Analysis

  • max time kernel
    70s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 10:05

General

  • Target

    77c7d2afd2060c9e30b5074809256959_JaffaCakes118.dll

  • Size

    440KB

  • MD5

    77c7d2afd2060c9e30b5074809256959

  • SHA1

    eefddb8f9e258db5bd4ff9f97be32274c5dd0c91

  • SHA256

    f298c3984ec632aa98db5df8a8c592197b44fe8d5b64e04acb0bc07b1c5d1086

  • SHA512

    61a18e0cf8af232db335a269c82601606ec92cd3d4947dbc7e49af0884892d88a5c980fc263af1e59ad6bd59c6d60254146eb4dfc0c1f7c026738515996d01c7

  • SSDEEP

    12288:gbC/p4XyBZN0SrFlIePPaUcUxodvNMvYXCZmUerZN5:ggC5pMAFzSmUer5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\77c7d2afd2060c9e30b5074809256959_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\77c7d2afd2060c9e30b5074809256959_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:916
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dnfhelp.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a5651c77c14234817dc7672c54821fb

    SHA1

    06f0a321c44503323f49f8ab45e34fc881edd2e3

    SHA256

    2bb76ae53baa41c16666b783594be6c0a5b9743f949251c4300dc162b2e86359

    SHA512

    6e7eaff295116d3cf4cf272e8ca6faafe76c29db65c6d63b6a56f9e3320719b79a2979352e1e2af72b79571a68fb9b1f5f975f67a05cdafb35d97a247bc8d627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70c8bffe74c7296f746ad673778dfa39

    SHA1

    5f120864c2086f192be94d6c5174359fde16af45

    SHA256

    f256f1957b6d809bbb2041d1f067233b318e322885a616fc8732a27477bbed46

    SHA512

    80c91958f2578b04a759d40baf32c91c7272f92f854c49ffaf116342218f0b1e9b499153879d2fe8a014036ad70f847e24712e3dc3d9a72a5767fc601646f1cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb9d54444e7a509087631a6f28aac150

    SHA1

    70509b965c5422695a4fba860692cc3c807f6edb

    SHA256

    76587cdebd2ddd972ad68ce336313c8f433e534abcaa9e7027e805639957d8a2

    SHA512

    f59eca8321c164adf21821399b8bd8cb7f3a2b1a83393fe13d29ad90b0ee69cf9e2b5de638878256659feb265558116be30bd64dd8b536bd126be13aa91a267c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8553b5b6b9f7acbe5b3f6a6da5b0e731

    SHA1

    39fd4bf42c0874496e17d1e9e616db0c465689cd

    SHA256

    ec9c3dcbd46ab91034b3e439deb2db243df752f8121f8b271f0c82a8f0eae237

    SHA512

    32bf9d8c5c061a47b2b573c8b9a177fd555dbe90e2dc3f958bf981d96309f36499b373de1ee5a07eb3b722e069bc4bf2e62d3666efcc8c3f830897db1d184baa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90924be155561e6cb65e450251c0968c

    SHA1

    b889e5059d33b0ed8d0a6ea82f7dae88a16c3b0f

    SHA256

    92c6c478fc2a54e95fe54313a90192913f2a1e117c15a8dc3ba341d4187f6346

    SHA512

    17757dde6f4ba37fc5e6f02715a6f8dbe3ecbaf1ee9d60d41ef27d9559d075287a282eacdb9a58ec48ba75ab581a09309ca7e76b315d0b4d74b056726fb55562

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6062913357773126efca3264531e5cf

    SHA1

    8c7e093a485b2007b9244f5b820073ae6750a8ae

    SHA256

    c39421ea502b5771d43e61bd7d6ed9d6563503398b190ed5e2196b4b1bcaf83f

    SHA512

    d188840148e72af1494245d04f310132621d6c0775482fc5b28cbd3a4d7b126852975e123f27d67ed59b0b3890eeb813979110ca3c107f716731bbafb4abd2d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ca42da3e77cc0fc0fe9733a8e8e8005

    SHA1

    ede22720c82a660d085ab6d80f85bb3e2b7bf3c8

    SHA256

    9b3c2a575e7c4cc59c583495d6bb6d818075f6df7e0af07335f13ded6d13047a

    SHA512

    ba34471d34f08f221991716a92ebacbcc09813bffa5f7ce7e63b65a546186203edc55a718acaff6ed6415c61bbdff0d3beb96d40f4e8c9341891be321dedae93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ef5d777c2a94533b01701fcb71e7efc

    SHA1

    c23d06c54d276f54ce2a0cfa7b494a0171fd0e2a

    SHA256

    dec6f5910639bafa3c9814b99c7c3023f4e7cca581413dd6987a57dbaa8bf3d2

    SHA512

    3e4cab036711605775c335136e22d6c04d1512c4999cd698fed8c8a71b916c704e742d51b52a0590770225e48b55fad26443a5534f69a28369a1d0489ca0ba30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76f916510a5cfcc95e6808193225c64e

    SHA1

    8fb12a00da8fceaef7c4a300bea2e8df6397e91d

    SHA256

    b63cdd0a32a4b2d636d9e5f201f76643a1f63dffab66de47ab1b7a791c5f7ed3

    SHA512

    59d73e247e15d54e923189c5380125a268703eec18f9ad2b10cb9250ed873334180d85b85f76b8007439d148481ca9bd0d91c5ed6d62874af4e09b57223b0afd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80e537cc6f153284c5f0c6238edf36cd

    SHA1

    88290b81ea2eea4de8b894d71af2f28a20bdd45e

    SHA256

    64a0667b6d9b9907ac08dcb3aa7beee1b01113332a11cdfc7715dab27398f964

    SHA512

    5e8a68a082412860fe843b926ab5b9c58a7bc5a8785a6efdae93988c54a226febf5980dd6c47fc366c502c992d15ea26736778b591f60545829bcb25db3381a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3493bf85103b396f04947a575a71169

    SHA1

    09f9a947f23bd74c72d8966dbfc5296f2248a84d

    SHA256

    b672fe0456e0c4a0efdc89637bf99e3b990d4f9c5e031c590d2c90951b6c3876

    SHA512

    2d83ee8d9e03811dc463bfa19af4f551d93701dc8e3fb3a88756868de7505aa96579e258cc9c3b3a2e40270b0560778e472c5bd86c8660bcff278ab51dd39844

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    087d8048dbefc3677471957b3eb60889

    SHA1

    aaf89bc3c241b47daadbd4e520f76d95bfc9dc02

    SHA256

    390e5752b4ea3ddb41861ae734c8e443a7ab47dcfbdf3a9b68caadadd686c8a6

    SHA512

    af2d9ea1400aa36a143c32fb62bcc65fb433a75ca0dbab44653d27dd5c8c91518f0738763ee651260dd96c0803cf87a8ca1cce54310998b4e3519851cb176a9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9a8de14344e0d16551e3640608dc327

    SHA1

    6ec38dd6c6b6159fb609c61144f18ac260d684c4

    SHA256

    002fb84e8388763b6df1348c265e7ff2b3f7efd0c1af5eaf2d55fc1e9fa23e5f

    SHA512

    7db52265ec36a4b81f6c060e5adc444f2f1d8152596829b5e13e5700f7c4803d78c61df2134517bfbf1d2c9ef77a6c37efa0996befc4c634b47060c34dc29db2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a72411c4851e8eadcb8bbd07f9ea1461

    SHA1

    108dd0f6aa8ed7b96b50d551d0514895323ff7f5

    SHA256

    17c238122cb80f511806da358527f6fe890c25c39eda94e3f8b4096902e07c7b

    SHA512

    3d37784c91c6b50f02d51dc596d44c35c080d9474e7b751ce8448872da3c8868f26cc7d8a59865d014add8d2df1086e661b7b6d6e680b7541957c3abbbbf1b42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71bc3de0a1a987724859d13fe3caaa61

    SHA1

    b29e02b9fec5a95bb0e517104bbbab885dc0d60a

    SHA256

    afb1aba7a69d960dd0d68dcd90ca6171ed4779136b246f38323eddff51fcfe83

    SHA512

    2a3489d698a3c5f1b73f4fd8e9bfa983ea36c5296457f5df93e1dd7842295d4f88f02c47d18ecd3b4fea347c9607bda80174ab1fb017f4c1aff8b314a2332784

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38b3857efecce30f5ae8e87e8ebb6d17

    SHA1

    b4b0a8e8d4d3427aae9788251df59eba437a9d98

    SHA256

    516aab403a04272faf7262b2a12e738c7a3aaa9e51d79247f71484de888f724d

    SHA512

    06510a2dc7aea244b17b9857fbdc1d942d1f93ad37528f2e43cc6a65084ee69ccbf86f966af1e4a46eab82950e77e9dc5287725f1ae7d9b1ea99816918f009c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    076048da9dc233d229e2d24e9185a609

    SHA1

    a8ebd729b8c1c56930537f0a063e7c55e795e095

    SHA256

    b5002e0b7bbbc270fc4e5d20c45c3bdd3f63022afdc9dd7c6857aa9aebb92a5b

    SHA512

    af8aa8812ca2ea69928ea7fcaaec629b64ef9bb26a0db5ff3c24e7d6d2db4fd28829f6ef3dac5657378a40536dffb403caf694ad9e8a2973d93318fec0e9ced1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba806ef2876d08c3ed274b64faa15a75

    SHA1

    ada5582e6a0fe7921654514b043d0cebff56589f

    SHA256

    e1abfe4d053452f3ee4fc2d68040f0aec1f8a426d6b2831d970df4378f908df6

    SHA512

    003ba581ea73feaafa0ae9a8384f08a93642e1f73f7a958b6629bb2caf629d5825d8373832ec7f64884f27d7854b89495a46be250cb26bc02f9845c7dbc053bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    925cc8530a83e49be0230808977ae84d

    SHA1

    9d96db236cbf12bf6be083b97d217b2460cd5c1f

    SHA256

    25fffe3b4934d703775822c70b83652488a329a32d7fa5162e1759b7da0f508c

    SHA512

    f8f0631beba87484ab69d98ac6921d7d27f1130e6bfd2cfa4aa057911a5e14c71914ac5e8bf963d79c6e3efc757ef2f2b7bcdf9ef38e02d1e8535f26d7bd8bc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b09bd160db7e3cb26fc9d3626ffe7e16

    SHA1

    1990688bc653ac3e1d51183a57cac2a0c6cf7f77

    SHA256

    2053dbb94e195f2993e42a881c370ffe793770c01ac597fc648a13ad7c76d912

    SHA512

    8ab936edb80d7b93cd8fb9672155ce700d9221df70a24b32485ff14bceced6b48647fc28c0a4140f38c405dab6aaf753e57c9210e833aa775cbddc97f1b7a4b1

  • C:\Users\Admin\AppData\Local\Temp\CabE38E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE43D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/916-6-0x0000000001DF0000-0x0000000001F1C000-memory.dmp

    Filesize

    1.2MB

  • memory/916-0-0x0000000001DF0000-0x0000000001F1C000-memory.dmp

    Filesize

    1.2MB

  • memory/916-1-0x0000000001DF0000-0x0000000001F1C000-memory.dmp

    Filesize

    1.2MB

  • memory/916-5-0x0000000001DF0000-0x0000000001F1C000-memory.dmp

    Filesize

    1.2MB

  • memory/916-4-0x0000000000130000-0x0000000000151000-memory.dmp

    Filesize

    132KB

  • memory/916-8-0x0000000001E55000-0x0000000001EA7000-memory.dmp

    Filesize

    328KB

  • memory/916-7-0x00000000020B0000-0x00000000021C0000-memory.dmp

    Filesize

    1.1MB

  • memory/916-9-0x0000000001DF0000-0x0000000001F1C000-memory.dmp

    Filesize

    1.2MB

  • memory/916-3-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/916-2-0x0000000000130000-0x0000000000151000-memory.dmp

    Filesize

    132KB

  • memory/916-12-0x0000000000130000-0x0000000000151000-memory.dmp

    Filesize

    132KB

  • memory/916-11-0x0000000000130000-0x0000000000151000-memory.dmp

    Filesize

    132KB