Analysis

  • max time kernel
    118s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 01:32

General

  • Target

    a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    a4ddbfff974fc472175a18d7fd0df206

  • SHA1

    895edbdb653f601ecdaa26cae8a6b51a769e7049

  • SHA256

    5ea935f2a09ba5051e2ffeccbace52c5610103ad747bd16e16e4528b10bf6e95

  • SHA512

    76e2b349d6e2a36349d99f2fdbbf046c5f3830998205cab2868a6a432b89348f45f81541663aff1cf83df40a34b9aae1c0bb7168d38381bcab4e549aa27b1b4b

  • SSDEEP

    3072:3h41wuygp/teJIRB93zYbydTaDmvWljx5VJIgHpG2NpeYufV65vuerfJpkEBNXT7:u+G8M2OYFWm8zH4dEx+IG2xVyr

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:536
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:536 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2808

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          54c016f5fc41f91ac02c2434f08ee1a4

          SHA1

          a31a5f748e6a36595fcd1b7d8212a1440465bc8d

          SHA256

          5c008ca5f5cfbf25f5d759f4fdbfde160f8aed83894aae81e5cc4c9ec3287f72

          SHA512

          943f91a8d538375b0d3161e0ed86849dc247ad2c8a13b1bfbc1cc0e59c6626752a5f7c20577a4cf3f1023c3801ef3d7c94ccae13dfa287e5c108231789539130

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3ba71c31d69688436679077410402fcf

          SHA1

          a260a526af1578d0b95509ba4e18642b3a6f963f

          SHA256

          16e356d3f8b2f105564266fcefa2803bd3310fdd394ff03523771390ee856554

          SHA512

          5b1d089af4f49f44fb463781cfab347a2ae13ae5f1c939f12fc492f6f4d5c446180d8680da91cb06a47cd4963b2a24195d4c68fbf1a54f5dae2a60595b434783

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bfa0679a8c71af8471d805d396b6d6df

          SHA1

          a4ed81a802628f118d978a47967eea6372965ce1

          SHA256

          4340461750cf0d82640dd62eceafdf46b6510d3209dac0b8ec788719abdec28d

          SHA512

          7457acc8dde958e166c50785df5203d49f128d969a46efa8f5c549dd501cc00ded286d00cf6ce14d47ab92390ad1b7fba56e5f7209780c5e580f8944b33ffaf8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bbba8fc112b8a77d0bdc218fdca48981

          SHA1

          db28a7e36f5020373f820170ca51d8c253545371

          SHA256

          ea7ef465d6985bfee255234208420eac5c5755936d9f86aec474e19478973d46

          SHA512

          32ee5ef699ff5b5de0f984c922ee57471ac6175c86d92ecf25c07194e6bb062f1ff1769dae9d5e140514516d1d3b237e1f21c0230f86bceff2905673979b593b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d0a4ac0b09cc5c5c46a943f957694fbd

          SHA1

          9f6e36fe6b5a6478a57d663a555916bcbea88021

          SHA256

          d9a0a56cc333647e22b64730ef5462380045b67553b27213007ef871c525b582

          SHA512

          1d57d6e1db673c3c31d328adff119898a91f26f8f8611f479ecb79ee5663573b030eb2d8aa96a97e5e423504f51c7013fdac435dfb03fb2dc834bb7984bd9c88

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2505d27b9dc13efeabcc61db6c073984

          SHA1

          1b19bf2791bcf5e551c4246b9115efae412fc2cc

          SHA256

          c79673a4fc91c60b12b611884730665c32946d4afdb3e527a740613166afb74f

          SHA512

          e318fd705f46577cf1cf77975b9e5889453b1679d153bc8f82a8ee373555f5212b475ab52404e5afa654bd871df923235be4d9cccfe23a9b17636b3345d10749

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2f5edfd3cab1b61c6bb285c9af8f1df4

          SHA1

          8cf30b40d246e1a43cda4ea41d57125e10e020de

          SHA256

          312c0309acb37cb7205b42c3abe99971edc94a2ddf7c3dda26d0bc25638805f4

          SHA512

          7386c2f7b6e6bc97fb8280306f2a2f104913341d6507d86f85de4e285146a3a871cb53eb41b3a5e2db7a7ca0fa1cdd4115ce83e00e663f1d24f68ecf12dec1c2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          10efcb67aee85dccee85b939c7fc5ba8

          SHA1

          40faa176a9b6b4a9b317bec5b1e2cec4b259bd33

          SHA256

          c1e4bc8478df43b9431d5ac894c763dd9bc1e14e80cdb281f5dffaa56ed8627f

          SHA512

          2953736cb770824162b59530ad42726a979e913ed2b0b09ae52899e3eece4783a975ab5fe41e752e5dfe25f9647ad237182e91bc0b57266e5fad4a401628630c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          663b39d89b5cd019c6a4206a331b31a8

          SHA1

          0f91157e2b4a614517bfe6bb0c42e04d07801e4d

          SHA256

          61561015a5327f443759ce6f934d452b7b0e1019254da27b4def19b330334709

          SHA512

          f94249ce02a523f9a68eb5562fdb182c4fc1dc524a43d106e05cbc7bc45bb6e430508e4e46e4f248143a714425745226439896033a8457c0b5d19106dc908db4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4f8915ad9cbde5d1b815a803896b2598

          SHA1

          a7f65b91006e01e73ccb1c228be898478d97c7df

          SHA256

          100a58d293cd652a4e8f70d9ed3cf17fd6e6d00215576c9e9747e9b709ca3aef

          SHA512

          b0d59bd99e66837d4a2e8637f1ae50f14bb2be72d6b94e11f26d05d90de644f30cd46d7fdcae1f2d6d8757eb1b70227d2127480383fe6bb0523eb8d62406407d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a64a3037d65c067919a1652b8e34f994

          SHA1

          08aa608ec1947f42fdb02ea7cd73f89c94aeecf4

          SHA256

          df2c990af2267c708c8496fa848a85d7427004b5653c0fd225b58071ffba228d

          SHA512

          08566441f0ff50542f02d45d9af17b6a395cade2c746a3d7da2d2de4d0235a76abc05fee9bd80880fc9506738ce41666bbab50daa2aaf7c91b3b891698bbe9d3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          722cb11d6ed440ede98cdc71bd02b606

          SHA1

          68f5ac16b25eca5d06bc33472b4ec5c1e7f538e0

          SHA256

          2cc76fc40e10f43809118ca9d825a9cb44fc1ce3f5a702cccbabf3ee3bc16dd9

          SHA512

          3911dca97fa1f92d45273ce2500d4c824fc16d9c839d834e368feca7028270681fe9bcb40d9f1275bbc19332540e836211ae23c62ed9e2581603e74e2d3f5bab

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e2e1d259a61a34b820f4358c36415daa

          SHA1

          e0632d1e2fe83f7a66ffe5a52a2f8b00b4fe7b75

          SHA256

          cebdca1a34c00d599aacd4c61d5d36b5cb35bd49fccd7d4eed74527e14ffe704

          SHA512

          3c2cc66c54d7e8ca643853691c66818fee1627356b77ea5fb76be2691e3ac302242d645b55353a975cd798eb7eb850a64febc1062f0b28da509be3048ee56bc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dda63545ad512c1053d016fbaaccc1ed

          SHA1

          ff627d9af1f79e6379f9b277bd82f35c241147af

          SHA256

          49131be61ea8e7ea7c67e2676b1ab74aa4096fad0a6d786f011d75098505274e

          SHA512

          cab8d4eef46226f9a6666dee2a26da849caf0240dd80426b98e29d78101e01e0deb20fa821a4b86bdabab03b249aab38ca9267fae60a7c8bb7c4ae87df5bb1cb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          62f047d358c3b054ac5f2ec1f4c5d6bd

          SHA1

          4e842bd11307262dae8355afa006f27f3988fb0c

          SHA256

          a2951b41c776cba81a9bb60d69e86deda0f121d0099e245b1607f95dfc0252b8

          SHA512

          eda502ed06283d1d796b55b654c02c3ce46ccf80b71ac6908562d850ed72b01567d3738e189529929af5c2e9ac904e409a58cc8607e355168671832619521599

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          147384417b52c06fa342f5d78f6d9f2e

          SHA1

          cead7885ee069d5380ca8a9caeb4543dbf0489e9

          SHA256

          9b46e41a2aecdc7a28ee5b77cea94be9bc1259cfa881be4671543223e012c36c

          SHA512

          1b9d344b517317435d2e000e29b9b93bafa5b9bd4b69c2e9c1a7434fb85f22df29bc66db8fbf94877718c1f739d2aee60a1c17ad9d5bb37e068470abf0f9316a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          70397fadebe00202c20f3ce090762d9b

          SHA1

          a0339ca60e287e4a9e7a11c67c0cf72179cd6b76

          SHA256

          32d6903941066ea557b510e9674e72a974b57aec14c641cab9e973f6408197d8

          SHA512

          8d31e4367c246850163509dc3a7acd18ebaae23b0e1d3dc1fa83bc73cd05fa6c142ee1b387d3b3c6b89dc0d52a12d0ceca99cf0791d7d0e0cbfa4d7d90b42c4b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9cc28ae3cf712740d7c120a8515ffdda

          SHA1

          5ebe7791190a01e6ac585ff8fd4e2ccb8d126228

          SHA256

          773031e8bc77480418c132656a2d2a514d67584cd81dc9ba043a5c660acd74a5

          SHA512

          6b8c56a0ddde2d6e572602f88d046855c6a28856465813b85218e0acc94ca298a3e39ae0d3b8236864aecf119e634abed01dbf3ec8ddf1dc976a97d2f27f3864

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3500925fad4c953333846bab869cc6f4

          SHA1

          0e3ce860630819cb199b9cce436ed28530926baa

          SHA256

          750f9a5f420b7e58162f82a91c0d2af696b273bfb7d46b9593bfd7af961244dc

          SHA512

          12a1c6d4d6e7b3e5f4c827443360b65fdd483d1a748e9b15ad2532c9926ba7a8581ecff07f89e3a1176a8828087dc434819d02976aeee01c3a0a76d9919a8c16

        • C:\Users\Admin\AppData\Local\Temp\Cab292.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar342.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2448-17-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-26-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-22-0x00000000002A0000-0x00000000002EF000-memory.dmp

          Filesize

          316KB

        • memory/2448-18-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/2448-7-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2448-3-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-4-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-8-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-10-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-13-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-15-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2448-16-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB