Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 22:53

General

  • Target

    8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe

  • Size

    172KB

  • MD5

    8c4e06c88654b9b897dbc98683dccad8

  • SHA1

    2e6448321540ee5343badf2b26ff7ea5d034ac88

  • SHA256

    43b539761c9b239b41de8d1733c6063c56e8d0ab4acca92cde78c7e60918c3e8

  • SHA512

    9389ade44eee0a07d12de2198c32ae6bd20f441073c975943400e99f317745e86fbe91aee6d5e5ac300db29f2204c08209abdcc81c6d9a352ceb120606860581

  • SSDEEP

    3072:B4yeuQWjFhluoKA+UvBrMvNsmMCoCPI69dSVDl1Yvxexw4KtpFSy:K0FkA+U1MvimYGI694xzYvxexwRDj

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\8c4e06c88654b9b897dbc98683dccad8_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2808
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08ed7ab68eabf08e55bd54887984ff9b

    SHA1

    98350477306025421329d77cbbb6cb5708a05b84

    SHA256

    df9f8dff9b6d63fa36687cb7a12b7eb70745c461f67449aa42d7e623fab845d1

    SHA512

    ff9b2dd9ae7722335f32c7956eef87b5a789a8fde1cbd3bcc9be70a4fbc597acce919921cefe50141ebb6a7c929d64fe4e96eb652f49a805f78c367a666cd581

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e53f67af7d6a04ad89e6661c67cc46a5

    SHA1

    d5b649e341de091cf9ed25ba91beb4b473fd58aa

    SHA256

    4efa1ffe0f1a2508b74295ac98ae0829dc0f0448a093b15aef18bbcc7f4679c1

    SHA512

    723cb6be0243c2a077ba5c3c8d1f032998a8feb108be0a33873f54764f77de0ca94f195fb151168da88d3907ecaa392baf5dbb48cbd6b0ddbcc40102d87a3d44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adee4abdad9237ab1f05e2e56ada158d

    SHA1

    7ef78e3182a2fcf1fabc6bf3d0bcebe83fe82d8f

    SHA256

    da2464586346386dbcd01219b34a284d2075a070ba3ce5b372c4b18b1764065d

    SHA512

    e80e07a9071ba61f2e10a60f22db9adfa4263dc424aca0feb20eca1da6f6fb3a7610480c59d7cd59f675f8a6f877768c43d5856a86be84c54af12623edb348d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0c05552f331d765a2d628aaea58073b

    SHA1

    c70ae8a624decedcfb88d8b30b9769e74d073a44

    SHA256

    fa130750f8439590c5517d2d302f790e18c2fa4f407fcfbcac3ea1f47f52ebda

    SHA512

    3f7fc2c4f1fcc409574dc601749d47d6d59e97348760a5a902508c54235a64175382dc5dc7f9f26f25212c7e6a7e5b36b2381c6acc50e4abe6da37d4d2754e84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e574bc4bb6a549d45db0d4affe6f099

    SHA1

    b8c940c8ced9316b3bf91bbcb3ae154a565de4a8

    SHA256

    e7b7e8545a4231c049e711d6dd75835130af77392ea8a3115da7c5eb3da69243

    SHA512

    10b506699a13427bdaa30e38a1153f5fe6c2400d08b920854dfa2ed32a617924ce061b966c8b9e0613e062f0eaa4b8ae95d5b9aa0c1e599e815dc915e21ab8fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc01eb6a32c07949d3ae18f5220a8596

    SHA1

    7a117ec70ca33e786573432a16fe55556cba5fd6

    SHA256

    76e975907c0bd4a4aa003bce0e3f48908dd11d8fa144ba9b3705886cee14cf3b

    SHA512

    77f6d3412001750b5d3e14c6139b60a020beeedb8be8ac0db8f9eb48eb1498df9e98ffbd878ded7c47838dbabe9d3a032ad6fc5f3c82aae99c588e1eae7b7e97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c54f0fe6e8e7b000d207cc8644cfe1ae

    SHA1

    23553a72b1702d7d9f2c269539042e1ba8c013ee

    SHA256

    a5056d23d952913c2f7f5d3171c6ce4e0721293baf8444ee6735f65141443132

    SHA512

    3919487ca5299d11d5600b2a2f9d6cb6696465d46c9cc56b29c0b3411dcf21c4b0373aa229276616f4bdd00a4595fee0f67d200f4f8b2124a1911c15b43ef688

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e125b5375925e48f18e5e10dc3297681

    SHA1

    9b61908afdcc0175c08e1edcf74f91b59a9bb7e8

    SHA256

    0e89a4c38b311d770e04d401f48f3cab6ecb34dc865f9aa9ccd0fcd604f44f45

    SHA512

    c713de1427d7f6cd9004eb7b5d795b4f51891b14ca59d2d8c85270858df7a03fcf40a9c63b995bde2b69d9a6bbb106d4ae2d840feb06a4a2de0cfc03d0454aad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca4093ba9afb328eb1c0a40cae534bdd

    SHA1

    9a859fdd71c60ba5dd972aedac4da91d99e1b855

    SHA256

    e98257e263cda4f450b2919bef9f77cf3c0151540fe806923cdf8bd77a2723af

    SHA512

    1483c9b69dd9300ff15d1dc39d58b4b9c86fc0a064e764a419f5193ce34f796ea46dd011ab87572ac05ad955c203f266e75fd4204d44a3a3e90e6851f33339cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdbb0c36113d1290dc0eb5f0907ec3d0

    SHA1

    746d41945439ffe73a64c66951e2240a9ae72158

    SHA256

    37129ad16b6ec56a8f8fad8f4de1e685dbdf50c28d25bb596669226d84eb92a5

    SHA512

    5f0da667433198baf7c4dc9763736a257211f0ad95aa506136b0e0657d366516bcc996fa2849ba741f02d0b39bc14df4af6074d9ac8284997a1734eb60b5b97b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d31af017cafbf29321d1114e2689b3c5

    SHA1

    07e5957c46578abb55af71fb8e0b710f3e2575d4

    SHA256

    e4087333476733add78ebb878545b10f2d4ee53e4f7fa88cb2ba5797be2f7c91

    SHA512

    17b7262651bb65814be55b774ed00f84e4e04c90ff3806523e77e99e2851ef86bb0027f1bc09d786833dfb00f06683e4a18d49f0ee9e2e3e5f5bf4e493712f87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82be4d2e39773cb7deae38d618f8821c

    SHA1

    5f5a984d2c7311d0c9c37eaef6fa448bc3895676

    SHA256

    376551e96d9e8d591f20c600ce5eac0bcb375a980d6e992c7453f4d06ee2343e

    SHA512

    115c89913d66c3d79f6a533d4736d4977891c6f75a5e4768ce8774524028551c99423c127a261246d56e6bc2e33ba2e6af620b75eccd1879eed1a46bb3486ab9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3f1c6c55d1f57e46ebc32cb20844c63

    SHA1

    e47dcd96e97ab7903cc998d7797a229443268052

    SHA256

    a0cbe18e25f3db1b270bae698bc1c17d90f327b73bc68971ae227031b966deae

    SHA512

    6ebe6108a8ab8e70cc2d1f7b979fc10912f25d9ea2b9085105eff081ff067aa45460ceb228f762dfb100716fb3a54a77aa51b6cb26be2b0b9b9619658916ef53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c26b03d01924fd21d0147ac6420d79c

    SHA1

    4854703de9bff4dfcd03fc880c25f10fd627c0a7

    SHA256

    52f02816db7a912c4c398a5e283e5f64191da26790ec51ff6fbf9ecaddfedfd5

    SHA512

    a83978f3e4131f7ab129c8b17511fdc9de116113afaf36c431ed1699f2375c316077df60f823d5ffb3c4afd5c1127aed7471764003581635530fd3105a23bc23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fece86475b27f73ef09026f2dde1af2

    SHA1

    ac40ffa120ea728720640e2fea6c3f9f5da4abb3

    SHA256

    9db8373736d55010379b584c3703816f7f4ca4ab942821fe50467788d4f7afc7

    SHA512

    54823adb6f25214cfc90e13eb01a177c76bbd355cbca0aebf129ff8741e50bc64107159e3b7d46697c5c96fe9fdca9a820d2539a94c17378d5a6d8013bac6441

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d00671f93196f4c5b2746d080b4cb09

    SHA1

    024e180c60b64ddc4e24506aa5e48e5ac91d4368

    SHA256

    6d1b55a360c7bc0dc8fb1f22305fc0a4b1e844dd9ecc66bb3eb6650a79cac5a2

    SHA512

    af89001f229ae468dff845bf306a3ee3fbe032cfb3104a951033f5463975c7466831a48e159cea6d84c6189af27ebc1a312eed01ea1a4c69b199158a40d82c70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5da7125f9f91662de3df454804358052

    SHA1

    1fca4111b7b5b7bfc8d2b158d430668e2f112ac6

    SHA256

    1fe0bd73d3e3b23c9431c48521360849ac425d396e152785b3c5ccf8442ee4ad

    SHA512

    db7b91bf2ec1a34c3d9529691f1d35d397a2944d4eb6b76ff0b925d008eb74476b432271da75f4979557e9682dc4543a24a3a5732aaab5b6cdecc19e3e1d900f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8a2aa46be4de032c05515ceb5e264c8

    SHA1

    6ae74c4f2c97b3f4d888c00b713cece44eeed7ba

    SHA256

    9973d32833b92cbd8f81b0641a19043780d68b1c7bf40bf1e5b42eb7e8506945

    SHA512

    7ddf8da8374e24118be0428106a9b5d557d9c9dc594d8fb1303bf4ed49b97b0242a2fc0ef4df75dbf6ef1259e09a9fd4db29a8584ab1036f93730ace4578969b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86d8ee7b7b82113681abf1f27a385a8f

    SHA1

    7df26cb663eb117f33881ba648b9012452ca96d0

    SHA256

    dbfb28ccd1f35373eefc45bf8e95befc89dcfdbac3f89a89924a9478f1fb0f12

    SHA512

    97f35540bbe17a0965382309c2c8134328e5abc70f35708c1111423f89158c8102bccb8e64cf0874d4f118f1b260f0e8b690a2c2011c703addb01a149ca53770

  • C:\Users\Admin\AppData\Local\Temp\CabABD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB1E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\POSITION4DLLNAME.txt

    Filesize

    2KB

    MD5

    f4f080ce4282e3af4b59657db1ab5772

    SHA1

    7ce4ee2a77efcad5737fda41fdd73af05b19c83e

    SHA256

    f9555a05f7911e7bcdc67dd958845d619b9d5ba5fe01b3d91bcc7260b95f7989

    SHA512

    5213d339fa73e4d787030a5aae4e561c4714de4e797f5ec18875fadfe9e121b7f6df5461c997506884454a2715cfa248a40b4e2964fa89b186e837aa590220a8

  • memory/2152-6-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-16-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-4-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-19-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-20-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-10-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-23-0x00000000003A0000-0x00000000003E2000-memory.dmp

    Filesize

    264KB

  • memory/2152-8-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2152-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2152-13-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2316-35-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-30-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-28-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-21-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-26-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-44-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-24-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-33-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-36-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2316-39-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2316-43-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/2488-0-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2488-17-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB