Analysis

  • max time kernel
    118s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 14:57

General

  • Target

    bc35a0509c5a06688b9af74069db9cbb_JaffaCakes118.exe

  • Size

    791KB

  • MD5

    bc35a0509c5a06688b9af74069db9cbb

  • SHA1

    78eac911bcb43e18d1d73dfbeeaa5ebabe9cb7a1

  • SHA256

    0bab2a1a42d9b934dde3465c067105820d1082654e17b561e3b64823a4c7af18

  • SHA512

    3f6cc3e7b8bf14f58a8f0f4066e495369464ed4d6c26e2794a770fb8097504b854e93cb1f83f8970b12d75d33a7e20cdb5038702dd2604803a8a9a8d376f9218

  • SSDEEP

    24576:bNEqn4on6JnmHFBiogPHobg0Dy6qlL5M5uZZaL:5nnn6JkrgPYgdM5+EL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc35a0509c5a06688b9af74069db9cbb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc35a0509c5a06688b9af74069db9cbb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.admama.cn/g/
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.admama.cn/g/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2748
    • C:\Windows\SysWOW64\Wscript.exe
      "C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft022104\b_0204.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\soft022104\b_0204.vbe

    Filesize

    1KB

    MD5

    5df81d84da7f381f4bf66eaa108ec453

    SHA1

    e18d3d7b755c90fb1106867acb2a52d53d3cd558

    SHA256

    483af1a051fbcc67398b165608061f2451bef7aa41ec09f0dfb960a82ab61460

    SHA512

    1e4afbaaab3f9ff77647586025d9bf34caff2829ef87c49360610488499552d55f34037e379741416e2fa4531ecc0bd7f567fff14274c40884d6ce703ecbd845

  • C:\Program Files (x86)\soft022104\ppev6694.exe

    Filesize

    2B

    MD5

    c244b9cdf7853b5693a295e384c07367

    SHA1

    f36488c08303b2a5d69384b3a05f8cfd95a3df00

    SHA256

    4f35212d12f9ad2036492c95f1fe79baf4ec7bd9bef3dffa7579f2293ff546a4

    SHA512

    2323649cfc42858be25615e4f6e8e218d61e7a18bf3b738cea3c2f4099ba98b6d15939e27a5893062256e3b1cb7ff7a9834291b9d69e3719238a8f3ac6646a18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fba9bba1f2c541bb29a29d7d9460a0a

    SHA1

    aab8a1f43fa5144fa7c1a126fe43f857a38602c9

    SHA256

    0fc3dd5c7fe1aaef44ad6e39bfd8a8a41e01c4248f273610c603507b60a31c0c

    SHA512

    900a65487dc424c343fd8d1acb6a6b33b5de4785fb3a675b520d5ffbb877695dc04bf73188219539d8aa9ca3a251ce0b185c60cfb71c12c8e641dec0b0219e54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23ea7672c6435ee76c0936e0ef0f6ec9

    SHA1

    538506791b9c315c6a63d4f1954c31b8e3ecebef

    SHA256

    2e311417c85b68bdd499fae44b1002097b5c58796c47b51a222c078c7b3a90f3

    SHA512

    0b7cfb5f2bfe00d67b80770b3a76d0ac1717bb70f08acbd06166faf3cf62b8ac7d1a10bcc85bfd1d493e42f27490ddc01edf455c1f4c9649af2b140e6f282188

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4256fd9e0d25a1fc0b57c3ae394a06c

    SHA1

    09d1903fc856dae3ff5d93c10de1dbb8df35794d

    SHA256

    3e54b4b751a21e627cadec3e5503a51658d8699d31c4b4362a37127d628f267d

    SHA512

    bdf5f68361e733c66bd881b0af3dc98ceb67d97bde9e763fc62ce52497a4f22b659481b999bd5ff74957cd509b94e0ee814db74eca9680b3f58a274800c6c962

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb7232fae7ad64ec8b5f55af72592ed8

    SHA1

    7bb7d09d5adbb1f000d6b58ca94fdb289f8dfa33

    SHA256

    9aace678afc3ca6e2788a2fb16ddaba79c52634798eeac0c4c8dc90e1d9ed89f

    SHA512

    82f9d8a9eb1994e386eeff9c83c9cfd60d335bd312878c07d67a84d0fe9062af0f907485d2c805e7d72b6bdfba69a599a8b198de79ca98d74fba09f351a6c2af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1205d9a670f85738031faa370942c04

    SHA1

    e11733fe1a8291fe189cf924b1f66cf48bb5f296

    SHA256

    9507ba6fc9e900d0fcd377f421a73eb809b5f588ba021b20844e68bd3e091204

    SHA512

    dfe3dd0969cc6776d756de03060c9688ef672e16bd9b52e6d170bf81cf1798d8e110d1d7d7d6b71388e65ed4c3b1003cbbc79ee6e5606a891d0c4a625ec63dc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0084c185a452531c8b4b7560a352778f

    SHA1

    5a0bfbe140d5aefa4850166ff161916fce19ea8d

    SHA256

    97503ac5e7dc27548b35d45c5aff962cc1c488e574747d1ec2b8144cf11eee7d

    SHA512

    cc5c191cce3569c7e38174c7905c7d144db16c80b22899fa6b7d8e7217375265ba221e3fcb97db474b074cf8db5aac3b904a23a1030b33650a4a9d43b8d4d0e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    949f168051b16227e5ba86831eab4b4e

    SHA1

    dba9ec78372f69dcaa9fe7ab73bcf0cc191171d5

    SHA256

    69727ce5cd958130856cd266c10f680624e6033b7784ba2a35e152757bdd9d17

    SHA512

    376bed9e7002be2e5cd96e399278ad5801b24507160f8ae13a390dc5f8de06038e3da075276825b02a85a608a4466202b47ea2602b7a7e0fa979302c9f430c19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48f7ff18c160c6e309ff46632c99971a

    SHA1

    b4031fb69aa701a365384a5f83e33ba10fa0a850

    SHA256

    eec86fde4cc7ab62d496fa5fb58f6eb14f0f53fa61583ee7bcdcc90ed6165d08

    SHA512

    60e317441955a0bcfaefe0be2ddc0cbf07c570b5850d9b634c7679483c8100fc676af16c71c14ae9dcfd7ea9732fd564792553fee1d227a0814334b69946b3a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d05d0d45ce72f5e514e3a037f733c32

    SHA1

    3024a1546c5501cca093caee4f41d63abdffef2c

    SHA256

    56dd91cbf197070f7c9cf4ef602e98da68ed7fa64e3a68f32b9988dafb9657d6

    SHA512

    966b856d7cac64e111b9b58687ee3c239c404b790741bdcd17d40012e44bab0fd426b64c9bf4fa76c42a611b0a32446f05ad5d1e15047e75c8d01ff5b6a4f59c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa3240f08f293c6b36b17c00c6e75cf2

    SHA1

    ec2c1c9ed9cb18d56b894c6ffe7eb012fd54d91e

    SHA256

    76aea2d38ed054baf066815e9704674740fc6265800c0a8217446977a7b151cb

    SHA512

    6149e0fc432ba32055c6e89721a6d6b7774a0f9514f10e7354dd926cfa164c9cc5c4df6fcdb61a8ee8f6135ed8992efcbb93c5a99657f88d6869d83344c007d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    132dba37ac460a2ece71e2e4635f7390

    SHA1

    a91341a069343a985e869ac001dbcb00b107f27b

    SHA256

    48756fda2be04af11efc442c48440903e82ec1646d8c19b2d44bc07c65702096

    SHA512

    de3de496d910d948fdeb8af6510c8d219be56c088cc921a117677fab9744ae074112a629302ede00fbc0cd62db1578f9e36b0a1856b4ef206efd41ff89564d28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6279bbce2f0e88091ff8281e1ae70762

    SHA1

    a16ea4e5d3326da2f86190255f52625665f73222

    SHA256

    41b917f88f4b4fb6ab3f77a8a7371ebfae63ec1fa6193f8b23e4c5eb677a1a15

    SHA512

    a6b42934056bc433a7462f1d30e652a62e952405b92046d0515827acb0d754a310341b1618bde9658ff55d6da0a3b2c0ec2ce041e984177c7bc3ba2bb44a90bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a224beef29e4674cf0770277560f95d6

    SHA1

    fc281f7a2705486ff4da146d358c6045c509f8eb

    SHA256

    a6a2fc13d778ebc503fd65d7290a454fbc848dc519c726e559d71d559565d4a1

    SHA512

    60e7f8cd3ec02e7d7377d6dcb16374744d71799c494b95e70205f997e1b793cdda6de85c2d109f4feac3da1ec67f419456ab3cb4691946b993730c9cb9a75281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e7594d61e65fa99409e6d49ef145b2f

    SHA1

    bdac6f4b6da67f095829a0e5d6696bd58ea73ec5

    SHA256

    ed9ee8230a3806a2c908f37a7c14b66f58d2801e907d8a3362496a98e6127675

    SHA512

    f6d965de4f6d83893cdb3f96221f2ccad24be2c8f79aa73edcfb7a9ca86e5f82b48507c3c1542b33b78ec054ab312937741c3ae4b61fd3f8c91f02fbf80ce53e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63524a784d7281c0f07e1a5a78739da8

    SHA1

    41f462693ceff5b1becdd2070e2a67ba60115c96

    SHA256

    9154ed19b1c9fec64469b5298f7b0f17d4ba6aadb3e4831e4ab16e629a29d31c

    SHA512

    508240e3f2ac64c193a7d5b5360794bc27139691ea44de589f264b67785bccebccab3055fa16a896bef89a353878164b7e7daefe01c69176be60fdafce656ae5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8671eb2df7f777e19bc2679c06ca9d9a

    SHA1

    2f25b45cdccd0359fc770514604e97cc91daaec1

    SHA256

    b2f1aef886d117fc963449220f3cf242b5f5091853a7f1b33d984285870e3d83

    SHA512

    8bdc3666fe79df77e2ccbe38d23a08c61b07e50cb7f187578fd0f33129ee63e8e240abf5173f9ad5a5efa5c776a9909ca4b4616cf04dc8e816ec3de6f16b92ad

  • C:\Users\Admin\AppData\Local\Temp\Cab740A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar74B9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Program Files (x86)\Speedk\Speedk.exe

    Filesize

    1.4MB

    MD5

    548f8a2766a9c75c9c43c5d583e80d34

    SHA1

    0259de3e8fe1e5d99bae06aa65253d1e7cc1419f

    SHA256

    a4eee83f86d97bfe06b96c9fea3228f392bd5d1c1ea05499bfa26956dc039dcc

    SHA512

    4324f721690ccc8ef62f2ac27a45717c0892f7747695e4800300c497c04b60dae0e3194c4ea5fafdfeb72f94665f31d97e3bf5f6c142f32d14bf3207eaa5e26d

  • \Users\Admin\AppData\Local\Temp\nsdADEC.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    254f13dfd61c5b7d2119eb2550491e1d

    SHA1

    5083f6804ee3475f3698ab9e68611b0128e22fd6

    SHA256

    fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

    SHA512

    fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7