Analysis

  • max time kernel
    143s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 16:09

General

  • Target

    96bb72469c95737e7187415935169490_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    96bb72469c95737e7187415935169490

  • SHA1

    7a8cac3e54bca10f7cb1d2d94f089454deac0bec

  • SHA256

    b2668e06a10e39b744648675ce2563b6d700eec35fce23031b27fa0bd9dc3c30

  • SHA512

    235503d3e2afb5359a376f0de8d32b2a367aa71037f09deaf09b9701815c2a486ff7da60c3daf55a04296226db17ea094c8cb2de800342bd480da401c18ae164

  • SSDEEP

    768:MfpCJOu3oXseYmTP4Zj2gYt7hz6+XiH1WXsYhE3ZsgfMpC6l2qDJJS9Qe:0CjoceYmTQUtlz6dH1W8Y63ZrMtwSSie

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96bb72469c95737e7187415935169490_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\96bb72469c95737e7187415935169490_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2780
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\96bb72469c95737e7187415935169490_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\jjjydf16.ini

    Filesize

    108B

    MD5

    fe1696b505ed541c65cc91bf044fb6f6

    SHA1

    623a9c1a79b00e48d6d13f9365f55a4e61c13846

    SHA256

    cf57d27394fbb4cf8dab6d635d18bf0a6120ac92de63d1cb7aa4903d3b2f533b

    SHA512

    73f59beda7287e9f4cbc0c7c49b5fe77026ac1f6a406ed88c5e8fb1526ccf843249d536a1c181c8f7075b0eac52f44feaada819a8350540095b768886dc50769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f331d3a5a76b394af1b7e73d8bfd6502

    SHA1

    d7a0c522c3859fd2f6da1f7e7b1fe3acada94f41

    SHA256

    e1afa1321bf1b0784d12923f8a40fdd8678516f1dfd3c90d8476fa96f21813f3

    SHA512

    699303dfac58280cc140b5fd0d609fedd0fc5e9d0cd1fa5e546cf2579f2a39463b2c3178acbb5dbf632b8855aba41f53625a4604d792f7b285cc91f59c85c80f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9a593faeecbc7a0028e4dbb7a48c82b

    SHA1

    2f616d518b06d9b5044062ed7be76e3d4bedab91

    SHA256

    16fcb238662326ff05c29513766cd9b0bbd9735a52945cba578c190f4720a7d1

    SHA512

    39ab5d1171fd8e85a5ea248ebe7ae87459c078971f388351d4f7fcae32a7e53c3f624ae07130d4974a250f20b96488b3587e00b836e56e2155caf4f7dfc96933

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcef0d1c1024c8d24e85bad68d0a7048

    SHA1

    b2417fc30d4cf3b111eca11e9629136204280ca8

    SHA256

    9ea55a75fbada735e09fcf1bb0f67aca7603a2da02a390b998d45adef6cb5902

    SHA512

    c361cc5f748d94273566fd30acdcef9b4b2a606913197ee6c0d7429c53d1731dfd2408569369c7183c0d62bceb1f4019892adc08e5d2fd2f7e69161f46a39c75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7b82c2652b31628b21ec03806fd82fe

    SHA1

    8fb4c2aefb89699b93e134d44ef02cc77086df8f

    SHA256

    931f2edf35b689fb6c546f173ed00076a8018e84c41088d59d0066c51d0505f1

    SHA512

    9fd839030f78b509ee19cb2c1894cbe7c6745ba6e576a129feb41bf487f948ad2338ec8acbfda5fccc005b725af06cf49ab56266814a416c494236e5c38d0335

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58fea3f37f1f3eb2d212ba72b889e865

    SHA1

    47b59276b2917ced853eb4e11795c8cf125a11d3

    SHA256

    6c48ae00d034c975c21cbe98831ac329a973df52ad4dfd0eea27a83ed4d48a35

    SHA512

    bfc94ea8a75d1849dcea4026c6e80607decd1d6c04e678ae85fe1a95e562ad79c722347122ca147b957022cad973a0b7e167bd372a272ca82f71f956286e5ee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bfb1d4aafe8c4f528e2f80b737dd0bb

    SHA1

    6b89a0712fd3a2529050708362ef043bd172fb4d

    SHA256

    a31a89b22d1e408849a7c0a95f5478db65b37027ec6c8a49920b6171f1c5d975

    SHA512

    e6686a314d20c45ecc2bd4fd0a68229fe53c1151266d90b5f28cf85afa00595ac5db464569715895e92fa8feedb83382e3f01516b8b6384db5471c5ad7da66a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea28acc3ae35cbd0faa7dede59001635

    SHA1

    6ce8439fd8bd03c3657d83a0cab1f518307f0ab3

    SHA256

    91344d32ff399c3df5c6e17122f747c16f36dee5e45d6703d7d0e3983d0a97ff

    SHA512

    1de2491fc9b478e626e4b18923023a2bae15f72efc596e1769680983224299699475d598bcd0520cd19e8746d4c3e09cd96ec7bf05ee4dd6f18357f3490d5a99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3422d0b72790ae6535e8bedb1c7e58c9

    SHA1

    b5921466cbb3f71f57a69c3012984f1792f1f1a4

    SHA256

    3420e633f0a61485f171ff7dffa30b52981c93cfbf056fd56d94298b70eecfe9

    SHA512

    a92deea9cf113c551c0439bde7ed70003ab24dead4715c3a37e2eb6334e0efd35015deb548ce05cbd3183ad9c1b3f7bbb358d76e5a23e421fd7d293fc25f38fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dc347d297dc4d07f69c29e7c095ca57

    SHA1

    baf6200c8b5cd794274706633f796ecdc92efa25

    SHA256

    cd743876c30d6c516f4394223dd64ec00a6abc8312ea1f400fc3b763aa4747f2

    SHA512

    5de6de28ad306cc76ff949c24554330c8f48e8b4cfd210445d316d5dc806dc8c67be6fcc3b7ae9128cf551b71e368ae74a20a5d5e14ed2bdf0f091fbb2dd9b60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ec84d450bba5922dcb3e1c65fa90cfc

    SHA1

    541d7481aaede9ec8aefe434d3433b63830774bd

    SHA256

    a2e42d23aaf8df9e04cb9531ede0742ab6c9b7cbc25f7b925603477389ab2c0c

    SHA512

    9949fe833e16bdf7916779ed230e00519b9628f20882fc94db7b6624bf5430ff86b7881fb9d4392ea418b23dc0cd491501378bf3ba542afc01148192efe9fe02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e88cc5ddf618790eaf297cb549a509e

    SHA1

    3c4a62292fe31323de77a53b786f5bd83dcd1a32

    SHA256

    1daa8aff5f563b8c2813221a78b73940e61f3cd522498f0f02e34afa18909f05

    SHA512

    1cf68ee67b9202ff769bd460c6df3ea458a32081791dbc6e6f3335c12ea194e7194d8dadb27fb2098133ab2233e1d778dee53ed3090a12354e4e8b46fd49ab2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2709459da21fb743f9b11dc64c98ca7

    SHA1

    fa09260dcd1b8c4ccf6da438477fb5d7eec397c8

    SHA256

    f48af3eb53e03f6313cf5133099eeb3a29551f672234609fd384fbf37919060d

    SHA512

    b7f5e50547e3d2931b38657fba434624c034bd11b2cbdaabeb602a07899b5e103ca3af1dcff9556f61172390fd38f360c79340ba29630f78204c8cd9b2b98921

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6621b9cb3f766eaaf43121d29bf14c0

    SHA1

    953f153cdc66bfa7d337694dcdcbd3236e703434

    SHA256

    370c98e544f069616d853f49735ccb43f5ab7037dc3a395119d0c55ce507ffd5

    SHA512

    ef19749496f0b986c68c12cecea097af2121ecac20c26670571fa08f2280f8fdad905ca1b6c081743b04a9af5257632691cb35950913e8a8138d242bde1ef814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f487aa48e8a7e23538943de35cf8dd8e

    SHA1

    07bf06156649ac4779eeca8af367005a96446cd5

    SHA256

    5d87806c11fc16c0c4a01b5db4d09ccb9c06a40fb68fda1ad153b98d8ec47b22

    SHA512

    df47bcd81cb180ef24ec2ebf82c577c87be7f058880d72ca717e35534fe910fa0afc272d7fb28a8d7447d50989e68d857036a7cac259104c65154360c4ccab9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad7c21dd0391836120b367edf5099d3d

    SHA1

    f66663b4ec3558f8cf1faacf218c1de2448ea3d8

    SHA256

    74766df5e357c2d94d1612b6efe7eaf499992b359341ffaaee26a5538bcca898

    SHA512

    506d37a342da706517a542aac372e29fcce82ca978adde247b1736f39dd5f4eb5c577b4529ef7b3c2e2a1ee9c3c8c5d960456aa35c4eeaf3feb80f3575f963c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e1d5b3c766cdbcdbc7d12e310113cc6

    SHA1

    51a497de89fd3ba41eb88c4ea389dea3bcc1d08b

    SHA256

    038288b5064f33399b4798b27b066c0d15cd784c7e3ecfd0ac4e137a31191a2a

    SHA512

    4c267a9bf2164551b08f6761b2307ad187e56ba3aaab78599dff01949a648c81bbb4e59ee69e4e0854acf9a415fc72efcb7d2a2919ae7a7817077790facc6752

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c05df192e426e7ce823e163da772d89

    SHA1

    abe465c8c0556a6632c98e1a94b59c96199b3a70

    SHA256

    7a0fbffdbf7b67e80cb8dbea134e4d2aa44ef3ebbaab875477825876fdb390cf

    SHA512

    8b417609afca01925173a8c43905e0cad1c7461a62ec56aa16b474416fd47bf1fade67378ad7cbc0414210a4e7b866e1f19a137a2c84cd178c0039fbc207cdb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68e30a68b8c2f556bb7a9c257aa8e840

    SHA1

    42c11f186c0cf7ffa37f4fe2c664ead4beb51fb3

    SHA256

    a614b49be47f4f9b978fa8fceafd51f5be0bc7d5b2ef47ffdc2e53a0b68c87b2

    SHA512

    5806fc93c5942b9d71e47c42dddc991840f012eae80897fb68b9d0129f5bf52887cec064cb11d6120be32767e8935428f6c92e6a2a8762d1919bb7609be049d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a93b4c81876ee6b39186b6e5ec8796

    SHA1

    3bc4afc9e14036fff9a967b0a884ac244b0d1587

    SHA256

    fd453392e2ddcaecf56e36900073953767aefa1fbd39e84d45f2264186d95bff

    SHA512

    3f595a0a342b5236e5da55f10e4f22eba262dc83ca855ded0cc9cc4eeb3a995fb93621410572fee09c78cf6c3b99a36710b1250bfc482293cd8f890f37df266c

  • C:\Users\Admin\AppData\Local\Temp\CabA151.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA20F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2312-12-0x0000000000690000-0x00000000006C1000-memory.dmp

    Filesize

    196KB

  • memory/2312-0-0x0000000000690000-0x00000000006C1000-memory.dmp

    Filesize

    196KB