf404597817755b7555adb44e509c7936ae609f090ac3cc101dc508b0141835f829829c7c8b8992fc97bfb854c17a5dba27cc572fa5efd5e9342

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da51921d2dde40be4deb7c6870790d56

    SHA1

    0f17e2092a5fd29516c24c5f011b288cbecc6546

    SHA256

    4bee909461e9d081d215283641474831f252f3fd8b09344041edc984997e5b5c

    SHA512

    90482f05b4c94d42cb87139be190daca6a5df6c58c32516260144207b356e92d934d8ad3215048758d81a2dc13ab5b05621d65fb98371f0842bab16b7f105ba6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35076607b75512b5320f3af9a920e015

    SHA1

    430bd4eea162f38e195598ad2ab4e41f81c93e96

    SHA256

    87c2e969d38286170b23285c85f5d544a9ba0f675313efbdbdedb92b91bc1267

    SHA512

    49fcaba52a82c2d94d2bcb96d9c53d26aef49e61991a3d3f7f2bef4b60869d74ae6e431e41a8e1cc9ad1f73fe58bf36261f7420070b73ad6ac6b786c6fce8d69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6aab654e751d9f73dea1bfabe3453d1

    SHA1

    89e7b9525106435d47551b90bb1392e08bbf21cf

    SHA256

    f7e7b83dd16f6246790c4c1b115c8983bba415852314d3fbbfbd59dcdacb96d8

    SHA512

    e38c408ee3318be3e49995f876fe9ba7bda73bf25e8aa82eeba1035f52d35212121b77122399a5f9c36b510fe97ee78dd1f49954a19efa8e71658cdcc8a7d64b

  • C:\Users\Admin\AppData\Local\Temp\CabE6C9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE768.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\dfDelmlljy.bat

    Filesize

    233B

    MD5

    3f31324cf9515e99e6ba1ebcb64ad70d

    SHA1

    8501c93b46d9c02c7f58122107fc770dcb9e5737

    SHA256

    03be84b09f53f903208bffd7ff20007f736fc9fb84628554d03e3227642ae6c1

    SHA512

    d016449b583a889762f0427222dbd1e6f88098c63b2ab7dc5d554e1fb33ce977feae1e583378cdc97c11bf6a1a45e81aef67eed27a48de324030d2f9cbc607ca

  • memory/2000-20-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/2000-0-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB