Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 02:18

General

  • Target

    ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe

  • Size

    83KB

  • MD5

    ad85c0ba2c09b07311962f25690e3018

  • SHA1

    92130253b380bad429d682b915a6b24ed57ab2c6

  • SHA256

    b10cba95aabecee360a0de41e5d9b5d535ded0befc16f8947174a6af6c9874f3

  • SHA512

    492369bc5c14c7da9e1083807b9c6fa5be8983530057e163be5b7251c55daf53ed2fb7c99200c382e41ff7f5fcb33dbf957cd6271cd6e7966a852360c555233c

  • SSDEEP

    1536:xQQ2aTmzPfYPZrk5SORqgNAPkL+Z2AQMs9J:xQQ2aS7udiXqgNU++Z2ks9J

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~3DBC.bat "C:\Users\Admin\AppData\Local\Temp\ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.nutritiondomain.com
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5d6c9da91c2393ccc4b9a419029eb96

    SHA1

    3521394d817d95a8036cb9fa071ad9e4ceb9d0c1

    SHA256

    74435bf3619ec379d4736b0064bb53157859dc93574c03cb949be80c8f20824a

    SHA512

    7ff2761fb4326e0fb432a158aefc44328d69ce5c5f4adea2e5cb801acc08e6c0c81798a413e2729e948c1dc2710ccf20d244ce0ca7f45e890d2fbfe7b3723a20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0101cb6c3829c8ff06f98073f1442c64

    SHA1

    1fa937b3155954661b591889a3ebf4f549392bcc

    SHA256

    8498255d5aa1421743da13347fc172cbd96cc5bad4ef045ff67e96de63ec6843

    SHA512

    ff4946ccbec51c55ccbbe65366717a193f761ef996fac6b30ed51bf0a119f159d4a0b7000af9520afd3c5b96bf06741bb1f0a444a1f37fce6640684ad28f4833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ec6460e2170c599d32d2b72b59e5b39

    SHA1

    dabd25e4d50bcfb0710a4ed1dd717c757030f229

    SHA256

    3f719cf6973558c8207722162fb87a22f00434e9f4b6d269d2a39abd05abc2dc

    SHA512

    15518c40bd78130998aa9e050c2615c325ac91bec761cda38ad0c0b7f49f94e731c795d087ac7b49496fb88dd40a7b46861edd36fd54c29743b6f3e449771cb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcafdd7f209a849abbb969a4254f8765

    SHA1

    144b969151bbd2ee6253115c53fe4059928d75b7

    SHA256

    805f041e8770db100805ad6659f6dac6a3951f67a914301c9ce85570c22a5de8

    SHA512

    60a9b621943355fc532baaba7222cb25a450863a0fb3f4bdf9a90cf851253aebbfdec6cf4f151503f11930f7435e2f55fa1cd9a4f7a6ecfcc53d498a42c4d646

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a1aee6849f7747192eea952d1cc82e0

    SHA1

    1c093766b17ed7abd93a5f48cefd1883634e3087

    SHA256

    ea7b6d4787197315ddc4e7fbf01c2698326e1f26b6b3537980f028eb5caaa77b

    SHA512

    f932c5b9e2e6c340c04355ed1bac9383a0067a25a9e516daf827c52a068f9bba934574adba3bed86986ebec53165f97b9c87601e182cb8fa5b712ff12db9b555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5267905311c61216ee888d02095f6dc1

    SHA1

    f96c912c2267162ddace3d682bde8cdad8994f62

    SHA256

    aab8e7c07466fbdeb688523557e9d49046d5b27347c4c7a37452ab8c2400dc5e

    SHA512

    d2ba1a8fbdaf5764649b475b2d312aa35aa9f104d8445dec223c8d645c11576e209c98a3f315d52ce913a9b38966006ca6da2ce3e7f04399190633061b9e5f7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22f975a8471daf50fca00a1d1936e70a

    SHA1

    31fb1273ae4f77c5cb68882e179211496ba526d2

    SHA256

    a0b63aa8b83b6b49a8c2d7156c808c1b092a266e5fc4a355b69ad685e2aebc32

    SHA512

    8b99706a6ffbe921b2c629852fb953e12eb8796e423759e2634fff4984fbaec9735e355b47707accd6ec9d020f9b37ce07089578a57a9a8bc9302dd0d9b3ccdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4d2c3a91ce6bf9c2b6b79771be01196

    SHA1

    f3f9588ed075088b7626529a54abfbc8d5ccd40d

    SHA256

    b200ae0cb0d7d6f1104e444afdb53999f31aff3c1f7eff50d7f6e1e077ce0823

    SHA512

    40b0b54cc0b5549c5e4d7b61286b9b90c2b0fea4eb176186a267dcdcd6c91250addf9b13277858687ee8b3455170e892fa7bf96cc709bb3e34ee8cc6a73649fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f5c85f351a2a79fa85264578fec2dcf

    SHA1

    6d1d8cbca2777b7c41f4a679fcea016e4f5ca6b3

    SHA256

    c1ad395d52b28874eb605f8010aed293776853d290a2891e1a070988a8f10ad2

    SHA512

    602c27b61327f6a6d448ed779e1f5dc2c672496d2f035f58bfc1a6a8fc056b6b00f8ddda225665bf0a15739d182f18faa6095d56035f51c4b493e606b8d1b1d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43e35cd9213eb52300463e3f37850771

    SHA1

    5c4f57b28744cd5460971334fd4d5a29c8afbc2d

    SHA256

    1236d360a941f4cf289f14a267c47d17e6c13b7d1a59547c2867b6d9cbc70127

    SHA512

    6be69b590f5ccda63e90029725c9fbee32a228e0a7d42cbf0287cd44595a7238c5ff588a9535da41a50afbfc8ef0eecf3199380fb8c134947b29cc492a9943b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63c95f1d008feabc8abbc83651133162

    SHA1

    7bacdcbb1a8cfa2a4462ae40e97b1df67ac3392b

    SHA256

    63fbb689571697702426fbee2ac5669d4ef2b1d80b5fd10188c111169ba4f9f8

    SHA512

    bd6fada53a8799b6d6ca6e6431e9eb6d893c32b4ae0e43860e98b17989e282b24796416d42169a69da81fcada8e840be267f073f0c4ff4228272314ba0a5d303

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    957f48bcd53e8aa74c6670143f159834

    SHA1

    6737aed859c40f97d8e2fde0e8fbe8e530807cbc

    SHA256

    b6b35a1d6fa4a7efcaf42963d2fff70088660b0ed9baa62ce087eb5f6083a88c

    SHA512

    3373c018bbcc1e78eb3fb1306c5d696bcc75b16fce3a27c2435ba87c46ca73a4d76e01c1d6a6e0803c82f2a51df61a9f37fde8f8d83636d4487dda35085d103f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1d6d56208649bc2fc130fc8056f14c4

    SHA1

    16daef73cdedbca53eb324497abbd030d5e07208

    SHA256

    6880fa1b4bf49e3d36773ffde0171f3b076bdf2c8c902800dd4ec3d78ccb3e4e

    SHA512

    de94db4a48ffdf768ac70ac788c9c107ace10797cd80df16da152f39de6350fa23505cc9050a8f51545237c9f17bdec1ce07d40f7fc7fd6d7175de4065c0d322

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4bcd35c4ed1dd6c6bd8bbb89ae4bdac

    SHA1

    d86a92e2e73839f7ada02ce4e6bcd0bbb6d3f867

    SHA256

    04809589db05870f5f2be200eca2ea7df75f5ac6a428df0b0feb1590c5f3fd2c

    SHA512

    428afc5660632ac04582b63b34cf88beda55e18264eee83bacdcd37c2cbdcf045d33bdf7ae4457b6237d4f4a66b9c18132b494c70fe6dd12f1ee140dab7dc645

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    031041a4b469c488e2e54841dc5c07ce

    SHA1

    8d78ab1cbe5068b956fa8197c9e0d56912c55261

    SHA256

    754a859f5f05b031f4878b77a0c9cd0b4f83b836aa362174fdfbb252492052fd

    SHA512

    62bdf1629b39a6dc43e01508864aa7e91c3684294d4b8c196b8cd711274ff57d1f95076606b182208b226be09b26cbba699e9f95dd13faf8e1524a458e816d73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e3a41cda419e33d5a59d6d51bf77360

    SHA1

    fe9c374ba9fa58a07ce22a4d18affd49ce25bd31

    SHA256

    06794e4a822e92e3e873b16722fc4649d0abb8015379b782113185f2109c7010

    SHA512

    43461df2a4bdb7db2281ea3501841e242115e5861a9c2bfa3da9b0869da9fe269264e08c37dd45997381eb12aec66d430a13a8b477494dd75c1dad9ef087d966

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0de760497b163d419214b6fed0674d9

    SHA1

    522d326e960ccd63017138e735cee6a8ddb0e1f4

    SHA256

    f242f663e047578df9437513ee52c53527bd9395028aa2a2e0fdfa0bcf918973

    SHA512

    e29bb31287297670773e3953254f40c539f4390b7136444b16380214286d4b28a91ef40c266daf7a7256a980dcd19a6aeaf9742f09888025ae311b9b0f10a469

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ab04fd841c43ffcb976c6266b939c52

    SHA1

    4a67631c4c153b763cd1c5b2218535d6aa9e7d38

    SHA256

    481955deb90fdcbee418c664347038f7ce503c0b4e4fe328f6933100355e6708

    SHA512

    a5334db0a713eb5c0b1366a355e54cadc6bd5010f04d77b6f2111edeadb26f098924a16d3e8af4357cae671c32275ec4a172fb4be2c7afa3a6d4fa8c691b56fb

  • C:\Users\Admin\AppData\Local\Temp\Cab5477.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar54F9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\~3DBC.bat

    Filesize

    55B

    MD5

    1f662fb5273391439ac076f835fe5507

    SHA1

    8f68c6943314b11f393f882fe04116eb12abb356

    SHA256

    b6867cf01c3cd46a0ae5941dd3970db18d816681a38394bd9b9097a2cbb65435

    SHA512

    ded8d646aeaeb86093ad5a2a23b193a04ad59a7fe8a000c9d2ead2e926e71bcf7221899bd037a8589fd7be94c192493015a7624ac4e9feb295cb0ce1fa7c05d9

  • memory/2272-19-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB