Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2024 15:13

General

  • Target

    868fbad52b106fe08c2153d1f270b507_JaffaCakes118.exe

  • Size

    140KB

  • MD5

    868fbad52b106fe08c2153d1f270b507

  • SHA1

    5505e684dc2805cc9fdddb430169a812cb01538f

  • SHA256

    f5ce49c19ae742a69d61c107520407883f975a1a7584639609c892217081e4a6

  • SHA512

    be374828690db11ed918d5f08566b3c5c74685bc75d061697381fe467f7c9ad1e677e102bea6a520a4c292a82370356bc8bbfa9ebc86ab5ab15632ba35edbfae

  • SSDEEP

    3072:V/na9TiG/v3Grddu0UmnEut7C8TrLtUJnIiMO88:V/aTl/v3eTu0UmEutu8/LtnO

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\868fbad52b106fe08c2153d1f270b507_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Users\Admin\AppData\Roaming\Dsdddg.exe
        "C:\Users\Admin\AppData\Roaming\Dsdddg.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Users\Admin\AppData\Roaming\Dsdddg.exe
          "C:\Users\Admin\AppData\Roaming\Dsdddg.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2812
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1776
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    573c5ef9f4f07f2bdf507c4889464ffd

    SHA1

    af5201e8077d233e7e9518173fa371e0122962e2

    SHA256

    00ae19fb273d6443525474506c58aa828c1fc90789404c1e19d338e877a636d9

    SHA512

    dcc580e7740dbefd3e6766aca787315305285423c728f7e4c26dca568a5730f8f3ddc1c97c42f7b18f52233085413a399b9b972a6f7911d062c5a2e4886d8e07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd53cc52c51bdfd36c841ce77392397d

    SHA1

    ea5c154aae94eec035d7bb6ce6e906954eda0ad7

    SHA256

    c050d21ebcc7ee12f8312edf5037091b11b83de81edd1b630a9acd9bcb24538c

    SHA512

    7305fba0e6e21f3ac0fa68a93e532786d894348ab373c4c0c7cc50ab5911e50b935239d15611285b5a05b4880c05c09710960700ac6b6188b1d08f63ab68ed64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99ffd8b4d74fed3a43554643b29b2b90

    SHA1

    576dfe6cc27560e7e80756385e75369fb5709639

    SHA256

    87a1f496dca18659646f6a72fd391cbd7a2378f7f744bc0dff98ebe7dbf43045

    SHA512

    a07372f1857aae70ceddcb286f90daa543bce6dbe88fb46f3fefdef509e8164b009aa33b78881a9ea7c16bc9ed6141722735c0919780577816467ba7df2b3dcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d2e1090b12a2c5614fcbd85842386be

    SHA1

    7d67d7bffe9d3808e70c7b77498e2ddfb29063c3

    SHA256

    0eb18ae2c080230cb04be2709c1f0803ed0c4de0f7b4810cae1d7990e41c498a

    SHA512

    dfd9e5ef60e99ab4445da0bedfe22bec0237eacd4537ad5f0ed75977fc960d7b1d43447a656bdc4540fb5e9c3999eb5460a2d6bc7eb86367c9d3ec509fbf26ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d9ad624f7cff688bafd80dbc9fe5a49

    SHA1

    f2087808f10d9b5ff31eb8743e91373bf3439419

    SHA256

    8ff22e4fc88b1479272b58ec9a7a74500f017513fda8db298a654beb57da9eb0

    SHA512

    f340d2a0cee0410ce491a87b3e6305497f5fd8328a554d9c893e2ef23edba5dad5fd796a2b981bb4385d40b687580744d32cbb7d458938657b6c4791549e3e49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9be73a7821a69f2da2eba1e40abc279f

    SHA1

    ce5e7ae70e70874be030b9f6e1500077d63ff928

    SHA256

    3bd67f2375f6add935ca57d2c9d8e331c270b4cbad2e1fc88b2e8e6fdb4565e6

    SHA512

    8d339f1f71b6cf3c24bf68dc512c0b2fb1547fe9348c82ee6abfea6e37b6c3015293ab99c8cadb3b7424082c8c3aa74cbac4b2513f47f1f506f649284a926f1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29776dbc47e175637c076848d7d7a565

    SHA1

    b07d722a039442795f164e52cf509eb15053db9e

    SHA256

    c575aea6d672163ede4cb934dd96618e4e9965688bc386427892dbbe5b310d8b

    SHA512

    4d9935db711bbb9df5000942b40cb1fe8c04a50846a265eb3e07cf2e23521e1d4040c45b0f1d590f04940abdfce130f2b26469cac93c784c32c2bceac8aa04b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    667962de8acdcbcf98c482b02b415ed6

    SHA1

    23ee3102550e93d0792a6cd8a1d335799d0b6f07

    SHA256

    80aaa607ed5ff51f6421185ae6f9ed006075f91ce0cdccbcf4949e783652dc34

    SHA512

    e91fe3a9677007450d7a51aacdbb4e2d74127d84fc1b059631b641bcc9766dc216c72497292b7cb426e17c9879d4cd8436ca0b9000557d716d389b02883580f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f3dcba6de060022f91050282853c159

    SHA1

    d36ebbce6e7b7bdd1440c085b8f27d385c99332e

    SHA256

    2bc3e1c83480c508eade30b25ed0ef4d932c088d189f83103eab39e4cbe17755

    SHA512

    75bee49652ab90ffe052f4c27e336481d6015ee29919df0bfd2ab0dec5710bd2451eba1e42b893156e7205af22e878271cdc1c0c11a63afd1ead2fc3ac90bb17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d301000fd7c785e9c5b92067b9ea7ff

    SHA1

    53cdf23583be16b3ec390d8f94784f7ca541c6b1

    SHA256

    63ca368605261670ba6060dd1c683988d955dee61152031d6c66d0d5e02189ac

    SHA512

    5247f5326286068a32a34592eada235b36ec2c10e074eb15be3b00910c5d432cead2dbbe6f91953b3f7d23f1995c0daf9c8d25e7c8c1e35715c1ea8cc02d6925

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61fd81ddf86f338655882306bcd3f38c

    SHA1

    b151da915ec0305b3ed38466c083b6fb06926d7e

    SHA256

    33eac631adc9d41099b7ebc59eed49354fc0f4068abc90f39a853711a067b123

    SHA512

    5d2a4a50ce72b3020b9bb9a37df2aebbc7b201eb544b9d73783c81a595b93e0adb914b57cb6ad6a203be5bab25ed7b7624052aaa4359c48dbb0ea6e9afbfdb0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e1d70830860dcaa3748505864037b6e

    SHA1

    cf259e1c94d3b799dbba3382ca43209e20f51bec

    SHA256

    3a34cd5488570b03599bd90b7d720b4b86aa02b4bd7a27155b00cd1a53e93ec4

    SHA512

    56fd30e67d3e0ad0d2c166fd226d5cc1035dae866f75c9594dca8bf9e943387f19e8a060f5c907fa18c34441ab34f7e8c759ac636de3fd2dabafa7c5f4c6ea08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc80f08e9951d57b5f2c92fa916478ca

    SHA1

    93ad3c0b72028003034b015cc7fdcc33b31604cd

    SHA256

    83703f961e76de4b1cc03bfe9e6faff5580c307445bf52cb3e2484903cf7a30b

    SHA512

    eb92b5844b6913a82313fcefee141c0bbf6e1c299ac3afde7679e902288a6e51f06310cb73c3c11849a6de771623702c2867bc1b6af61694c52461ff9fe08e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e6a06bf3557267d67c3895e1280a443

    SHA1

    bf2cd1011ed49781450460d6b489e004d33ddae2

    SHA256

    9d3fa46e6412ec78c90f0beea63db72765667122151bbe67575455c20e23a5f5

    SHA512

    a5811d1ae93eea05a02d8a474b2a6b5adfb96960ac096f64b4adf93711ce2d0004b9ea2f39f643720d7a112c8c725cdbc210932b4fcd8af0e8262acf06eb98af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ba541e6856ca91e67d029b682744ba6

    SHA1

    2eab18be83c6acce1db655cbceb4c3457fcdf7f6

    SHA256

    a78e83dc7b3d57797ce13c1810f262aa95f23466300825faed6def4513b8d9c6

    SHA512

    2ec452fe13de378fe963c77ebd5c90948e4a914310ff19c3db2211feef6dcc48a9902e177143e6b26162b78f9a8efd9fb73f5e7bb5aee154da9a3a2019d2e194

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d23cd201e16fe2cc265eae1143d42a05

    SHA1

    59cb946e7c62f6797e8b39c941b426ffed35e1de

    SHA256

    a8b1ed19118e94f428e8ebac4df913fb0aa199dac3c2e2eff5718a835f701468

    SHA512

    653276cd8006af9a0fd30adeb5d34609369363415c27c0827d3ea1523752d6afea793fb8146d54e155030101a7531bfd1e3264d6d0e2ba4a1376b0e28d65e90c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92c6348d5b3f1bb96ca84ef8cf55a6a9

    SHA1

    5b47de575eb30339b959727f8b57cda8942748cf

    SHA256

    2bdab11ac84b37b5ac1aac7b05cbb55e978dcae32fb9209d090d7e82438e2e8a

    SHA512

    fc7291090cd190dd4a2d6bbd1790c0ffe21feaac3ee3373b54eda9a13680c5b9bafaa1e2ac628c753fad942e3ffb60b8ccdc7c9d830b3ec85f924a29a6f20c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9f7dcc387adff3d513b59f042f25e10

    SHA1

    83603d72ff1bef12ad0902a554a07e9e6a43d223

    SHA256

    e7701e1561f80517610eba668d7c450332f73ebf7db7820b2b099eec07a26a0f

    SHA512

    c5a1c20d0b8c42450cda7d489b71a7c3469b00f6da2e906e39c2762bf237fa798fffe709143cee0c1db91fda249797a0cbcc5774b74442fe21be29842a54d9b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27cd2fc97d09b51e3c76cd07d6313f30

    SHA1

    f3446612fc82b329b04312afbeb00b4010e47e5e

    SHA256

    b0f9707d651077b2ab6b554a6e84f7789c3e2179abf4ec1c51cef22374422b15

    SHA512

    e228eaf15447e6785198e3582e2b9888182ae3e51caf54eebf776177496d3f9291fedf14480e9ed67229da827ba1651dfe8edda55a42d194e507f29ad0c5c998

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee61786db8ad477890ce91cd0d088c01

    SHA1

    1d4f23c1febcc12425971e47b3479d1905aaeccf

    SHA256

    7bab3757d41a18402d621c80cc449c49b802202cf7e2041c8dd0a4a4f754c589

    SHA512

    cf5b54921d3bfaff07ee30cdc0b0a1b0f0e467fad5752604e2549ca5696963436a7d25af7873034c2ce12d859ae08952a7589fb6ef7efd740feb5c943d0159b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ba64c2c2987b6fc5687b4f510decfc4

    SHA1

    5c39f967a714ccc4d0dfd070e49e7063ce6e3201

    SHA256

    979b529ac3f817b261c43b1646b381684f20b3586a3f3a8c5ad8fdfbd9f48bc6

    SHA512

    161a8bf3099ad8d7b9a45ce3b62d313153efcb4b43812a0040f8f0e67749aca5bdab5e9ff7abae90f0888e87e828d2633bec5b488e8cd735fad52da42a8e4027

  • C:\Users\Admin\AppData\Local\Temp\Cab23F8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar247A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Dsdddg.exe

    Filesize

    140KB

    MD5

    868fbad52b106fe08c2153d1f270b507

    SHA1

    5505e684dc2805cc9fdddb430169a812cb01538f

    SHA256

    f5ce49c19ae742a69d61c107520407883f975a1a7584639609c892217081e4a6

    SHA512

    be374828690db11ed918d5f08566b3c5c74685bc75d061697381fe467f7c9ad1e677e102bea6a520a4c292a82370356bc8bbfa9ebc86ab5ab15632ba35edbfae

  • memory/2636-0-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2636-1-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2664-48-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2664-49-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2728-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2728-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2824-29-0x00000000003A0000-0x00000000003A8000-memory.dmp

    Filesize

    32KB

  • memory/2824-30-0x00000000003A0000-0x00000000003A8000-memory.dmp

    Filesize

    32KB