Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 15:47

General

  • Target

    703a748dbecbe3c73a4c455d17598028_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    703a748dbecbe3c73a4c455d17598028

  • SHA1

    94bac7004fc74da68c72fefe8e56d66d25dc58b0

  • SHA256

    73fe2755699c6e907210c5c02909007fc041330bcc422d02b7078a1c14593069

  • SHA512

    ab3170f4891c8bcbfd3008832329189de1ae5930743c603865d9cc344c48d62232ceb769e9eca5a34fa1994e732a301572c5e2e93352bad187fabfd78f0fe349

  • SSDEEP

    384:VC8IVHVQjelbC0BPCV973hqk/YT+Rv7glK:VC86lW0CV/YT+RDg8

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\703a748dbecbe3c73a4c455d17598028_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\703a748dbecbe3c73a4c455d17598028_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.download787.com/sanity.php?1=609685-10020
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2da575353e077a4c779a3e6729a5fc1

    SHA1

    5d846341fd24e3deef18611edc9bdb87074220d1

    SHA256

    3e39754b1cf666eeb890c3b13881594234e0480561cd442f5c337e026ed6dd54

    SHA512

    b5a680d8f591315bf67dc5545705cd4bce799762d32350c7593c4e21e3ea70c532a54c1238bbd80a0c4bd8b84c1ac5cc2458059e5d11fe202f8944f9be572786

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d7b4594f7cde29d740db5c09615ef0a

    SHA1

    c758a40236c26a40a4c605563578646719577ea3

    SHA256

    b1f72a7f2973f340572a75ef0d0cf2c3ede437348623611f26f88dc1451ddc08

    SHA512

    1aa9e9abd854438dedec1739264a18ec6b8d0bfd680d025d332fa38fa2a9cbe19a61a687698615c12236139f236405ba449affb0a3945609a9304bbaa28c7881

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f137f19af773d5f00d2593abd8190a9

    SHA1

    9eae9e6a3dfd106f5318885bcc9b17cb842660ff

    SHA256

    99049ba211d765b8c19d51b86459a5cc68b79eb6275c0332c825c8883c1c2cfb

    SHA512

    15e63c0d5e0346d01ca7e00a4d06ccbdbbd4b1d280563a67ede4e05de585369fdd39c3bff14d96d01e532a9b775f26b82d5e4aa4d4a665570bfd6e5d3cccb749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f19724effcaf0dc99f4541901a1157c

    SHA1

    a1f840e0a500f97dec81bbd21c348316b89ed15a

    SHA256

    3d4442dc4204c088dcdec60f70907d607682d39d830c35341cfc15d19750e9cc

    SHA512

    d6b2a043e633f375b0606b62fe3cd55a6b1ee16e90e59099d2ecc9d7fc44fa97ae9153a8c95bec80259766656b43a6b1008364277473d477abfd0fdc76a80ab9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca4763304ddf46e5d9a243f9d6088455

    SHA1

    db36a429ce498712cf2cc367ddfdef30ab9e64f2

    SHA256

    db86a1419cdaea27b25c10fb68e3da16973db18a5bc4f2c9857531c902bc7b53

    SHA512

    33e90e5b69e9e3254947080bcd18f8b647e1a3e1903527ea0e73bf5d6bec9cdf1ebd4a07e61ef2d75aaa287804a3ca3fc33ace0c7f70d51c6a51cd763183e575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0048ac019fcc1e4585824d76861b8c1

    SHA1

    278656d18942f74f20ccd1ac7699f52b4cd9bea5

    SHA256

    b035ad56c1757d76327a46cbc8c88d60438c14045f232d8f26bc8066751b523c

    SHA512

    af60b1899d8e4b9ca37ad9a1ba3c7fe35463c560b15743b264777e6932e5bc66145c420130fff260b0d4f5dc4d61b44c1abb95b196de8389f2fe09c42efe0b51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d938c0fd337437fdc364084444d7b947

    SHA1

    bd87c8636d0d0c07c25b85768726fc9afaf6fb4b

    SHA256

    a97651e4cb9f4c605a391dc5d7b605a172481935620cec8e893d120167380c16

    SHA512

    d93cee6b0851834beb464cd390b590663dc6382b1faa4b5ee55d0d001ee7b467e8cc347d5d4d3d17eb7bed439834154b362cfc14f73e0232df3e6741cabee554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b02d2b653658a8734e59d78358f363ee

    SHA1

    2bea3dfc460a14592e754bc1b19c6492d2edd687

    SHA256

    ef4f0bc97f83d060ba6f71c71b92411077e03cc3d53d9a6a0e43ea90446b4ddd

    SHA512

    0642e1f5cdc0f6f4bd056d7af2cd489fdf01f9bcc108f0ee8635b3cdcc9ed53a7e49a2512b5de51f794db204465d3b39ede88271214a73862cc6ce85722bcc25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62467853a191cffd2be7f9a0819e35d3

    SHA1

    2192f691eff7b918a2fa3b9c8fa4472c99c6967b

    SHA256

    ebf5b64827225b2cf86f95258f84b4d994893e5853a1d58eb56719e48fbdcbf9

    SHA512

    bf4c763135f112fe4bdbdff96119ca59b12fa6e12a97f62d6185ce32facc24b3825883f529a9b3730df7793d1f243cd9d53cb5f87c404dd0a2c502f5af9ece69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e98583efbf6533d49e27eaeb1039ae0

    SHA1

    03fd61145a38b235288c90409a1c6107c040ab84

    SHA256

    d7f9499fb3c7550d74cd144f1e2083a5037886604096baddd5e9a92823e2ee93

    SHA512

    3817da7583b472a5385c2b202b0396036f19e5a44475e742cbfe4864bb07d3eae14430dbac7c373bb08b48680fa94c25d7188a5b2f29ffea1be8df82d9f73e32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    106c7f7fd18715f36fbd98a45aeca6d2

    SHA1

    ac4a00c551b02a3460de6f824bff21bc0ccca331

    SHA256

    a11cf084e4ef6fb6d3ffa09a8dcbfc05739f1caabc34044e79c5d3f20cc32c79

    SHA512

    0b31e4cad344b0ce94d5e9f072a1c3f8f9462e186d60b9a017699422bc5bff588b061e19122ac0021955c770ec978e05fd91856888606803ab8aa64fb53bbdab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07f9ff969b869d23968a9e0dd07eaa4c

    SHA1

    cc9352908876585c01d34475bdc2484aad155b74

    SHA256

    454d332087f92cde59281001f9e01c0788931f026c22032cf503ee8030abd68a

    SHA512

    fe6a7d60a479841d04f9be7a1082e798cd998a748b63f51b4c4846977a51b3e06c2ef6cf29144ef227b5b5a921111402f56ae6a2849488abe9261ce1afae13f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34b2b1f83fd343d4e816fcda4ee44d02

    SHA1

    fb531bf40083f4c06b0f4ad93f0ae753b4f690ae

    SHA256

    ad8a355b45ecf0541483d44e9aa763608be453ef38fb743d3531eff08cb65fe2

    SHA512

    b771bf1f26d60398e7f4b0e71a575296735efe51f7697fab9b89cd977da342d68bcc08fb3d76e075ae32aec83c13da57933de3f6eafdf7ed92c165b0d7791172

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c072653bdf4c3f86c3b8045a2897eb3

    SHA1

    fcc1d73f21bbf067c63443b0f56bed47fe201d93

    SHA256

    b25bb8871ac5e188e10056c84cbfd62fdcc200ccb7f640e15842679eaab6d18f

    SHA512

    c8b97be6c290258f96ad378545759cce20204bc9c37f04150c0f6544aa0770b0a2a19ab48b1caa27a6649f8cde691f899b627f3389a4477447a81e9567d616dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c148136b3c5da66021e8631790be6a6d

    SHA1

    42c763b00dc379b4171e5ef0302ff03503490fd6

    SHA256

    13741acc0da32ccfadb07dec5a96439210ce213e239a9de43cca272c559148d6

    SHA512

    23c704cfaa8bac165a9c812603ff359bc83b2ca99a5b66d0a3ceaa3d8f6b49f6178da4052b32213f66864cc9143cb447cbfcb3db03843d9eb2148b623327eb00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9632eb7d2a0f692fa6f6fb653c85146b

    SHA1

    021f8fe2832ccdf5981e928df0ddc43d052fb626

    SHA256

    1b0a158702d757caa6c4a108e4e39cbbb1a37f8138763c149cfe3e8e88942d79

    SHA512

    235fbb51bcb9c80a7bf06e00b3f5382b2e8640c3a2333c350d0415a14a51031d05d94f14acf77a51443e54c37998605b91a0ee5eec72dd6666716fae0b5f7e08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66beb664931a35dfc069f6ec679058ed

    SHA1

    946ad97d2eb6fd08a194a5fa3423f4fe4390677e

    SHA256

    6eb940fd56ccbc082b207d7d3553d6704554ce668daf9d24790ea2517cfc45d4

    SHA512

    45392319321e0ecd2c7ce2a4a01611221667d40067d9cfa3d79d218a350caea82eb96c9de9c3b481ebd7ee9dd6970b23f87c8323ee67dfa5b2774a81eca39b6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54b030e68423e5bf270ff2941523d1fd

    SHA1

    6886fdc4ca1b46d6316265238b2aa620939372bd

    SHA256

    33c08678e8f370c166285fa4da1503474f9d99dbdbd18d1062899353de17b85e

    SHA512

    e1a4d0312f60dedad7a1d67143260c547688cc7c616ef7ddb9ef5c240c2fff3ea8a5099e52ca4ab97a3d3c465a62ba8768cc374bf7d6ca5e3cb3cf285ca89af2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13d79a01463b072f5a9dcac3de9d4544

    SHA1

    3b17ae319570c4af2fb7bf0a28b4fd0631990b38

    SHA256

    b836c1e0f049bae0def5248618f01d6d844832f9c38076693d171de832217c67

    SHA512

    3e9559875ad17b9209eac66427a2cfbcc8af59d538e009767e2b95feb60fff3194a642ed40a635c3c838b6de6d2695f2e6ff6bf0c21aaf7039fbb359c2d9c35f

  • C:\Users\Admin\AppData\Local\Temp\Cab3787.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3826.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2668-13-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2668-6-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/2668-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB