Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2024 16:46

General

  • Target

    68642635fcc2b649edaf5e02ce5cf872_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    68642635fcc2b649edaf5e02ce5cf872

  • SHA1

    8d82cf42e912d745e1d165582c60abf9dff1fefa

  • SHA256

    fc1e95a63a7c5a8857abad156f4b591790c594e85cd7330b2b251d351777a197

  • SHA512

    b35e21adccefbe610104462e9342fc0c298022b5831c743980cf92f834c783141412d30d2343df036b4ad38055833a3d9e5d1aca8ae95d221faa4ce178a95c8d

  • SSDEEP

    1536:Iptm2lT9jN2QFOV9Y1rIESY5G9dPoT9/dexf0/Rsmd:UM2DR2QFO3CEESYwoT9lpSmd

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68642635fcc2b649edaf5e02ce5cf872_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68642635fcc2b649edaf5e02ce5cf872_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\68642635fcc2b649edaf5e02ce5cf872_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\68642635fcc2b649edaf5e02ce5cf872_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Users\Admin\AppData\Roaming\Fxsmsr.exe
        "C:\Users\Admin\AppData\Roaming\Fxsmsr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Users\Admin\AppData\Roaming\Fxsmsr.exe
          "C:\Users\Admin\AppData\Roaming\Fxsmsr.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2660
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2852
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e30d45c2ba4803025061a28c986fecdc

    SHA1

    7b896b8864734bc64a075557068311803cd4db9d

    SHA256

    5ddf08095df3b1bd04ac65c3a3554861e6b51ded5fe17de97337bdb24da8ebfe

    SHA512

    6fba95c80a7439423e7cf349f69dd4d320ea8d1915f4b9d7c5f0a445869f2758dd0a882fabcd49736633fc51fd00bfff34a878a547e81c12fbe7f682429afd67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3838cbee5410783e1091279ad688128

    SHA1

    540ee5099e403b99e7fab2e2ab6c56ebfd4c06b8

    SHA256

    477a06c14b29a511ddbc236a34a9f50566b02c5e9e1ab2f4c721794e9951ae98

    SHA512

    121d1a36182059984abba22270991c479a8e80b3576f9d3d3c2c4b0ddf7b1dbdb167bd4b8fc124aac6a473ab1ad61f68431c6503ac2eb9a97f15c13f67d27911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    942adcc57e8c17170f99681d9e3487de

    SHA1

    31924abbeb5300b2d255b9d333eafdc589ee54e2

    SHA256

    59a2f1dbbdc7d62db290c006b2825b3e36383761d3cb63b477861a7621a46933

    SHA512

    1bd7191acce44874831a63f89e43382c254883475e6ac9e7ae64b92eadb3afce7a5ae4fd93875c029f97637cb802052779932c2f00d8e56a23c43cbce2fc1e8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bbdb95e3100d301f5d4d7af6d6a7c4d

    SHA1

    84c4a4f8e05afaa94d8639b945cf5a84bb165fbe

    SHA256

    21f24c23c3a28635db3349f7028c6f5634c7489469e916a785087db3c26f58ad

    SHA512

    756dc9e74988d9c4524e20b9dac7c3fb60c58e673238260a84e4d349b49457d61bec50e6c0c81d4699815e55e4d0cac6fb71519f8ebaf5e303837cd2b3c9f593

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4603a6d346585a08b92694f6424391ed

    SHA1

    c994cc04b93c7ade3840b30daaff4b172cc94c50

    SHA256

    b271657497c01ff25af0e8b991b5059bebee7ea7cf266c0c1c31f1147c029ce3

    SHA512

    b13118990a1a963ed38074b02ba2515919c9703a2a233e9acbb6081be012d0681634ca14fe6b94e8e1818e1199ef13734bdc322b64eed880b01a380a88cad0f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9f81b7592ba02450fd625c18cc9bfe0

    SHA1

    104b9a9e2f5d5227d44d28a40b36485595fd4cd3

    SHA256

    cf126071856a92fb627059c28bd8f0bf97371df466fdbbf76a8a4a3610851f68

    SHA512

    73dad3e3a01f531d55f19e0fbd68323c9712999f15ac5d57666476d68ee2909bf366de2b25327e542029a25b0ae44e8fcb1b39d82f4df8c4b57f0139dd7a2c24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8f5595d4b3fcc1cce3af8889b8a0b3e

    SHA1

    cf404cb41d6a5a72eae4e070aa9449e169d88df0

    SHA256

    8b9ebb30e2f41e9066211344a8a9e6ef109f57ccd0ab83cac2ce308f6f372e6f

    SHA512

    e015b9e73e1cdaf67c1bd16e68fcf117ba93d69ec753eab90f586b65cd094fe397db3580b5cb8fbfdfba9ee22b559db3080f4a43f0a3b1179876007ef54dd4d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97692535202471f39ec1dc612bc61449

    SHA1

    02725131a3b3096660fecfd62bd3fa648dc030bb

    SHA256

    f4aefa88b43419d797bead9f278a41f05b48fc3914bc3229388b77b3e9b081ba

    SHA512

    e14503c880a5235d120d09e3ef7176fa35f3bfa4478b472dc39401fdcfe2ed8dd9cfa902a7969effd8d41fe859e92927f4a2de9349c6b5afca46d77205485f34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6c7458e53c84209ef8398ebf876ab93

    SHA1

    e6ee85b296c2b9820933595c01aa3e4d3febd600

    SHA256

    3122b1d5bfc1b111b7ee67e8ccc5b25d01b7482e5c331a9c54e58cbfd1c017c5

    SHA512

    e429e1c6943ddce7d54a3b8160325a69ad2446127106eefb0b11275b51bf7ceabf50173ade18992ee921d3417d1b568f54e620257e7bbc4b6744fbe8216af289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    045c858cf6363d3fdd161c4cd6181cde

    SHA1

    fe7f2bbd68eccc4103725eaad7861bc8569e4a0d

    SHA256

    612cfe8387836b67f90211086db612e5661689e25c90e09071ab8866ad0d9ac5

    SHA512

    195a587e85e636bd6cfc0c21fe0325e0ec4ad2cf2fad189ef3037a007d5fb3f6edecb89fad9c6ed662a9115e79e42225e6e6429175db71e96f156144d06e70a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    004dfd723dba2e68193c9bd4f87b6788

    SHA1

    527e6d6f838b9dd305a7de83f07c7e58e9b6df12

    SHA256

    4b87005daf6db8c4733d0b0a22ba3b1cc5bcc900316854e91355c589d13559e3

    SHA512

    b81bcd1d88399b00284af2865cb6eba5b83d709c1bfec609f1b942dfadc43f718d73395b2cca2c4857c287611564a1214b05aa0e845f3746481d4d5b3627a63c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93d6e451d30c9d575217fe4e932e2b6b

    SHA1

    043b84093c8c2ed39b1b41e8278f8aa7e9799d8c

    SHA256

    4d0e4e3d7b7abf44c17e90fe9da5055b86192c76fa58a9fa5138e4bd569cd464

    SHA512

    d80db201b7a6b9d5e4e244f189c40f58f2983e4398731b63b77929ed1ab46419d2788bbce8e9a3d5eb7d12fa25ddf7a0335b5fd92646708d68c41acd35af24b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06da059bb3400b191523f82910de9597

    SHA1

    b4597d946c1e436cba392eccfc342fb633d9264e

    SHA256

    98b5ea9f9fb2efaaa014355bb07e4d75bba02f6e3f822599e3f01b6f9ceb479a

    SHA512

    6de578be9301cd8fda0ddbe85f5e2c841bb391b011dcd511ccdef8bec3929ba75d7b7070e08122cbb7e1c455e18b03132edcd6f861b95f6ec92092ecca1ce06a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1171323e81e193fd61bd24a5f2146c34

    SHA1

    74f88d4e7691583742be7069137b41b54eb9882b

    SHA256

    36ad49fe26d6fda481fb60f9ccf932824136e0bef9379492f72249706a1d7164

    SHA512

    e84b7dc482f2ff036b10dded37c7338f501e730b84c715d253690c4265ee2cf40561a6dbac7eeef848dff99f65e3d2f0c81129500d38737ca2423f16a2760bcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9511ae3827d141e6945a655a088aa6d

    SHA1

    f0c82d9e048a10b067de558502371cf8e430fadd

    SHA256

    989e4be72ebbf9d3bf420e4a375459c5b852d0907aabceff72fedcbf1ba35070

    SHA512

    8f7afabb23aa6235b72af0e7b4b7944bbfee4fde7b4893db579a3879cd40c16b380590e7b5447ddeac67882e2706bafbd8247810f252f991137f44c2929d2e1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9869fdbc2dbc3ea8f586be9d1d6e7045

    SHA1

    2db58b7f9182c483f6e1277724408c818ba54823

    SHA256

    88ceb9d795bb8b2d3fe27ba8a10ecf9c5648865ed86dac08ebbdfd60706e683a

    SHA512

    eab45e1df84405349cb2c786131e3ab804cf60f03b85f2cc77c7082cca8adb0fb2032a9ba670e6bece58a027791680aa518f2b3d03a2609ce9234eaadef7d0be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dabaaf9e632f04957b0fa82a1a28ff9d

    SHA1

    b85ee042542cc6847059107ed0d98722ac0b1525

    SHA256

    d0a97c49fb4a715810cf7b7bea66d4c2896b92811ca02f0a5552407bfc2984e5

    SHA512

    12137faedabdc338cd8a1c8c7017e2a2792f1f5fd0a179cef404a90f68cbed3d3e7292f429fab89e89f738e7b53031dc55de9e4d3ab8286e0b052c412352ea00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecbf841c461de38537fe96be1fd232bf

    SHA1

    7a814a335d56808aeda9869d970fd4bb37d5efc2

    SHA256

    bf0f9e93838f343e3ea87dfceb4d538dc3396d3702b8fc231cebdf1e14d073d2

    SHA512

    03894c387a88935c416426fff210207cb5ccb4f688ab1af37772a449cc8242c4aa966efe40f5c6db596eec3623ce25ef4193ff5f6ac34ec4777dfc6ef62d954c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e225dc058acc7e629fa8b21e2e745553

    SHA1

    8a27c105098ba36c5632c68ed6b19941bc85e973

    SHA256

    f948f9056eb846063900c93740741cf1c8b3fac9f56bee842e466c090e86982a

    SHA512

    48e6456f418adeacf0684b9119d01e95f7870259ddfa3b7a280e2c44400a29dddbebaac3200dad5594a547dbf002222662345114c46dd75639ea8932212192fa

  • C:\Users\Admin\AppData\Local\Temp\Cab2B48.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2BF6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Fxsmsr.exe

    Filesize

    136KB

    MD5

    68642635fcc2b649edaf5e02ce5cf872

    SHA1

    8d82cf42e912d745e1d165582c60abf9dff1fefa

    SHA256

    fc1e95a63a7c5a8857abad156f4b591790c594e85cd7330b2b251d351777a197

    SHA512

    b35e21adccefbe610104462e9342fc0c298022b5831c743980cf92f834c783141412d30d2343df036b4ad38055833a3d9e5d1aca8ae95d221faa4ce178a95c8d

  • memory/1712-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/1712-13-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2116-46-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2116-30-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2688-48-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2688-49-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-3-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-28-0x0000000000230000-0x0000000000252000-memory.dmp

    Filesize

    136KB

  • memory/2948-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2948-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-27-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-7-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2948-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB