Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 08:19

General

  • Target

    a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe

  • Size

    379KB

  • MD5

    a1d04cb7f024937645ac1859c51aa7a5

  • SHA1

    82fd4d31dd0eef58a5aa4fd0625de2f23b4046d2

  • SHA256

    0244faf7eb47d633501d7cd38e655a30fe9b9968cc564dfe97beffe7457ff7d5

  • SHA512

    1c139b9bef5c6bad2303a674470b35f9004fee69121dfb3adbf879f65b1150b249729dc84bd65119426d76682dd5bfec242dbbd9f728d29fde50724b2383a75a

  • SSDEEP

    6144:IWBtQYoVU9ypRgmlCjBsY6/C1ZlV2VRc7EchvEsYd/O8G2X8F42I1bARl7:lBuFVU9y3RY6/C5V2Ve7Ec5gmn2XSfQs

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a1d04cb7f024937645ac1859c51aa7a5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://globo.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    878e122f7de5b70eedd73c11d874dcc0

    SHA1

    63c4b7744b66ce41fbdbb0123af1c6516c2e99e6

    SHA256

    650b89b0457c9005c009505633a60586617a1ed41c0aa21ea218dbfa122e60bd

    SHA512

    815cebb11e7ceda0f5c8aa9a4410a79bd4e8cbb81900e0e8e50b6b7530149335f9842a13e5bde1e33f2b25938a3bd9348403ea6cae77c8a16123f3eb319e4b63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaddf31742974cf0781ef9e944d5ca19

    SHA1

    9e663831efc01a635aa851c13e9f8d5b8045c03c

    SHA256

    e2cb0118ad57e325baf672d04e0eaf51575c0f0f3b8fc7c8b261bffda3fd72f6

    SHA512

    3eb24e3655b6de2e2555ff5359ee809e6eb1cd936be13a338270542a8543ab9ea751d105d43a215219c97ef0780940826b5a8d200de42a03743934147a657461

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f319b86b98f1e6e009e9c515809f61f

    SHA1

    5e3e33672d982d84a38a96c868107ee4acd23cf6

    SHA256

    e14344fd11d015ec6a87506b0e3267368c9436be51b980d88af2df9c6fe749a2

    SHA512

    7ac2e8954fbfc6d2aa7684517b52b8f1b83949f50903a9287a7eecaf5fd2b2ffac2ee401e92dc940c7041d338c2771bd4a3eb9b8834dbae1d40df888b208e24c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2aa5fe03a8e293e23dd4ae97bdbe3c24

    SHA1

    302e59a91ff2489e22e3d4cc71027485ce13c176

    SHA256

    0522bdeb7ba88ed1c88aabb5f28d9ebc886c74ba834adcb5f506c0a4623d0881

    SHA512

    6a673d2fad3d998ba8e2ab63d51f9d757c1039d6140a87e5daec584c545782b0319541b742b20242288d38e7e69c697f2c4874a9527fbe43bcde3c9ec30451dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6964757b45c26c072a52b7aa0250cb9

    SHA1

    640a0d97638ce4f39005196c6985eedba7aeb01a

    SHA256

    c9c4ab5880659aabe888938eba2147348150efea4169550da9608d5697cb07e7

    SHA512

    ee155033d48f25ac76e11d57c4bb152b7cde5d59a4ae76e5b837f6d0a68cc5ac7dbe815aab663e2af01253ce8a8e7f2424fb94d9318cabe5c8d58d4bae74a03b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b268978de6acffa1bb8f6bfae91ccb54

    SHA1

    f895cbb62b4ea4e9c57871f61c19309274f11bc2

    SHA256

    29ba0b44fdec88f172f8e4fb88d686b16bee175b72aa66e2e294a6a791bcbb0c

    SHA512

    c5e15f71256f7d4861b80f240df9bf41b5011018bb449f995c53ec113cd98e09c28a58b31dca5ea6092906bb8aeb23a041f36428394c363876c60505afbfac17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    961bf16091e6d5269337742260c08ecb

    SHA1

    902d925787d6821f0d563454056ea3cf27be8520

    SHA256

    db6e869f2973082db018b220702282ac79db2000e45096607c311a13a5b80c58

    SHA512

    bf188ac59e8447912c3da1c6734e7aba6784de77ce950cd654988ead22cd404f609d8b8e8d7b5f22c417660c0820925d50ecf77540609c8d10aea3d67be86960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a24d32f13d73e6c65393844e45218feb

    SHA1

    446c01b6622aec56a824dceeedb4de331a133bd5

    SHA256

    481879feab7eafc9bb70917bbbf3067d314c235ae72ce69d9a80ffcd17b10b3b

    SHA512

    8079f271c88eaff721472921840413a01cd19635588b209dc01cd0f77006b681d9457c5c01b27b13cfd1090ce38a24408c44675ec1bad92b16a2a32d27d13a00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3011548e9ecacf147eec77e638a6fb9c

    SHA1

    cbfc5a2d939b59aebce956710263c1f5e04519a2

    SHA256

    29eba884b9e0ea28336ad62b938d262b2d7e42a0c32e9dd78bd272115030db36

    SHA512

    5fe55a6b6d091ee4bf390a8f680e9fcdf912c1e0d86b2dd4c8d10dd8edefddd0fbc07dd583ce9e829ccbb5dfaccd2b8d93cdb91d9c33564bfd0bb909a2ffe642

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78336498b3ec55736b72d3e28c251a0b

    SHA1

    5104d4ad9247a62a64eddc9d7f485fb0a2676709

    SHA256

    d65ceaf06fea766e8b3eff5ef7ed684c20d042dc7c244e138a026c20d0f668a8

    SHA512

    d6101ba3199c70d9ec568bd8263dfeb1593d9356fe040c9e04d61e5f9ebc48a35c974107332d7bdf634e76aaf3523640631fb9562723e6d4aaf77e6aa228ed7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    021469b3d91e0bf2a6fff5a0f753de27

    SHA1

    3c1797d17a191624d55d55e69cfa0359e29bd452

    SHA256

    324e4eecd360cfa6cffda30e30a3f7810a17cd2e521bc98282a9e544274c5b03

    SHA512

    6f8b6af8e37fc055ac5cb51ceadfbbbd7ed6ac2938a0b5068ffe70ba1e66c381d8e1c779e9a6497638c8ebbd45a93aad5e116c3596dfd34a6802727da6ee431f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67e4340aca6c4749e91a94cc63234797

    SHA1

    6703e748c7ead7e0a485f37824a7cc91f98328cf

    SHA256

    18ea348e5009e0927925d92a8bf1fdd7fa931c0feef7e11889208d4992a3a433

    SHA512

    888afcdc31e91628e27893603ff25849bef589faf10d92f910e7e09447a6b25e7e4669637ee246b91814c5f87b8f355f25b7f110a0cba95554c48fc6335cf948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e75e75614c634696b7dd8bcf5867dc63

    SHA1

    ccbb32847b4309ece9fcb7af75d5ba3970d43868

    SHA256

    f8122bf7349ea8c4162c7aea5ddf4e632bf3fdeb20b42d9c7ab9e31402eb23e8

    SHA512

    304a4df2c737459b65a8b2275935768688fd9b83275c4e97d15106a3b18c90740e226f461774f19cb5465237be51e8bca38fba20d5583c74c966acbd369d9d01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3358229fa6f7a75de68e28b2f9381a18

    SHA1

    550db0a1cd22b892a8df3b9d7fc8b8a383086f54

    SHA256

    618788081199d5f6cef2e862625b378938737b3a04e0dbc5029bf75d8ccc3f52

    SHA512

    0ae1e036c7780476e4d2b0627de57b493721045bd4b032af0451209c70f9e6f8f8ed247827f7c2cdec68984033c61c0683305da43489d276fa2bd9901afe3582

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c45aa7925fd606cff3f8d664424bcae

    SHA1

    3ea8d7609f22e3e652ec1a8258910123b47193b3

    SHA256

    1a421a5ca4250e0b0db598da4e05c75d890b8086f3f61855e6fbca977e1e0a20

    SHA512

    2be90715572c2229653adabd058a7fdecdc6ad1a8314dbd7556b14bbe5b2017e91cbdc4cd7ba38ac22a17a7aeb4b164b160311869b728f5676ec1d0f4574b6df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    991d48405fc8cfeddbb08cab2a4c26e1

    SHA1

    1c0cbd6d51974128c98d6577daefdc66ae78fd0a

    SHA256

    1c4e3e42f4ac207d93e57291457b9333e3ec96993ebab9afd11d3cdc53d88810

    SHA512

    c70513be7834871d2ff90bfe5c37af032417e8e09d8259e90282f0eb3ad89a1c479283e0f4892b3fbf824858d408605618cd54c94fec8be5655941ba94330047

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4c8902c0a75829cf6c5edb10f2cc15

    SHA1

    fd51f39055fd0b515b0eb79bfde4676e118efe70

    SHA256

    92092032f211cd06f48baeeec695305b7d0507a0d3538dae87200243f2ea2fb3

    SHA512

    ee0ab5c7baca8bec33a6592983e1ceb88e70173e2924cbb17ea7b63518c49169764a6db8da3847f8d7726eb51e14b1e03a13c61962a993ff3fbb3e2cab183c8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a76432229bd723b00b5dad8657340432

    SHA1

    017b2e7c85ab912d6f974717235e1526e7bb48b5

    SHA256

    eab27d92bb5b0da14466be3e66e4958fb8edb9d8fa26eb2fa53a76fa81306623

    SHA512

    0084d22895a35f9cb2d59a1b9f459d7279153a6e762000db718cad8df9f84634165e40eb5f740d223129bb7d436ae02606e0c213d1b5ff3dc9b8f19282dc30d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a506ac2714db8db09859707cf24dd6f

    SHA1

    0d0aca3a1e7a3d9cd8377ab7b20fdf0fe82aa46b

    SHA256

    8d15a85cf82efb3f2143b8309cf2a2cff14ef4b5da894d6540a4bcd65cf8c5fc

    SHA512

    1aed14e5afbab873cc9e2726510a204c8ead2cdad4ed4c2f15bd379020597a37ad8341b352659d13826aa6180b48e78a7f47916b6ff71a2050d604970b637512

  • C:\Users\Admin\AppData\Local\Temp\Cab7D0D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7D70.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1368-1-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1368-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB