Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:03

General

  • Target

    81c3f3969b5b480a96d65db7b5064a18_JaffaCakes118.exe

  • Size

    37KB

  • MD5

    81c3f3969b5b480a96d65db7b5064a18

  • SHA1

    55c328279f94a0ded3356a9b878aac07c7f0b3e1

  • SHA256

    b81a7df95cb2adaadac50b289596bfdd993b8bd88ecb69247c45dac4d873e96a

  • SHA512

    5fcd31e0cb6c9f7d19a8bc1804d590e558a4e260ff9dc7dbc668a776ea3e67911d38414d94cfbc6a4d54dfb56f529ba57e41c6ec34dda162c645632821030b50

  • SSDEEP

    768:OMALvzQQzK6+mAm+fMCvM5Qg6KM7ZrgZQK7rexCkDjT1+skY:OBvzQyjHWwQh4QKGxCSjTZ

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c3f3969b5b480a96d65db7b5064a18_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81c3f3969b5b480a96d65db7b5064a18_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2740
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\dfDelmlljy.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a1cd98bf403be4d8b74b6006bb469e3

    SHA1

    a80d659efc1a05a6d44d8a53ef1ce1d8a54dd042

    SHA256

    a0328c7a47f5a270d8198e0cc1a167cabb21d2290fcc40caf2f99881968ce454

    SHA512

    81a404cba94e1a6f9e3cb94abfb52e8269fae741319c7e1c85cd4221a99c9e3ff308779680e17465381635457093d3779e017e74dd1c8181d853337c875bcc24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b9a67a9ebe02eca36ccfec079d682f3

    SHA1

    d892fa2bca4d84117c0361abcaa527a6a9440ece

    SHA256

    42dedeb080f927dfe97c53ff26d46e29e09c3769f159d2e1b9dcff09cd2b1a5f

    SHA512

    a5c1071a674c143ae2f7d4e2d19b4e794e9cfcb07b0e00d04f93fbfcd672dc080adb4f0b7c995c642b7d4cbb44330b33f87335a45442b4846a4ce86444a4e06b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c2968d46523b8a968731c7949ad8f63

    SHA1

    a54db17f5afb7502e2f7bc6f46a42808b26bf78e

    SHA256

    ef26e3a549c005549ad7e9810366d9137de268e3370eee09de92a31bb8b7b09a

    SHA512

    7212d7cd4b2050b5b556af53173de12d93c3f9e60c03ee2313dd2fedffc6127e653b7e4af1469cd6b2f90d47516654e688272f06f002a441a27ba354ee17e83e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3562e4ffa63ff0c8bc59bd3a32b6ac4c

    SHA1

    1adc3407c96bb9213c873367657708adae925b76

    SHA256

    22e13340d634694643f23b377a29f966c46f9a1029973f033718353dc02d9200

    SHA512

    80c37c43720b7dd80640a442f427c390705eeb7f36f856b3e09eff0d88c5d8ac1a8ffeb34d211452dea93a5492d42dd3e79a46c50e5335fee80ee3c149cbc3d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7043feaa74dde45ce524273f1b200311

    SHA1

    b51fe7535fafe8c832821310db8ecdbb1b997a63

    SHA256

    ad4609fa93ea95e287d674c069b85424ac7c127cfc677904a66a9602c9bc80c9

    SHA512

    0a75325e4fc01f5fa294b6e29f06fd3943f778a810410258effdbad95aa54eba0e4ecd803d9d15722cd27afef3518117ae30b50bf2e7e29438ca57728b00419f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b068dcaae2503a9c9b7deed4b8540c38

    SHA1

    d590d765936fe3b86f493bd96978b91eddb28647

    SHA256

    630c926ccb493b5edbf21da81a1a85af2463c70c0207d3c063daa3374e1bf21d

    SHA512

    956441484acbd772fbfb1ae5fe02dbb3f685251ecf92ffc599d6ca22e1a88b446e79ca6ff4af3589e22e4cbc095e9d104e010eb636d6addf4c4e50c6b74d0255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acbd63a0cdcf824685d3cb4996ff5aec

    SHA1

    d73f075b14b900a389052b150577d879b90a4159

    SHA256

    016868a1c1933b74c6943a6f686f137622807566781b7858847c66c072023c40

    SHA512

    6495a86a84aecdcbbb26b14a4e8add8ed58a3e94aa7750c7067bb9f5c582bdf73bbeaf243f07518105dc939efe7032977cdd376ab6c8a1e1e1588004105bf4ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4abc5ac94d89318cf4ad6db9281ae422

    SHA1

    db4dac80427d97fa894babe367e517a3adab8d11

    SHA256

    5c240db672e5f8ee7c7f9cfc532b61efddc1239afb4ee3ce774a0e0349aa83ab

    SHA512

    66d525ad45f0c8227528aaa6f5e7af754153303d81540b5255acddd0239795cb062b51a87ab6ad27521bdb3f3e5364b45630cb73794a1b3c4175b254b6ee7dd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a8b88fba52d297a59af872f55ff5dd8

    SHA1

    aed1f24e896f479baf3eb488fcd2569dafd11c8b

    SHA256

    45bf0d78a990c3b97666f7c9b45eac5892607cc0493273c2cfdfa5aa6eeb32b3

    SHA512

    b9cd3a8c656d04d40f0652db5c77f7cee9ebd97f3b1de1e22fc4bee52c4c00e5a7b8ac5fd26016b18e6e03754763aa5586e7deeab6b494021d177ac395873916

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82d90a1d07b9e9af05713eac805bedae

    SHA1

    c187aad876fe4589818e1681be9d9635371499b2

    SHA256

    177418d010de0e3389ae7f89b1d23e68f1e14842a61cf81ad0dc9106f4d68005

    SHA512

    c6ee1f89d9dbcc0b7d21d54ce3f0c111b9fc046cc770609d8a1de712113d015d101c7aa3416f73b047c55c4777151fadd962bf7810996700e006bfd57d71908b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4367d3b4c50400b8092232cdda0e5735

    SHA1

    e0c51c3fe983381d3e637b808a3199f56abb69ae

    SHA256

    ed1f273949fa74f47fed890024073a8dccefa7b5e96e6169c44e3bd4d39a99d9

    SHA512

    4809df9cef65681fd0473cb1fdb50a22948bd42766c0d9e29735dd24a50f71b984f33c2362f9075aab003e60b1bc7866296924bc2cebe07ebb9661b58714df0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43bbe3d255f6fdb60434b24aa101e193

    SHA1

    dddb81d49de40b5a3cbb62ef619c3d27bd56b432

    SHA256

    5a473bea4dacf45c67b7d236c78d974057c6aac6a2cf3ebac2dfa07225f5e938

    SHA512

    30ad084284d6a19ae4687b2613a788b4dbe7d26ad531bfa65f2548f4af660231e703b8112630e1aed6fc9e40acfa21523eb093ff5fe1f99901c6371108a9c982

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c372cf68a04b612467016fe5f64f652

    SHA1

    0901638a16259b8e122573d58a6b51eda76a05a6

    SHA256

    647df4cd737fe92cccc26374205ebaf646fe7ed28363f09889e55324bbc0e590

    SHA512

    7cac2b9e760820aac0fe8b7459cfbfbbed322f04e73b3d34c9b02d174386c2dd17f7bb4ecff6e37160ba3e17c6412f14c7f62a7decb528208f473d3dc7792d83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfb94482bb9d00a30f6c2a4fd30fd3ce

    SHA1

    41718d74bd7eef06d15223c5a5ae8f113bd428dd

    SHA256

    287d7460765c40c7894dab07f0991c6cdb91b1c49559992d919adbb088c9506f

    SHA512

    62233229feef7d494f1bfd985ac00a0158551de433b44b1e207f0525b45dad82cf68fd7bf196d26106b34e6f818c8ffb63934e4841e2b36a73390444a6ab92f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb09ab18fba5b3cfb918b6ce6111265c

    SHA1

    3ccd7a801e84d5833ec152dbf80356244e4fc1b9

    SHA256

    a8c430c75cf344257c105c9a9ae4fba16278fe8cc669cd258a57e37544f1a739

    SHA512

    5e11281fb465e7313c0a8b334989b0fa08370a0a6b4026496dfc9befa4294a7f0a81be20be547409ae65d9d1aa3f6e0d31e690c899403a609be2af1bf3efdc3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dacacbf8f926cc6a76454fce35b827cb

    SHA1

    facccc985d60e10b59e87ea37457a4117f77de96

    SHA256

    877a3937b24ca96d74954aac831b88154a47a1801c14780c3272516a0f7b23c6

    SHA512

    d037304503798bb81598a63e9807efc399f2325376f0f5ff3f18177fe98846c300f25f1e80ac61b7ee7daea980f62d9395500d5cdf5e731afd4770ea2a5d8aed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    857a021cca6bdb48b202dba262fcc530

    SHA1

    3702c9b1240c8192957e850dccfe0697c565e044

    SHA256

    9a0783d3b3422eb56bd33d6bb4b5cb3d9812e5def07bbf7beaf3c8584891670f

    SHA512

    1a23b07c5da2af24c8eb69ced11e38e688fd9caa4d5d2d2dc3bc7116c53a00b026b721237a6aac2b9b57db1450eab8959d97cb33baa0c0f84bd55901cc19ddda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b787a60cf0b8e2d4b03b00a65b279cf8

    SHA1

    c9c61eb086b5e8a65f88a8802df33f8f914e2653

    SHA256

    7c0700cb85e2baa0d32391c043431ace40ff542cdbe71eaaf939fec94cf3f3a9

    SHA512

    78683bddcfce74b337a04cdc2803af88e8f5411908ec01306c4663561e8c17d5fb396d11a05102906b0eda5271f475bd56aa56f3ad2f122cc3218a8601af5136

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11815b7a8a572b6842fbd0b8c770d551

    SHA1

    024265a78b0803d751c351589df967fcbbb5596a

    SHA256

    8e055b32246b760699689a63535eae29aaadcb41137c2bd06556bfa809384f27

    SHA512

    524b91c09af75550a2b4de4aea44f534e4b6ab79dae91d278ebad6d752a6e52748ae671f3e22c7a8b0c401c6a1ec80c23fd513519bb92de74d53de1a07c3f6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eda6e160212e3e34d05ada52d08ca3f0

    SHA1

    43c7348d92e4f60b87aba6e0fc3179236450baf9

    SHA256

    f5a683317d320de30aa8a5dd64fd5a80f2837a00dddca98e5c9440c88b7915d4

    SHA512

    9e328de7f7c7290f775e33ac1ad8ce15bd81a9302bd3d3b3b2ca264749019df070c25256705b0b2fa0944bf6c4d160e439fdcda4b156659034fb9e602aff9e1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ce469dce71ff70c49aa6039017a6f42

    SHA1

    1b18f84ca735fc983c7c856a81f929a179d818c5

    SHA256

    582217073cda82141a268165ce1e1a451d4d97f3b55bf83f048367dbabc99185

    SHA512

    84e87ab5f83db22762de22e47d6086b72a0a19372d2126cbeaa64bd717f999c16752671fc313ecc3f7987e48eec31010cc5b2355fbd4f89ba7f446cfa3c6027e

  • C:\Users\Admin\AppData\Local\Temp\CabA40E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA47F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\dfDelmlljy.bat

    Filesize

    233B

    MD5

    748c457c35bdd64e7e0eda1356837767

    SHA1

    95497d2240b2c8e35796dde9c380daa65b69eae7

    SHA256

    33ea52b67fc5a556340085e5c99ca8d867a027933575216061eeab7533313a51

    SHA512

    858e82603bc86b0739201121c4b8ad3ea14d9e60c5c9a0109b0eb63863f2659c9ff8523188dfd6353a85d385042d954a0f0a32ecfc5c6d0cc3bd6f7c3a48c6d9