Analysis

  • max time kernel
    71s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 21:23

General

  • Target

    8c064b855b31dda5b9a4212ccd2a3a03_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    8c064b855b31dda5b9a4212ccd2a3a03

  • SHA1

    08d723e9f17d04db3dde19baea7cc292e000ca4b

  • SHA256

    998790ce5713c840675af15be228e94040af1f8a02e8d80e4fbb082653754012

  • SHA512

    e5eae92f94914aefa693d24a94b3969e3d93e0224d1c6532d0974d9a9ac125b8da5ab32addaa94af6853449d0025366110c4f8fafc829ca1cf917dcbb68da01f

  • SSDEEP

    3072:6M9wdDxCugoJOjbxqDbNiuoV93pPwJkUUvKdawh8p:lUxCugoBbNiuoTpwdUaawe

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c064b855b31dda5b9a4212ccd2a3a03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c064b855b31dda5b9a4212ccd2a3a03_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Users\Admin\AppData\Local\Temp\8c064b855b31dda5b9a4212ccd2a3a03_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62d96df3838bd2e9295440a12c7e5182

    SHA1

    8fb1a126990160736225e90882f719011b599fd5

    SHA256

    327faa1385de63390addb06e57817ff8c1bbd03c7476806e399e47bf8d1392bc

    SHA512

    6a29c905e202371958ef9adb9aa5885f41f4bfb4abfffface62f9db867e8450659779796c9186a7961f7ce8ce97b72de96ec70423ca48cf97e1b1d1c9ac9a95c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbe8eced52249f71e08956094266b299

    SHA1

    d5e1784d20633e52db426e39a3526e6311c42675

    SHA256

    c086356ee88d46175a20540386e8138929e19c5ff840c982a314bf645503dde6

    SHA512

    83cb8fe687e64c7126061b622067cc608c42e7dd99415cdafb4ce12d516a166190daf0694779a057753b231d3f577a310ee84566f3b1cd49191b3be8e0b31da9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d59b696070f87525dcc6bd2dceaeefb5

    SHA1

    61553dc849ed43df10ca46831ea1f1af1124d6b3

    SHA256

    21fe2019ead4da32468b2b6a72773993004566cf43ded0cc8733bfd60026a309

    SHA512

    1e548e1cddc7e0407f95744ca7d3db1fcdeb1e774a88e5d5d9a80fb6ec388c7a82a347d45ca41db5ea8cb43eca3657e14b197ca4df3a35c0b0ddda3886a9df3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36c156e8d0ecd85aa62af11cd5d59f1d

    SHA1

    afdf74773c2fbd40343c5ca25dbc86ae9aa0db9a

    SHA256

    72e913b754d15d5fc65398fe9e16b0cb1ced294fb030c7856f84c0c852fcaebd

    SHA512

    9234c63db1ee257390e898a18001acb5d99da7472927bd6ee8e23af543645260325d6922be524d31e65c1ef75e5e267b9c944b2039dcb76c7c62fd749eff7f77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c27941691894ddf349fbdcc4a92d0746

    SHA1

    e18020790616c5257965b1f96bc90521e280d4d0

    SHA256

    1b280f0742f22afe833ec09aed3f52513f37097e8fed7ec27c1b2b1b7ec7fbba

    SHA512

    573b7541d74b0bd40e14323049f82bc660775a82e7fd883e50c8f851401f69da92ec54eb1e7f9f8e1f6be54ab2cdf8692560416f4fb73faab47109c26c07e0b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c48dcfa66d84f42e25db6499f8cd0507

    SHA1

    81b15e219051f8d12ded647e4404dddcac8eaada

    SHA256

    00809df061cd5b3fb7fb425b2ac5da5cc8c4fe06b31e0142e17af0a5989172a5

    SHA512

    5531b06ffb88d180c16251936a172087584178266ad3f3deabcfe40e1298e504443626e3cc57343268dd2d1a5d9351afd322feab6ec47fae7c2b3a9b232bfbf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1bcdca094338bfd0d5453261af430d0

    SHA1

    33ced8ea7bdf6a37fff3f4d7ecf543c297159672

    SHA256

    20936cb04a21e77cc02517acdeccdd2e713af70f5ccf2717aff41a97c5291a50

    SHA512

    458ef09276c7dfa05fb0f599882879f682c680cddc6b66ac79a75cbb78e7dde60846edcf18c446f9864fad202d268b82e227e0e584cb33d532f2c1331b0b49a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3ce122d5f79e741173f8ce22a1853a3

    SHA1

    9c5ac376de8c4996fd31b4fad8c8360366060033

    SHA256

    3ffc5c03acd4d91e7a4b1246b027e6eb8c0fef644cde7e928277f8d2d1b8abe1

    SHA512

    4d0be9fcdad3bb97bf27918c5ab4540195f56c38c4c6e4d4c63da2dd3e90db32101a88edad14fd384939200a3da425e56f4a2aa4d14bf5ea94e00af921d44693

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1a695fad9be4bc00934d72ac2bca650

    SHA1

    5b4c722d950982a454c5510e6d9ce5a1ea6b14f9

    SHA256

    6eebd192101e9714c0d1c611a980187239bfec26f4d37f27fd91186c46a5b7fd

    SHA512

    290eece869842772b4ff51eba9e6eb9860e94356b53e0bce4fc6be50bb9472b788adcf3cf59b2235161f8d35ef5e48ac746152e67d62fb9b9202b86c21ea2646

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db22b3e5c24457e8f7a1c7d5e8f15593

    SHA1

    1e36a65a01e065b21b08d362a987960ed7a5920a

    SHA256

    662917161fed553cfd332e5ac249918493ebfcd8eccb9561ba64503399189f3a

    SHA512

    40e0e1122cf8b4d1baff94f7a8bd864d5f23a14e2cfb97c8fe4abd86eb6413c0f204db6b20cb05ea959abeed6a5a36d9aca27e24010bcadda6c4a9515213f0ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8172ba53dd3fa768cf9b3b993728f5ef

    SHA1

    49767ada0692b6029e4bf412d0d4e095c429c325

    SHA256

    f65a6b8c428e46f85d1a745c91f8aa636e5943e6c1b320e0813112bee9e7c000

    SHA512

    59e891de63c75852f866bc7f7ea2074f6e942e878db36338a23ee870bc2325d34631565272c6b432d1afbc605e36b9135702c96628c5019337731afe03b60271

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f72c03afb9d7dea9595a632adf64957

    SHA1

    e5396649b0db89ae78e600997ee7d3215516eef6

    SHA256

    77f7965077e5f2ba654c4904f3758c12871abb8d2de512ece411a7bd68e479c8

    SHA512

    85ba42713ccfbd9d109e889be1587db6dcac95aa61d91c9bcf46755fc71614e62b26522f90d706ba72cde5be3753946ec9e828561deea266f7d9ad297471f28a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f76ab5fab23aa5ff17e8c929a75dacdc

    SHA1

    b7adaf87811bba500a595a03fdecae13e49830f4

    SHA256

    4aea064579646a7d793bb8c85764f46ced2884f01c3bad6b3387a377d4c0e303

    SHA512

    c02c6d2041fd772045b2ae330c9abecc2f9dabc225bde88b01a71f236f73b20c8bd61d59a436ffdc07ac499a79aa69e50848c6b6b7bb6d29f34d675ddd1fc834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98c646a53d364329b4b3ad6696d6fe05

    SHA1

    33d53e2772930452b133b303650f73a361a8a6db

    SHA256

    f6bc68a94e86662652701653bec9f5270ffa872f0b94921582163e090d488d49

    SHA512

    46d48452747a93d7c3a890d62dc429c7d08c63b9ebcecac13ee1a55ecd33a570a7f8a652b5d6384768a28c7b6c94aa21b8df9f00535ce1c1fb1e681b11f4d823

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4edb83a30c36f7af26f811229c1409e5

    SHA1

    6cceeeb60479a00883030d13d17f9446b8fc59f6

    SHA256

    67c737c6e0d980497e7b8f90a3391688f173aee9fc5362eee04a16dd9a979d6e

    SHA512

    2b2e55341a48789da1d5f45bbf5cd45211597e37fd755c3c5704ae63f53fd83d259c6893cb255ade81cc5ab360fed9e3786cf04a6b7f2c25232b4308551426d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4fe90dc01f96684ed5d25fc8bdf91c98

    SHA1

    0cd2e6fd0187af0b0749bbfe67574bc63a4d5fb3

    SHA256

    7a0e6edbf6403aa2b4427f0e5d5948bc10514be557b73540fe87a1a2a9bc6814

    SHA512

    6f3d207f8af1f3ec234904f6cdf2a19d4cf842b82a8754d6d852cb3e5bcd3f32a61ac85a66457a6e02c63262d2bae5006b277e94b45c8bb76fc6135e9fb3e0c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ec96bdc503caf976a4813b392e8338f

    SHA1

    cb044579d4808d44a5aa48c014b9e6cf99ae8312

    SHA256

    08ab2c669bf9dd289a3ca99ec3e201b19a76653a38644d487bf1802b23517936

    SHA512

    05efc0b883f8e944e0b92416ae6652cd8ea5b3bd6995cfa5a9744d8ce6f4d32a3a9fb3114601421844c6bad4a004089cacfaf60f8ff81433e0c8d6baf17765dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4c7c8038d48c38ab2b61ee83dad0d66

    SHA1

    386529da64f4b0ec5c0f7f1ed17135fd7f72ab98

    SHA256

    6a24d005174486ddd91cc56192b78fee8d9d5099540b4ad8d34679bb880a8302

    SHA512

    53141e18d376fe89d98f68f08a03c98fd133ae4dff2ce475cb742a06ff37332fc6acb91dd16dee7f42c900850bf5e395460f65f65d1cce009098b9214d92689a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a086cb4088549f6cdee09cf459a33ba

    SHA1

    a005906f6c7d779b2e73791a972bb6031b3cc573

    SHA256

    8c3011ba4dbc3580049af0cc5bc647f088d2d018fdce278be9c6c6dc6b2f9ee7

    SHA512

    87d33f40b1669fab7a7d2dc9ed61dc96f605307a826103e620a3088465f9ff392fedfa852760ea95bd6573b67c82b25eb8ebbd8674f2e1e1bb124aa7bcf977c1

  • C:\Users\Admin\AppData\Local\Temp\CabFD94.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA63.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1820-10-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/1820-16-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1820-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2264-5-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-18-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-19-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2264-24-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-7-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2264-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2264-23-0x00000000002A0000-0x00000000002EE000-memory.dmp

    Filesize

    312KB

  • memory/2264-3-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB