Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 08:00

General

  • Target

    66c05e4f2757122015a12afa6d860427_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    66c05e4f2757122015a12afa6d860427

  • SHA1

    16f323aadf986f4bada1a09f04d50d256e75ed26

  • SHA256

    e548a285d33bab702fd081dc1e97c88c973b9c564d9ac23aa2561c890723b18b

  • SHA512

    00ba583070ce5da315eb5408d0b23383e534fb79ce9edd7f8bfe2b72a50461e045720f4d1b257a85bde2efe069a88a4e1364527657d4766ae14e221f43a2f1d9

  • SSDEEP

    1536:J4cl1pNGsHF9IHYN18+8/jcCusotZ4Vt4yxjAixsQfeO/K:+i3pl9IYN18povzkt4jazdK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66c05e4f2757122015a12afa6d860427_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\66c05e4f2757122015a12afa6d860427_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\66c05e4f2757122015a12afa6d860427_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\66c05e4f2757122015a12afa6d860427_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Roaming\Tmypyi.exe
        "C:\Users\Admin\AppData\Roaming\Tmypyi.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Users\Admin\AppData\Roaming\Tmypyi.exe
          "C:\Users\Admin\AppData\Roaming\Tmypyi.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2800
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2556
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d288531b9e71e963faa8ac043c0ad143

          SHA1

          fd91212d4f8f2354b515a003fed9299e28593708

          SHA256

          c74f593d309f11d1d7304b7805f63f3739efaa0ddd6ac5de9b590b80f12d60bc

          SHA512

          c4b4b83f9a9706f94f2e325b5463217afc26246d0b5786acb277146fada2e90e4fadb21e2167481ec0e4734e10d5e70fb837a52fd73836dd397e79d7d84c994e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f89f89bf2e4c20d446db3cd63d00ade7

          SHA1

          fe36adf76f9e55d1342a08eb86e514dc53a93d38

          SHA256

          ca5ac48b8af8e10b00006107c42c48557d9ce94b0468cf521e156c0969ede701

          SHA512

          1b189477ac666eac6a7598c71ac0c7ad2070a079de348c465fda631b6df889542fb7edbd2bea92191fd529c38d123984eb5c12c44953523e1c8366cb1e2b4d81

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fc72957cbd1a598f093f10d077e7ad84

          SHA1

          9283b255cc3bf8e387cf668b2691cd20ff00a10a

          SHA256

          056eda782fa8816e5a41e1a05e153ed2cd28c1865143e9eedd7f4e6c30d56961

          SHA512

          96f42687faf2e3cd27f6c3682f5f7ed5c0c9aa56eeabdedcd79776634564e0ce6817cdea8a0256c3795e780def85717ca5bf6af654f3ab5d38b9cc02aa7d8631

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          13116ac438c114a40825adf7765159d4

          SHA1

          08c854258e5559af5b8875d074cbd1622f28695e

          SHA256

          33ae2748b665f92da0ba32600499556325ac6f408487fe1c18a9078798cd1df9

          SHA512

          62b7311a10ff38d832c1f54e60a101053dfa263424f140b70f0f253aead87b9df69ab43ed8da9113ef264d0b259f1305e7076d593e64cec72d05a326fe589b45

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6611850b485fd9266a57c6697385363f

          SHA1

          05e486b3c37fdf6d4452d5b1b8746a47ab560bb6

          SHA256

          5447cd816bbd0474e4474373704f468447a14b8a08e67686ca250a7cf821195e

          SHA512

          ccdcc19a1359c03dd59752565ba975cbeb9a20a8b8b3f25bca7bddad4038c36affc8734eb399e685c30db0ac5b444be545506111fbff55c4b1dbb188914dfa8b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8ad62d2d7c86b606f974737fe5a5bd85

          SHA1

          8f1ccbaf8d8c884a295e9cc58219efc74d76153d

          SHA256

          f6572c231400bc9c326422d4e0791b9d0e66342ac4a8f5b007f0bf95c193c7fa

          SHA512

          4c9ba083f30b2f959024f6448602f53ca6fbe42685de5d5449c072ff24bb2041d77ee90df4a8fdb1c99ff9fc97b603fb141781d31621fe98be3b1ee7ce81af1b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          30ae510d341d1f4c261236868878561b

          SHA1

          7f24211079e998db3ccb3f0aa53682026e4e4ffb

          SHA256

          96f60634e31f5c1f633603a62f6a1ebc416b9fbad74f80f3979696fee5da817a

          SHA512

          a75d834e6ae4ef53c689d2bc7ef712d08c5b1b325efb7ea0e039bbecd38b9bca2112777c00cc566c383aa0cc74726883dcbf11ec7c419f9bfefd62274a058c10

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8de77a3baa3ad9ad1bf1673773a49a32

          SHA1

          1100d559ef6df0427487751d9e29e60d401c51a1

          SHA256

          ab189190cbb1213320856cc9ea99aa3251b80fed27d247e8cbcfa9d13ef891da

          SHA512

          81bd1ac8edad4a166e9fe012ad000a7e8b9c486526bb88ba10daebae770c5c1334bcde9a1d111586fc633c59098f96e951bda5e4665e4139c03e47eea18d0751

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c583e792057349d4673ce9f9b1659215

          SHA1

          3ee9014a580557a43c72101d0b4f17faf9d8f1d2

          SHA256

          6a14be1b6dc0be2f5fdd6658f816bfc25e138c94ca98f6649c8927d7ee3dee06

          SHA512

          2e63b5bb68f93e9083c140de979e6329a2f90f2dede741f7acc5f87e0c5c23d319a5b5fa7e72b7dfb2e5a61f40d70fd6e08a785703572d8672635d96c4782de4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f0b17a049bc7c6e8b7dc73d4780c6232

          SHA1

          7f576b7a1fc8e67f9b5f8f4a3222f8074f2b24ab

          SHA256

          7245358db6f1559786883692d4be155119648173d26dbf601add40b9d133078d

          SHA512

          838fcd0a25822b96215a692068f4fffc16cc12e6ba49903d486a0240a6de17042c1d3e98f80a43206b3f5040bdae413a50f91000efd530552d462c882022cccb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c92f903d5e4c33aafc7a75b11281a164

          SHA1

          f7d366615082bebfd12ba0d51fac652f888ac33e

          SHA256

          ad00dfc20b5351754e3847036a6a44f848d97434a63e64037dda8869522450f5

          SHA512

          8c0b0248efd6f3cf9615119a0fac547d2b5237df22ad5270c54220ca446e56844d4c6519c5951c39c99259762070b041fe3af724b263644d729325d6af56c0d4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fbb537bc7db2d767d87cd93fde88e8bc

          SHA1

          96fdf59d40fe420885df5a912eb276023d35dd5f

          SHA256

          6a7a052c7a4321cfe2f5adb6638278a28ebd1710ed44675bfee515da93054404

          SHA512

          f0b1e4487a44c8b085652f4eb48584465ef214fd39c614d23098b9990e3fb0e814ee37bfcb4f551f50ab29460c38937837cb41b6e0d4cd5590f0fc42c4cc1d51

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2f8a03f0d132bc1285dbb800f947cebb

          SHA1

          32a0bcc07911826e44e101bf732c43cc77fd9862

          SHA256

          34581f18f6819a87201a75be4041b2e361ca60dcbd104e2b56249ba735b4ec38

          SHA512

          e43bd254003148172198c09cf5ebf6c4fdb0c64b7def2cac3dd092c57d272fffd5336ddab4dcc45fcec2f53c247836ca202b189fc32a8d07e0760d16685b6f05

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bbc1d4874d1253c029639f558c93aa44

          SHA1

          3f75421c0546cdd49e85fd0f572c5949ce5a383d

          SHA256

          603235eae9cdfd12925d760cd90f954acb77dbd6ad25643730ef69916bfba652

          SHA512

          c00a3da666e3e569d86ba7a54fa1e8bce43713d7f13b814d4631e2499f8d51276c35e6f24b5dbdcbb8b209422e68179979aa0b19dda5a7bca390cfe836db6a51

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          22c73aca5f10962324e9710b65ddb588

          SHA1

          5d7588f32944e6f0823c914ddc167e6a5937b5f4

          SHA256

          de200e5b5cc72270abc05a653002da7d2bb07b50e7ce8bdfb7afac80e6336d58

          SHA512

          bd36903521a88f3b81dcda162276666d87f2fb6575ee95dca202895c3cf228d96880534d68a1d3b0f4410ce304dc72deb7147e5ecaeea1ce19eeb7ee2cb3e316

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7c98303a4d63794bc699192e8ae1899b

          SHA1

          7983cc54482600facfe20d637c427b550f15d2d9

          SHA256

          5be5fe55b6e3aa4479ab3104504cb5c43c600a1379bf55651e967b699dc3defc

          SHA512

          792ce0965ea65a5404459405c88989eb1ba3eb4b040f47f3263a6a2877aaf9b1952ec02e0746535410bc798e809a7c61bac77b403f5ce0333cb93a0b1db43cd0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          246eeb67f9a4e989075e2262fd49f26c

          SHA1

          074b818cda8e9d340d3898e4aa13aff7036e4523

          SHA256

          0390e5fefa1f7c37bf273b34ecf8a1f0774d7eba2eaac57985ce44728bffc7c2

          SHA512

          6549dd9ba20342a12a51aad46938a130166ff471b03ad614867d17f8e6f9167ae16ad61eea8a3b4eff4349327574a1aeaf438dd5c584b72392f73d980c048a68

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          446ab35871c6e609d345b9e8c982a129

          SHA1

          1e34a3e40e176caa98ffbd25ba916a84a42d1f46

          SHA256

          53b59ac441c2d79532eecaf32b19b7f7c13b5aa8509c0a2721d3fc14c6d9779c

          SHA512

          1e0d9872dc2fcdc19e5058fb673636f8ff3d97854993781395505d940dd5f5c429fac112efc3cb392f79ca64b7e3cbd9f5208c6138aeede81550c49793959640

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          87cb81e5184a896bcdaaedb1d759bb54

          SHA1

          f7af339166873e5cb1a6232cb74364d527d5f885

          SHA256

          b8e900475daae4186550a63a807d5daca12049d98a6731a678f8ee62cb655a0d

          SHA512

          234120c85a76eb7939f3107bf0439c355e2e6f4c8187e237ecde5421dd3cf6fe0888ec35ece81cf7baaa6d3e5b565c823632ae4744cd6c5a2fe827e3b120cb50

        • C:\Users\Admin\AppData\Local\Temp\Cab7B97.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar7C19.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Roaming\Tmypyi.exe

          Filesize

          84KB

          MD5

          66c05e4f2757122015a12afa6d860427

          SHA1

          16f323aadf986f4bada1a09f04d50d256e75ed26

          SHA256

          e548a285d33bab702fd081dc1e97c88c973b9c564d9ac23aa2561c890723b18b

          SHA512

          00ba583070ce5da315eb5408d0b23383e534fb79ce9edd7f8bfe2b72a50461e045720f4d1b257a85bde2efe069a88a4e1364527657d4766ae14e221f43a2f1d9

        • memory/2796-43-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2796-33-0x00000000003C0000-0x00000000003E6000-memory.dmp

          Filesize

          152KB

        • memory/2796-28-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2800-46-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2800-47-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2868-3-0x00000000003B0000-0x00000000003D6000-memory.dmp

          Filesize

          152KB

        • memory/2868-0-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2868-12-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2968-8-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-7-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-11-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-14-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-15-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-10-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-4-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-26-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2968-1-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB