Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 13:35

General

  • Target

    bbf21e8caa331158d3c62a7c07c9c423_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    bbf21e8caa331158d3c62a7c07c9c423

  • SHA1

    7cce93fb4ac2d220d31bf7135a5b6b3c91ca323e

  • SHA256

    3396894b42d81353487ab990f1f66792583a290fa6ac28fbfa3b4d879cec3c8d

  • SHA512

    e470fdf0a4d77696ce3aab538213c62984c959acb903e2fd54c9991eac2c9ed53c38f87cdd1d100c6761a27ea6db37010704d7da9173832986f3f08ec19e20e4

  • SSDEEP

    49152:zBMBTQtBlHz95kTxjrwRp8NEWlznqQZCi+i6biSWTUhL0FlAYX:zWBTQhHB2V8RpwdlbqQoZK3c0FGYX

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbf21e8caa331158d3c62a7c07c9c423_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bbf21e8caa331158d3c62a7c07c9c423_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://blog.naver.com/PostList.nhn?blogId=qoeodlf13&from=postList&categoryNo=128
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    2ff73cf45875528ae57d641858d7e90e

    SHA1

    eda6a13f2b8fd71bae69ad49d29b6a6a0ae960d4

    SHA256

    ef7f60169e89b7d7c47e05b73e9ce80785afd36c836c1421ed22ecf085e499bf

    SHA512

    5c5f175d6d42cf368b2a67038855ab54a1b9bcd085ab5a0025bec4a1fa4232b04a4acc5193abca5cea85117adb286f0f686eb3145361b195c5c64a94305bfb49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12be0d7218874e6faf2254e18f484b74

    SHA1

    bd86c3752c429a585c5ab450383c2cb876a8f998

    SHA256

    3a54b065606418b24268a87049d1701035a5d19f024f76ad53c4115c7329ba1e

    SHA512

    e5e753332425a7aca58c08dd16d6b208f84f63fc61a11c87f1d917a6ed63b0eeedd0c6ddd1ce029f672987045563e819180a92c6c32d29f447849ecc558d35ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9000f12623408e1eab419bd2319fbfe3

    SHA1

    7c850a2d209b90354f548c65b7d7b65d950a61ef

    SHA256

    260bd4bacea161e23eb3e0e119f0dc23db0133068483715d1847aeef53b3fa10

    SHA512

    0e52c3b3b23369aa68bf54f358473f784d1a7a6eabc1c41c1717d4aa0ed7deee8041189058e75aa83cda48b736a98eb639ff94824a1bf8544090bc34b709a259

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b358cd75d8e5c647e4f0a6ea7c0b6c4b

    SHA1

    f44b6ec22f7a0a6c71d86ebcfed178b0e44c6478

    SHA256

    54bada6d8fd483589aa161709a49baf24ed3a0598320205d5eb88e4a113b98e4

    SHA512

    530e57231897aa3456a724a88a38c2e9a9dae13807b5ec714bcfea45bc23fc1f8d18481e650f3f42ad027b6903c5c9a0d89dd2297fff620bf1cb1bea458fc834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9090b1383c84fa96fca449257933f4d3

    SHA1

    d2909fbdf95db430aabd2a7d989ed953c383118b

    SHA256

    7f2d6f3d474890e006b16092859e572d0b089bd9da4c8d221757325a714be254

    SHA512

    b8786c5086f5a184ff1b8eeff87737b11dafaddcbbebacd164f44b1a9af07a6180c616ced865bff1d939654c2587387da5a5bc6b7324f3607e08b2d0e7da6051

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90884d8b5e722cae92d86113011fa54b

    SHA1

    ef96d33ecd4dfd548e7de28df57a8658a1be4aec

    SHA256

    f6efb62564708ebd849de69058f27f0bbf115e036e542113afa0954a6c093944

    SHA512

    c0f9d21c6dc3d1522aab58c950d1e3344e5a5119a86d0c39c809260a951c758f297a040d36890937ac309727fbc3986fc4a8d4985e1b7beef82fa091f0f132a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bf017818fad17d7f972e613c8205640

    SHA1

    0ec5fe5256ae3ec59af7ca7227eeb3789bc14bd8

    SHA256

    4f7911246ed57bfca51e07bd5c301e744d7652abffac7647328648413f3b35a0

    SHA512

    7312232755d7802612764ce46165e36ce8cdafecaccaf02a1e469a6493b530e65cc41d07c2576f34cc878ae1378f0fb1cf14e8c2c6a46f5f097c2e8e93ad5244

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd43f4bd19afeadec2b6eb924d50dca9

    SHA1

    9f2d688b104209f817f4c31871f550b489457111

    SHA256

    301229b73aca1b28481f39121805b1f375ff315d4ae2f1590bd0a69b4d0d521d

    SHA512

    63f7348f0eae02a6a05c625fc33a5274aaa20939d58c11e972713f10bcac3bf134f2a62a535871f41a7ebef407f2db125ed652573df46b29d764d532101130a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5f59c36380fe314cab6b314fd95f6ea

    SHA1

    01bf2d58ccbfee7551c44a1050fd0ce4d2d196f1

    SHA256

    26c4fb34d68c6a5aa481ba6e828d08d68a3d52c13d0ed69ae3e7461cd157bb11

    SHA512

    af777eb938f75c5e89cdc59fce19d3a79f571d000a136f5944cfdc1d75eabbca3dfe92e7f7ad39fc23267a3ce20ef9ced58ab47722c1d02ef325f49be1c828c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f4e20e511d41dc73a83555241ec0101

    SHA1

    ab7bb6788dacdc528ddb30aed1d4546d998684eb

    SHA256

    58f4c3cf730f50a067c70334c1e9e7021f378b2921d1cd59438ffa403163fede

    SHA512

    f9b7a0f33964bcdd07180df5abc947317689154bab24256548916b07bdc8aeca5fc140d20e7945494ff9715779293ac018d1723e59306454b592411e153621b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42ae64fc4bd265205d7b925d9cde5600

    SHA1

    7862522ddd18889e43e6810f73570b0138d41328

    SHA256

    81246e8ba736dedbd4563ff03fb919c444ce1f66e4682dea7e7364ae653c8242

    SHA512

    d339fc7d237a383a68d279d2c7cfc30175ca5b02b433e3288922a99e7f2228344dc026dafb8fbeaf2253c2f3fc4242bb68473aa3cb7d0a6ecf48b475d9a0a5b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8c647e695700b36f87f2cf03091209b

    SHA1

    ff8e5cbe268795aa8b9baf6207c4356c86a0323e

    SHA256

    2407b1c156a71c29a1b572d8531fb1b47e8aaaff124e7aef898b34ae80b9aa8f

    SHA512

    8291004350a209ee60a97a8e45dce9cf385c083f5a110d4ac9e29eddaae077898ed6a696a7cfb4e70a9cc9ffb40fa77992ddeea0d42487cc0db0e535ff6339cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed4fa6995309ff98bea61a5830e9780b

    SHA1

    e0a8563dbd70cb8fd337105f1a8ed661156b86aa

    SHA256

    ffb76759fd1fe0d2a696d367cdcf35b2840d12101f5429b21ed10fe4a3ecde1e

    SHA512

    556ffeeb940b1a574bc797aa4e27447f3523a1be8d43d67bef8009c02bfe61f21f8e211352b4f70f310d2030f5ddf5263eac07685b5aefebb3bfba471f959baf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a39a7f17d690193ae2d129b60edb9b27

    SHA1

    cd25ad1b10b64dc88bc7158f77962e94a0ce2680

    SHA256

    9761ba015cb170de2246e2660a507a89e89c09e4030a93bcea48f24af675b41f

    SHA512

    94d695227cc8eab20b578ff08750c64bc0616a9cc1e1480ed2f5b1b2e4fc2cdc38dd3b41538f39a868ebeaffe542385abc4e8cc2e19dc51ca53110ca69ad204e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7d03cf77bc5516c8df8513929f137c5

    SHA1

    70b08c17d22bb24b8381533c0b95779cd71336f2

    SHA256

    a72f5e114977a484a1b409b305dd35d1848549e55f22891917d6c225d2435b13

    SHA512

    594e6496219c14be0eb92d488070f514017c8aa2d427c646f6b46e2286b4c2c72734e5de70e21587aee00051a2879b979643190218c9bb9a21cfc9f5e645ed9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16c68cc8fd8a510e3fab5021f92aabb7

    SHA1

    854aad5dd09e47e595ee451f0d05c139dfcc54a9

    SHA256

    eda581fee11501fec8a1d98a3c2e572eb43d3f4c1298cff2ff0762ee1df38b55

    SHA512

    dd1ff387f29295a5867d3057c408e69a8f810ed7d36b7ce068d1db06f362e2a6ecd8cdd5f7407ef0501d7c56a9d7ef678270cb67a668664c50d8f28ac6f4f322

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73a80cabef0b03efb5bd8b56622a7eff

    SHA1

    fbb166c73540ca7c3c359712dfcb8c4a81890903

    SHA256

    f8123ecf8311a2d603d4ca35c2ba46a4f21efebd0cf0a44cd2f19b1ab3ab907b

    SHA512

    4d5136c7b87219f4fb9fee6a8d318fa75049a9b8c609bc4a75a1502fde75a8bda550f3d0b7cc5e5eb96f6ee2a5cf8552090d6efc0159a43f30f7342805453485

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d762e24c77f2a60ea5ad9432268c78c7

    SHA1

    6e8e79ed0d04f98393f7bf20dedd2caa3aa36f28

    SHA256

    6d084a4b269dbdca0d307ad311ea91ca7f2e65d2562bb3c1085eb917de57e022

    SHA512

    0a5ffef9f920725006763ec335da9899e1a579545f7feedfcb95460e27023bfbb6405ada560dcabe4570c5db3e1d048499fbb9b3c65927bd0e73a91fd51656c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bae0ac6e91b670f87d71e3a402ee1dd9

    SHA1

    00fb226e2c976570e5295f0714334eb66c96ef32

    SHA256

    a960a5e8e28d3f185780d6904201bb55a5380c6c174886e7e2fb76e528eeefb4

    SHA512

    d5d67f0efae605a195126ea5abc6d758590a502b3654306adbba22b9cd20341afaaa5295d120d59ba04a2726a80e2148b22024a575e5ed14dd329e181107ee04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    e8388a3d04308e94404e6a1aa2275d48

    SHA1

    ea73a8ff8cb68b72e2e019b3ae18390aee077cdc

    SHA256

    224e93c7044fe26b2a45de98e9a06713951801e9a0096ca9386a088ec2e41d12

    SHA512

    f7cdd4915f08708c08c556863286b8f9848a3010c780d13c1850b5d9eb6100e58387064d0286b54852c17f2751bc28662882315a108c2571b05f0321d0e6f4bf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\c2sxdb0\imagestore.dat

    Filesize

    5KB

    MD5

    8d97fe3cbeebc3ccdcd5850325588fb7

    SHA1

    79d4bcb2dbb0b16a5141c6404d136876a531fd19

    SHA256

    bfec3e64b7e131f8741f9e268180b218e19ecd53df556c04d05378e99d449c98

    SHA512

    b7a748dca5fc248faa98a12d017353554823e1a08603184e50476586d9e055e55e3462bfdab72266a4a9e58ccceda58c67270db295f30e5ae4c4168e4ae73165

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\favicon[1].htm

    Filesize

    5KB

    MD5

    026229045759e917304ee6518f96aecb

    SHA1

    7918efc4744755433534a6e03539a15db9820133

    SHA256

    6dd5dd9eee11c7a111d4ace7dcefae71b78ea92d6b2796cb0d80744903c5248e

    SHA512

    cea8330261bac1e112418cf2d673713bfff86bdcadd0c8e9e67b87ec29d08baa1a64a1b21483643a5246e435f74599541e3bdacc89e0956197aa33c94d037925

  • C:\Users\Admin\AppData\Local\Temp\Cab966.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar967.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsdB0F8.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977