Analysis

  • max time kernel
    120s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 11:49

General

  • Target

    8ea01ebba618cbbd47e07e03a3cd549f_JaffaCakes118.exe

  • Size

    110KB

  • MD5

    8ea01ebba618cbbd47e07e03a3cd549f

  • SHA1

    12267830f39fa016c1d362ce03ca055c5a6d9548

  • SHA256

    3a2713022ec30c7dfbd3a633930a48b5fa92067f130cba940f02296c1fae84df

  • SHA512

    45b69625910d2f8ad6aba3b5e7e42680570b871ff515f3da4e81b305f5b500a2fcf02ed56523dea0f03106267c3071483be79ae7470ac415652784608a88617f

  • SSDEEP

    3072:sd5D61VH7jIoRMOvTyHEis4QMlrZco2K:CQ5LcUtMPnv

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ea01ebba618cbbd47e07e03a3cd549f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ea01ebba618cbbd47e07e03a3cd549f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\8ea01ebba618cbbd47e07e03a3cd549f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\8ea01ebba618cbbd47e07e03a3cd549f_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Users\Admin\AppData\Roaming\Osxvxj.exe
        "C:\Users\Admin\AppData\Roaming\Osxvxj.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Roaming\Osxvxj.exe
          C:\Users\Admin\AppData\Roaming\Osxvxj.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2792
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2608
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2628
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 1272
                  8⤵
                  • Program crash
                  PID:1800
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:406535 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8c7bbc3ea0a48bde537f74c936b494d

    SHA1

    4f5a70c19361276a5decda0dfe3b8cf916eaf07e

    SHA256

    2d62672bd73cdc71e67ebea0982bc7821ae03c097ea084fa680e861ed8f3d7f1

    SHA512

    4736556c7e824dd823898415bb9d2083df47ce83e5177ca368bd9cb336c8f2dcf6cae3858ee326613e33fea01f79c9f2e80c8cac6035186ab616367f25ab3374

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    255d4f09b53657b75c4ba3b3133bb609

    SHA1

    f0903e6109b435d1f27b41edba0f58c22ef31727

    SHA256

    8e7ece07ced93a2ac453c8a5f8af4cbbcab43df48f405ce569fc9d20c9c4c05e

    SHA512

    b1cbe028977911ade848e6ea12c6b1bfae298771eb0dc7407fbee40edf379076ead9efb17eef2111e1755a75f9c43b7a36ce799b6cc565256dd5dc06b33dc37c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50eec2be8d7dff2ef3f73870ff4f18a7

    SHA1

    23839baa2321a51618b34666b9dd6934d621bf23

    SHA256

    68902a2a9d448c2820e8ae62191875bcd7fc188be1390270746372310facabf6

    SHA512

    d09cf9f5d1eac9058543aae84cc58325022128c4248e575956f1a890323c7c60c75cf1cd14893e9b535a3bf50be981b234f0c080c120bea54ec1be2f18d93868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe46d3046ec0dda93e6d437de3027dad

    SHA1

    491b0f4bd5c41f4439b835c6cb5f3a23fc32dbf7

    SHA256

    f68e5f5155524ab3259c7334c6cedff91849abfef588e1a407eeb08349e5dfa5

    SHA512

    02f31c72127915ed06a678d9660b9e73c61e5589edf8b2f91647c322c6525a1e27cf0a372e76653cbe689924a52dc926ff5e0445e205f2db291336e6ca1b4400

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6427ad515069d49a6f8f4464b516bfa4

    SHA1

    d554fdb4b81659331066e8e03afbf7875ef3151a

    SHA256

    43739f5701b493c601e68b856eea1503d87a983ba321ad7a00936b138fac1b67

    SHA512

    45d22ec72dd48ec2ade52a2733e881b3c5a54b617c2919303fc96195c8c4ba237dee511c4189697bfbbb2b1db5068bcc4ce3ba1636858606510b661af6772e11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43a71c9119c79ddfe3e619114b220026

    SHA1

    7baf13bc7ab2b66675f7f1cff7346636aa98f877

    SHA256

    8fe61feec404c0f372212b1cc9e6ad73dc7605b1980c8b4cc685df6457ba8084

    SHA512

    cf1dd69cec716863162e279e728af8239ceb76a43b60dfe96082e67907181773d931c2692e1151dfdbd68619753fe74ae8a57d931c11e8bff49c42078550c756

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c7535f6af826e0064d0b701efb65555

    SHA1

    f32c7e03f6ce6335ec4920d4d356b1f7ddcaa31f

    SHA256

    0ac579f2d3e2336a09bf300497abeaf9371284fa52246d733e6a9586c52c68b2

    SHA512

    90db94d0e3da8f69ace27b3383ce1651418ba733193ab4702edf4bf2a752026fe82ec33900375d57ef11c5509a3bc56fe1d2562374624787241c3902e8953913

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ef92fb491667b4ff2740d750a4dba40

    SHA1

    51a113edf5ce24bd9f85ce4918c389dffdb058f8

    SHA256

    df510efedc8c23ef9796d1a3fa793c1d806d21afec02bee976ae95eefa755a9d

    SHA512

    8f0a598fe4d9cf15a2cf1c2c2b626d60e71591a6abc5aec88be00c44d3f4e33042f4e326faaca3be6e1ec9dcacb52335d46fd38da0c64cffff6ed7fe4d6052e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05c59788862e43bd1632343d7354f043

    SHA1

    291c9122ec655a78ff62ab8dddc297ef27ff190b

    SHA256

    d6dba7dfb7e133942a2c70d51ebe890c242d66b13b441153d1e04638501d786a

    SHA512

    e74454b7332016304d974633cc7bae21e8898cfac1e0f0f30d2d1bf6dc67a6eb38f86119b1d2b8a95b383534f396308df1b61b770c192d435dc323f9a87a50c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8b42469a87c2b388ca666b1e2231f65

    SHA1

    0944605e0e4417f0773800650f6728f093a1670a

    SHA256

    1435620c2f035f5be5cb043b49b05ce04a109bfb2ecef5c7ade1f5b083ec9d45

    SHA512

    b03b035a85fd15d86663de9a619c9bb49495a9b0fad663ccfa9dca0dfde25f74ab313b40b9f439903f0b27aa2373d52712de25e44c568c24a0236723e9a8c57e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bdc1ce7f1d2e38f9d564479344f35a3

    SHA1

    89853d2f87aaf51da8e58067360d4696e2a7ae68

    SHA256

    9682500ccd09523d02b86f9216bc3eb6256945a2464c4cff8b2c0156a89f4f6e

    SHA512

    ae31631112718fff4da7d399e67a9d1ffcf5ae6b2ecd5038dcb382b6654e5085d347813b035f26874169a0a734a8da059b75fb7b4123f7d9f94872ee8553e23f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3946834cf98d017426ed169eb967232f

    SHA1

    a5ef1a4c0d15c6f864b1a7c8dcf0bd77ae2367b1

    SHA256

    ec5570a2e097bc257a047f46b979eed903cf1578e138f867773cbc59ab2af6f7

    SHA512

    2aeb1f8c549230a4ffd61afec9aaf4dfdd788ab306765fda21a8a95195dbea57f5e870b0408fd5230d94db65ebc14ce7b6bc8a1a1e5347e4eec274b49c6390e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d082580dbe9aba6014885a711b75c79

    SHA1

    a1d7aad6cde5854ab3022659314e829f4aa51cdc

    SHA256

    03cbaab5802483b410b5f2bb24881f015107e8c3361eea426a31acc33455f58d

    SHA512

    2cdd6213b5a58377eed8189bea09bda370d830fa88a4b79d3b7104440643f43fed87bbb9857d2b642f8b140cd8804806203a944296b31f742fc6d9a6856df60f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67be16c3acb4c0fdf5853caec6abc4fa

    SHA1

    ea2819f3c72d57e2e48b68324c6605a6b9c57158

    SHA256

    a97c5b862f81ea29d017b55dac88943799d1c6cb22ac2c090eb8f971624f85cd

    SHA512

    6e52b1dc9536a28c8cb5feba77402fd7c5afa68c3b0e1a351f872c4bcd61a9017cb66acb6eb880e3b9ead653a24245659b2ddcde29939e46d7198704ee5fdebb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b3e832855665c7ac5346970b6987427

    SHA1

    9669fd1f3f87c867967cf78a51f1b05a3b2f9346

    SHA256

    17018e6e04671b14c441a54845b8f48b451023ecfb9325b4c85b2e3258e14bcc

    SHA512

    0fe0b76fdedce916b81241f49164e02e9cbfd61fde2a50a9c2c798039ad0d1e1537e886b12e71ffdb7f6aad45cf6179af176b010b071d3536a67219aa48af0c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26fbd6d17849fdddc9a8ed333a4fa7f6

    SHA1

    b1014a836cb986137c667fb2e8ffbe32572316b2

    SHA256

    c81ffed9af083fe11c58650c047a4ac7a0274c56a3d09e936d551d84bd5c7935

    SHA512

    06ad4e1be4d2fd6a7888ecb93acda8d0694801a64136ef4203c0aaedb6d9daa3707315e1263f2daf3fe12e5b0b99e6d2b7f2fbb89025252c2fb3d8e7f2f844fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1299192a4b08dd48fc4811c7fc20dbcc

    SHA1

    be3d5fab6f012c02c0f22457f8b19ba12e972231

    SHA256

    f526080af8d72b7ea2b5ed5ae66e46798ded735f99125c472c27da6d0dcae8c9

    SHA512

    9b39c39655e4a3c6a9e4d227e85323e00c06ec76928879dcd9afc37ed1e2e0599d861a0de3d9cf44aa31a44726bba67c9a05e3c042389e041d4cb698d40e8063

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2d80a26490352bab9f473de3665b180

    SHA1

    1fd3c55dab656c6b055819c2b66d9ee7e1786e36

    SHA256

    26dae60a40055ea77f1637452dc163547ea6c65a861d139c9c9a2dab819f5863

    SHA512

    d8c03666af4e2290e6225e98bffd6c3fa9cc4b2e92859d14e8bbb18ce1be92e6f60fa77d29181e3757bff0d7a5ddaacca6289314a612c0f92e56ce10243f53f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ea5f638a9eccc89b4ff08773056730d

    SHA1

    775bdfcaf79bdea52196eecb2f70a1a80751c6c4

    SHA256

    1ac20975807b618e60f803bb5488610859285b9891132028a64e32c29aef8771

    SHA512

    c29b7202bef10fa8b1b748b4620b37b0087ec0e7671ddbc580b3461305df82d3f57eecfc6c56149c1262fbcc6ffbf91e5c61563641eeff496f2bb941e1a33cd9

  • C:\Users\Admin\AppData\Local\Temp\CabFD07.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFD78.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Osxvxj.exe

    Filesize

    110KB

    MD5

    8ea01ebba618cbbd47e07e03a3cd549f

    SHA1

    12267830f39fa016c1d362ce03ca055c5a6d9548

    SHA256

    3a2713022ec30c7dfbd3a633930a48b5fa92067f130cba940f02296c1fae84df

    SHA512

    45b69625910d2f8ad6aba3b5e7e42680570b871ff515f3da4e81b305f5b500a2fcf02ed56523dea0f03106267c3071483be79ae7470ac415652784608a88617f

  • memory/1448-19-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1448-23-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1448-24-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1800-31-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1800-464-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1800-35-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/1800-33-0x0000000000110000-0x0000000000139000-memory.dmp

    Filesize

    164KB

  • memory/2116-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2116-3-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2356-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2356-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2356-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2356-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2792-29-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2792-28-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB