Analysis

  • max time kernel
    33s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 21:24

General

  • Target

    87ba917d7b3f460cca7d453766813652_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    87ba917d7b3f460cca7d453766813652

  • SHA1

    732bbdfc47176365a83c346b1d8c61404022565e

  • SHA256

    94a4cd1d926413f45c28365694523ebfbff609dc0eea1956a08f75f0b165d9c6

  • SHA512

    8aa38119151fd553278457ec6e08e22292a1e93a881e3a1a4baf37daea7584761d167eb489e5a6ec063d7acc42fbe93c80835c1e849b744f2ed4aab9eb5cd82e

  • SSDEEP

    24576:yT++j3NAOhjtohcv3pPiz05xV2uRqr4JN4koafCOkUYnwT/VEDf+QozCmj:yT+YSOhjKcv3+0N2uRE4JN4DOMnwTtGo

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87ba917d7b3f460cca7d453766813652_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\87ba917d7b3f460cca7d453766813652_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1400

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d44011fe0ae0c6e9e06ee88f2599219a

          SHA1

          9b27f26f7473e0649feeb50f54b196133766be45

          SHA256

          cc4c59bcba2d097a01c3f5a5dcefd16ab0c608d59f00562a44614d91db394fe6

          SHA512

          f6b5f80f0efbfdc786901bae8c5db5422267fb49ae354bc4ee23e122fef3d064fac05751a71a6147c3e1cfa298b867c93c1807482402409c4d8914e9047ef926

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GL24G53\httpErrorPagesScripts[2]

          Filesize

          8KB

          MD5

          3f57b781cb3ef114dd0b665151571b7b

          SHA1

          ce6a63f996df3a1cccb81720e21204b825e0238c

          SHA256

          46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

          SHA512

          8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3JH4PQP\errorPageStrings[1]

          Filesize

          2KB

          MD5

          e3e4a98353f119b80b323302f26b78fa

          SHA1

          20ee35a370cdd3a8a7d04b506410300fd0a6a864

          SHA256

          9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

          SHA512

          d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

        • C:\Users\Admin\AppData\Local\Temp\CabF7F8.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarF887.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/1400-34-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-24-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-36-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-44-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-51-0x0000000000400000-0x000000000078FE01-memory.dmp

          Filesize

          3.6MB

        • memory/1400-50-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-48-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-46-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-42-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-40-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-38-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-0-0x0000000000400000-0x000000000078FE01-memory.dmp

          Filesize

          3.6MB

        • memory/1400-32-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-30-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-28-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-26-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-22-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-18-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-16-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-12-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-10-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-52-0x0000000000400000-0x000000000078FE01-memory.dmp

          Filesize

          3.6MB

        • memory/1400-20-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-14-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-6-0x0000000002940000-0x0000000002991000-memory.dmp

          Filesize

          324KB

        • memory/1400-2-0x0000000000400000-0x000000000078FE01-memory.dmp

          Filesize

          3.6MB

        • memory/1400-1-0x0000000000401000-0x000000000065F000-memory.dmp

          Filesize

          2.4MB

        • memory/1400-183-0x0000000000401000-0x000000000065F000-memory.dmp

          Filesize

          2.4MB

        • memory/1400-182-0x0000000000400000-0x000000000078FE01-memory.dmp

          Filesize

          3.6MB