Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 13:44

General

  • Target

    965573fb19b1a5bfa0c0826e24536dd3_JaffaCakes118.exe

  • Size

    1002KB

  • MD5

    965573fb19b1a5bfa0c0826e24536dd3

  • SHA1

    84f35becc000808c9079f6e0457543a3a7bf0a96

  • SHA256

    45586b539a8806cdea216cfa6038a5236b202526c1390ed8357be3a148639249

  • SHA512

    e45dfbc92345d3c17ef1991bead344c2152f0acbad07733c4f8c4d7e08e97cc46c7527939ad1dbf27fe03ee0229025ad42dc122fe06a29d574a1a928ca077707

  • SSDEEP

    24576:hUpYB1FR2369buC0KUU2MuAyKwga41rVoVmPRX:L1vS69F0e2VvKz5rVo0Z

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 16 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\965573fb19b1a5bfa0c0826e24536dd3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\965573fb19b1a5bfa0c0826e24536dd3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\temp\201111622536.exe
      "C:\Windows\temp\201111622536.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\SysWOW64\¾¢ÎèÉÁµç5.3·À·âºÅ¼ÒÍ¥Íø°ÉͨÓðæ.exe
        "C:\Windows\system32\¾¢ÎèÉÁµç5.3·À·âºÅ¼ÒÍ¥Íø°ÉͨÓðæ.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" www.91jwsd.com
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2824
    • C:\Windows\temp\201111622538.exe
      "C:\Windows\temp\201111622538.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s /c XunLeiBHO_001.dll
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Windows\Temp\cmdd.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5f5d2af475295bf26ace683c01b95ac5

    SHA1

    a6936b4c6d4449ec86693dee7b7090af8e4d7b6a

    SHA256

    b815e5318ddb628fa04491e0b7753e8f98f95eba323a0eb767ffffd976889843

    SHA512

    3082b4e9f4097e0eafb0aaba7300eaaa6199e2a8e936d11bc3dff90b9b6c06cbf6bae113185fa682b85003d9b51ed463afbfad692c28924b4b590e90a3979a9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9894ada34d79919e33863471c32b155c

    SHA1

    c2f90c4e21ffa26e063fdacadfca5f3176fda89d

    SHA256

    1433fa7afce7dffb545cae85f7b8a90228278f0fd05d60e1b08a94950cbb0b44

    SHA512

    1aa9ff25bd6b904029be2cf4f71e46d078224a2a8dd85b43d940dc2b3a5a28363da20683c5a08acf449dbbea9ea0d0f3935190194b71030d2b5f05b1cb882f8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e64ec32f11581c884102d23b2590d8f3

    SHA1

    cc4345e86a48593a49096c5a5a3838a152081323

    SHA256

    835b96da9be2188c297ebc372417da45c8f2c646120a7dd5cc92fde33fda09c5

    SHA512

    33e450cc9cb52d3bf22706408cb41e72b6f970ba65ae95fcf0c6301248cf1e226af5adc69c4e4ab1c2c7b89c8c208507645d410ceec23d7a55b8211c66b4a781

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3f31d80c5dafa4adda045a91ea94996f

    SHA1

    2f0f3d0b4de11c3534b2ea6eb9f7a6600f2e8bbb

    SHA256

    476ba5acbfea37c95307ad6ac147f6e0acb85ae54e0f37b24268acdd084ce10a

    SHA512

    0d272b259b85d64c69d172b8a67453e9a743a9ca0e17a1bd9dee5b3524a77e53e3421d052d127854848810391d6ece264b7c1d4fc90e2e84bdadac0473fa3596

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d7eaca39e2707873536da683a970d63f

    SHA1

    67ccf24561924711df0ea31b0b20227ddc243b24

    SHA256

    7f142356624cddeecdb14cacbc453200af424f8aba074dd739be69f375d39bd2

    SHA512

    3a255d26087d237188c097bf6cc09eee0949882ed15a9c2e948d031eccb809699406762db15c6924867c6e13e2df5ab37223a7c976aec2c65e039d1383e29720

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    159d1e087fc51b0efa12af287f58297c

    SHA1

    85f74dbfe5a53ada8e97f8f89afd5068f5a0742b

    SHA256

    ebcd6142d4b9f4e986d90736ed7a38838c8fbacf3b9fe3770e7202799064629b

    SHA512

    aca14d9c78a3e9ecb7f6e76efe232d8e6290c192d7f6996784de4f980ba809fb6c99253a504fc6373dbbe2a66a27b5593566c72fac288c10d84cd6d36d11e499

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7a9606f2c419eb911a3543ff1e5d65a3

    SHA1

    54066e5880b406309566b1ba2bfa50c6cf7034c6

    SHA256

    8ac239d726bd8ea7ce5cc2db33ddd6cfa5ad6037cda6d4bc668e26d0fa1b39d8

    SHA512

    3835b60a16e8334f652fc7fecda989895840bcd28713d8c963bd2c2b8a44be1872de44c2b7425539f9884a618178e6a3bec78e7a0df22cf1390150accbed82ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    90e095a8a6f57268dd8557d71d7a28bc

    SHA1

    754d7053e96f4f9daf558aa59fa3f3b5cf52bad6

    SHA256

    16c263a5f7ff6af1984340d77b0bb9abd808ede68ae1981241a2f475193c1edb

    SHA512

    3da936d8a70a980016ef7ac85e8b838f9f6b10929bd36846902b6c8c6bddea5d129cb7ae24ea821cce29f2514885a02ab39f450dcb5f0760c191069512d8eaa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fe468e3d37ef3187544ef26bcb779d73

    SHA1

    13163dacfcdce2aaac4f7e2235cdcd0b574364b9

    SHA256

    ecc8a71a7ca5fb12a6c4c464e1597d2c164937f54e2fbabe85d9396037662491

    SHA512

    829c7c784176f36fb7949a6e525c80f7873699018a01ebf0df282e5d71ce9cb18e6034ec9521bb6dd9bdef20c60896ecd8d00f77917cbc3e5af1f9287242392d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8cd86ba2db62ef9abd97d12777ba9952

    SHA1

    de57af0e72ec9faab61321f52d89d9636fb98786

    SHA256

    10338e3acb82003b4ffaa5077c7599a7733b4fd372b6e37259f507d253c659bd

    SHA512

    17876757981e1966ca789ea8c5147c4a4af84b80ee303a1b73219af3be2fd9e4909a5d096d1fa982ecf86b409d5f76ffd9138059bd517e8bdd19d5898c98fd0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    fb002884718d03111ecdc71769862e80

    SHA1

    e8dda54fb0ffd318acbd813abf3aada21f139f3d

    SHA256

    99b8c384f6a130c4c520d3ee992caaeb096ffa8144a2c997cc9a6b4ec02520af

    SHA512

    9977ac773c12b768eec9aa1cbf46739bb57cc1ed00b806e25e9cf69d3ef15e51fa9b20391d5f2aea3e72e0c07f1bf197bb6db22805747099025eaf71dc30ab3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    94a404d88ae2fc68acefb73ed47026c5

    SHA1

    83c78ed6564da44ab9fb4182bda30b6b5cda9b8a

    SHA256

    6a099456ab198b8957a03327c3e26348120365998a0312271fa4944858533555

    SHA512

    e46b73a7e543a85b3abb72afaf29134ac4261e109cfbc78bfc71fca0486df7963316abf8eaad93a2e33e6249c2f85c434d674c84df149195793df01d660966f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0ebc899e79cbda1ff0b55984b648cf64

    SHA1

    09ca74018f1ec7a03ccfd3d37aa6787c6983fe65

    SHA256

    70b21bd8acc39173cb563b77800e237cea77c116cc6387cc949ab882785745e6

    SHA512

    2009fb4b7a28e3f94ce8063068207c61da1cd00f340e332a19143f8360fadd358bfefd95d095c094d1e302ec3e11f67e2f4a74b253fa8c24b0afa07fea4962a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1061df0cf12d1df209e560856c294f18

    SHA1

    95dd5cfb751dbf7913cffb77e641cd1a4a474b1e

    SHA256

    2ab698a168c04096a9b73ce4acf8f958ef3f274b5987925e63b52d11a64ab2af

    SHA512

    9b441254321fa6284ba486caf2c13024bd110e82190733ee477ac217862275f494070d3e46d97bcd20956d16405aadf161709b099e243ca7d440d2e8f8e0784b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    82edc787f976200eaf5551d6e3bb82f4

    SHA1

    c182ad9c5fee23cb0b3b1078ceb58b3b0daa647b

    SHA256

    d5c88797924cf9cbada43573b13ec8745dbfdcca9eca4522636dba26867e1b6d

    SHA512

    5f47b69a7e7ae4b7a999d5f34cb6a4d4932beca6c9607609a9973ac84ac5d374eb3c754bbfee44c08080035a57dec77ec44783fee28ab9e27b7aed812aa6e6e2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\bullet[1]

    Filesize

    447B

    MD5

    26f971d87ca00e23bd2d064524aef838

    SHA1

    7440beff2f4f8fabc9315608a13bf26cabad27d9

    SHA256

    1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d

    SHA512

    c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\http_404_webOC[1]

    Filesize

    6KB

    MD5

    92ab50175c4b03970f264c637c78febe

    SHA1

    b00fbe1169da972ba4a4a84871af9eca7479000a

    SHA256

    3926c545ae82fc264c98d6c229a8a0999e2b59ed2bb736f1bda9e2f89e0eeac8

    SHA512

    3311f118963ad1eaf1b9c7fb10b67280aae1ab38358aed77c10f2587100427af58c7d008abb46ad0f59880ac51e50b5a53fc2c2a96d70f5ece4578ab72382b7a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4MP1SLKR\httpErrorPagesScripts[2]

    Filesize

    8KB

    MD5

    3f57b781cb3ef114dd0b665151571b7b

    SHA1

    ce6a63f996df3a1cccb81720e21204b825e0238c

    SHA256

    46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

    SHA512

    8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4MP1SLKR\info_48[1]

    Filesize

    4KB

    MD5

    5565250fcc163aa3a79f0b746416ce69

    SHA1

    b97cc66471fcdee07d0ee36c7fb03f342c231f8f

    SHA256

    51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859

    SHA512

    e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\background_gradient[1]

    Filesize

    453B

    MD5

    20f0110ed5e4e0d5384a496e4880139b

    SHA1

    51f5fc61d8bf19100df0f8aadaa57fcd9c086255

    SHA256

    1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b

    SHA512

    5f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4UQ4J2DQ\errorPageStrings[1]

    Filesize

    2KB

    MD5

    e3e4a98353f119b80b323302f26b78fa

    SHA1

    20ee35a370cdd3a8a7d04b506410300fd0a6a864

    SHA256

    9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

    SHA512

    d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\ErrorPageTemplate[1]

    Filesize

    2KB

    MD5

    f4fe1cb77e758e1ba56b8a8ec20417c5

    SHA1

    f4eda06901edb98633a686b11d02f4925f827bf0

    SHA256

    8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f

    SHA512

    62514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\down[1]

    Filesize

    748B

    MD5

    c4f558c4c8b56858f15c09037cd6625a

    SHA1

    ee497cc061d6a7a59bb66defea65f9a8145ba240

    SHA256

    39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781

    SHA512

    d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44

  • C:\Users\Admin\AppData\Local\Temp\CabBD5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC94.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\¾¢ÎèÉÁµç5.3·À·âºÅ¼ÒÍ¥Íø°ÉͨÓðæ.exe

    Filesize

    2.6MB

    MD5

    166bf604c435928f3ec87d9848c04bfb

    SHA1

    782a23928de85f15c5a03d496c03226b366c9352

    SHA256

    914cf169636dea8a8f63f9f388aca30237fb73d996c09b4eb847abd011d2dd97

    SHA512

    a2da36c6581528ec63a5b844f08b9e896671569153492763e875119a2ed4668c1116154bdcf369d7cdda78511a7f5f9654f32c7aba318aa6fafa156ed9efabf4

  • C:\Windows\Temp\cmdd.bat

    Filesize

    121B

    MD5

    2b9f807de3f9cc53aa7360b62ee8e85b

    SHA1

    2c4ec11337683b444da1626ffbe794f9088dd328

    SHA256

    c28977265bd55df501a53275213b55554731ebad4f55d13ba80a264ebbed7f87

    SHA512

    704c137ea4ec078abc4f68ea43d88f6b7ac998b71ea8aac7264adfb6a744699c1e9747265c202ec796d707b36c9d2cec0f226f181de5b8e4972c78fdd7905d7e

  • \Windows\SysWOW64\XunLeiBHO_001.dll

    Filesize

    68KB

    MD5

    a5ec6cc9158578271f0b4e94d8ae739d

    SHA1

    26239f1ddf8e5e172e01c15f09801f7fa3d6496a

    SHA256

    f01457af41bca243436e40b3062cd0ae29812c97bc6edb7efc2d0c4293c8c5e1

    SHA512

    59dcf92028beec30c4027d4d11891913d325e21c2cb134f1c01bee510cd7b27a38d7c8f74d19c6d30cba9e376077962effc45d8aa19d47ce637dae23421df71a

  • \Windows\Temp\201111622536.exe

    Filesize

    3.2MB

    MD5

    5271c56c881d68153a9378b2877d8e7a

    SHA1

    4a732c3e102f7c2ab07a80775258770d052e4daf

    SHA256

    6ebf3f67c7a048fac21f68b0970c29e453aad018308a02a2ca97801cb3853433

    SHA512

    a80591b695de10579525ae0f74ddb27b8258e891c5c3c86fc5a1b6d28d9042270720f712017cc26dc9d87f4ef8cd65bb70c7d9b27e84ad257299acea1e30b291

  • \Windows\Temp\201111622538.exe

    Filesize

    116KB

    MD5

    e1a7f4ef23c9cf6fbbcbfbb5efb4acc4

    SHA1

    5707e5744324fcb9f1911a062610368609464814

    SHA256

    b3d86f429ddc83d4fe1cbbf2233a21ac220f632ce41362e2609fa5c2f64a49ec

    SHA512

    396dc5c1f2e9ecb33e49e261f537dedef38332e2544c1f5a7033fc1c27f7ec13674e4056a89853e53972ca3a639d15d74fcd33ebf54d6d988fae3989a9ac1264