Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 13:03

General

  • Target

    86282337242629e73c4693b601c7fd60_JaffaCakes118.exe

  • Size

    150KB

  • MD5

    86282337242629e73c4693b601c7fd60

  • SHA1

    1d296f20f2121376622f37433aa15c5221d3d407

  • SHA256

    9bbad35921675083c62d907c76a35a39cebfff12cc221dc186002a2ca21d639d

  • SHA512

    ebdfd09d59cd11cdcac1b5a2f36ba63cf6b08f542ba87e5533204d84f84f42b8504fba62a516ac033e311575b3df932ae8fc71f4a04d9dba4dfdaf175e087103

  • SSDEEP

    3072:nhFXUYwMfLarzbekew1db4kIzsTvbcu8gG/OAV8rDITrbPq3ZjXRNFVx:nhRwtekewZ4sHPDITrbi3ZjXRNFVx

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86282337242629e73c4693b601c7fd60_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\86282337242629e73c4693b601c7fd60_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "C:\Users\Admin\AppData\Local\Temp\tmpE4C4.tmp"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1196
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1968 CREDAT:537605 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2760
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "C:\Users\Admin\AppData\Local\Temp\tmpE561.tmp"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2136 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3088
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "http://www.easy-free-sex.biz/"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3196
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "http://www.easy-free-sex.biz/"
      2⤵
        PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      eb34a71f39688c3633dfaa8a9c8c87dd

      SHA1

      6beee2c06b9fd1f1f257b0866c6ad9e821c770a8

      SHA256

      774bde8bc0909a6a0d5bb31fc861fe888faaeeed0fa6e597cbde023d558b52bb

      SHA512

      b8ca1328727449b05e4adaf0e7261b20731ed3ced86224067f025456660208b40c1088ed349e0cfe1027fe63c2a880967d3a686c162beb2464bb970c0b2e5723

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7bc095ecc7fb341398fac8efe999b840

      SHA1

      fc7287217bb0f9370c8f9f4aecdd6cf2b61dadb9

      SHA256

      897be1277f9d049352d4334fd5fa7206c4f666b72c7a02726189c97dba13649f

      SHA512

      b7d0dcc5cd1865391a26d5ee8e1c3fe064d6a83b7fc38542717608d312a03d58a990e6010a7b6ec4ad6a97f8a7ad2f4f102dd41e37b7a17c77c00a0189197bfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1609739b708beabfc4ef197c41cbec6a

      SHA1

      72b77dcd46bcc8bd1e44af9edc1106cb61c907b4

      SHA256

      ffe8330cb9fc256612d376683d8193bdeba245a4c8e0b30015fca59edc803f00

      SHA512

      f8886c687a4605b6b290504cedb43565c882d09105f32dc203a274fcd60ae63a651e5d09e85733cd2d2939e5b7350b12d72ba3609e0db50f201936412fb57586

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cfa9f0679344133922d8a4a6e034f556

      SHA1

      06a698992e90fa6781e6eace95de06b18b49e298

      SHA256

      a04022de975fcd3facb6318bc370bc380ab76c649f4e10d6f3f51e804bc826ef

      SHA512

      27c73dad46f2c9df7ac51b5e5f8572e83952df75992d8aac743c65311cb928b08c48d95866213e27dc378f5a27d08a8569da354483b65a40afb114e72e04d214

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e9cb53dab8624c7a2f030f15014e9ce3

      SHA1

      7ad2764f302f77626e36a73ca03db223b9a35510

      SHA256

      4f284ffe08d51be3b5142f860c37cf7d50059de336159763dbc118a592d92457

      SHA512

      c17d70bb40d25bf7b13d70e11aac6eb2df591a59d93ba6e6ff615bf536ca8799e0094ec4daa317926063403dbe01bf22631b643b4d99447e8f9638f43fc720f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      166b0534045f0e6636fee3ac92051156

      SHA1

      b4cdbcef147abe557f66b04b4b561d8b9ce335dd

      SHA256

      a368e2869b292611c04ac09adba0d430ae06c703481f313c693d02c2d1d323cb

      SHA512

      c5e92eb478c7ffe75b38f64a5b52f8eeff9439ee406edc8d209a3e8a9b3190d98bb000b950ca780b300a65d441b49b5d3071cd319e6d11c6a7a3f025c0773416

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5d619c6fcb27f1133289de7e9351852d

      SHA1

      6204f621c08eb068f4d0c5d405484a52f9c4868d

      SHA256

      be4c2b2711acecfc487db5f4d326031f240dd110bac91f7a05cf69c91205e29d

      SHA512

      8bac15041c057f4bf2251529e8cd9d5e1fd172abfe05a5da73d50ac1336f10c58cbda2f446f1b6f166b0bc482e232130938fab113c9df290b92176a6b6ca3d1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0840b31591fcc005e96b2f65b7f27d78

      SHA1

      eeee4cd00d90bfe8e5cd08dfa2d5d8eb2dbc6008

      SHA256

      3d368da26b77f78122537021e9031a077b9b9f645c84aca35a3f2a7f3357933b

      SHA512

      6b430d3b38acf2f6121649e03e90ba14dc92c6350b466fab21a50cd47b0ac5a8e56cb302f69658ac129bd1032e4b964aa78c5401fdf5fca6ce43375c50f715ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2d919bc2a47f1d4b887d0de2b31aaa1f

      SHA1

      996d1ccc70e8c379187363997c8c830e642ac030

      SHA256

      108159d8cae23a822ce05f483157eeccaa7b6adceb3ead64678b53931d4e35a0

      SHA512

      fed33a324f61598bccffa13d67aa19a3ac7e59d129880fddc8887f5d41e0bd77247f448d027d6b1765df74959b0acd2cc27502d2e34d75d4d96bd429f56dc750

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4af713e6e16c68ef60a7117aa1d05eba

      SHA1

      8bd62981a93164e7590959acff431292b6cfe033

      SHA256

      956a6e1b7d0df2c041ee5f4acd99d31b08d9f56eba13fb14d3849457571f84f7

      SHA512

      f5cfc0a00460756b44ec8d73dd2eb69d0c97ff12378448508fdeb83dbd8e2fffa8b36430c7e7d9851a719ac834c3f0ab1ac8f0bdb4ccdb5fdad8c0d10e5c10c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a2a2ec0261a99d259b85937738834eaa

      SHA1

      872d452045cdaf073972a557c793f879b6ce3d3f

      SHA256

      3e695ee63f96f637082499b49ed4af30be0097efacb486a9d69ac862109da522

      SHA512

      225bf89042f02516eb78840515b76b052ae5d75dcaa1e4c4e328b813de234f55ffe712537b5ad6b9a247f251a9fceb06f3264f5e62b3530b57abb5da39b33fd0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b13e9bfdfb8024d523ad82b53af1c8e8

      SHA1

      8f971321c7985606374dd8eb95d30083887861c3

      SHA256

      1e411b83bf88ac5856eaebd1fb1f3f52e565c915c2c0da1cd8db277d25691164

      SHA512

      32c2512b5fd12547846894ee02a11943ef7d0202fb7b78fbffa5d86e7fc296d90d843765fb3d58b19e2f9ea8f41828b9b8734ac5a384dd775c5b7a314b81e491

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f00352baacfecf6c851877026eb3ee9f

      SHA1

      a386010bc7f65278b787a81a78e8788a5117a7d2

      SHA256

      a5a7b07430b89b706434af4ead4174396cbfb064a59d981ae8d133fb70f385cc

      SHA512

      c47d442641097ddc7ed24ca6c560525e2485434f9008efe852fe86f5360bc2fd265a7563fd95b5e4a5c28ed90240f9d5f66290bfc283a1e94b2d0f7453104613

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5662de6a52d08f5c0cb0c1cd38df4332

      SHA1

      379e5c3a850323ed207c2f24f0755cc36453bfbd

      SHA256

      b29a60fc065e83322d109af62de228358a9bb1548b3bb0e1ed3a1303f321bc67

      SHA512

      3663f7d5de2bb3dab81e0f756c3398674871187f66b50ba9bcf4ddac1512a6c212c7b5116d443ed54f96581227998eead508b63db2ac2d29ab9f3af2799bdeb0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4f435e7ce998265b90caf7eb026cf29e

      SHA1

      f6644c5e63380fcab2a7cfd3bb4233a6a9ad435b

      SHA256

      24b8945bbb4c28c9dbeba78246f26f6528dbfcc4301abfa03af6ebe131734664

      SHA512

      0e6ba128b483b3de2cc62198eccc587be6e9285b3b150a8eaa255ffc7518421de31d13a2f3fc4b56cd77f7dd677a777ef31f32eb077c4b292091ce341e20f1da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2c618ecdcd0eb0e997cdaa4380876618

      SHA1

      51a01b47df2d22f72aefc3811cf28a93cc7feccc

      SHA256

      4306d9a6bafe2c65c1949c7584322833e31926f4cdbcef5f80bc5cf50299833c

      SHA512

      d883df12e642c12eaef64cf2ee27aabfa36c070d04b477c3ccb0cfd15bd0d1755c97071aa611449259ddc4ffc2885840a8dcc4adeb2a438e5ab18f80ee1ee449

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5af0f5c6bb1890e9a3c1f4e1b2287193

      SHA1

      91ddf7c5279d071fcd6ca4e4470fa963f61402d2

      SHA256

      096b25a4369d9d92a02983e2651a47a082fc262525fe1b8fb1181d541578087e

      SHA512

      9dfb401f5c1be253dba1580ec12b4b199db3392d2205214f5a421148a7bd092dfbbbb3fa79e3be92c29136d83e0a9403d495973e6138494e4a5050522a32171f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e7a5f576973b948eb6182442a3de67ef

      SHA1

      7bbd6e98a1d1dd9ca827c2405092ba36a2d44b53

      SHA256

      c9e91a40b1ed340e891a369b60570b857a37d01a2b224257b4427e564b7a4aa8

      SHA512

      5eeb16f1fe32c903e4b2c7bbeb3b8601f11ddfc2d3d4040cf8e5af72b40db638b0951fe6f02fdd497828603e2fb2a45f3d6447a8df60a932a6832ad9a0c4baa4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bd782491310baffc9b38eb4c5e0e0c2c

      SHA1

      fd93b3a8db129aa13d62253572c1f1f338a282dc

      SHA256

      dc14551ddf0b3b99836026ad498176d1806ee54141ad557a2817de3bdfbcd864

      SHA512

      bbbad2913a83caf19126d098f4a40a38876e1f4b690a1b55d1bbc0b4a95ae5ecc2a6c1b624506b46027197204334ce90c524ddb3e2d199db1fbe02777284ecbb

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EB763171-5718-11EF-9438-E643F72B7232}.dat

      Filesize

      5KB

      MD5

      5b46dff842b0e6c2a3a44890379a7e0b

      SHA1

      c378019bb795ba7a19039d2cd291ccc7d5e05fe2

      SHA256

      5dbca6780893a3dbec53454c035f8734035ed28a0361661bac77920e5fc367cb

      SHA512

      e95ae1ab6505938a633a1e64d7f66222fa87772080302efeee7203e5810986e53ed5920ec00fe321fd88a1b3e7514bdbf54aaff5ee5b1b88026dfa9aba00fa2e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EB87E4B1-5718-11EF-9438-E643F72B7232}.dat

      Filesize

      5KB

      MD5

      d18e23081ffb94feb55e8228f8cdb325

      SHA1

      97c222a607cdc6a578af0239e569aac0664bd6de

      SHA256

      a9ea148a30935654f5ab6fa32e036d01f288f8099c0dd7516dd4bcd6975b69b2

      SHA512

      17ecfa85e7d521bcafa2a967f26a2319cad32534f1eff894e4fc2acfafb836b48af3ae24c7a2dff07b6d5876e2dd82b193d0051566e64eec04455977ec69a040

    • C:\Users\Admin\AppData\Local\Temp\Cab688.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar709.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\tmpE4C4.tmp

      Filesize

      442B

      MD5

      11919d4be6573fa86778220f8c235f5f

      SHA1

      9fd4fe1088d23bf7bff1c6209fccdba7ff5150b1

      SHA256

      b3fca75b6f1744455839fec36788873ba6d4700ee79b0beecae902214d98829e

      SHA512

      ed1d993402778a941f24009877bfdc470398fb9fc7fe4889d0b56a194cb019da094915fa10b9349f922f5af41dc0274d7b1dc9854b5b105fe5a59821ce2843bf

    • C:\Users\Admin\AppData\Local\Temp\tmpE561.tmp

      Filesize

      466B

      MD5

      ab9bf535b85650bedd40fd87b6cac611

      SHA1

      2217b502d69f71d1e362e621638e6ab17f4884a7

      SHA256

      27637d3fe2b614bb18768d26d331beb1931e59d70499f76a41e15351a922bb98

      SHA512

      bd5dff99a1fb61f0f7b37fd5813521e0efbe26a4da1c5a7b6ee401491a01132bc6c2ace3b9e6431fb8d53939f7dfda4df8b493e02da130e65bdcf62b04b96323

    • C:\Windows\SysWOW64\hgakheg.dll

      Filesize

      564B

      MD5

      39ff784965001d1f8dbc27e3b41fa343

      SHA1

      7bcebb49dec74a5f3335f7c1f64079528d405957

      SHA256

      847ee6424f6b327bef0dc3d8793baa24e0732a5a7274e5f1b2ec35386c6bfb0d

      SHA512

      c592e92bc7b2518be18b00e258494d58c9ae7d11240bdb4be238ec91f532a9988be15b4888eb0efc46d27c28c51fda16b14f4cf3635b1a4640892e86eb417d2a

    • memory/2572-12-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB