Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:27

General

  • Target

    81c92ac32b18775c2e70745571f8d2e8_JaffaCakes118.exe

  • Size

    209KB

  • MD5

    81c92ac32b18775c2e70745571f8d2e8

  • SHA1

    612c7053312dcb0f86f14d03f200ec55c52f6b20

  • SHA256

    478dd1865f2c01c3b6912ebb2f002963cf9b89b94a91b454140bd8cd725fb6d7

  • SHA512

    65d5804ab09ec1356d96bae2efeff46843e82fb6bc3eb225a9419d7f046d3ed60131c8b7e4396e634da9e0a7a26bb033f9612144c4277c9df41677961dcd90cf

  • SSDEEP

    3072:i4VR5kMcruKt4NuAMUjyfMzEX80vJTQZut+8oW/jrg92u:i4VR+T6MUjyfY8t4E7u

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c92ac32b18775c2e70745571f8d2e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81c92ac32b18775c2e70745571f8d2e8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\81c92ac32b18775c2e70745571f8d2e8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\81c92ac32b18775c2e70745571f8d2e8_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40767d3dd96858803a93bbf3d30e7174

    SHA1

    846c83291bbff1e283afa2199a986c9779045025

    SHA256

    9157aeed76b61b03f9d0531fee83b81b6d43168bd94249c05b5bf4d7e2c02efe

    SHA512

    93d34f76bce7a4e71a2948a7cee454d42f27c08ffec42dcf3047e7053c8705b0bc963537a57adf4268f4b20c19d3d4c2eeb9f5554aefc3663f12ab14d1619425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4732baa3cd233d8046abb2d67145e73c

    SHA1

    00181c76cd7281fc1204f2ce252618c376821ba1

    SHA256

    ba76828dcb1442b12f4f289986ddc4444e679f980fd5c1b3185f1eadc243e66e

    SHA512

    8c71cdc6b1baa8df58c898a7ec3639b4be38a735645ee67d141c8dc599b4cd201883c9088a6bb221cdeeea9b0a1e778dabec77b425ccf814a785bde17c9f769e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28d9195f0718aeec6fd0d54ed586d773

    SHA1

    fd5868e42c12a555b3ad3a30db319e2046a9b28e

    SHA256

    b80ef5a6e75b9abb63c27d4b35b9750be7e86a7979df09dabbdad5b063244744

    SHA512

    b5520ceeb9e28730a9dcfa961950b5c55d60ed3e93edc39011d35a1dbe0a737b13de0a5d4903faaa066a6cfae9f7ae5adecab62f6950389c31e94286528c3f1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9a9042b3d114d4b38386d9f6d614826

    SHA1

    6b7e4c08abcb139985ca0ba73c1fc5199b8f91ee

    SHA256

    95e9cf6b78b6f1cb954b96d35a1f0a4fb6cddebfea7b81a8281d31f674886e27

    SHA512

    7a5bde061bddbabb06a0a351b1129aff2edafd893726b3ee43ba381d8a748f447d8de1d58fd8c93ff22e086a1f3b32e9c053310f3d9dd9a83fc5f9a41b1efb98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cddb25e0d8cf80397bd02bbfad9aefc

    SHA1

    b0a1414d7c49d95c2791b78270a043ff074de54d

    SHA256

    ba9b2e0e7a643d8cc8245ccfb08ce2fd4c66870b043b94f9cf340e55ac840993

    SHA512

    634b5173ebf977db5227c5b2db0436be828b075db9d8c44c10b63790e5bba3c341ddb70af46d65e9fd8bcde246e730e8e74faff0c4a6698664568312b4a25a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02ae96da54d6ddab03cc0628debdd4e4

    SHA1

    08b3444f88a6915b984ff15a619fe1fee4c7b206

    SHA256

    f5631e29ac4803d3dfb248a64ac5f60be470a8dc8553e40a5c2114bea0f9aeb6

    SHA512

    d9737e500de2850c9635208405da3c8cd7f18f3762e7685b655760faaf24f060e352f110c515be0cc562c09294d1d80f30f014fc5569cac3e62d9d10c1c062e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b07191fcb9de49194096a1d957e264b8

    SHA1

    c7d8dc752843d04cd837808c85442b2dff8faa00

    SHA256

    62ddf53509974aa170fa6b7ccda3b77ee79a8628a18dbd2c64e15fa8e9978535

    SHA512

    5d6b51616b7425784e2cb2b83248aeaaedc4adc5711a8bd65d94de23e151d972051c142d81c61717af90046d35dc61d6464eff8a577a09cc31b52b18b1e765bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d93e245ce53a9bdfbc4fce37af252103

    SHA1

    b2d1b44ba584c4709515242ecfbd922337c67857

    SHA256

    a55c6e2ee715a7b3f54cab2297d45e34423692009f595f67ce57cb3ec6e72432

    SHA512

    01ff328f9ee2d0b2034d47951fd012a179a7fa78cc542f33c998fcf583ea827878567402373959ececa1ab54e4f9b1a022dd2cd8bc53c1859ca10b114db00ecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c344ca4fcf28e12f9eee201e984ed0a

    SHA1

    ec62cdb8fff049e10d02ab9188674ff30b72ac0d

    SHA256

    ce7108beb17df17a81298ef4dc530e4d43cc3b0792f19d27ae329d524ddd7320

    SHA512

    5dd8cc681d731005955e61139cf5a0b689c9fc7268ec1d68b664acf3ca22583f91b70778e70f478677c5471d8cb029f9425b2e3c7d28ddf6f4c5fa5c054a6d3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4ea5f21def0b1ff242741216373e2b7

    SHA1

    d06199a876fb75bf96cad5261b8603d6b9c385c0

    SHA256

    f1ae3dcfc73edf65578babde73e5d4c9fce45aff47e326af98144f16117d655c

    SHA512

    ff00457c03752eb26d9fbe1d187c4cec2d5cbe6e18eaff498582dfd9e1e374c58609035da91e346f0ab57e5aad7c6d9c328b7d1d897d767a910371440ac9f023

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a730c91ccb5ef42a769822593f028f0

    SHA1

    a326a313ef6dfbcc89dc95c2d401cd62e7d632de

    SHA256

    c94e467b314eaa6a58950dc34fce5257af27b2c8fe6472afe1f69de4ec28e117

    SHA512

    4f65a6f5d58f6a6e4bc083fa717a96c582a15b98013dcf5da10642aef2a6d1f53b185be5449408fa57f5f1549a5447a5558856aca339df52e63f8ac92d29e381

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7b5a507df5c7eaf0de444797d23c49b

    SHA1

    b1d4661c9791f4b1f09cefed8a59b5c3adb31dda

    SHA256

    ddb2f806e8980ad69b714d18b3bff5630d35acef6a0a659fd126ba81909446cf

    SHA512

    6f6083fea5922f44a84a49063b9778a9cb92f3a343e1f72e4f1429eb3271d4aa523b63919710badc52fc56576efcf639b779ce1768234734a348d00eec503ac4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbf7a505d761f54ca45f8c121d26f6e3

    SHA1

    386d0f13aec5071902460eb78927dbba67cc2637

    SHA256

    6e2d012631a274908058eb1069ed25d20114ddd54041c07bff9f03f4c62205b6

    SHA512

    d5c61072fc409f5e1be70e24d2a8696bf2eff637748ebe94cde3f8ac7b19a72bcf1e155e0f0669d458030f96cc7aa0c5f6f00bccf7f2fdfd57fecc866d500d6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    782755ccb103ab5624b6efbff157f5fa

    SHA1

    b9c85dbf451fb82ab726f72d8146cbccfe1e278e

    SHA256

    33fae94ff86e55d36ee457259561a2cf119135a6f702a342b91a0c8eb56263d1

    SHA512

    ad72c9a1ad3aff096e9212fdc2582a4755a931ba8ee6ecd364bf1044c6d8b57e7499f849dec56c2f90baa30c03b130623c2ce97e9febb04d37375b37e12883df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    876e7fc4f11564449162c35b9ba95031

    SHA1

    06d59a592d20f12543a84ef490d50c39af4656ab

    SHA256

    4afe7888d58f7a86f8c361531823b4e57eaa67b3a53a15b71be157920798bffe

    SHA512

    8c5c7aeab79b6aa56c140bc3e7f9ca7e82b4c34c5e1c672f3bc56a027a2422fd45c8feb1920b42a00e9bbf89692d8a8c90c090233177a2fa6402c3040b5539fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf8a3fa7a0de7e8e772229f7743bfd62

    SHA1

    4efc20e70ee298025e3ac150e17ac9f76f08de18

    SHA256

    33411e3959466b2c343121a3f27455a42035e32585f70ebc3770624d8517736e

    SHA512

    7e1d3cb99730898004bb561f304705779d9478bddc165d34dcc30d21b4132c5a3eb95de337f1d1ec9b48ec6a9e9a0a904463e46361450de47f4cbc156ea483da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e7f1e0cf17161cad5c230da60af44f4

    SHA1

    b2d6450bda654375aa14c2d18fa6c2ec7fd79181

    SHA256

    c49e05122f8825a6b5833ec73e5ab9cdd444c5666b0d074bf17c64f32ceef026

    SHA512

    bf9dd05e7380dc3994267c2296bc3f614a4712ebf0e30215f841945627e3268932e67220e763c25406dedb5703d406a4851344c2f8bff1a52a0de45977be7c12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10984efece853049300c319bf6c90cc4

    SHA1

    a2f71daae3b5589f25f5347dde5f66ef21823fdb

    SHA256

    53bb9bb09264a1b25fd0290092f38a48af0fc59f0608723fc364a9f0b5811a84

    SHA512

    6384dc6d9e260f58e8e1151b848eb466affe7795d424ff61fd8c31d94e5cfe5f768ca6119d57563bd27c394b1c58f88f9127e9372f20fabc5a91a6f860054f49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b0138098aa2b62002c3c534f691c23c

    SHA1

    e4bd41ae048d476e32611896a22cd6cd37ba9247

    SHA256

    c754c90a963c7130af63e10fdaced81b79722992974dd990460f3e717c1ebe89

    SHA512

    3e9b4afaf42deaf39f141ceaff48176711c832d93d9746b2f9e6d6f6f4a79f476734945d2ba27353339a370840f684ecd6cdac25dd235066a8546e0037eb68d7

  • C:\Users\Admin\AppData\Local\Temp\Cab11BF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar126E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/832-3-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/832-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/832-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/832-10-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/832-13-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB

  • memory/832-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/832-14-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB

  • memory/1020-4-0x00000000027A0000-0x00000000027F7000-memory.dmp

    Filesize

    348KB

  • memory/1020-0-0x0000000000400000-0x0000000000456A00-memory.dmp

    Filesize

    346KB

  • memory/1020-7-0x0000000000400000-0x0000000000456A00-memory.dmp

    Filesize

    346KB