Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 16:13

General

  • Target

    8b0c0d86b676f4699ec48588bbdbad0b_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    8b0c0d86b676f4699ec48588bbdbad0b

  • SHA1

    289e01b982e6cfe1f0d01bda88aa59d40ae7e2e7

  • SHA256

    d02c71d728c6d3d00b002706d54696a88b83cff2af61957562689fc5697bab27

  • SHA512

    103c7491a903acc97ab7d25367e8c1caa80c2c8185c350e8d17d021e5627f7b30e4b26d4cd866d2603fe82aaf569630457b644d637daecfb5cb921947f5aaa8d

  • SSDEEP

    192:nW+6sDobzc2JFYNDuGnMONPL6daMEOn4JeLJB7hG23NbOhoOD9swq:WK0cJDuGdZw4IVB023NbKD9swq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b0c0d86b676f4699ec48588bbdbad0b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8b0c0d86b676f4699ec48588bbdbad0b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bb1626eba9bdcb67dd2babaf7651534

    SHA1

    7f6d764505c2888448e86b38dd811a8ab25beee3

    SHA256

    83e43b8fa0853f2991203321a9083f86229875371a7fbb61bf5ead05a70ba2df

    SHA512

    b54e0f42dbb76e72bceceb397fe8ad3482b62e97fde59a10ead46a96b7a2262db448f4e48fd1917840de6e299947599f5a1de3deed39fdf295ce34a5863a2840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89f3b36b6f2a5be3fc8e3246ad8aa8c9

    SHA1

    7a35b0b30be8dee22b3724271c6c2fc11adad19c

    SHA256

    8dedb97a84cf3eca73d2cea5990cf3cd45994e733274aafcd23642ca4993deef

    SHA512

    bbc39a12056da6c0b43786d70f49dca3b772155ade018c7566a260bc0fd073bbf2bf4b29e16735b9174d7963989810af181bf173376862c324c3756dfeb0c611

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    320ddb14dbd0dfd5f51b26d8d3c4bc4a

    SHA1

    bb2af7ac20cc911ff75054783abc7a53b3684299

    SHA256

    b70e2476fdb179178adb2ed8c478b5a41d3f1a4481169c0bf3dcf1894714b331

    SHA512

    8253cbc989196d4f43e406e1c4d40185f5f0b2e8847bf35a1d5bdfe3ecc08bea7397bc61750fc872808cfc1050374df5d765a8dc8d495372c9de390b4978645b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c957207ad2097b49152dac51963bab3

    SHA1

    08af4a0ad93124131129845489fa6101ed202ed5

    SHA256

    d7eeb071319165a849bdd8b461f8a8de66ce1d7d52396f5c43992cd1b2e7894e

    SHA512

    56c60e52101bdcf128f699a7c19ef76806229634b41e8f3894903e24829545b81f533ea9a0783d475309384e6df9705a90883de52da49ef5d1e1852d95f0ccfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\dmedianet[1].js

    Filesize

    100KB

    MD5

    a28a25032de96f4f7de40226176b3440

    SHA1

    171a045028c89dc96ac786f4631eeb1d2e205d1e

    SHA256

    66aa4af784dc94829f81a5038b4b9dc296e85e1f8e4411145ee07002a5b611aa

    SHA512

    63e53048bc280da678a5eaf4af39af1c98229441fde417208cb2d8c6c044c99f65c37be9b6885d4b3f3f50dd3586e37f4724a323319978367865c321dc8e2719

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\runtime.7f8599418f7f7a55[1].htm

    Filesize

    44KB

    MD5

    c85e4f7d50e07629a0bd5ea30cd890e3

    SHA1

    76af3908b9daa15276a2d42667223c765362dc94

    SHA256

    8640a821b43b865647d7af148615150eda912cc8e41e3c909b32fd3e614cf870

    SHA512

    4551db38ceb62c5f3c4ad7bdf64165b2f9fca863248365d3220e8a84933877b6b38a5da34feded9289dc2805b9018bf5626b1bdf6afb5de255f0fabf1c2a2d03

  • C:\Users\Admin\AppData\Local\Temp\Cab31AD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar31BF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1072-1-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1072-3-0x0000000003C90000-0x0000000004CF2000-memory.dmp

    Filesize

    16.4MB

  • memory/1072-479-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB