Analysis

  • max time kernel
    72s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 10:44

General

  • Target

    674262e3546f1d34dcbe05b6b961cc0f_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    674262e3546f1d34dcbe05b6b961cc0f

  • SHA1

    86eba312cd8d66e37ff4534be2a7dd8555e45704

  • SHA256

    5d5aa1ca0baf66d76e1a866229d55db1347ffc5d41b2483327cfd4e301bccd29

  • SHA512

    b54c6f510c12098bfeb7b0343416eda3128a734c0e8fa81016245b8c0ec1aaa57aa901ee5379b8f076a5fe0ef3354cdef69234b1f546d9997c4f10aaee82c831

  • SSDEEP

    3072:x+jRXcvsLlp1zGkwdMY0uSdj73zNewj3H0x3TM4h:Gk0lp53ySdjzn3H0x3rh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\674262e3546f1d34dcbe05b6b961cc0f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\674262e3546f1d34dcbe05b6b961cc0f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\674262e3546f1d34dcbe05b6b961cc0f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\674262e3546f1d34dcbe05b6b961cc0f_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Roaming\Egzfzj.exe
        "C:\Users\Admin\AppData\Roaming\Egzfzj.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Roaming\Egzfzj.exe
          C:\Users\Admin\AppData\Roaming\Egzfzj.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1820
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1608
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7e7e64a3633f48c709946fcbbdccd23b

          SHA1

          fcf29a5df548dc3ee3e24d77eca7981ca5cd494d

          SHA256

          963aafa6abff7a5e6c63f0fb42b97b7b52581edfcdef43492cca6bb1ccc02daf

          SHA512

          b1819895ffb3c8b5254ad40913a64dc93309d36c28bf0a29671714fd638b4f9f6dda51b469ea4ecd995344879ff027c57388dd56a100a3f9b764ef2b729eb67c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a18c3c566bc7a2bb7a401ab3a0472084

          SHA1

          3fb0811e98767166a8ca101e9117e06226fd89b8

          SHA256

          44e2146a6deea15d1f3db198d2b80912feb7f3b9e8aef958f40129c18fab09c5

          SHA512

          4212ae0d96ae6910973a8ba3a838bd09c0288be9b19d14c7a35ae743f8c41e3b97d9ec97759938260e2bcaafb5681a3cad0b5b04e905b6bc7550982cdcd5d48d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2959bfb8bc3f7ccc233fb1928b42e0b5

          SHA1

          fdfe01fde2aef47c0ae2f119629a6817f28cf863

          SHA256

          7cfc0b37daf2c5264270ec389bb39c08f352803713f2c152ef5331eef84160cb

          SHA512

          b0abd64b323bf672ef3483ca64625e66445382e23937877139000a421be77e79b03fbc30c31f39031be7da2c76db4fa07001fc3dafd0053fddeb2950236193b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          17afa23121f3d6308bcdb9bacf3c4d50

          SHA1

          4ffb48e5944586661b6123c5a575e26636d40e6b

          SHA256

          6838020e2002a91c21a15c8b73615b0d8c01ca39b3ff97f902916928e042f4d4

          SHA512

          a4d1ade5e836c563ff09dd200114b3f83b5983b0e2190ce1d93035a57d9f239a1d10ccc461c75eb2d82ff0c16ab58c6e64a676a5621d93729282484a6e0b3eab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d26f94b3bc9e0cfa286a3fd3cde385a0

          SHA1

          b4722ccafea1f20e759f7acb39dd19a300227829

          SHA256

          9ec14cd9624229663aeb4defcce935a68f4000cb38edeccdb985d817af240d31

          SHA512

          09470248b2a62b3cbd2547ce99a27e6aa58223f7b8c5f902e53ad8c9234e3e16ccd1295c89fa84aca50e0f616838ba8a4ebc3c192a6e86ad1b054faefde5bff2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          11c6841d1b65b3f1d554fa82a06a026a

          SHA1

          6fed952ec61c45b92648755173808a50893d70fd

          SHA256

          e8a9cfadb443e1ae50851e44515a81a32aa8a61d8b5cac5423cb1380c3cbcaea

          SHA512

          ca140bf9bb331d3539a69f6b1f23219e844091a333060571a464b0d69a495cc113c5229bc6580ffc91459c2122034f96c4a7031182faf5e3db75bb6d50866a4a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          90371e465e54118237628ab9754cb8c0

          SHA1

          c8804d04c2ac11d23839c3ecbc16ea7421bf13de

          SHA256

          1024a318213b18cdf5d75056c4699e8d9cfda2a644af4edb977acf547259ae0c

          SHA512

          1c356a7099d6b937376ff1873bb6adfc2753c0d772b5d58e7d19ed22126d04d3db7bf97cee128e8447f97fd332207fc162f1ef44afd50b4393ba3a7021c772df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          439a982387963149ba884027a9ceb5f5

          SHA1

          fc8f50c32fb87100692b840d869f081e3aa0fddc

          SHA256

          7b9f439fc25cd53d062c3725a1aa5d9505b25c7e86c764fa8be63dfd6c41d560

          SHA512

          6e9883aebfdf2bfb2566d46326e11eef6b02c8db36698389f6fdc1d9858f1a49f389588ffa3b62b522bd724ee537103146295c97ecdf24a49f2f3b3c5e9eac96

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ad7dababd598020ce549b0d03dd04d00

          SHA1

          eaafae18d4866d6bf270a7cb5ead3f49032c708e

          SHA256

          7d8d621284192620f7f3279e0f589544865ae71b9fcfbf705b291f8416bb2f62

          SHA512

          c87bd9c0f8ccafbf0c0d852e23e00124992db4358a6fd14f2dd782a3d6359db5fb21ae35f70081137c50d30e9448832dc67054756a1cad13bd93f145b7205456

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          14e7b8af1c8d6fe14f9c0590f4aa8509

          SHA1

          55cb4e77237c52c5b53d4a1ed6cb2763fefd02e2

          SHA256

          1d270b56a34ec5edd00a20500bb49cdc0f00723912da03dac918c69e761596cb

          SHA512

          2c03d82789d34571d3adeea9465d276af3801b49d0073ebbf8ea840f194ee1aea45e082d590e67b428d618275bf9777a0333ea7edc519f0186deace6e4fb406d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          593de9d2cb63f3ef5a5ceaec4d1b7cc1

          SHA1

          79934e9e4e0c7afd919a6eaa38ae6450a793fa3f

          SHA256

          deed84d7547d3918e770b8fef2ed06a5e8385f093b342cc454dd02f0653d7d4b

          SHA512

          dacd1ccfcb6b1c5cbc873584254bf1b65396bd6680b689d562e35cc4b8a4178cf7961b8f48daf2bcdb2859182560b907aafbef30f73980c3b387333e93fc28bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d8000e21f8499361b91ef58cdc2c217a

          SHA1

          33877efde0711dddf262fb5cbe48961c9cac3410

          SHA256

          88d8a4e341d0e3fd3b1979891bf63e3f987b5ff86c5a7305f432fc3991b7df1e

          SHA512

          852eecfc4d29f8397353cb4caa96adab3a6623273479ccf519f9a9c9c1bf5a3b11881f8a4a6a9eef10a2d2252d9fc71ac4275b7f6bfdafb054f166e9d52041dc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b32c994cb7547d02994c50aef7ccd21d

          SHA1

          52412289d8af3a23a2266b3712e19cce52e49d22

          SHA256

          c60bd1fce8003853d9dcc4559b592fa5b61f0aeb89106531d4c70d25cdded7e9

          SHA512

          ff3aaf8e2f8425edd87d340c46838c1d3dcd42aaf8cbd1ea4e752ed9603470aebd863884f62016b54f8a7b59aa4133cef6af4ad1918e3ce0d49449d6f3dba639

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2a61ddce8d4496a43dd0c0dbc1507f5f

          SHA1

          a62da3299c12ed356bb7987270ab34ca4925a18a

          SHA256

          9ebf6e393c76d510f061989bf6d80da5ec7e05d8776509a9e398e47b866cb595

          SHA512

          755c805de8e0b71b39f01fc0eb9220750a67b5bc17494d6f6dbc2e41aa92ee6a73d47c9311436a728060d42fa11ace440d9086f2c7fb7c09f221962e938c1538

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c9b7f1404feead053c9044b407ceaa08

          SHA1

          20b2bec8249777e1a985cf9ee783c218dc7fa928

          SHA256

          8abccfc867674c8cb3aba034841bf643f3a191f5a1aab18923a9551b056d045b

          SHA512

          cf86449535af119095e62050ec0a0d6168b16c25f33f97cb112357d1b6f81fb3883ebb25a55f2db38f7631ced61181578b1d84a8234e75523ecf3a2b28f2cb0c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2673a932e8603805df87cc18752e3565

          SHA1

          174051715e96b64ddf59c1ddfd4ad37715f85304

          SHA256

          45faf40460ebaf9d5147f6b105011f4660572dd0dd49ae015fe3112c52008541

          SHA512

          36456b73f8510146230a7de388b95dc51a14e40d93e5319df06be454042519d3b7e8f6b0c08774c2140cfae018ec653f6b45164def42b7fac02e720bb8273f5c

        • C:\Users\Admin\AppData\Local\Temp\Cab5CC3.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar5DA1.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Roaming\Egzfzj.exe

          Filesize

          168KB

          MD5

          674262e3546f1d34dcbe05b6b961cc0f

          SHA1

          86eba312cd8d66e37ff4534be2a7dd8555e45704

          SHA256

          5d5aa1ca0baf66d76e1a866229d55db1347ffc5d41b2483327cfd4e301bccd29

          SHA512

          b54c6f510c12098bfeb7b0343416eda3128a734c0e8fa81016245b8c0ec1aaa57aa901ee5379b8f076a5fe0ef3354cdef69234b1f546d9997c4f10aaee82c831

        • memory/2248-4-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2248-2-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2248-5-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2248-17-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2860-26-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB