Analysis

  • max time kernel
    122s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 04:28

General

  • Target

    88fe305bbf9afcad59021e4a714cab40_JaffaCakes118.exe

  • Size

    140KB

  • MD5

    88fe305bbf9afcad59021e4a714cab40

  • SHA1

    43a35d8e7690d90eb06a5b0ee860c901ccab667f

  • SHA256

    a42d9fd7e8e5c69fc70ca8079f001ef28aecb582817329f58147f033e82cf314

  • SHA512

    4e02f926fae7cf83e3fe0a289c10055ee03a0f435b90d13b88fcea5e69dee78d59ffdfffd58b16d46c89128eaed0648dd54c3fbf56ed35072d9927b0df56aecc

  • SSDEEP

    3072:UJUv62uGoN4z7f5OU+0W5K8lCmbDH6RifHx9qKuX96Vt197:Ni2uGzzjZ+0bvmbDaROI/6Vt1h

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88fe305bbf9afcad59021e4a714cab40_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\88fe305bbf9afcad59021e4a714cab40_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\88fe305bbf9afcad59021e4a714cab40_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\88fe305bbf9afcad59021e4a714cab40_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Roaming\Icrtrb.exe
        "C:\Users\Admin\AppData\Roaming\Icrtrb.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Users\Admin\AppData\Roaming\Icrtrb.exe
          "C:\Users\Admin\AppData\Roaming\Icrtrb.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2200
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2588
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2624
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb346b6a941a3be8d35d7aa72f40fdb4

    SHA1

    08e7857999ec4cf1d66fd5a0a6d9e7f31ab205b5

    SHA256

    d5bea4891d8845f9676d87dbf59aec95414de0cb00ed02bce77d3d657562308b

    SHA512

    0cd3aa805787655dc400d056f4c1b3e8a53b7c78e305e7e112ce6d205d2650994ac996fc3d5d786a99985a4ee7aabadb4fd4ce7d0cf8e6e10d8d77594b8e3781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54f4064f0831fdf27804cd2facd3f454

    SHA1

    7afc239ac89bed7d3e108d9e47ea3a8f4082c92a

    SHA256

    297bb38a9861d9850747f1e14c539185d948117a0f03d3e8dd7b49370f1cd4a5

    SHA512

    2d52e6d5e2a2cab02f0d009b09cadb8b6db731570707215a6ddce26c01f8dfefb9c79fc7d9310dc19c28c22b2215431e9df4aa196c2941770ac468eb82127285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7df0f12bd0cff2508e5d8289e1eabf8c

    SHA1

    4ad9017b9bd77229decc9cb9777d24046597c6fc

    SHA256

    c73dfbae1aa7828fac90ab1c0a916e62e7528bce8029ebbcc26e6095a6edf8ea

    SHA512

    fdcb5792b43d5845b84adcada5ed5ef90c71898b3b634273c155b9c99f435459535adf5ff053dc6bd8546c3756748c6bfab46452272f3cf21dc6c20c785da637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7656c40be068e059a1777bec4c07b3b

    SHA1

    46c9738aca2862c393702b57f6e4e575371063bb

    SHA256

    58c3daaa55ca5c995212ff649988994a5e3fb988ef1ee2a313ec613bc9fd5f4a

    SHA512

    90ca81f2e6d33a5f7f87f4b2e8feb5e491a8154a6ead37790d286eb73367d6cb4177e57a2076f760e139b4eff4c1e949a5546723dd4b8482aeb4d36f2403f520

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27dd9f4478ee6a1043658aec06686528

    SHA1

    2d0a0ce205a12069397bfc3fe3373fbd11bd9756

    SHA256

    22a9ffc925ab0eaa453e9f861c5a8d5877074a5c33cd3a43bd756b2b440fe87b

    SHA512

    726cfb0fdfb9c2f9ebfc792afdac014f5d765729b2565a3fa40091dfdffe6ed5d33a19fd01b5f9e9d0f9cebdf66f1356867239c7d19cc85ccb42924b5f77e8c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b39057a4ae23b37a1fcef0aac1bf7ff

    SHA1

    176cc1f16f8b1b30b1ae0164b9322d44fbd76f93

    SHA256

    54adb17f3ab9fdd438b038d69720075c789790a71a252df9bff20c95ae0d40eb

    SHA512

    6613bb553273ef76fccdd4718b60c74d7d4ae2693e83d3584ec15ba1bfb7d648a68a318128e6ce833815822e86a143a5b7d947107585abd4d5aae1e039075714

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    273de516b89fed668ceb001c9b966777

    SHA1

    cdf9d445e06a6dde69dcb1dca88409405c148146

    SHA256

    094285b8ab81df2630f7752c76c86254471d9569ef95b3f7bebd0975afa81783

    SHA512

    8bd5b6c363f96ff2cf0e533397a2c490f8c261763e34578858ea6a309b12be938d18ff80befdaaeab341b31b3c084e9ec6c9eee2a5698585bb2f6d687fd3b2f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fd147db7de3a34647140c6c4b8e9fb0

    SHA1

    38a20bacaf0cb70cb01934a0087574329522e578

    SHA256

    b7c6ead9e58466c1bc33b3434ff116a10788248b152670bfb8a7d4484cb65a9a

    SHA512

    e131ba2e4102192aa174afdbe6be2c9b71b28a55692c352d7468fd1c36ed2d3faafab367bcc9bc9722ac20945763f97d9518e5b740efa0dc9466cd8530303d76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8468511df8728dc13327d06ed7398317

    SHA1

    9fff5bacd7814722c6db4654d1c6b2b07f866b4f

    SHA256

    aa5045c9c4c6220cc26e57df67c0027de189df9566c31ae8250351c38670ed1f

    SHA512

    2e578ac920aa6f304364e75f9362c9fd8b874d73bccf1389f86ea8a0c8865e4d9e6edbce16f8ec6a1a96933bd16bbcb2b535b32c6183bb38c72cd7c77684eab3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9060645f4192189e1ffd3132be0d5d3a

    SHA1

    8e8cc907e752094da3748c2f9832e40072641104

    SHA256

    8908c0d26cdd48f24b648c455ecf4380b360cfc459065984f0572630977346ba

    SHA512

    7baed2dc1c3cc4cd55410d23ef222ef5df0eef75cb8744171cbd9cc0e2eeee536a3a2cc905ca57242384f5704bd53b096387bbfb6c34f5ad4ca4634169d61e16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0eb0dd2c451ab65761b06bc10ab553ac

    SHA1

    fcdb4f25b75bfbcaa2f62bfe2cdc875525e058cf

    SHA256

    192f9d8d7028380fdd6e4b8a3c1a8a506f7910aece983f0a13c71bcc9d543662

    SHA512

    4747a5f9427dc7befd8425dbe1f238b2e44c33ec42647624d4f1c2f9a10f0d24ee477b64876b9788ed69c67dff2ccb948a6282eeef9d98fdf994dd5e7236d188

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61855634e34a3f278f37e64e47098fdd

    SHA1

    d11d3f4ab9c94c1437cfae9638a09a823bfbe0e8

    SHA256

    6f6f6dcd3f43833298cc587521803b413bb5e95bb23504d845647486fc5c1c4c

    SHA512

    c672fd0209dacf274dfcac8ae4f17513cd8dcd9a64432c0ff3d4d60df91c53679f4076b115f5f7fae7063090e3dc4499c558d8acc18ee9984592eb6023b9c84c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2125a29d303564b1ca8b3dc3156aa0a4

    SHA1

    f7767290986280219cc1045226d4a63187d1c60f

    SHA256

    f5b4f572d80b084c542c9be503da0fff066400642fe8d41823d4170daac86278

    SHA512

    bc2e5be6d5012a97167a9e590dbf4cf330cf2ebb7d7711dfe0fcd6a62832c9e2d14004a776eca6d6f1d609ceb10dae1ed9752de4dc050b087c8a9a8787b0f621

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35b9171ff33f54244b8397eb64311af9

    SHA1

    620e227dbb0de467adfbb26660145fe2abfe83e8

    SHA256

    06f97682abb9d0be24c8caf5ab1009ed023ec03b3fad3e2ec214122d6134e892

    SHA512

    1c8d7395c82c1256377ee6ac69238cd8e0ade226331f2957061e6ecbf5ec4fa5047516efa07aa6593340ffb347413ff47c8c3189ba6f38c52d301755404fb5d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d2c9042a9d9c2e490420f8ac7de824f

    SHA1

    9528b652f8d35981c973992e0ff6b15a0f1f25c9

    SHA256

    bf2c9950d84e6979ca281c814c2324729af97c036b1c20380de59fc83aa7b68f

    SHA512

    ff4dd925961253b0f2f41e05fe2fb598eb8a4b81f604ceb6e8550bcdfd74e4bfb38a6f90f77b4b0321f420e24885484fe3e1c86386e9d7cd2dd77604482a8ae5

  • C:\Users\Admin\AppData\Local\Temp\Cab62FA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar63A9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Icrtrb.exe

    Filesize

    140KB

    MD5

    88fe305bbf9afcad59021e4a714cab40

    SHA1

    43a35d8e7690d90eb06a5b0ee860c901ccab667f

    SHA256

    a42d9fd7e8e5c69fc70ca8079f001ef28aecb582817329f58147f033e82cf314

    SHA512

    4e02f926fae7cf83e3fe0a289c10055ee03a0f435b90d13b88fcea5e69dee78d59ffdfffd58b16d46c89128eaed0648dd54c3fbf56ed35072d9927b0df56aecc

  • memory/1676-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1676-14-0x0000000000470000-0x000000000049B000-memory.dmp

    Filesize

    172KB

  • memory/1676-15-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1868-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1868-30-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-23-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-24-0x00000000001C0000-0x00000000001EB000-memory.dmp

    Filesize

    172KB

  • memory/1868-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-4-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1868-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2200-53-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2200-52-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2764-32-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2764-50-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB