Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 22:58

General

  • Target

    bd8081a78db33d0d2cdab0bfafcdf8d3_JaffaCakes118.exe

  • Size

    449KB

  • MD5

    bd8081a78db33d0d2cdab0bfafcdf8d3

  • SHA1

    0d647a8288c742c16d0f2012585683af9957e49b

  • SHA256

    08f0838789b89105a549ca9e7a10957f958af26aec92403b8448b6f821d4a75f

  • SHA512

    998708db3ee9d5035fc7f5f3c9fc580db73c7077498db5c4301dcf6d6a6ae7ee68b2d3d3c2fdff07f5f5f435cf582a1a9c7e832ad172fea9ae018cb1f3b4ebf7

  • SSDEEP

    12288:PzsQIYEZ6dK/u2YFCpISqewtqoV4D+UUWR0evfKy:PNIYEGK/NYF+ISm3VcWevj

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd8081a78db33d0d2cdab0bfafcdf8d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd8081a78db33d0d2cdab0bfafcdf8d3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://123.kukankan.com/index2.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2704
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BD8081~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b85871da8f983b2ae53c12078bea733

    SHA1

    e54831d65fa22c60a6951d6fd4db68ef8190fb11

    SHA256

    756da4e37061d415824da233c10739efb6f6fc50f4987531aa3f97d27762e913

    SHA512

    862d729883404b0da9b4bd3a5db43683175733442eb1a76f7dc13ae8d07d1912ed26badc034860e29481f0784272f40d47ec13159b6e0fd287a586f1bb465056

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56e03b67846a2ef2782e92e61107821a

    SHA1

    54692ed003b986834a9a3b1f77f327e93f03e52d

    SHA256

    06435f5bcccd56bda78177239cfff27246cf3c0ac8629a5df22ad4b52a87970e

    SHA512

    a098866bd591f6553423f59634d2eca539b22327cb271f26acef37c287c748dd2428df5ed0f4d307b4e7f1ea69aeae537f08550020fd69a31c7a3a10d3b3d2bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbe701fd56d4bc28fa4143367c90f23a

    SHA1

    1f5bdbb33b3cf3a3136eaf1687b82707e1073f62

    SHA256

    eb469f84b1b9087ee3041ab574b476c70677bf59c0e20cb56a6ef60f4e36b28c

    SHA512

    7911c208a4713e4357f3be60772702bfa99a4b1217f63b13092236c15ea1bd5fdfcc29d850aff16c2013284495b0f9b69b06e30476d56c88f76625d0cb135703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7926363a0e73432bf45b52f2ed616c4

    SHA1

    1232ae07f417ec0500da4d55c0a6416748bfe767

    SHA256

    fa4a957b78c9f515fc77ac0cf3fa1c228121d616031fe001a48df2834c6418b7

    SHA512

    8df581fc0290ab978edea8e36d56695a1753764563f24286de4fbcfde0355753b7885a7de5f0dc3f959b31cd467044031381124a5cdf06bab0f680b182fb4678

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5f980d766e6752bd93b4b7fef2431f5

    SHA1

    ad7ef95fb9b52a6955bf7c2201319a8e025f0951

    SHA256

    e3db090156de2c526c03c89d41d89f1dc4b40651bda6e7b4824c4e582394b588

    SHA512

    8241f1b64df39e5ce52879db574aa5de47b48aeb7aa48bb8e013602805063d6fd845943466c3a2fc6b25dfa0852b89aa6e8d56f027cdc423044a8d43cd63c541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b027d185d1393ed1df8aff5d49355d72

    SHA1

    9cbdb524a4c3129a3c1685a04be96866032cce78

    SHA256

    2c365908b11ee461aafe93d77c6f3ea940605c60005394fd3baf3cfee69554dd

    SHA512

    880ac3217014581079db55b8bfb6b221e3f68dcb1500c2b262598fe7513347ce7a252f40e47598d24d909e8173fa370c75e743052e8a7dc8b8cb3fe9f8329ca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25a0fc431f5017e633639a99671c8048

    SHA1

    7f140cdf97f695a2671baf8c32ce9311ba014b87

    SHA256

    fd7a745d33169ba62881e35bed01abfbe39bcb67bba6194e8428a751441a500f

    SHA512

    684e7615ea7ad5e0e4ee5de6d3c64972bd9b2ca97a26014633dfb80a9f69e717ba8fdfea7f9b8a5a09badcee866a0099d33ebd607ec55456ac18058a32eef50b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    419c20f4a5bc758ddbdd1d82e5752e12

    SHA1

    737a4ca45155494bae9b55f85b45abae686383d9

    SHA256

    417a9b63eb4d02632822cdd2a14ef1fd49352a2adc822503cdd30e70e78ea427

    SHA512

    6df366d2325be6e32eaced17f266b1c62bb2d4cb2e2f79e5cd03898d749ded7144a9442d0e7e63c5fed2a78ef0b6da28a02933f040428cd3d8d0138dce2c9df5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52c0c48879c87791c64b4bc2cec60940

    SHA1

    ef48813a6b5d613822b7d2bc5921c0d2d868b14f

    SHA256

    0a31d4ab4c9efa3cbf98569c464bd0c9450dc746abc585742eaec6346ce9aa91

    SHA512

    b883369b1f231bf7402e02276952085a02add991b8761bb5c50028776fec8da18c0407f689b760f6eb0e09de6932cf84193e17436b1af02a6df931f144d5df67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46bd0b78e4761f3f4de64c9dddb66952

    SHA1

    b53ee3245e34a44c127673b4d02c991074695478

    SHA256

    7a5a933bb02a7c898cf7bfa9c96aa620398b555b8a4cc0a107ed21a8534ffb77

    SHA512

    2596a7afeb493b7835046d22cdea73a209d93f17fda251ca9e74abafc88be543412c779f4b78544848be9078cd4a09d7f7e5f4d8cf3f11b70e9d1a62213c9970

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bc4896da1737ff8ddc6193bf326a079

    SHA1

    6c9407104c732b87c141b38cf1bead3b0de54971

    SHA256

    6d0a50362c47d42b9469d5c0de99be75d7b1a3d62c003a0c8039756c09b3c3fd

    SHA512

    c6260b2212e42099645fe56b1df6b4bf1839bdaf731062bd62b305ce43309aabf181ec97b88e48148adecb09035f68df1229fcd9803cecb65df2cacef746b8fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ab1d897f3063ccb71c3377aa063f1ce

    SHA1

    0779c6c0afe98f2b2b11a1fbd7534b60eede36a6

    SHA256

    76cdcc81c448191139cdebc04098a543f1974b56f0531676486889506d92a7e4

    SHA512

    84020d838fa48016beffae416b1e588f5479b81b46e5a84f5617f9fa188c5d89ecea866a32154498547a8b3463734f72f5b3e737f1274323d6bc7c30ecc50ca2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e05ab9c4e64de9638845cf7982d703b4

    SHA1

    e492cc6073d550714ac2f5529efe2405e5764fc1

    SHA256

    4afb30e03a39524241eb9cf002c817fb892f461228dfb002a42218595924670d

    SHA512

    8e1900d743845673c926316f54fab7d0a4a58002fc16422e2f17204a880cc3cd496c2f638a740dbca276561ea4039b9d8759ea159885c89b1c1a6a7010d98852

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31ed8468daa67112a4f5850dab02523b

    SHA1

    4b17b8b693cfc370e4f87fa7b9d00e34418580c5

    SHA256

    cadce83f4c0f27db4df7fdf9c46b0c93e46840ff7a70e5d8e3eab1c26647ef49

    SHA512

    b048d24add145c767ed26aae3a2a6dfdc14564834e53d34e26f659cb96befddbb53cdb4a94eb66ea5142323eb8ee714814499d45291410d4a76e70d7113a7e25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b58f72f9bcbef11980001e2abe172363

    SHA1

    a8ce3e084c53b7f6f56435458d213fce77a4d7ee

    SHA256

    155e8d361fdcd4beeaa7ebf9449f4039f5a264a16a1fbd97dd9ef47b2462e1ce

    SHA512

    61566a99391cd2fef84f1530d4b22103ae1c218938498997353eeae73fe4d231a1c52939119b5b3a49c1b596ac04a426cdce28c33cb34ccdf8f9194f70c3b8a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd07d60d546481d2d75d2cc43c0ed851

    SHA1

    d2dfc4c62de62f580accfd90af960ffe5274e575

    SHA256

    4f974e18b3439f248c5e7adfc6ce56325cc820335f110be20d69374249f403ed

    SHA512

    67913d226e244dc33326cb37fced78c6a71cd56ab5ec90272488827ac37564335752abe7801b63c8f804611b688958459b7ab746522b753be025beaaec1e9744

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90a7131996b8747f66c8e48c4cb78a50

    SHA1

    ae57f6ee52a0e6f4c120ca2c25c289390505711d

    SHA256

    b72bc0743d9b8e6f95e3d1c039afbf6157ae764a063160a259fdb531cbf843ee

    SHA512

    460568512aca7076f2e1f75f91b8bcd3427712fb9f85ca3490670ae30e90d76dcfb82d5e64df8df1afd1da913d1859e430a68e95892066aa135a5ccf7426ccbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04551de7ca6235223f6980739844aefc

    SHA1

    310c3fffcc23bfaf74468ce9862f1e82c7678b62

    SHA256

    2ec51de852e62225eb9b31ad3cba4ad35eac2a7ceed4dcdc71f93b8bfda8e7f5

    SHA512

    395ebba42c9f0c9b7c585c6bdfb147095f986d0fed8267671aab565165f2191c6da6838723a7cfc3f359d213d95d1ea92ce164bc5c8ec7172109a930dec93c0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daf6ee5ca9dbaa8aad2ac0192d92f041

    SHA1

    b8e58b25443bfec7cefd3adc2ef7da2242ebdbef

    SHA256

    d65966ee62e7ec1c1b252721c157758cdf2567ce1ed23b47847f215292909ae5

    SHA512

    8e91c0b18233afd778d88357e41912c64f9c4724669a4a81cefd3241535ebddcfcdda5674b527e3e8373607568bc7dcc5cfe9f2ee8f2d90726c65ad9987117c4

  • C:\Users\Admin\AppData\Local\Temp\Cab5728.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5789.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1792-5-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/1792-0-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB

  • memory/1792-1-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB