Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 20:55

General

  • Target

    83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe

  • Size

    9KB

  • MD5

    83870fd4b4cc6dbbd71aa516b5c181c9

  • SHA1

    2761854d57c18d89b2dd4d6984c4dcb1d65c6401

  • SHA256

    380ab11290df67beb0da81ad31144fa3ab01f173c0c88df54fbce10367d72b27

  • SHA512

    aaed8ae72f3eeeb2b25f1f90f11ab371405ddacff65c2affafb60201d7e777ee47b2cefdd80845a29111f0cffc3b5c58cc2017f005de1cc47c9b90658649309b

  • SSDEEP

    192:kQ0EJMEbGhFyHJYqLTPCaiMyb75E+mAVuMuimqzcJ7ZUbRV5sf:kQ0EJtiuH6iTVyb75E+gnim3JObRVOf

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83870fd4b4cc6dbbd71aa516b5c181c9_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1880 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1858584dc4a665f02199d573359ec353

    SHA1

    24230510e348d4f41929fc9ca24ddc11a8937c03

    SHA256

    730b58329825a9e4098c63652ec74665cb206b0cf54f75a5b13e08792dade274

    SHA512

    1ab75b8192131fa3b716f905c8f54d42f9b73cd2628807ec6f195db613df4d59b24f6aa7f2771aafd60030d6627db00ee459fe8fa99397c264d16e6c2c71038a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    268b87ca45bc9e6ede9cc19fcf0710ce

    SHA1

    3cc619a8b073cea4c89228dcc3c9ef7ad7e7eade

    SHA256

    befe2bf82d6ba51caee536b8660328c7f0aa644681aed41190627d48b4d93b7a

    SHA512

    68e3df3a2e297f60fb61ad54158c674e6351bc8eca29232b6e5d564c411c284af920d9dda0a5990b79992fb88efff1daa7fcadb8fc1dc9c32b81994f64634e3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eed2a82f64277d8c3d75debfbebc18e7

    SHA1

    f06d35652f52f3b808f88da8eb5020b467b056e3

    SHA256

    6f6ba7238eec607bf8988c5384763797f4779aff02a5bb9d16596e6cc0fd8838

    SHA512

    836f3675a8a247c99ccf1a0172df4f53539ad4000734469f37814e16b580a819a19e3e0333aa7468435b0d690dde3211766b34841caf0b77596628033156142c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64f47fde61a8530e10c58026b3973b96

    SHA1

    4ebd553ea9384acb4568820703d7dc855b2c2e12

    SHA256

    01b3d05d561eab5d40e10250786fe79f8e504ca09c5d379d0b4c5644db15ee0d

    SHA512

    bed727c21e844b819075dbe9745c95b49bf7592b95fd997be8693005792e750e1119f966dc7aa78163aa7fa7ff29f61c69c7c8a3440670aa382c8c23aae7554a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37ceddc51a7e8130dbecdf1ef7ab35f5

    SHA1

    405c2700eaed685d51b57e8ac9003313b0bef04d

    SHA256

    7b1b4e01646eb64376bb6735417d6413f0586d867e7b9395fe7cfa46bce40add

    SHA512

    9ed9799033a9b72b549eec747257563f51b864dcfeb2d440c160e04c6c48e48a3b62692545fa414870bc0008a7e7566e23b1c71ff2269856f4ccd7a81cae38a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a01706aa73da708d590f064c2b781aa

    SHA1

    e91aa62191567861ddcdb6071ada69f0142efda2

    SHA256

    80fb55110d18871641106d2907823ec63eb0102c3c6b7d8d4c2896bde5bc7231

    SHA512

    e0a78824680835a335cc96b2f5da9af680b864ac95aaf53686c4aa771f1a67ecae4999f725422927c9ddbcc21bf40df03e5cbe8156372bfa5acae197c33510f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30e3b0ebf56c20799eb4469bbd373eed

    SHA1

    09564e914053b486799ee2d81fd21e3105a5a798

    SHA256

    2c3ff828b7140b353690484bd37c9f58b7c2dd95ab47f2ca73a66c5581f1a067

    SHA512

    d38937f4f5cf85d27247ae4dbcaca74c50f98f2a98f007b75272fb50e0ed904c8786d5878f2feddc8eee1ee1c8f3433e22e0476cdf478630abd7c7d60b811d17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5959ea28b51ec27a829cd01e7cd6451

    SHA1

    340324b550266c4e06a2b9bc8982ca9e0b49a74a

    SHA256

    f282e9d7de60452f0c36b80b79961c3da7c774f51af45195e3789fde2a91f525

    SHA512

    1de6909468caa8c49ce165e657900811031ed408aba5db49b698889312747c15d20ce4afc4a2ef2c4ef89e5995203c64662b6cc35d18bcb93a6acab6bdd8c4e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98fb8ae66523ea3a6fc826245c59292a

    SHA1

    95906a60691f037602f2627cade6a5418acb68f2

    SHA256

    602d507efeaba321dbd196f44573e1f16e2736c7f3b2ace883c9a67b92feea9a

    SHA512

    f5f4d1b9cb7a2a0cc18b5187170fa40ccbc32ff5fb7d1c8631666be003e19505ea23f3e8289b77076f00fa9b41ac8c85a7d814ddd711e8863dc8ee1c1f149215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79ceb04fecea449bb3ddc999996acb80

    SHA1

    a3fef052ad8d872d99c039b5d6d73da6d9f0f0db

    SHA256

    cc6b0eb12cb9e46c7d9214ff4c62f6cdb757a2715dd03a649710b988ce3f0d69

    SHA512

    1c38be784c1f2e5a605ae765f1387074893b07b23606ca3a71e61cc58e3130958422f143a58015a91b503b424ec2dd25df8272190493d7985cc68c39a2e31d82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45e0b70ad664dfbcf2507fa7a1c35e44

    SHA1

    f99c3b12138c082334220e160d1490f55f5aa6a4

    SHA256

    d662a9178fdb6fee39e35fd39455c8c54bf1c742a9d3e4d553b621691d765492

    SHA512

    26c4e096181b1f2166506f100cb6f33c8b37f182aec78920aa497588bfc5ef7303556efdb9a7c6cbf80523a35e0f44fedfa323b9e3abb6713920bfc954d81aec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ca12233ed6b3d0ed273eabb2d17da44

    SHA1

    55b7c04e213fbf5c165bb266e8534c6ec42bcbbd

    SHA256

    3a25887eb75cf4af47c4fe8b0f7d2cad3e79fa22c506f08d0f560a92fcbf094a

    SHA512

    e2e0092a52b54cab5941301aa5cab32c51428fcb2de8965739305f0733eb7e70bde8ca87b42448bbd6465fe7aa4e72681dfa77f199d8cd6a95719d1bac81814f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df83f484b5c3dcac5bd5a031273e0c06

    SHA1

    3ff76a4e32db4c74bd95988272476e1aa5ff8367

    SHA256

    09073d88bae1c7eef64fe95372c264020aef7196c8493cab3b33514a0697cdb8

    SHA512

    89e7483a351a6db64bac020acb61c9995ebb528e44ec16b18278cd47a8df6f6c4744e730066b4291344a973489420326bc248e9bcf9c842f4d35b66eb18f321d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c2ed6c6eb4c4b22a9aca43db8662e75

    SHA1

    d1fdb59d54bbbf17cb267ab2224a9cc6811de1e0

    SHA256

    19109e1f504aa3f657c36fb23beb0fd9bb4d16812806dafbbb86b4fabd49c8de

    SHA512

    46bf31592b197dd122c25b810f731741409a7d5be945db937f40d3f368b31c567087bc2aab6065d73e2a204e681ff6b36fbe22120cc740b1c3c7371ba610f4c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d0be9473662e27c01d521b9b267ed7f

    SHA1

    bf2e4e8f5bad3a47ee56465ee0af4a418d653728

    SHA256

    c3a243a9ec2a49f2f78e21579e9006b0741840e53b847659fe4b42787ff5c935

    SHA512

    8dbb3e218e40e42fd15f6c35ec49e33d803fd7aa76cff0d69367f4236ab11b89bd9085e300cc750de2ecf089517d9695ad374df82c700c5389e32f26475972f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7d5a862c3274714fbd3c9bc8e030332

    SHA1

    dd9af840a0b1319265dbd620463f809e3f2fbcfc

    SHA256

    72ecc65b1eebfc3de5688f30d15dea447de8bf9042e33784ce857984f82dbc86

    SHA512

    30132a9c9b244976273c1d55c883d2f23cce3997c625556440ab77176e7e3bd4448275314a06610e68d9cce5a4a8baa7f3ee5fb03b015be8155d83d8d25d8a0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    378b4f3c48566e01fc9ea74261768abd

    SHA1

    430604762ebcf3adf31695f78c5f95c946eb1c03

    SHA256

    edeab3e449f69a9db0005e9b1a912963feaf1a4b2054ced475c58ea2c6ee50ef

    SHA512

    8893aa5a24196a9a3a04cd1b5d0f5cf2635427c667d4105c91c7282bcb228109c3250c3024fa995246585ecf399edefe44674ffec36cf6d1d50f0f8e99de50b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1562eb5eae0f793267b1e9187f8fe900

    SHA1

    03eeab3014de6cad4d366717d9b47f2ce7a96ee6

    SHA256

    32c821ac89d156f3f74cb254cd489c352e0d3cfa1bd6f468756ed5eec9e3287c

    SHA512

    01a739db52b46e738bcdf5059c06e780df6f6be3fc53fca434f109aa1cdb36a65aba88e7270a5bd838c816ebff9d8af0276c4118d35a087f8aba2f423f0f30e2

  • C:\Users\Admin\AppData\Local\Temp\Cab27EE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar285E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2932-6-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB