Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
73f4b350b97aed61f7eabd3021d3c341
-
SHA1
2d0c8fefe45aadaa71117a874f027843b0f96a97
-
SHA256
6bf043a90d43c7b57995dc6df5356cc28b22fe37fc34ae0c92f3c3fd56aa059f
-
SHA512
44d00ef06be0f1dc619ddc2d462328f3797fa9af55f96cd500aa2677027f0ef33bfc8f62b038963982580e473a67cd72eb007662d055844c9a775e1603e9dfee
-
SSDEEP
49152:s9VKKcBBwc+0pfW8HdglIjpvBiVRJzt7R:4kKcBV+0pu8HdHp4VRJpR
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000016d89-8.dat acprotect -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchosts.exe 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0009000000016d89-8.dat upx behavioral1/memory/2356-10-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2356-16-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2356-14-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2356-18-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2356-17-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral1/memory/2356-13-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\cj.she 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe 2356 73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73f4b350b97aed61f7eabd3021d3c341_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543534902f60d1bda88058a80cda01fc8
SHA115e4783954dbd7d46a94c2254162de55182207a4
SHA256e417f2ec9d9e12adddcb0574ff89dd985ff601d8723e01fcce32cb5c845e6fa2
SHA512301160950e5c2986e4dbf4440c0ae88ae8ea6e1ddb2aaf03ac56f9e67ecfb5cb99f3d4728098209f56f5071ab9a1a0b7fd000cd30e674db6ffd75f8d1209ae6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0fc4a5f7ff7b0114ed2e8c896fd156
SHA15f2fa4da87b8e4eb90c14040f660aefe4c06cfd4
SHA2566f4db3f915364dbb55ad421c080df15b3423ba12dc4687f17d38a91e3facedf0
SHA51209e95827fa704c7b611607fb05959984fc26def40bae7f88ba61635859a6a6fcd8284c191f65111fd489838bea71cb69723e422d4629f8a25c73faf76ef356ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591934c8a893cf9937950748327ab7cf5
SHA114ddb8b4906826e601246604311543b53099c683
SHA256043447d95c1b82ad0deca83485295c804603f18f96a2533e4bbaabfa3aeff633
SHA512a39e112b371baed9eebb9724e05647a86ebc6e618de1bb72e15db78d74685fdf7bd570bf98b178a094e7736810ac846d5c756c3fd06bada19abfdc17c9466ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b015a38b55a722650060fb35f63d4a6
SHA1b63b329120fb23b854c13aa2846d162bdca2bc90
SHA256a785fdab1ffe66182eb2e049893c60a92cc43c1ecae98e1fd9f02430fb188cd7
SHA512d7bd49949421c5e375d3915fbdf7533f138a8aceb06c86c641c6b6ac578ea1f237a863f13448acb00aa57d89b7bbd8a81dbfc5ab6bb4682866acb0a5c0828625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731a5e482829ce4473aae71b4a64d6d4
SHA1c654cafab55232330d5066bd00dda0dcf2bc3db3
SHA256bb73437e7cf45ffce9cd71857aa9e98648a14b02c4bda0bbdd5851262c203fe9
SHA51211ba6fbf4428b6486e45db87329abb67e2a335e3edcbd93337a5526969ab4b6ed04e543001e0f542156f2adb2a4a1a9d8bc5b6652c5c1788daf3f5da22ece3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46ef8142254b902df78c07742d118ff
SHA12d76a522b38826c9a742ed3f6e9bf1924246e1f9
SHA256d8ac2cebd35f97e6445779636b40486f20067a680c82b3be70ea6d91bf80aed6
SHA5121c3de0803bd20580b0598699ff2e5c3f5a55844e28065d18809ec9a7b9985e5057f75d3a513bf0c7ab901ae5021e066282b69b959dec599d159a83c7b8161236
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5bb9c05516361e82ffe27ea3cb28b25
SHA13f013c94a6e1387b97d8b2b5d522699203b6abd6
SHA256f7284e775b868737e66d9aa600acc1a4a9d2757a3ac38dbb6bd124858c475bc8
SHA512a9cf0b1f1787703ebb242fa66dbed0a712a9f273d014844c1519bd795aa15a557757594eb5d3448afcc888ee1ce56efa39dfcd8006316cce3f91e59f2b3f52f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a067fcc45e942ea7453ca97b4f59e35a
SHA1a540a94b572ec1de3184b270629c49cf59b2f962
SHA256a98ffe315672189b38649b441b7dfeaeeada2d99e0b4fcbe1ff2b6b81be4ca5d
SHA512b05c25609e52c908f29c4a667315afe1971f7319dfd1a666c298c90803bc5ade38811ffca47c3ecc7269a258feccca2022c77a73685bf775e15908943fe4ac5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b8ffe71506988e91f4e3bf237fc6c5
SHA12c52e66c897bc67d40876b8a6129e6cff50c9d66
SHA256878fee5c1901bbd513711c392a54e64a27d6dcc60a940eedffac038fe8162898
SHA5123112a793c14a3cba9689033594a1daa066ee628a52411a9f7fe83a3c735e5c71cd68c09d19c2c69b4d51eca930bd93077194a21e795a2bc8e2c93c4a6ae43762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e84ca3b34bec09aec1b76196a7f02a2
SHA1ae217934c41e6f2cff3492608322c5a6301af9c5
SHA2566d915320217eaa4c8fde81a69d70d2d1fe6444fe0e153d9a81f4122f6b8cde72
SHA51261e06eb1190c98a766a644d3f30ef3e5469191f65a4f586049ebcbad58893fd6371d65a363cb473459eecdb02a2486b0e57a11b656c13d3af512e2cc4e597a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eadda3d2762540a0bd8afbea9ff218f8
SHA1eff065015e3f9e340dac6211fb44f219f3edb1ff
SHA25630f8ce99ecd8897be258921b468e47b5ff8da808b97545ed07b517b4738e818f
SHA5122c69d8c4b70fca438b6e6ea4b055c3bdb0332c9c90eee6a02d5617c89ee48b07a0b65679c06289059569c1de4bcb4e1c81f70ed5e9314b1838cc2af2ba4de052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d030e81100e2f4066f1a740abf076938
SHA1d48f2f9edcbd5209c02e9fd862a041eb2e29d818
SHA25674d37595ff30713787632da6f86e4725b2a4484334b2e04f83aab39c0efdafae
SHA512f37778dc64cfac72b6845552d7621c0776b7df76e31d88a9adef4ca9b64035823e2c54190ad2791f262e8809ea2405079a8d93ceddb5a45daea998d9e6a0dfd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942d16e12147c704dc663578e9478d6a
SHA1ef8227bbdcd8456865467b2f091544b999a98c2b
SHA256ff08f8785bd6cfa0ed501f1399428cabcaf1a6efdc7d7ec1fdbf7126317dd569
SHA51282291996937764031e544365e5eccf7f416b5c2fbad24d6e8286fa965e8589b9d7525862e8642bf74b2b936353b0d430abdad990fc4c2396bf73ac2710061cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce951231c8cc3343e421bdc9b498bb1
SHA147ab36421595e62b119e8926227be57abdd2e164
SHA256652901e14c09f6f6ac94066a68ab3c9f69f26f30e3f121a3e26dd4344dcf5e17
SHA512ec8339c460a85d2f9a20d9c59ba20fd7778330132edc5ed37bd83772341bdfc3c29d8199d7cda646d8a6ae82e75f9a4505059926eb6c57cd4d63d6fb78a22ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55831fffb5646f00910a751e3a9b684ca
SHA1f959573e8b4cfba1d326663bb758e6e523577a78
SHA2567b97da97cb5632d9dbfca9375c0da1fade74a15ea0f69bcbb900c7b8b22657c2
SHA512d201fda13fc3ec9a543c99b2eebafaec49350bd4350b4d03518e42988e8765db23914a27131256686ca4943d9e90401e37067879b5070393b47e83cae45a8a7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51100fcb1c568c2db5f8b50e15208d4d0
SHA193994d89b2c291bdc311cf21df9ee1afbc266c26
SHA25652b956f9804eb78e77b10fa16e8d5c926430d08092404791af19e28676e71f6e
SHA512c69ff66ee8d6e5d429094ec7c6e7e73c9e82ed8a430cf5c67fe20caac0f53461009a2a79216505291c3051144b11cda92fd1ecc29f11d76a3691ac280184595a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5fbb4115e6900dcdc0fa8caf4bd11a920
SHA13c2c1bcd0c0eb62060bddcda9a6e4925704ef8b3
SHA256162545b6e57e626dcd916d86fff5897fad7f91e5947f28f969a5da8bc7ccf3f6
SHA51266bdbf9cb7a62ed1bcc61e6b996ff1e63c2a1341f8803745f25a25c3f64fb8687ee10211779961804f796fde9428cdc794e353719c260c94c73ce2eb56287e65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\script[1].js
Filesize96KB
MD528becf0e5ce8d65f6f9e33e5954a1a79
SHA169d67a8f41d803b62218f02a28ebaf53f32e072e
SHA256c59fa2847d6798cd7b5ebbd9b7832eb95e6b8aeffff195d3312ac7094049ac50
SHA5123d6734183f99b73e5bf6097f2f388ca83ca7d20a849b77c871e28c2cd3e65d9fc0a020fbd349b08bbd916493089396386623d695af964a6a1f273429cca1ad6b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d