Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 11:24

General

  • Target

    b772a91ce22b949e8c352136d47241d7_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    b772a91ce22b949e8c352136d47241d7

  • SHA1

    ac94801b0fcc999238ff4129625af211416863cf

  • SHA256

    9372758c6185516dbcf0a7e60372139f147bea6e38f5d66a764ed3b04b54d19f

  • SHA512

    0f41055a8fb9e4056b033b95ac4e612840fb7dc15fa578322864f8e321203721115e3c3b2e46b769c2a9bad08f52511396c80d2934a31f0a27479296c0223a69

  • SSDEEP

    49152:ElO7a65tpLMMn2EW9dCLEVm00atVBuhHKf:ES7p5eUEE0LtvTf

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b772a91ce22b949e8c352136d47241d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b772a91ce22b949e8c352136d47241d7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.515wg.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DYA_IFBPIMOOCFPWQHOPJ\1.0.0\Data\app.dat

    Filesize

    971B

    MD5

    786984ae028e21dced4646bbb9db7555

    SHA1

    f583d95b69c0065a1c29bfa2f77269e1d81fc4f8

    SHA256

    407017650cc50bf1caa7af48efd651b14ee520e1a7cffdd6d63483901ed3d486

    SHA512

    565cc85f3a84ae93ede8a7161f4fb191f939b77a729c5e9d7350c18255df599f8b628595e4e9c18fe150ce8ada01ee99d2a0de315c24f73fc8e86244fa7876e1

  • C:\ProgramData\DYA_IFBPIMOOCFPWQHOPJ\1.0.0\Data\updates.dat

    Filesize

    971B

    MD5

    6f56162ac7bfdc42d97e6e7bfc97ec30

    SHA1

    75e7d722b5c3da4daac2b420f1676bb90db76983

    SHA256

    5040a0ce016ba49dc4ccc011b1346373cd6c0a197985a826214c34855e594a86

    SHA512

    bfe3607130d4b5d5793f41f028e3fa794791cffe81e39515aa7ac725fad860a97626ee407aecef2cf7174d0034d1e9bef401a921daf04b8dcc19cb1f9444b3bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57d4d8cde1e79f08f88aa368aa1b6a27

    SHA1

    2f3ac5fe5f24749b4edd7fd70368e6c32cd724d0

    SHA256

    161c4ad2d7c8239962c1f18ecc29b66a5cba08de98977d05dd3604b85a99f4e7

    SHA512

    567db9c3f31f816d96a91000827f1d97bcb803be263aae72cb4197ad19b5bc12554bcb18390015fab9d421357515dafd55c994cbf197488428cb89d2cbfc0d68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0a8aea2010380b232a762f744936bb7

    SHA1

    16079e041101d3b1519ae5501df3996b7216eaa1

    SHA256

    0b3952cacfc3607eac508255943364faaf1d511afccf0d768a4d4da53799e732

    SHA512

    20888a10d0481b701bcf6abcb3465b1a5b6f51517fb5540ba9e830030b19c2e12aa46a243482fb8be7670a4d4bf1c81546d0f577a958d70cdd15d08fec3843dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c27790153d38827dc4d384cc65d0cf50

    SHA1

    1bbb0c2980d717d30cbd0c14b45007004c0609e5

    SHA256

    65335f2d22768b4365678d09d3269bde033e9cee96294db6001282e3cb0ec2f9

    SHA512

    e7d9c407def26bb9058c8b1fc409b987f4ac8877a76c83126c171c74930a3114cc6050d679d917f93f0fdf5baa2220cbcaa5200a4cfd25f42ae9e55e074e6c80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74402d77f7bf05d62e5c777d47a874ae

    SHA1

    957a7d2be073d9f12c9a2fd2bf0133956d10fa44

    SHA256

    ce78f7d9a8b9b1dde274cae0ea4b835d5c0a4f091a7d76378073b10db5801c81

    SHA512

    cb9ed8584c627f633822a4b7171b4adedd4ff21358cd652b11dbdb3846f7d5909c6a2789684190c1998069ad602ccd6dde993c28c365de70e32fb4120a3cbe94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1429866dd671bd53830909f83b9c68c1

    SHA1

    2b35a426a869cc865676268467b82d99be76d9a0

    SHA256

    b43f6b93000f4e7b992fdcba6230a5ea7ca490afbe62418de548175a866cfe32

    SHA512

    e51212367255b08dfa6167133e2c36110431a57d70c1c3cadf68284dff7c3a1e406d319d3d1791d275d89e08628263b9a7a881f3e461d421ddce51c39f7709e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    581e5259a1558dbcb60ed1dd8ff00f3b

    SHA1

    1043e6664626c0e176295a67b6a941c0d8715268

    SHA256

    54406ff43238bcee06954bca229cbf8f86851db0168377748e24e713b7df58ab

    SHA512

    94ecd3c63249cab2b6a0c2667fd2195a95fa4977b8147a8aba101a6307d36b4fcbd40c1c133ab58fe9692cae20a96636097390498f0651241759d02ae1dcb78b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6829b68d63c9db38107ef83a366495b8

    SHA1

    df3268e68b4358ab09e8d026de752e4f5588265c

    SHA256

    a96adea49204aef49e83b439c7c9cc5e778bc7c9ab9afa60508b86103816d5c0

    SHA512

    6d045f8cd8d0b3a5fe2e1360c6355c03d29006c4c385a8ccfd1f8f54eb065c7dda81f5d051ae76cb347e92656c8f126d3c2736599415930c70bc8286684c8361

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3ef3e906763dca31a408ab7d27bbf1a

    SHA1

    61694e6e1df61b9e3e6da865d999767d57503ba2

    SHA256

    25a5246a5565534b39f9085a3ce7a3ce152c137411f70f575c80b43864053fa9

    SHA512

    9c1f3f1d5e0ff115c184540100f429c5a812cb59422e05638c1f5acf8ca1907630480e4a50468dbebbcb1b8c918e7086c13d3f532fe4922b73e0fd97089ab375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42986e09ee29e3ac8ebedbc57e6b448e

    SHA1

    a446b8056bb3c87777202246f3c52cbd514112a4

    SHA256

    d9652906a87c16aa4ca45a7ebeac57c2435853c91f1220d34f23adaa001b7866

    SHA512

    baff29b54163a1d4701439e0a0fa0116c07b3a4f6e110df42e0d5ed2659b855978b2194d6634b74d3250db1c385786fc8a7658f4db50150bc3cab1a6aed94127

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39e01b5b3742dbed91693559e45e80c7

    SHA1

    bc62b83e83239a5e71aee262ffb2c9aa9edd9a16

    SHA256

    405e662671fa90747b8da55db776bf1c865b184932cf40bf189ca3072b5e1f1d

    SHA512

    9c8da5a04d8eaeff80ce5940207e5868ddd3b34ec46dbd142bbd043a80d9205ea70df989f72d54dfda44666b909a3c91b7499f3a69d91ecc311353691dab673f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91988323037fa2c7e589145f584dad21

    SHA1

    1ff22291b27fbb3b4f11fc707995187d82580f41

    SHA256

    fab9cfb7bd50bfc06d4edf01882ab283a3e03496c212f20fc53f0c8326775a9d

    SHA512

    3dee7595d1312721bf0cdcaaac0ba746591cbfbabec2f9c350a748951e8eb73eb0f97c0132696d4846442158e6bafd4c718005aac470ed7a8a9061edb707d2cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e8e53d476c483f84e056fef6085abe5

    SHA1

    f1f00f359c314cbe4dbaa47b294d911806bebf36

    SHA256

    850ce981415959287babc236114ea963aa1aaf6b6ada76d00968c63b2a79d521

    SHA512

    55e8c36136812dae4bbc3357c923eb04caa6095af1499e574a110dd0213bede6706329b2535049d0c4d2120bc76d11d6c327292840dc8d62362926b086e36c9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    422a26b3f44545d494245a10968a4200

    SHA1

    5565154e3ccb0c8c2e80c451cdab148a35a9110d

    SHA256

    151b0350ceed1c092e827af5ab761918402e846da9dd098bc228384826778e10

    SHA512

    e275678d1ad10c129171f0b41262215c71e1ea54dcd6743236ee5379de83f287f87650f3fb40df6d1fce457692f36ee580f27defe38256a038d1044a998192d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9738f122786ea907c87cd73160f9b1a

    SHA1

    e0b9ea1e1a8737ddace9dbd58de567ab48e6bbfd

    SHA256

    3794fd6db549f790f50bbed6bd57c3d12c61805324824f71d4ace8f2186359ea

    SHA512

    be5d6ddd7173a788e1a7022771101786c5cbb8ee39403399f7cceccee43c6405164061d69b372c4f57823266ad235d707a1b0ce0b829ff13af999f00b631bef6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd09deff001c30034302c2eca47c53bb

    SHA1

    89f9ccf24b0aa195430ef90f70593f451c1934c1

    SHA256

    307ab90e0a3fde3a7fd216a15607a40f9db6b4c172d64b094de0b42f059b927c

    SHA512

    1ec4315f7f95763f4472237b035609d08a6590d72200336fb1a53d2a97070c6053c8062292b522686bcdd28f2e1f91987e51a548fe2fd167700c15e19f8792f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f13483ee110671870d5884a73bcac048

    SHA1

    0d591f22266e35370072ec815826a15bdfaf2385

    SHA256

    47c322f6877084bcfef2cb8f9836811eb6e39e966f49031670c1f34014f522b2

    SHA512

    4245cc6b4928a60675196debbc893e40d59e70ff0170feabcb8c9b5045b6b70978ebada2d2cdc8288f5b66268bfd48c6a6f9325a3a8fe975dfc30fe4c1a653bf

  • C:\Users\Admin\AppData\Local\Temp\CabF30.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFFE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\DYA_IFBPIMOOCFPWQHOPJ\1.0.0\Data\dya.dat

    Filesize

    971B

    MD5

    ab7fd29497627fcb871996458ce3de7e

    SHA1

    3d419c155c1e57cc30c0a64d61ad83efbd560729

    SHA256

    a735d01ff0abb0f555b002d9b4c5d24ef4bce7adab195ae5d00bc922954321b7

    SHA512

    d2471cd8c1461f582339bae8c013ced372953faea1ff2394c000fd5683d662624097f876f05f0344a592aae10a02ef958bf7936a5064589d39ce46aaa7316dda

  • \Users\Admin\AppData\Local\Temp\SkinH_EL.dll

    Filesize

    86KB

    MD5

    147127382e001f495d1842ee7a9e7912

    SHA1

    92d1ed56032183c75d4b57d7ce30b1c4ae11dc9b

    SHA256

    edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc

    SHA512

    97f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d

  • memory/2244-65-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2244-62-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-61-0x0000000000647000-0x00000000006E3000-memory.dmp

    Filesize

    624KB

  • memory/2244-56-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-55-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-494-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-54-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-51-0x0000000010000000-0x000000001003D000-memory.dmp

    Filesize

    244KB

  • memory/2244-53-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-0-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-46-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-45-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-44-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-43-0x0000000000400000-0x0000000000706000-memory.dmp

    Filesize

    3.0MB

  • memory/2244-1-0x0000000000647000-0x00000000006E3000-memory.dmp

    Filesize

    624KB