Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 15:44

General

  • Target

    c10f539c437a9b5af875c9b28a4c20bf_JaffaCakes118.exe

  • Size

    155KB

  • MD5

    c10f539c437a9b5af875c9b28a4c20bf

  • SHA1

    da28325ce0ef2619609e46a2422ffe33160734a0

  • SHA256

    3da8f63181b11ac73f97ee558c24a4746413c9feecfd5e94bbff57432c3ba388

  • SHA512

    1af839964906244c363b05f8765c21fdf34325f598a3f6affe8fbeb6600c68b0722be45117a80dda86c8062e8b041f083aab10a9301dfc594544d2e81be6cfd4

  • SSDEEP

    3072:tYcoxqopZbH+xJkdwapf8V36y8ixffP+pgwEbJr62l8ECZL:tYDxqkZL8JkqapflLiVfEh0xxCZ

Score
7/10

Malware Config

Signatures

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\c10f539c437a9b5af875c9b28a4c20bf_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ced8fdcf91eed36c9074954725398046

    SHA1

    7fc67b74080ff044338826d641ad45108866454a

    SHA256

    3e86fc7d65f42dd2e66b42009c43df22c509bdd43184bba8ca60dac3014267be

    SHA512

    a69767f5dedaffa4efd4433b4c42427f3dc0d5e5b93be390760d4c67352fa1dece43b792bd7ec79f9ed73c1ef0a789b4147fdd171d6f0176e3727422fe81ff55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1b9c362a141431ce47cc52a646ca7d2

    SHA1

    9b7c1daf245ea56d3923c22760ba7dfb274428f4

    SHA256

    b02f34f5087cf498dacf8840600160d229bee1178e710657ba83d16554546903

    SHA512

    2631459dd18bf88058dda7e0ed60f3d13f0fce23328983e7f9a434b92928e3db8c2b24709f9319e35ee4960026f398131c5de7b7b37d3da5161c7a30b83de513

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c9beb0bc9e4516cc387a1f5a7b6afd5

    SHA1

    856b029daca59b86834abe014c375cdc212c483d

    SHA256

    4141be035e2a861918d5b4e7d2907d3bd6af2e5be81d0db8fdb7abc32f275a6e

    SHA512

    0bd1bb73b38d35738f425747adb5d4740ae7c64a4ecae1b7020e2c6a899c2944f6b415b64c6a3e59f6766b2dc1be859f13493bf8dc3179a64cc542ef35834fce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56797c7b1fb0f95e65d730d2e21c95ea

    SHA1

    2e1da9ee4263939ae4b695fafe5cb00766407c05

    SHA256

    33771090cef9d5afe2bdd9061c8c472c13cd1ab80538de1a79eb524ca9faf2d1

    SHA512

    7fba5b68e4a19cf666dc3d397fd2ac0959f17003ce3ff30a238c06b6a6219b520278e17f002b410c6c976be3ff643788c7d3d1efd947fa36f9accc850ad56013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae5f40876bfbb059edf8c7fba8dc13be

    SHA1

    0dfc76bc31eb952f70556f128ce99a12d9ed7978

    SHA256

    8597d137e8a1e2350b115800915dd3276ca011beb8343fea3d8d23786817a253

    SHA512

    87f6a04ee1978ed4fbb8f48057f147c12ebe86b410b157e1192ae847576259948469550754baf7e15c5712d68728c661a5c382c6376e464b0917373d18d7a1d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c15fefd1e9efe4aae0424f366fbb588e

    SHA1

    1f5806129bcf88a6b1932d087ea8fb8afed25f8a

    SHA256

    5590a3a39d8d871062178385168a1d875703758a592c151389b34472e7b0073e

    SHA512

    072d7b7c586a6f713acbae1e3f5846ca8fccff8d468a975a51f63b73d642f815b036a6c9266a64e75e64fabbfc8179902805d671edd23858bf792abefbdb945f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    868d4c26dfa5cbc79bd90a5f626148ac

    SHA1

    0e757b5d26620c6befd70d9b16603dd47de662d2

    SHA256

    d38ada52beffbc1fb8c3db8fe095b8012c3420ae1e7aecd4b3f50ab1a06112dc

    SHA512

    73170a4ae22ec4bd6c7aee507fa7d64b7e51bcf32f2600a4406b5c98bc6fd32da44c2d9ce26b0811749758f3fee19b9ce2efa193519af965267102b90068804b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0f91c6aca64749fc19291d5d033de92

    SHA1

    d395fe95240193282e9c3d38842ac234c95cfd81

    SHA256

    b788fdc03d0837cac0d5983b7025646915a01fc9e20bb11d9f7a1f875051bc68

    SHA512

    ff75f3cea05392ddb1990000b307be0247d048fae7a0bd8db6505293aa3639448f5f7d37478780c95ca4349ff49130df848394453b3af66a99d4ccd7cdb64a3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23312e140f279be603ce7a6dff0d88b1

    SHA1

    78b3e22861e458a52171d338319049e1d8d308b3

    SHA256

    a7e5208dae75029e5015ab5e614108420c16d69a0a5325d6c041508c7c22aae4

    SHA512

    24055804751ecbb0f99d10e7cf5396d98187e7097ca0280bcb8434d61de112177320fec196b9cd29e37e2127f5ee2a2ec8aefa933deeb48ad25caef376da3da7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2b8dc240363a8b68aff549f63c0f626

    SHA1

    16460e5c7851d6919780047ee345530a9471978b

    SHA256

    47efbbbb0fba592735ad081d7685714a8dbcd7b43e617bc0587f38ad34cfe662

    SHA512

    e452c4b406ec55e6e47b46a15920d3451f962bc541ccf97b3fdb8fc987e880fb8f8b466f222e23ee3c7c665dd5b73b8162a4ad5e81c964162128a94579286cc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89456ef9d304eeb2ae41211321a8c562

    SHA1

    9a17f34d1619c7bf4f9ad3d9a9c091cd31322ad5

    SHA256

    f046fc3e3a60866e0cd2cc0799293a680ded7738dcc60080ca510caf7dfafe92

    SHA512

    d5f7a2f80dceac8fdd8b2faf4b60298096f6dd7811b31ce59d03f0a2b2a5e0eb5cd2aae454a40c782eb7f5f4a434b42a0e861057168fe9949b7459b1b9744ed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d36301b9499fd9103a69e937efe90b26

    SHA1

    d29769639036c621984516d5626a2828e3eddfef

    SHA256

    f19b701a2cdcfb563215b70f92d1c106d37451e30561d3b0d49b0c4e61ff498d

    SHA512

    ed59dda18c5414a992315ce515c92915ebef38a354f008ec7d1b0a1c768d38fdf0bb8433e5b29377998b6a80d72860c463634de665372ea6359f5690eccea1c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f78c28e4c51f3a7c763fac65c413d1f4

    SHA1

    fe8552c64a0cd7684bb1ceac2926cd0086b1e8f0

    SHA256

    5413316efd4288522ddb97796305c15f09c8dbf0be71eccc7b74acd103dccac3

    SHA512

    f5a18c520e24a8b2f32d1627c7267af3bfc7804fe98fcd26586c989c9a5ed445bbfec1e19b1e5f9c1dba09b3a0e27a4ad8feb90dee35d34b66591d617551f3fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fb92f0c5758d66e8324ef65fec48eb2

    SHA1

    6296d2ecba5b682591f9fe763335fefc5e268be6

    SHA256

    68e3584c71dcc9f5825166a2a5829866f51e9747ae0b1b6837326ea8d3d36c73

    SHA512

    761c633a36914e1bf1ae4d1e6d97ba897d9d0b4392444c2170b5e030e63a70ea134629f754f25bb4a74bc5f9b771ec2c4780b93e4b1850f6acf6512552951f7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b49927a2021ad39ab07d74cf58422d01

    SHA1

    c4544b3c1c38c92a96ce540313fa0e0376c51ddb

    SHA256

    3f019d03f2641294a24b07246ac02da50b8e58cff356ff3c6d77d467ef8f73c4

    SHA512

    60102cade82e577b84114d0ca6487c4f8fc605a9ff5749ddd65ddf28d66160592ffe27d89805ac49f8750c54a5b099b23a6837384272c6922197ebb5276027bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad0f50b5f300506e31cccc47ad3e303f

    SHA1

    d02d8570d8f92dbafbff66608cb75d6b9b608d62

    SHA256

    b454dbf16f8a0c86747542a03ecbb4647b5fb83c39fdbd34c8e4c86e725aa6c9

    SHA512

    fbcb283888e4504b12e354caa11ad2f4504a723061eb8d160ce600d0bc94efa713e2af4fb307447917fe43c8ce7f5a364e00c261aae5255a5d5ec152230773d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    094cb8cdc1a45c18f441e02e585de8e3

    SHA1

    055909ac33e81760521e43b4581a0c2a5769fea4

    SHA256

    1249a3974c5a57171ef0d0654634b15fb92b1b58f136d363f7930587fdbd97c9

    SHA512

    12f9458932f7eaea5be26dfb03593b1b2abcec745417121a12d081b13ba9bd136168c9872ea1d99ccd8cbf75717a137ab46f80bcdfbb15bf35aa3154a10b6a6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f810d8be393c1c9005fbd5914342e74

    SHA1

    db46b639611abe56d2bbfd81914f89ea8f044b90

    SHA256

    9cf774db2b321743f31297587a0adebe2d45645abad403a3438d9c5eff6b53d5

    SHA512

    543a781f6c4680b3d170e568f0767d71549299c8fddf7db0f587a2117d3341af440e25746abe6f0308483fc4ec3fcafd3157bcfc76ade3419445b058e84bf3e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53d5b67414c8f3c6b38aed7ea45bfad1

    SHA1

    443016f346d6b0df46418cb1f7c1a2dc288f635b

    SHA256

    b04e18623ceb15473c98871256aa05dd94ed51258c99c23318782ef2e64a25f6

    SHA512

    07ce10c023f55e856eb468ff7e878327a40d92dd0ee16fecd99a3ac87d2b3b28ccb590e7413b60455c989617b865a9ebb74e17f7c4e146741279f38b54b02c94

  • C:\Users\Admin\AppData\Local\Temp\CabC748.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC7A9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2328-17-0x0000000000450000-0x0000000000550000-memory.dmp

    Filesize

    1024KB

  • memory/2328-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2328-12-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2328-14-0x0000000000330000-0x000000000037E000-memory.dmp

    Filesize

    312KB

  • memory/2328-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2328-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2328-16-0x0000000000330000-0x000000000037E000-memory.dmp

    Filesize

    312KB

  • memory/2328-20-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2424-5-0x00000000002F0000-0x0000000000377000-memory.dmp

    Filesize

    540KB

  • memory/2424-4-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2424-0-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2424-9-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB