Analysis

  • max time kernel
    141s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 09:49

General

  • Target

    a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    a2124e3bd8be252fd6eb28b6c63a8ca8

  • SHA1

    685eb27a708bdd96f496c36757354a7253cb33f5

  • SHA256

    de146bcdd9c4654ed46720326582ec46ec34f37bfcb422af9b726a6ffe533f19

  • SHA512

    4fe6ef741d424f56c521a3eb43abd0333af400d7e7ba99e6504e6afcac2ef5f355bad5e4bd8e13b6a382a1b49b29af655f4653f3ee3af8405bc720624e590d58

  • SSDEEP

    768:3urE8TCXx4KvmWaZG/sRtn1Fqd+gbor/3pNzpgZ76iaeMNmOne4Nw6eEVzTnr:+w4z8nk1Y+fr/51CQihBOewLeYzTnr

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" find404.com
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" find404.com
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2264

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2c470dc8bedb1c2187f79bc4a461f623

          SHA1

          3c06b3c93ba16c9aaa043455e3758202d23ed092

          SHA256

          ed79b9084ba8bc0ed6c082ea44ba6db55c8546fdb505f0256dcb0638faf7b4f9

          SHA512

          6ce9f0c163d646ba92daba79bd4740ceaff18f78733358b93df3e715482a9ff2b5a1077a8257f7a45cab2b65e9e80b54daf3ddff6d3d3d9c62c782c8a06b4360

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          857b2cabe0749151b5cdacb1319f258f

          SHA1

          75ffff9ca25d2733ecb535acabe2f4ec99ceb222

          SHA256

          347d2d6cb62bca92f38746c8e43d5bea4ebb93e39b741d42acfaaf93ee56dba4

          SHA512

          78f12fc558806b400416ab7143c0173d4e319b3b23efbda53fa6b1b84eb41d84093d5331b377223f4a63b69f96fbaa028cbaae50bd73b873604efdd1b725220d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5ebcb2db974e2af4ea0d111eea7a3018

          SHA1

          ae4d3c65375df35a469c392a122f62343912ef66

          SHA256

          6d4b4f492f13f98d2db5dfdf9249310ed949f7aad557ba216886a00e6380e563

          SHA512

          d238551bbc98822fa24f88da71f3d9c8630cff2d4d9e19ad5d6145e4721287e96e7df104f72ecc54f630af46e87e273f18e9aac32372e14f538602de013e0606

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ecbc0a42e5e074357009c144cbe340c0

          SHA1

          5554ec53e536563d00708e07470b4514e3f680d9

          SHA256

          4d8a7bb4f256d5dc4489db617afc922bae8cdc94530b7e8e62115f2cf16897fd

          SHA512

          c123a2c6c5a7d79b7a6421d7c6526f4403db8d2138451cb93dd34f32933e29cf93862731c12aea853bc1acba02d8818420a5e5b86a1a5a6c848136ffb3fd5fed

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          217f93622df39ce42cd0d227330ee734

          SHA1

          72d780af199149ffbecda8111a6428e2595e4cd1

          SHA256

          f871ea8bf0f594eb0b5b94ff7fb1e061fd9bec5892e4a66f227aeac017d311c4

          SHA512

          53d74befeaab88b29945868b97d1ae0522cf1d6be74b458a52c815179d302969d673c03e3135c67c22cced2cbec3a7a85feb002d30a34d01b647e89f4c9ad597

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0559ffcbe45011a73399481c2019f652

          SHA1

          e9b4c1b1e4742108c936957ff690dc8eb7cfc63c

          SHA256

          278de8f137f04008beed3dd6874e71500b40c738199176ddd8f91b3670e2e4c5

          SHA512

          f4a5cf8e4af4da731ea183bef045a47d56f8308ccea079d3a27dd818170947f38140be061f301d249cc305e3fdc4d11dd8c8c3090a9a161c8a6f2cbe652bbce9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a6aaba425eefbc8f3f2096f798214001

          SHA1

          5e19ef5338bd96ed45dd719a3954a0827ffd026b

          SHA256

          dc4d560e59b2a12eabc59beb2ba4ae83ac3ef43bb7777054ecee9f5a12180d8e

          SHA512

          499d68254b6b533a92016aa8c2f42b63586dbb5c04f17b01e2e3de6a4488b55bcfa9b7c93fda60c23825acade74a59754bbb220db72d259162390b4ef805687a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4f5858c60ca6b88a3e8bbb006a899578

          SHA1

          7fb795df2455a8b252c58cc305aec8a50437bc48

          SHA256

          4c67fab4aaa2e1e215b360a1fe5d9411d603bd306e96d7c85771a17f46598cdc

          SHA512

          e59ca82b13eea9012cfd4a6865eb7acfa035cacaae679e8ed42f7b5b5331c26522a3a1ce4260164554a86970be5d852cc74106466b5c2acd8ef38e67ab9992e0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          65bc6a653af0492438d9c1c724c88b7e

          SHA1

          172aa05a97a8345580ce1d28ea060c2b69881237

          SHA256

          b0ba30376ba091fdf54a895e5339075b5ea5d4550c7794216069e5593f718cd4

          SHA512

          551ffe9a4269a38f07c905fd2218d44e3b24e5f3e65180adc44af26b3a46dc8006d136c8f683db4ed167a144ad7153a65f5cd89984d36209d59f2a2db6c25df7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e28c27f93a59dd98f4611eb063d93dcf

          SHA1

          c288d0c16fe47ec3eb6760db18482d3174a34e76

          SHA256

          5c04834b273e9bd7403c0d6b4da3e03c7b796f15848e689b4d3690642bda6c93

          SHA512

          fc37dde9a3ea01fd7c10b49bb7aa0c16a81d0422f39e238189b310cdb0fd7b0145b6bf82ce0656f0e3e31ccb957af038902d36d499524a9dde75bc5490b11ab7

        • C:\Users\Admin\AppData\Local\Temp\CabDDD3.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarDDF5.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2372-3-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2684-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2684-2-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2684-4-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2684-790-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB