Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 00:49

General

  • Target

    cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    cde7bc198a51a823398382a3eec26875

  • SHA1

    b756585570e704278d663a1726d97e012f5bb389

  • SHA256

    a5d97582f00ce0f573d94b1b699c9bd7024aff7f72abc0ecadb56c84f6659f23

  • SHA512

    0b75d47116e506f51d8d468bd836e1d4dda47528f7f1634f3ae5a909d32872b709bf6f65fb9176960654350c4f951d6e7abe1f29e4c0a4fae9bd7af29ff3875b

  • SSDEEP

    3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vX:PWfUkBPyrtBxgQTMK0TKpxS3H8j0b0

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cde7bc198a51a823398382a3eec26875_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.bigfishgames.com/download-games/876/masterofdefense/download.html?afcode=af628d3a27a2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9bcfa62c0446fc044fdce7bc17d7d99

    SHA1

    1c4d3e7bca16b2233e9d792e0d8f8648d9121eef

    SHA256

    aec726a2ed460d70c85e988bf1a8f873f3bc70ec622b9e0b9b61e41f5b50063c

    SHA512

    0c54dcdd894f460a6f81c3d07e1ef763fe812c1ce05985f1db3100d866dedbadbba3a97b9bf4f79367752f9540ea670e9a682b981a03b5b193d34f812feb28be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d243b8185c0c8d9853e387184b7b563d

    SHA1

    2ffd6cfc2d5f77e17473f76bdaf2c35ba8ae111e

    SHA256

    c3389882cc73ecbadad9587b2387af6aed7aab14dc9e303454b9db68f7a91008

    SHA512

    22442e54cc2f93f7e3858be71a5ac45ef8b1f410428678d5a6b4b62703c0ef3bfc4cd332dd281cf857e7fb071417b338c9fa5a4f6337adab32fd5a2845512ca2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1413080fd9d0dc886ce979a2e601270

    SHA1

    61e94a4142df44614043ebbdcd5e15418edf1c9b

    SHA256

    1d69ec33bab83b3ec95e93ed94f6c7e29ce61adbc2dcca9ef9b741954954429a

    SHA512

    7bf32d5a568c15b0948a1a41e58faf10bc199878e6102280867b1ce795443a77b7b9d1239dd7723f4fbfbabbf9f2055d9063ea29e8191f5ac498231864e869a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7939789162159fb4fb7ab78fc15700aa

    SHA1

    16d1c219144b5385b6f8f07fe4f8cf490e33a72f

    SHA256

    ebeb099aa54ce0d8fc4e8f9b8d1dd3e9cf470429c3e4f871886512a59de4d8d9

    SHA512

    0d0fab0515162a0326e77278230804fecf33841b17f04ab6ff908d3fa86a8263e4bcf533818845819a1b87361bd7e856228c2b79127239b0e51b03bc5fccb41b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    570f24f3fcd80e373dc70df775a20d75

    SHA1

    5dd33f52d790f38f346926171aadd622f045144b

    SHA256

    229dbf3dbfd28457a4dbee6e860b77441f12cd4eae1923bcc4614bc8f85cf0da

    SHA512

    75c498ecc2a71bf083057ca1437cf668780436d627f2806ba48379bae693c0ff800280cdf03c0e15e4120e10c631679eda0c64ddee5c8fcc06289df85a127fe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8c7fe98105ba906ad86dbc09a6f3af3

    SHA1

    008873b14aca40a748cfe72b5f447f4343861884

    SHA256

    68e36f2a4730e736b92b332e3ceb5c7fc717bf061b933e0209d495dc1784e173

    SHA512

    3dd5057fdb4dfa734f2d16c0a41b20b3a4b2a00afebb5f691e73c21e255dfd5efa8e76cc0a0169e748399a8c0133d9c05b710258dec6305b541299a2cb581031

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59ab2d7fd883e7f31dadff9ddd2dfafe

    SHA1

    5cb21fa0820e95a42a420b3edffb35bd6b1ba7a6

    SHA256

    fe5fd5140e23c5799fd6a6636d2403f791d8443f3ca8ded1c959162d0966e143

    SHA512

    154421fe9d2a5bd7308383583d67d6aa1909e63d5c62fc5bcc7a97e19edd03033177dc389b195eb484ed7ef226b1d7e97124c3d01b7ca0791d54bd2dc98e5804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a35c9062062236974cf414e1acb114bf

    SHA1

    74c19ec479aa8045c79b7f547d02da45fd57ba23

    SHA256

    6842a569937b8296c47d422317bd0fe4d820e324c0c6038eba93c0dfa7cd3e33

    SHA512

    05bf2149ce56a11788b33aa4aff1539e35cde1de52acb49b784a2d3d353059b00d170b1a4cb176834a5bf94527cdfba9a8133cd751f4b9e783071d7d814800e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c910c4d9035997a0cc497e9b0307776f

    SHA1

    69e0eb4ac854cc717299a2e42f9619d6f9d8b31e

    SHA256

    6ca3a125194ad18640955a79f7e89b63e71e1d43ad8b0c236640c51c908af0fe

    SHA512

    2298cb4cc3c509e067f3df3133a842939e987280d7359fa028eae569b148561eb7d91f8a917b0f83828c5a1415fc0c6eb30b780505c8a26cf082401154324bfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3b60910dcfd983c66e5399530376f74

    SHA1

    49103d2ac685dcf031c2531dae016397d825f9b7

    SHA256

    a1a19db875e7e48f9e8d72fd45e011974a4ce63260c642849ca206e602d50763

    SHA512

    a6e7f5f38bcd27039770d53f7a079804109bb206661b654f90abdb0c9c184b32862c7b5778a6af7b9eabc307706e7d08e13f8bdb9ecefb3befb09003a00ca041

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf1d3a8fc3c2dd9f873ac75766f1d30e

    SHA1

    a6366c8496d74d8eb7d859cec3af9192a0716f96

    SHA256

    63e7acd051b15858e340f7d44b428bf22ca661a546ce924b2d72dfe0d23f1a25

    SHA512

    dde301d9cf99e27d0a319a190579046def9a32423a6253aff1112aedddf84d622c1b8f000acdd2a824b7c5779bedb240a239c484c5deec807e55e6808b0aca79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6674af6503dbbabd5bbf198c38df2b5

    SHA1

    fb3cc90f6d0df484894bf00de67abcb936a882c4

    SHA256

    2bf711f90b8b51ecd85ca9d1cd9b84cf2e1ce509b3216483aa1f9655c164331c

    SHA512

    c595988505268e8e6da8f38c9187c4a91182c1b2f7eecd27ea3d495a68e715dfff326b0024a86da88b853f84779a138dafc157d5759e78e5ba162f0efdb6c4fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    980813db014be1d4a38cda0b4aeceb41

    SHA1

    0256206dea346506d9306f3a8d9eccde29f7549a

    SHA256

    a8e4832edcb9c38620801c72cefea5f8f79ebb088d7397b3c413b25eb7d21f52

    SHA512

    f9e2a22a444e8d67a9ac11f7b88f7f6e33242d19559942d3feee5cbaac0a36edf7fa26322056be1135d9d6656787d6b0b0095b5f0e797232a357ee062bd40d9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2793a889f07cf24770ac6ca3b9ddb916

    SHA1

    90c0e6237deba0b3c552c376071b00716ee5746c

    SHA256

    963e891d7545f630a2c2cce77a2746f089bd45b5b1ecc714ecfe623f1bac9250

    SHA512

    e230f29a0cf05efce13173067d2bd1ddcfd6e656d027271dece39db693bc9a7a76abb0a0819b3e1b258c2f0077fc1b69b8b9269f9e95a180e063bbb4326b1aeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5552c0b0c787d9a31c70c8c420d6bf4

    SHA1

    c6f00c66bef0d102dbf22726e3a4d54f26c0146a

    SHA256

    0c0b4cd21ccd293e66527563450a0f7f6ccd6e072682d7d62980230959909d44

    SHA512

    13f421ff4446580ee6003e466efd986003883a77324781cea970a8a227a3488256a14a1a1c08bcc10ef22b3eec5d16a4869a1b88e8c0f272401bbfb07c54ddd5

  • C:\Users\Admin\AppData\Local\Temp\CabE64D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\FG.url

    Filesize

    192B

    MD5

    0fcf82b5a915470e8a79d3516f582a36

    SHA1

    75f81b41607905b231521243129aff3554a58db0

    SHA256

    076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4

    SHA512

    adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293

  • C:\Users\Admin\AppData\Local\Temp\TarEAF1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2124-0-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/2124-33-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB