Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 03:19

General

  • Target

    82d88474bfc26eec8bdeea050176294e_JaffaCakes118.exe

  • Size

    332KB

  • MD5

    82d88474bfc26eec8bdeea050176294e

  • SHA1

    11dc03821728e703f1039a33154e1a2d3f30c2c8

  • SHA256

    fba640fffd6753dd83f9e98ffc52113e73a41ea7dd5b8f76f5de88c5179e3bc1

  • SHA512

    2feabb1ac56e1b398fb3c841da7a0d5412cccd1713d8498252cfe6f8f00575e5051eca90716bc46f3f38e1d9f00b3973dadd2de619044241b5eaae22f5462868

  • SSDEEP

    6144:5lJUWR8kMHd6rBadqohqOhGdItdKsuKT1IhS5fyscrBLZ:vJdR8kMHdnqBedKshmhSFyNBL

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82d88474bfc26eec8bdeea050176294e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82d88474bfc26eec8bdeea050176294e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baisou123.com/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2872
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baisou123.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02da892796e0dcefe86a87ad695474de

    SHA1

    ecd9c933e35b0a57e1e194e2db13338b89398934

    SHA256

    1157bfef05c28b31e7a01666f1db310059c000e398876823af7d1006162e7126

    SHA512

    1daf9a4791c4154694400c98c55dd89d97e711dd191437dca7ab5028b12fbbc4c588350aca72ef71bb70a7825fbab94c7608ceaec0164083a5e83546bf1e4580

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f9885a3bbc8388d61316dadbd9b59a7

    SHA1

    d14273d857c6c81e7d8fdc4ba723b7b7dd892ebd

    SHA256

    ad5df50e7a3aad03e35971963a6f25935996beb3ed84a74a564f9a8cff93872a

    SHA512

    b7945d9192b7c0c716a3a04235f1c3033875b0a1189c9d494642b2ed66c65e208ea318c023185b2aa836a6c752c7252c1b36a3281b67d98a201e25e950622f59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2676ccfd37f043711c4b1c34ac2b6b4

    SHA1

    20edf67264f2fb7c48a5f8eca9a4737004eb0880

    SHA256

    ac9cac472d2817df1efaed4b70a367b98b204e34ee84642d6a52b06dbdd0a450

    SHA512

    25e37830da0689ca092189fbf3cf4142c548b1516d90c0d89f19ac33635c963326ff6514c76125410d3fd94989656ee0b541b48916f206c3ed1960bcbf9e042e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7beee5587922961e18e5b1f80ea71be1

    SHA1

    177f856abc15f504c216be0954a5fab34220a739

    SHA256

    a345252572e0e009eddff996f7356ec02f2c67e302f12f2ea419af53e37c3915

    SHA512

    134820ab7ed80b7b25ad4a1bc1c727ea8eba6bf40f3ea60c248ed5704ffc006f767580c26be3bd093cd1c53d6e89de84bc91243e7cfe6d530f7156466aa6ab6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aeba6552fb5acb165e9e15f1ffce5bcf

    SHA1

    42cdf3623b56b29b7754d43dc75643286df9f3e1

    SHA256

    548b4bc779ceec9592f764050e2a2e107e0c2d6167918f383958a6dd113a5497

    SHA512

    b5da2476929f2ebc98e1821a9bb6b80090ae30b345397e075d806fc4ee2314593152f901db200e4a0258ee04dd9837968a3916187bb1bc6dec5440f0a6088061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b95a9448e61221884d78e2ea2c4e3517

    SHA1

    8e9e4b3ea511f88dca3466bec3afdd608b290de1

    SHA256

    ab426f96975a6920ccbcea0cad32466fdd686261266da46c7074ea07a5167378

    SHA512

    a16fd8c2622be521abee6964a3a4b1e46aa8c74f87661ad09784fb1bad02b21e63a5e4b89aad03617b3407154757c7aee92b0e03f2947cf160b198b71d59a7b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0cbb7e9931178c22fd9bb3b2865cfc84

    SHA1

    5209b97949e5859f30989938808e028eef54a614

    SHA256

    2b1e00d7cc0497da9269dd7087d78c2538b40e9a9a550b25c2527b7f2ce5cd0b

    SHA512

    1d85e20c840cc02581db16897f30baf836f37743475f699c9ec634549e5eb9c474fee9e83658099c21886d10b6ef836d95681d0ad3bc3036c36c7847166a581c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84b1016d529cbc69400a0c9384e3d7c6

    SHA1

    50f0a38bd557eacdeb9c1ea2081bbd7bb18a02de

    SHA256

    ab2a412af86147e38f7fda037851133b996d20ad779b06e18aacd2ffc7ee4efe

    SHA512

    7ef48a61172994360cb24f512487a806dedbb8defffe79b5290a880cd1fff574db0eb74f9f2b99529b4256062817d0808c7055ded015312bf661e06c1f59c1e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03cda72e2cf3175661c8acecf6a870ac

    SHA1

    5c12d88ad965e5d955a0ffb1ff0519e91f528585

    SHA256

    50cfdf57b6ca639ae4ef041035e2dc762620a6d38b386289d22e43b862f1737d

    SHA512

    1f0ff49d878820ddf486a927b501a86b3b6f368d9aa814670df5d59c6edf08211897cdafc642049b55314d82790c70cee08a9057768d69c20e11aafcfe3bcce6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    deecc17e4c7252478817e3f4855095d9

    SHA1

    b2f4b7d9d6c393845df105981d9e5c12175fc58a

    SHA256

    cb22da21428e4721034793cc1b657db73bfecf7f0649bf516880c8325158de6c

    SHA512

    fba589c561c38c137bbd6282fb5d7efa300023e1e094f9bc5748c932863515b0b75af7b099b555207ada972c44a6e47b6083d62a425edb53c5f80b840b3bc3d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7458732cef375b51ed733a6937043073

    SHA1

    fac6b87ca97514ce509417ff11fadadaf3eac72b

    SHA256

    4977624a34e2c4288ecee36dfb787bfa317bccec3a1e64531844ce6b3b706cdb

    SHA512

    72c8a82fe5502b849db33e017bcf3b1a6b08371b4392aa8d7b8a831932cf778fff007bc9d50565ca45e8ed2544e880ee4af86a203c235c4439aa0ed593bb2f79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d50f67f4d301a5973c7087f91ff7f4b3

    SHA1

    4f4f3c4d74056a678f9d4156c796c1b8e83f0509

    SHA256

    0419b819ddff6346dbdd2f880cc4392d696b26ea4e534cd4fed0f4674a8acf64

    SHA512

    3ffb69b7c42512f8c9fc648b00c3cc1856b832890fbab3efaf26b47111df8a91c3abd0a48940fe88972772a2489883b43678afb03478a083aef57b31ebd509cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99e57f400dc0c7c6944785b10b7d9899

    SHA1

    5924b338160cfc7699d098d26885af1ace84fe37

    SHA256

    28584f91c57ccf3ee39daa3fc0f090015a281a9856cf5a2c3459fe5d2dc75eb8

    SHA512

    f657e29d6a3167343ae5fac7e39744d685918bfdd6fff9aa43ae3285ef4d31ac0105d597d43cc489987ef06c69f38dfd5ff7e0f50037be626964949169389d20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    919d310084d46a1d863f92c39d043f0e

    SHA1

    77ec2d9aae891760d7292dcef86b3b8b6f55a575

    SHA256

    7931799a9d3fb52cf2311fcf1ddd73a43d039a988afe0d15379f8ce24b2d2582

    SHA512

    6072af426bd63fafe2ecc3c31586495d9abf09a2e1fa7538218541a8919612225e910ce3aa6889a4f7e03f04101f1dc6d4ec298e33825f30b81efe9825da310b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9607b7e88e18e43734512f88781f98d

    SHA1

    4d7037d0853a9924fc158a8d6d27d4cd4e9557b9

    SHA256

    69ffdd97867e7d66d96a2d353f07aca29867ad44b9fdd8cde9072099c77e9684

    SHA512

    fc5f021fda288971530fcb5e79214177a8da8e2694e4adca3d915ea845323104c9f4f545f24e797594cf3dec7c4840eee7bf6be7c2933a5265bfc63f1992e6eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dec6afa5683e1e3e71b32ea534a72bd3

    SHA1

    7f71ea94c372b7810d0de69568c7f5ad9a79c075

    SHA256

    a828c0ebbe22530caf2304d9de9ca0884b46688b8612fa5451a146db84be57b4

    SHA512

    ad2e1d0c6265268e2ac0907c9aac1cb56234a83347b8ef797ab03c7cc67cd2ac9d0a8749a2e833cc845a5adf99948babc8dc19836ef8e7442c25363ecaf6b368

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23a6e42f44c01f38d13b12558e0be049

    SHA1

    483f19670df132af1a23d277dc56c4f53fdc6f05

    SHA256

    c590a67a197cf7abbb88c5ca2a1ff0d5342e25556c167191bbaa7eabc7d83e6d

    SHA512

    7982d870e20242fcdb51dd50bdef9be37e17ef58be0cb8de6ee125f5aec0a0ddc65cbe5be3bd18d0b5d4eb1dfddcb5363a6eb8d2cf30b10be261712caa802636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de2c4a70c6557d931d0183eed5cf6ea7

    SHA1

    f01b2c7e994419bedbd7acafc1bf2a901c4092f8

    SHA256

    e7eb92a5a12285e0e0e9b714f8fee5ee7a4a3d7447451367a55e9607ec86fc65

    SHA512

    30b8d2715953879ea22574c7901551da8ee7734a8276fdc65e739fe5a7a13a1c4c8aef0c83ed849a1bfc96d0dcd6e494aff5abf0d3fad0a1f5f74e7b50369e1b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{183EA9E1-507E-11EF-80ED-4625F4E6DDF6}.dat

    Filesize

    5KB

    MD5

    4c95c0d2a886d05d3728b3752aa7aedf

    SHA1

    7d8c1daf050b88ecd17fa5e6454dcb176cb38f9e

    SHA256

    0ac3ed60d1f599468eb00303ea8f4eb1cabbf7a85602bd9083a23c09860e121c

    SHA512

    7190b57ffbc05238dff57ab623d6c3170c30b57dbe5e69285c946ff9f5ad70580ed69685bfb0a0b00032cfedab3bb3f0b5df82a91c6be7e74c05ae22cfe60d75

  • C:\Users\Admin\AppData\Local\Temp\Cab3FB2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4032.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2776-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2776-395-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB