Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 12:36

General

  • Target

    8ec64ab678ed0fb02a920fca8972cec5_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    8ec64ab678ed0fb02a920fca8972cec5

  • SHA1

    1122324d64704dd7fc5580445654ab0ca09a39f2

  • SHA256

    1f756b82fac4de368c5895f49ef5de8704251ab42da4d717fe7212502964fd42

  • SHA512

    e72ccdc460f40efd9f346c214658db71fb6678e34c5519a8fd9abc3240e3f2a325125abbccba30a280f0c3b9655d8f1cb5afc80f39f59e22c64f7b8aaf6df696

  • SSDEEP

    24576:lCTyxTurh6kkPH0La3TlQiUtKr0uOXbJUrW7NmiJvYnk4LP6y+B8FX+1FVYN:lCBrmPq7tKgbXCKx94LCTA+1Tk

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ec64ab678ed0fb02a920fca8972cec5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ec64ab678ed0fb02a920fca8972cec5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.59tou.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25fdfac1f851806c6c397586328ea5b1

    SHA1

    d399161f4beac30f43b6ee3d1fceb0a43235871b

    SHA256

    d8fb511cff9eaefe6d308fb83c9e11bb22ef454b45fb2ce3007ba44789594145

    SHA512

    1fe2138dcfa8853b8cd52502f169d8fb9295dca1df2c22e38b671e01b75be522d767c0d5d3b9a3d2e0c481e75175b1a722cf6bf61331b32fd1b2f971009ed68a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    719dd55e5c0f456411bff68075beee99

    SHA1

    c14b88a1935130ac0c4b446805f14e52236cc821

    SHA256

    682efb29f5b7a5488b462e9dd367168439704b82a4ff133a0c7d94f9ceb5cf7e

    SHA512

    2d3ddeaa99bc5f346e437ecfca5e3dd18b3841da2e2b1ee9d0b003f25866e71a2eb11c4b6b95d0513699ea8933bd65f02afa83c9ac9de8b4cee2b44186d35853

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f3bad27ee6784a9f09166306398e6ea

    SHA1

    5fc191ea235efbd293fa246cad7e5d19c1459878

    SHA256

    7791961e1106c5acc558f86b4a7d5d4abd329020b1a59369484410dcc48c6b3a

    SHA512

    cb107debe8afc2ba751b7275fd4c39a2751ac88cb7ec18c8ed68faab5490548faff6a8abcce2987b9b8e9a56e982909e4404080d39d1ac41d74715479dafc34e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39625495d4f1979c62d9ce4f6e71c6a3

    SHA1

    9af4be32dc6709939eb70145e3bb09afa9a43703

    SHA256

    a4391fd43a439cd5b2444ed126773cb798d0e1d9478391642eaf523dd1912cb2

    SHA512

    62ec763f14af34f0933db2f2252c7354db891b2d05afdd6cb1c042e07aca93d53a4b4fb14ac9fa3df11862e6cad22c62616bb638db7397d11eaffe52489aa46b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2200cf9fd0641051c31f2ccfa9032cda

    SHA1

    0fcc14d0ceb5fc0ae5752d4cc42b67553fe8d299

    SHA256

    9ada82af46fc6233a7c3132d7835e596ba60975cbc7d0004a1e2738dfc24fc53

    SHA512

    5b59f210525bc79bf38af91fc68d59b7567c1b972409d5f10956c6af4cdb5806069ac5ae294435e248f7f4ebe247a4b97be3e0fed46742e41e54e61c6ffdbf24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41a085c0760dac4ccc2c6c16d607e1e5

    SHA1

    705c76d8cdb57e2cf345492d0e799fc31ff2db0a

    SHA256

    75f28a89ba86696b3ce4c98ae19a800420b635c6a71b325f8312667e5cf3c681

    SHA512

    ef820183def232876c512a0fd67c8ca2c3c69f89fdba592d24110af99254043f93a6f76c2a20993da5fcb469cf7b872efb048553fe45cdf95aee8fbcf7c193a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2b56750c35232d0ee44cfc8f9ac1a92

    SHA1

    6df78d80ed795866dc232b260a470d3f9928f5f1

    SHA256

    a353f61a56e8535dc032daf3a83063b750f63fdc2cad200650b23dba2713c4c8

    SHA512

    f3ddbfb8607e61c1279e5c1581c75a131519f062d7e0d7118af6d7613217c6ef5b11e25206d1c2368edae80cdcbe5b575708325b182125fe34483f10ff421d72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2960fa71059fa5c82219b2f249e035b1

    SHA1

    aa4b959b7ad8c88fa4ecd565087e41a8de16ec99

    SHA256

    98a5704f6a72a95f95e049662db459da3369b030c1c6a2caffbc970973c48862

    SHA512

    823cb331b4ac2d204301cd0dc2452c879249ad705599600939ec7cdef3e62c03300a695ead9b520ad760711ea38f6159fbbedcc5674a61bf21437c72dbae8fc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e89db39dcd3be7fdf43c69e15965ba7

    SHA1

    25b95bcd7c4e63835d6b870942888c144d3bff09

    SHA256

    795ef5703e203e0f2a9ddbee1c905dd0e5d5aed413c5d37d6b6142f6d07a242e

    SHA512

    e81bfb616fb4516208f5453f585772406ead29a0cbf99987b3df174ad50e8b693cdc2f6576e8a80ac4fc3184f2aaf05c419deb5f248c2b403fc20207522fbe81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ea0a6abc68852f0b1a119714ff09a07

    SHA1

    9c034deb6f0da89e077ab1b84bf2a468089a9bce

    SHA256

    fdb2df914585f9790b4345d56e2ac6d25113c024519c8f0ef4ae2c923cac1dc6

    SHA512

    ebb36b62a682aef07bb7357865dc37affee01d9af3b938b638b6fb8e410b59ccea54d794cd2e8cb6f94ca6d8f76ba85c2831ab690500afe3f2ae7143c7c770df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0acbfee5a26c7b5a86a76bc4063df39

    SHA1

    e56876c8d75cb03fefebbaf464585b49455263f7

    SHA256

    0d6e2e53d879b5d5647a6e4666257610056a4282a00e77ab4fb38382f9bd55b3

    SHA512

    81896efd552ba28588a2ce71f627ff3b7535bef428002a4a2eb4bd83d666f917ff9f50db90a4249d9865536f55f8721d9bbca2998ce5bff920eb8f18bb5dad94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abd242c072d78b390e027531fff8ab76

    SHA1

    fff0baf635599a9442a5eb017ae44af6d665cc8f

    SHA256

    7b989ea1a7a8e267e274a68deff2d60ce963f897f7cea9b870574954e1b691db

    SHA512

    ae4fa2824248159074bacbe2aa5ca53424778a64b833161247fbf6687b35f910fa111f2dee798be655cd13fa1d399adb7ee64569d558bb2403f343346d9be242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2f4b41c9d340e889b40941e7455f5f1

    SHA1

    012cfc08339e924feaefda3c48838dde524f6c97

    SHA256

    53e3b9fc1357a09fd3bd796be8f4cbaa9c0e204f16f9396cc6d5d3fa1d1e251f

    SHA512

    07faaf741a65bf0a996cb216d54634c9f64b49a69313c63f9bd67b139ef379b16c6562105a2eefa768274d25ed5389583d4e385295bb4112a50542b104021749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3a9406d5db2955a9527a1e31cca6903

    SHA1

    985ada3818658892bc252f764ab5a9cb10e26adb

    SHA256

    1de99befed4c1ca738ef84b22a7682fa1eb738f7d47de23d496c523439333c40

    SHA512

    ed846602c4911a30ef8993e4ad3628d7cf63716e84269fc3dce6669159e2100e21c1307cfb3bb1058fb405bf2b84c7a189b20e8ef6c86622bf5644bc1c2b57b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89be01905483b54405f706d5d12ba270

    SHA1

    0a195d7aa07d23c515c57a46a54ea4a52fc6a59b

    SHA256

    cf3f6ec7db74530d8505579a5f996f35b53fd4bff662ea8f839e8817f4737390

    SHA512

    0d9947f602e8e08a5702fd1083ffd75b9fe0f5e830893e53f8db1f44c88733b7b97652bfb8b4501c81fb8e1a7545a61387a3e8a885cf06d4db271dea1c01d39b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c963a4b0e7d83db1a6d12bde26f5e88e

    SHA1

    7e2b803d206f6d48de96e18dd3c470a6c22f113c

    SHA256

    ecdf1ceb5b19951cabf564a53a097443fde891a6361312699be06cd1f4b4da99

    SHA512

    010ed83f4b2f883aae8fc4e5efd3454ffa9d02145d95f2dc58d8a156d1d24004cba4d9819cdf338dc47c2572db5da34bc01bcb877267b041507a570035ed764e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23c1cc254359b5b77c88d4c2f0271164

    SHA1

    bea62d8b921c92fdf5cc7e8679cd20fd44fb31c7

    SHA256

    45a02d70c82ea5ffa3f8664cbd1dcec99f5f5e1570d85cb6db6eb385ec0b429a

    SHA512

    58288dfbe1bc71354a29b47283bc1766768512943341b2e7b05a96aab8b2e8d737ca4466eeb5140a362f0691737d8f81ad9691c17a88b5b0196102ce929d1a42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5678000cca869ed0527641b3e667c155

    SHA1

    2114ebbffefa7c0aec548e5d2a3342e2e86cfc0c

    SHA256

    cc921b69a82a0736544e4eb9d994c93884e3e407ceccf4a9aff5c40aad917fa3

    SHA512

    a58aa70862aa7cfef46f42d59dbf0964d7e429fb85644a242285a59d70f296acbfa6950a30196dbcaacf56a1ad9af875ccdf6815b081eaadd8f4679c11494a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fd6e27ffef5c471bdb90a4f6c6f3f29

    SHA1

    3ffb7b9dd1ad4a2dd02d2d433c204d5e5fa35360

    SHA256

    f0aa6c6fa1990fd5307868a5a8a44dd6fd9bbdb8abc43088de467d8f8db0550e

    SHA512

    836595c318204dcdf9655991493eab9694d658fa8cc25dad29427643889c77d1439419e38877cd8532bb1e1573c3adc2786539bbf9332fd8291a9c5778ae0af6

  • C:\Users\Admin\AppData\Local\Temp\Cab2475.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2514.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SkinH_EL.Dll

    Filesize

    86KB

    MD5

    114054313070472cd1a6d7d28f7c5002

    SHA1

    9a044986e6101df1a126035da7326a50c3fe9a23

    SHA256

    e15d9e1b772fed3db19e67b8d54533d1a2d46a37f8b12702a5892c6b886e9db1

    SHA512

    a2ff8481e89698dae4a1c83404105093472e384d7a3debbd7014e010543e08efc8ebb3f67c8a4ce09029e6b2a8fb7779bb402aae7c9987e61389cd8a72c73522

  • memory/3004-17-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/3004-4-0x0000000000400000-0x00000000005BA000-memory.dmp

    Filesize

    1.7MB

  • memory/3004-7-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3004-11-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/3004-10-0x0000000010009000-0x000000001000A000-memory.dmp

    Filesize

    4KB