Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 12:35

General

  • Target

    8612e1250468477385b1c0a0615f419b_JaffaCakes118.exe

  • Size

    416KB

  • MD5

    8612e1250468477385b1c0a0615f419b

  • SHA1

    ffd61e161a1d2a6671caa71916bcf597713858a4

  • SHA256

    5f9d8a6fe993ebdff7b266d8ee24d720fe6243381dfe7cb66ab11ee73c3563c9

  • SHA512

    41fb9ce45ff8d7c2a5bb9ac0551de7d7a0ff56137390d0d2482e4b96dd2665b7f42d58eda2a173fcbaacd59a793a1327631255dfb303ae1f64abfe5cd35397d1

  • SSDEEP

    12288:nvRFi55LuGwFJQOnAJdWkW0Ht5BmZUQeR3Sc1Vq1Ttj2WAndI:n5FivLuGGJQbXHoA3at6WQd

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8612e1250468477385b1c0a0615f419b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8612e1250468477385b1c0a0615f419b_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\SysWOW64\ctl3d32Z.exe
      C:\Windows\SysWOW64\ctl3d32Z.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://ads.alpha00001.com/cgi-bin/advert/getads?did=1077
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1296
    • C:\Windows\SysWOW64\cmd.exe
      /c C:\Users\Admin\AppData\Local\Temp\~unins9968.bat "C:\Users\Admin\AppData\Local\Temp\8612e1250468477385b1c0a0615f419b_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67351756ed5519e5fda8965962ada6f7

    SHA1

    391141b801a275d3fa19ec8fc97083cb9808feaa

    SHA256

    cdbae608690651575b2b53b6b836438771f47b2dc73a7850257068a916c316ef

    SHA512

    c71481ec518b45562e0b5129b017d7ca990247a8ee69f01dbbb12b3548ef18d18a9d766342a5c565f4da531cebadfd18f5427c5f8daa119230334968db43b2ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b355a37c0baf0498ffcf3001be5660ab

    SHA1

    86de952e0a9af5be83cd7975d5bb7c8d856bbe34

    SHA256

    c052964947ff3ec40c11772ff64cf3d115ecb626e1fe357069d2506ed9531537

    SHA512

    be8efcd8aec849c50f136a52c03e94096b4d8631e57a97180338c3ce29eb72e4b69cb7d11f98c2eaa83edd09574ce1564ba79eac4c44465c6a16695eb9295ae1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf8b29a6d34065c3f0e350b979dcb9ab

    SHA1

    351d3e53f36ced6d8b179f4dfb19277ee67a522a

    SHA256

    40a9758eabae8563b621205e9cac21fa1fb68bfd6473bb47de13de2efb493a09

    SHA512

    1134202b132675e5ea7174e5f7f14a1df680da7ff15276e172a6273c62170b65accf822ff7aa5eda101051d7c67efe946c67d710c08d0223dfcd0f15713f8cf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fab0a01530960046c4c13ab07decb18

    SHA1

    415b57dbf3cbb9d7b47dc64091fbbde5189456cd

    SHA256

    11ad6a0f909ef98e0851f45c9822e4f2c841ad17b093485085e2ccfc842a4fd7

    SHA512

    742972fe89572f45ec76f945862bedf5c378463b817b57d774e7d2ed3d389cfc305e189aa0696e02b9d5de60ce11b6611a03307763d4244725d91064fccbdc7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74e577479bfacb46cb1d53398035c437

    SHA1

    f5dd815a6ed37b4f56b757c18760080773537629

    SHA256

    503ecff9bfa8d964f94f5e2c80fba22ea4bd2d8ca6ddfc9fc6833fa1718c8a6f

    SHA512

    bfae9c49946e2e011df2059e55fbb34fa1d402d9dfa2cb0cb30000fdbf1c9868bdf18d10af82e9f9bd35e6a9327809ff9e44b0c36453675c01dc26e80bf8b97e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4632c1edb7891f14c57806f9ede2278

    SHA1

    8c1dc7878bb16ca11424bf0bd300972c622b08fd

    SHA256

    9941fa47ab0ccf49d00b533f6b7842f651ecb2faecd9e7cc2aeb81d181a4c716

    SHA512

    454bec110dc6de3544bb594300409e064047e38629bae0d3b562dde2215ada7080a6d4dac938e01efe31aab0b6e87a52fbb097dd1d2d62174337ee289665de1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8a686c605128687e0e74ce5e92c0f14

    SHA1

    594c3c01b9bebacf86b89c68ae9a3e733e213319

    SHA256

    a27b450a902851fe626eff90813b9ae468fe851a8a2de64c3b7025a97410026f

    SHA512

    9067bebb6739a8f43b5ac4270eccaa383533dd33989afbdb3e2d63081c3cf7b2ed9966307c6fac47beb0ea245daf97571ce82079973af624aef5a0d4032d54d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf52703d8d45a4c2407c67cf2e31b422

    SHA1

    a7097c36f1b598581859364cf979fea8917e615e

    SHA256

    0f33c656d74d8431beec36d01e382bcd4023c6adc86e18d38e799b5fd0954d68

    SHA512

    8ced03e531b6a938e3f670413536aca21bb959dbc4dcb946e44d3643182659a635c751f65f921e54f269fd60f477715d98c450383c6656815f18d2e547b1b987

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97d58f25aed88420065ee9bccdc43571

    SHA1

    e3e7175c05fa57fb923c5d4c80b44b39e1d10080

    SHA256

    b632fdd16576c4f1e2f601105d926f80478d59e776d45e7e1a296b8b4c2f6fdf

    SHA512

    758c38a4fa4df014583b07cc0bb1e87b5611aaa89c0647823722f75359c7da7aaf16c433a2b83dc4624482d95b0edd9f1944ba102f8fc3976231b355be54d331

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    550b1c832355cbed913c393be32c274a

    SHA1

    0851ae3195af1f9fd9f0396cca3c21b857fbd40e

    SHA256

    75fcc97f2c45093cdc2fe8761a659205809adc443e8a01a174a5e509e7abf80c

    SHA512

    8a5b524c796166bbf1609e9a7435c1503866fe1bdc25d16ca586e42ba3dccf0f3b5db22886d62d11ce5378bab944256665171a66456e5b41b53086917689260b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59f5ad89ec722d5ec9ef5b7758c447e4

    SHA1

    1978d4c21dd79feb2c5a9cefee842bb2d8f11b31

    SHA256

    97a898e84f958de3f90aa32e239353bd50d997b16c02830e27666a7bff76f314

    SHA512

    735f683d1f17be68a61fa3950ea74812cdf7e2ec899f70119f1665281b47c377e9b0ba01ede2e6ee7d2a833ab5cc0523a9812c07240293206ca2dd1196073292

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    422f879e9cbff1c7da0fbabfdd473924

    SHA1

    1d8f921f6bb601b16578712a7685fc24badd20bb

    SHA256

    9f75554e36037b861048823e866614e3b3fe7b583667048c3875acb9e672b6cb

    SHA512

    2d4acda8249327964fd963fb53cef84ef4d14e9f2bedb0498aa986437827c89eed78f435d833fadbbc11e16b7a20358a44c7391928ae8510fe40adeb3af94794

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63a36249a7b49e83403c21d65597ca4b

    SHA1

    5a3808520efc636e6efeda03d9b3af77c7747c4c

    SHA256

    38d0f1345e46491b20d3e378dd581f571ce582f6667a014ec004667f6ae2a89f

    SHA512

    1ac95c2bf7e06a4e00cb3d5ea4c8d1de6a1ccff3dfa7332c110e91e6497c944d0aa704921b80ad4f33d28f600992608acbde61f5a06eff3e898dba915583dad0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5974da05aace1e7ac86f9579ae6c9883

    SHA1

    f91966c1e89849c1fbdb215e77c13116ff82bb5d

    SHA256

    badaab870de74a9cf3bc112373c4712dd2216c63bcdb6176d5838890828f029c

    SHA512

    3e35cb4c6384ae5710ad700082d3f2af68a603128bd93aff1020a132b88b7cdb4972fc70f3e04a907f6f34c9a37c441ca5fd4ffd52eb131723cd692b662a24d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32d786ac25e6fddc9d0ae50461a2e7c0

    SHA1

    77caf8212d4c20e243dc09e3b52f99ad2c1cc78c

    SHA256

    796c61b86f5262d70dc43c840d3b5d9dc83404cfc081c201516e7111c150246a

    SHA512

    705da43620c3e60aadcde5d2ca14536448d5b52e8aab8b83ca19b89dfd28371a7b8dfcda6f726cafcef600d7a37a355b6f522cf2dffc843501351ffb656e68a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ff3affe065500f0893d92c45bf48b43

    SHA1

    5a76fe4e9af25ca4549d020195c576a8b59a2f30

    SHA256

    4a33234a4b4532e1ef21e39b017db9a1a0bd48c4488d0621c752351a5cd4502b

    SHA512

    becbd305dd3411bf0fcd5d30a6f3597035f5a9c92ab968dcc7f9d1841915300d3b873018aec09cf1ccf259f88f0f201ec1cd7265dca0d5975793b6fe0bf9272a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1358173431bc6c4a981ffd12cd6c5c8a

    SHA1

    04981a4a78a1a078c2a9a868ebee2e1fcdc7f0eb

    SHA256

    ee715949bc4f07f68f6364fa0583f1bdb618dc8072374105254b21d612436c08

    SHA512

    f051223e5b086816a403cb9d583252f7e2ab4d62099b8bb623ff7d885fe0015c688e213af778fbab51c101ac8018face249c6ed2bf8e4f90ec4966f8f5ee336d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1727587b3c2cfe781b434b59c57cf373

    SHA1

    4bda16a932434b43c96a514d515566133a8fd389

    SHA256

    d770353bc434dd3092062069093d20167da78d45f2e6a641a7e7198783e22730

    SHA512

    9c370aab8a33beacffc18ec1ef2143ef1cf20c48b37c7610c806b20e6f715a7d3324ac2e6256d15c028c152583d788b548114e49f65ab37ac3e3924e3c000b1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7431e583168b29ae4eece23b68bf144

    SHA1

    af507aa67c844afbe8d64a2d47f6fd730bfba274

    SHA256

    3bcca6cef906d3a1f0f838995aa9ea78268d62a91b0abc7ecdbc1929609c5ee3

    SHA512

    964ae6c19694aeb17db4df6d63bfb331c390b502adf92be20ab09c664f2810a9a4569a2a51746339c7c381f1445b10efe1a31187dc15c3519efae59b81acee38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b62df6bc10a172a76dc3cc974680596

    SHA1

    6b884809fe78666d33c8c309a84dd788b3d7b767

    SHA256

    c24f3f373272d94be87e2cf2fbc8e139ca5edf22e9631a56b6fb41d729a6feba

    SHA512

    afd279a1d22ccdbae2a01f6d00be27c9ad84671b04813aa0cddeff32ee49d41bd69da10a695f53bc7978659763f299e4374d95e6054f308227d06f0ef3e447a0

  • C:\Users\Admin\AppData\Local\Temp\CabBE05.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBEB3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\~unins9968.bat

    Filesize

    49B

    MD5

    9e0a2f5ab30517809b95a1ff1dd98c53

    SHA1

    5c1eefdf10e67d1e9216e2e3f5e92352d583c9ce

    SHA256

    97ac9fee75a1f7b63b3115e9c4fb9dda80b1caba26d2fb51325670dee261fe32

    SHA512

    e959cc1fd48fb1cccf135a697924c775a3812bab211fc7f9b00c5a9d617261d84c5d6f7cb548774c1e8f46811b06ca39c5603d0e10cbcb7b805f9abbe49b9b42

  • \Windows\SysWOW64\ctl3d32Z.exe

    Filesize

    145KB

    MD5

    d3d49feed1573d4d7c31a12c32c338a8

    SHA1

    f4f47062016ce0e489ee2a98268c55830c86dd2e

    SHA256

    90e0730422c030b69b9e5f461ae488e91b1cc3a803f041b86e1bedc37f311bde

    SHA512

    89f3f9d83271f28794a8e102996e96c8a36ccebfbe74e9fced6cf2065b11ef09c32fa3b1ab80ed01f6636d20d62346d6ec47ebba85898106e7b7a5f30baa46ac

  • memory/2308-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2308-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2972-459-0x0000000000300000-0x00000000003A6000-memory.dmp

    Filesize

    664KB

  • memory/2972-0-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2972-460-0x0000000000470000-0x0000000000478000-memory.dmp

    Filesize

    32KB

  • memory/2972-458-0x00000000002B0000-0x00000000002F2000-memory.dmp

    Filesize

    264KB

  • memory/2972-1-0x0000000000300000-0x00000000003A6000-memory.dmp

    Filesize

    664KB

  • memory/2972-20-0x0000000000470000-0x0000000000478000-memory.dmp

    Filesize

    32KB

  • memory/2972-5-0x0000000000300000-0x00000000003A6000-memory.dmp

    Filesize

    664KB

  • memory/2972-4-0x0000000000300000-0x00000000003A6000-memory.dmp

    Filesize

    664KB

  • memory/2972-7-0x0000000000300000-0x00000000003A6000-memory.dmp

    Filesize

    664KB

  • memory/2972-6-0x00000000002B0000-0x00000000002F2000-memory.dmp

    Filesize

    264KB

  • memory/2972-8-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2972-14-0x0000000000470000-0x0000000000478000-memory.dmp

    Filesize

    32KB

  • memory/2972-893-0x0000000000300000-0x00000000003A6000-memory.dmp

    Filesize

    664KB