Analysis

  • max time kernel
    137s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 07:01

General

  • Target

    b284a204ad4112acc3e83f3493335c89_JaffaCakes118.exe

  • Size

    780KB

  • MD5

    b284a204ad4112acc3e83f3493335c89

  • SHA1

    0130d1442a8cd42fe82e8ad990f909bbdbe0d163

  • SHA256

    eed063401f40d50fca0a041a91b88fe55d7093f6de91ee2c6ef49c046d009e05

  • SHA512

    3b9105abd294470279867362ed087713ae44c392224a00f001c81720a4bcc28913faf25469ecf7cd5d312624439f1673adf646ec3c119ec6c414cae1eaf10606

  • SSDEEP

    24576:bFEqn4on6JnmHFBiogPHobg0Dy6qlL5M5uZZXxX2t:Rnnn6JkrgPYgdM5+7c

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b284a204ad4112acc3e83f3493335c89_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b284a204ad4112acc3e83f3493335c89_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://jy.2144.net/?k
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://jy.2144.net/?k
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2800
    • C:\Windows\SysWOW64\Wscript.exe
      "C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft194605\052011050205051446051905.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\soft194605\052011050205051446051905.vbe

    Filesize

    1KB

    MD5

    567c28d368c6152f61a0082d71fab209

    SHA1

    63dc4b3e34e07b893791ac774a66474ac6a073c8

    SHA256

    ce8f3724aeef003396c779f062019e3d7de712aa198f905d7a753679c3362401

    SHA512

    b482a60108de8de84b8c5db12ffab06b7ce94a4b947d7df721a37a865f7d3fa26f066545fde3dbf991e5803215f88db8dfb045dacad0c4a88a5c1e0e69e75f39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    896658978f4a8f76fe7d29914853c359

    SHA1

    aea95d7c7e720535c44583c8f49ee8e46b06564f

    SHA256

    dc1bb6fb7d7451186cdfef59ce09e78c28cde253034256f07beeb0873a44b10f

    SHA512

    97679e0a78ed8af2f0eb37eb656ac381c57518617f1202b3ba0711bb99821e0cb5ab5fb7269c0ab100f2a7fd7d028468e4409b81013bff99601e19268f444e5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    abb865cb006b2bf317662b44208c1c93

    SHA1

    a2e147996f8d3dc63a8964adf314ff3dfcbb225d

    SHA256

    9025c83db6252ab81f8a081e3da37953f3c268ce373625adf5859355c36d69d2

    SHA512

    c7287186d2ac2e7fe3097329a9a7314097fd41b4fa8910747005304b811de2cfc6b734f11039bb7df1701c8bb070a222c6fa90959e111ef77cc2f116a5c2fc6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd65e56e28532e198b25ea306feb5f3e

    SHA1

    59e090331992b5f40c6a945d3565dbe0a061cb08

    SHA256

    929af4a9e8ac33146fa896c67b6617aa72e40f2b27a43bb57920cad0ba8210b9

    SHA512

    6354f95de13528e8714a48b0ec240764dff03e1e881b2e91816dc90e28b3833b708ba09a22a27a243c8a6b847d0c6dd951ff27553606f6fe6c6fa95a6893f103

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba2ba40e3630b6e8bec2870ba8611418

    SHA1

    8a18d5463d13d7f69c5f853965f7278a9ba476cf

    SHA256

    ee7bc9d16b3db43ea08563645ce6280b6e86a034c3780bcda056c6ae46b208bd

    SHA512

    481189c5095ea071ab6dcebb43af44749bb48f04eb441ab50a0ad4d2c6fe99515509514c57b52d5fa3f652c2f7db70da4bf1fd89543a1283963536c2715b7c67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb12a2a160a60f53c8ccfb9c1fc5359d

    SHA1

    c7c2ccdd09a08528e56464bc2b995c717183256f

    SHA256

    95d7727ffb1f9f44f04415f1e0e8946da300d83ac2194ac58252ca9eaa1f243a

    SHA512

    1af5a8d9fa500ba75bec199628845ea961857fc590e7315724ba68c1f6d7840e766d820ccca5b0ebfd61e18e6c606369ce29e7fe29b700bbdde7d6c2e26f01e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dda462b7fda29eb9cbc1a738d5c3c7c0

    SHA1

    5f09a7a7ff58df2610d11e0c325a8877de153bcd

    SHA256

    8fe381ce5a9b44ef74a5677ddb9853f42cab7803545062c4fdcd6d0faa0fbf06

    SHA512

    8db6c7d2d17ea19d68f7910e8b290f0ced7e112105ede80ab4ff6b02ac7e964eda3d23989619fdeaa3b740475c5261d8517c91351f51140afc3ad55cc5d0bdb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab476a2cc92863f588f327119bb9e039

    SHA1

    7925579f64b719482f52be85f28f8dcf7161ede3

    SHA256

    76fea14c4b5382f950a9a444902199a8d765a856d8a278bf0f3a818fb82fec8f

    SHA512

    e68ec9d11aa34cdd77a51cbe9dd27d6aa827d6783366b441f6281dc5de41d90ca757d5eddd4118151b7396a3532c5ab9fe9f9ffcb86119bcf2c95c7829ae51b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dc7cb8224b442af8d08f382a8f4d9e3

    SHA1

    a4e3e2a8361e63abf41580d939b061f4cdd3f709

    SHA256

    33cd683c32b3e6310f6db8b3a0cc12728facfb6e5171961e5c1e56613d5db294

    SHA512

    2287b3fea5434556ec4b65cf478459bf7cc00303e0514fe88e3a63e3809253adcb60054a9ec128bf922bcbe14f6a02d93efad0bc0a40bfe8ba4b03951a7aef39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58657de0ceac9f10aaa26cac5fe13256

    SHA1

    0e84c4df6c73fbb9885c1616c05c9c2472b8dc4b

    SHA256

    1f333b4d25bac164ceba688ee1f06ca73196c746e3472df85f6124ff8544bfc4

    SHA512

    6c5d806fb0a48a8168cbfef7fcc158910db224ae578806e57ca37713383bf46ca10b496b78b44d059d47b1709d1f199de96c5303fb4c2d6eb04913a7f9488d74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1718d58fcf6e6b76a87adc1ad8185d3a

    SHA1

    07057caa3e4097e79aa5265a6eb0baa9dc1cb4b9

    SHA256

    6acb43daeba59f1de19bfaff739f9c8f26755ee2e1b58b265a80968681ce44b4

    SHA512

    4e847af105b7b7abb28ec6217fe4332e6a7ab34f90e9d414bb5cb667d94fb7bcee4c247c1ae3875a8cbb08a3f42329e0eb2051f66b8697d5db8a9118d98c2e8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a066d16762cb4d57a91c2d4670ea145f

    SHA1

    cae3cd4c4868251476986575e89d1e14ddb3f735

    SHA256

    900da603fe918204a995982ed08ac43ec51cd18235f7aeca9499c8441d3b1b88

    SHA512

    91f83318d2ef3ababe20bf8687c0851a8f435fa18e0bc89c1d122fb99aec46fff818752b9846e1d6e116748fbf6c4c16c14348809e1779efa7db4566eb82c796

  • C:\Users\Admin\AppData\Local\Temp\CabC9B7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD62A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Program Files (x86)\Speedg\Speedg.exe

    Filesize

    1.4MB

    MD5

    548f8a2766a9c75c9c43c5d583e80d34

    SHA1

    0259de3e8fe1e5d99bae06aa65253d1e7cc1419f

    SHA256

    a4eee83f86d97bfe06b96c9fea3228f392bd5d1c1ea05499bfa26956dc039dcc

    SHA512

    4324f721690ccc8ef62f2ac27a45717c0892f7747695e4800300c497c04b60dae0e3194c4ea5fafdfeb72f94665f31d97e3bf5f6c142f32d14bf3207eaa5e26d

  • \Users\Admin\AppData\Local\Temp\nseF26B.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    254f13dfd61c5b7d2119eb2550491e1d

    SHA1

    5083f6804ee3475f3698ab9e68611b0128e22fd6

    SHA256

    fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

    SHA512

    fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7