Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 23:42

General

  • Target

    71bc465c68c18f15410142e2eb0fc9ff_JaffaCakes118.exe

  • Size

    30KB

  • MD5

    71bc465c68c18f15410142e2eb0fc9ff

  • SHA1

    435b8bac22eb52bddba1a33ab6606970db6fb8f6

  • SHA256

    c2800f541aea7bf403560b048682091466852ed382dac6bc1f34254631442dab

  • SHA512

    aa39afc7f2417b8d46c947392ce295f81f3c88fa694c84456d7b6744c08367733c422fcdff8b82ad19915dd680b633648503763cbc4afae66581e9445e70bfc2

  • SSDEEP

    768:qN2LwnvA1kKR6NSwydvulSRDTrISXwacAPOLGSptQNv8zctZx:qNnvAmKqTy7DHISxcxLGWmD

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71bc465c68c18f15410142e2eb0fc9ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\71bc465c68c18f15410142e2eb0fc9ff_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.finefind.net/?query=virgin
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07fee64cb07c6e84e27e76e9d8daa7d1

    SHA1

    d27c6100de9309e9bd62eb15e1ff05085fb301bb

    SHA256

    ab491edf21a9fde9c4375c10e93bfbac2b6badffd4bde9fb214cad31da240b31

    SHA512

    42e0a93b443d5ac4303646f7d2de19377beccbb125d57037e67f547f1a51c48771effe6a85e48d75187828da166150b17e1de4aa977dc48ddcad6bcb0a15403d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc8324aab535962e1d281a785b641146

    SHA1

    8421858442ae92ff021305b2dd3ecd9eecd29384

    SHA256

    80e5709f2d4dabb177734110cc15399553b7a4264c65c2dfcf2617ce30a086ac

    SHA512

    2917f36d02e88decc534933f88e4c47a30e131d2e104876fbf626c741d4635926517a150fda7812cb82e6c10770f31a83b354715b3e496a61fb5ef7e5ea7e28c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dee0d6ba9684d99682e34487e9d64436

    SHA1

    ebbfd523c46867b4daf0b399074441598fd3f24f

    SHA256

    b9846f7d37de181e8365d8258c4b96a3db6da0317b01b2cb99da52d61da71a19

    SHA512

    8013efb0f6ba84673504e0ab8499f30a7d57ba57d8d47bb41a086ddd2124a3d59fb99c4584091004012936752964293806f226c29f31a386acecfbf328656f1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cb74f02e5b4c2995d1fc89376450019

    SHA1

    c9067fb1fee40cb798b1fc269ccbc7e119c374e1

    SHA256

    0e98b9435cb317060ad5639834d384be0cee85d7ccff5992de1797c8e74f2720

    SHA512

    451228971f81141319eca3692b40ca9b20a0e79b64a123fdf1c6255a009575f78e032683b7c4f93cba426c8f73bd721919eb6eeb2de18917c846fc855bd989ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5623277bf98c838cf9db7289c349420c

    SHA1

    8330d1499bdb7c021b30402e0b22888b532ea2c7

    SHA256

    ae16a361c1975221fa0993282f57d82a28624935b6b50b9c3c4962ac8192c716

    SHA512

    3b4ba74ff803158cbaf23c77c15621bd4f4f264320b84c3a9a540e0cb819c86762617003d9ed40dedf4f12906091f33aa716c824e18aebbe7def0a106b4d782d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cde89263360d01c9ec3eaac51e1d20e1

    SHA1

    757a547919dd6027812d41f4c27d8c881033a716

    SHA256

    0889c487f3c3cdec487d48a384a271152d1e49e4041fcafce1132fd34e9af3ed

    SHA512

    3b9b315b2d568dc16e505c462af4c423b49715f0d383b3e1caee39eef63739a40bcc74315c179be7f904818ab677db53a3e86ca5c50fae07ff5232b52ca0e792

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66b19bf2b543e649d174bfe8fa7984d7

    SHA1

    d487b119231ee20a89d30593cea7ff5e612c1669

    SHA256

    63645ed65d10847e722940535fbf7812f8e0fa865a7075b94df80c6e1ae4c358

    SHA512

    f72730479bb97c9802ba73ac1b6f39ed6140c80044849c3338427e4e53a894a9e2899f4a2814146a069ee7fc25556c4b24b529ad5a05425b6eb9ebb0a492b1d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f0c17db5a0c7f5caf3efa212b8d0ab

    SHA1

    a750b1003c9ad7092d5e6c1352e8342499d37578

    SHA256

    64d5b96cd879064b271b84fbfecacb6b6d288cbadf6c22976dcb1d00a380a367

    SHA512

    1474a470b31f08037be8637471021c3aff71a770d14976c8175cb2b3807a144b2b721ac130d143ba530448a35bf66d73f3e156f9f50d8da1a5ddf0c83dea2638

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97fe9096075ba7140302b33a6ebdc909

    SHA1

    1e7463973c5bd93f5203d4bd7275cae7e179b6d6

    SHA256

    e778c5b625f9ecd61a8572bad89572d3916f4a138db8963189592f2dbc9b0744

    SHA512

    5db811ac42902bb79e2794afeefbcda508340aa17be1a8f6d1ec82d1b6e824b9d7bb96a89be1769c99829adab79ac3e8cb8f63ff7116b1a9480dc58a3405cb70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fdc9a12976890bf2c4118d3188cd6a8

    SHA1

    0421d8851a13a2a3a24a8e5c068e0d016c7cd466

    SHA256

    126ae221f8a6c562f18a6a5f851831584370154f18f3d74963526a39a1582a7c

    SHA512

    b176d5e7ab48d1e08add0f4c966973330d0c9c9c61b2fdcdf6f2f2bb050e77c6c1fadf875c904e9c8030513c42bd6ddc829efd023f6517db5111ffe963e391c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6142ede1820ffdaf1995e8dcaf7f93d8

    SHA1

    25f433145da05a066019f8b80e4c0a8e04e03d26

    SHA256

    6bd4d197513f5658c238942b80a0f9dc6f1342e1fb1cb266ea9ac96d98f5413b

    SHA512

    12f6e92bfece14e0e9e41ca75cb8cb08f47990a89c03ace3c498a299c84a9b861cb032f12aacdcca615d4de200022371db43fd71a977d44fa0573e48e96ddd43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b62def6bacf7bd4825908fb452b47304

    SHA1

    5321e4a19647a48e1b70ccb17cc6936961f0fb86

    SHA256

    3c8139dacc2f2b11770aa778978a80911c487b82bed81ae78f85d2459c8c155e

    SHA512

    b60574ea37f5ef3136b0c99adc90cad972d4b2ab8dffb3ad4e4fec5044cc97db60cd9ff743d75d4e6b9b01a27c240364227ff423b3f0b7ae30177d582a03bbe3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd9fcb67b03b5e9b57482f83868eb3f3

    SHA1

    fb105492cf20594687baeda4b6ac0f59e880710c

    SHA256

    6088b4fbf2ac78fb3b08f5499a24f848bf2f079ad0deed6a20cf56b3594ace2d

    SHA512

    506aa0d220e953b3b70804a89a38376524443d693de0ad7ceecf2a82642b22909dd9a04eeda9f9116c1bc75a47db2fd42dcd9a42a004c98d7f8f084419a27472

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    978ffec0e885f8c59e6660a71d67fc07

    SHA1

    cf3c13e95e3dfcaa8aeeb8f1f58d440956762684

    SHA256

    487d71b9f4dc6b2a3d5864de7a3ea9c287e5c4ec39176fa4f55290dff9559408

    SHA512

    e6bfcc5ca365bdb6cbb8d54b00baf368f917e6d9dbbf0f9f83fa385d0539b2019e520531472ea5b830696043a2c476b368e219cb6a8be83e6ca9db303eb830c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8d85d4805a4fcb7ff4c5aad7eaffb97

    SHA1

    5063678a8e5694e1b79e434ad8bf3948a26be108

    SHA256

    f08b82e0551e1dda4b5b3a342c8a7f0ec8e6d4a21db276051b348302c01200a7

    SHA512

    ca1893aa9eeee02ee3c799a0a93289247e060cd29cd37abe3892a38b803dd3cea6770e1166168f2f3c57bff2ad91ce9ad3c235f1ddd7a9c854ed7ad84ea322f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54c3401793b9e8559f93b385b098eafb

    SHA1

    10f81860dc5cb4047bc2b66f53d077d246abb190

    SHA256

    2430a95ca74a78b748989a202675bc744eeb88c3ad85a3e023eb799b7b99ae8c

    SHA512

    4d565927048132f4c89619308bcc840bc17e2b0b70d7adeabca88bc1e6cbc3612a94cc9c9378286c3c11e1ae681ef66e7a180ee5c8e062e45262abf15c29af8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cd2af892a0c53d02adcb6c068be4d49

    SHA1

    d0c971a47ca3b44db34f1e7b83d919f39a1f304d

    SHA256

    423845b973582fda61f87d779ec834277d85c2afc4bf9c9c484827a8ef5b3448

    SHA512

    40d8dd92df5bfe0bd25ae7006bdb80049ee6060876c1c365904924feee89ec33e2e06e0c6287339ded35abccd009a6f24f635eef23ace4ce4355bc4deb9cb3e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    222fe93693a39df92213496b009653c3

    SHA1

    67ca4a8d10bbd4f20613da7807199cf1939ec2f4

    SHA256

    9b39603ea5df6ab494a6e59706eda6f057593b949c322d3a9bd32b0e233142c8

    SHA512

    ac0911d1cd1936b1c8ec324d4ec6335eec73002767236171d034bb44fcc2ac8e00d8d16efaf182f37a35c102f8ced5839e435bb7178220e6aff20fec247bc9e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb563c235f09616924551a0cc5abca1d

    SHA1

    93e289d50ff0e9022cd6bb9b0353ebfe8b98ab4b

    SHA256

    6184a0ea26af6a650de38830225efb91b3ced5631b7351f3ba523a615714f7d4

    SHA512

    7d7181f1837b9f304705363bb799d5f981e7ed0bbfd9934aea754c979c541b065ab7a1195ac00d2345784cd21a6fcd6b581b2c5619ea8d1e8c488411af20d8e6

  • C:\Users\Admin\AppData\Local\Temp\Cab16AD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar177D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    981B

    MD5

    aac8448c9f5061cbc96d734839e83390

    SHA1

    375e49f37e33801a7eb9c25bb081873e0b1ce763

    SHA256

    3a24d78ca1ae6d08377a1810f84a2edda1ec54d025b267e759d5b7ad86dde9d3

    SHA512

    31bc94fcea82c79bb588daa1438044341969992f14eb414551512f9e5f6bab44e0c7778a98878502c7715e45eef376e64073002239f36e6d58e0754ba663d713

  • memory/2432-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2432-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2432-444-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB