Analysis

  • max time kernel
    121s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 21:54

General

  • Target

    ce05a1790947ada87a8fe19718874e51_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    ce05a1790947ada87a8fe19718874e51

  • SHA1

    163a6755a44c363838e55afd3bfea566dec36b5f

  • SHA256

    65242190345b80994aca9969ef7e8d6a1378520a7d9d5e02df916a33957e321b

  • SHA512

    6bd270e22132f4a2b88fd04912b7584761dbd7a0e05a49308ed640802112be52ed5a0bd31df644c561510664ac6a9ca2e72794ce0da5c0254c0ff9601ec13d5e

  • SSDEEP

    6144:oiBPjksfQRQLYwKXEgQQQQQQQQQrt0QQQQMDLQQQQQQQQdgPnhcSbLKR9p7l:NJLfDjKXEgQQQQQQQQQrt0QQQQMDLQQt

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ce05a1790947ada87a8fe19718874e51_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2272
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f773d1f615c0c4c5c2968c2ef3f4d376

    SHA1

    9f58e679236f98546b2283fd43ad07cfbfb05615

    SHA256

    8283f40e9fafc8535a97d9bcdc2fa083447ff4b1cc802f7e525cc6a18888086c

    SHA512

    5416603ccfa8d715da4b7d75b7a23e86d7d14340bedc1b6d19613f95c78f49df873d470564c2865f52eb741448513d42f41c82fa887a72dddb0d6707cbd30346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10d06161cba3892e2b7c6b207827b0f7

    SHA1

    8a62cd9091fc354688bd32bff441c2e9d12993e0

    SHA256

    bd70530b120a8fd30d1b078523f071550e74845388acaf4c4b12b242bd6e56b7

    SHA512

    dd0070521d01a9e4d1eb936295483bca9cd2670ab6322aba0d9c8067c2194033c6d69517242db1a26b4d76cc077606189e8a262d796a37ff528706dc767bdf41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f135f60c444b1d2e962564b1ebfa0805

    SHA1

    7be46e924937e0f8c1527923345af71419bfa6d6

    SHA256

    2eb6e3e33946924add377eff5d509591c1331f12fa497fe2e48efd92ee23998c

    SHA512

    2b64a3be0534ad273d170247fcebf25c0477d778e398192fe496501c60fc0d66473bc4aa0bc26225857e988f18c3ab263ebbfe8f8f2424a8499595f655ed495e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c89aa45bbcbb3bd25c10ea19734452e0

    SHA1

    3a841009e311dbb61c31e37fb9801c278d342362

    SHA256

    2d9f041851f74fe8d8e358f6e85b81bf1e2d9130d5b684a8c15255701cec826d

    SHA512

    5292b002a517904e09a569067ae948e094350d06cab613f2b6ac44edc608bb0b91d8ba363f319b7ef41d91375c8542c1517ec822190a118841f6f442bdcd6c86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66054e5c539810a35871b8a195b02aae

    SHA1

    ec1bf67d2a88790e3d4ad023fd387093f9baf155

    SHA256

    5ae1df22ff6371a6293241a85d860633093289900d2ec52c7b80626f903a2792

    SHA512

    9106fcbf22583b47f40940f0ffb4e0edd27388c28064014282615da7cce0072f16f74df94138dca52a812b5d6772f2f6e0c6275e6795255377c6fd44bed361eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c32bd3f73f3aff39508f54071d6caa21

    SHA1

    3a4dc864bd098ea7f4787e3d5051c992645b03fa

    SHA256

    c6f6d300026d7e4e67f8e9ef038cec1579d0e376839c33504f96ab141ff97bd4

    SHA512

    fcb30e0eb2a104e96e8f79067a5f54f240b7b04aa9f396fef34a046b4ac792118e22832ee7eb719f22cca1e022264bf6db82bea8803a482036ae0a692713b30b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1912825e125aa9b9e79ac77087ef6e86

    SHA1

    9698ef5952e196a937fff8a9f1db30c5a734f100

    SHA256

    2dcf941564898d5345448c879e7a5f4266a5171ab92225ef22981dcb3ab04398

    SHA512

    a7b628e274c52b42bbaf9249c26f88f8ec022efed7969096b0395f3f3010be64a706e04c07abfc2a1e5f26fc28afa243a602b612441208875398171a2e95e58c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff98fedbefdddc18a2b71a91f56c4742

    SHA1

    d43eeed6b15bc2e29d686baee0b318c3bca6d2ea

    SHA256

    6b03cd24ffa3542cce67a7442cf713257bd9ffab40cdc8b718a6586d10820bfe

    SHA512

    ff480f990fdf6dd54edaceab7dc28a385507e62da9840b738bf9e8ec381343dcebf38abc6b30eff5b78dc5d8a5d088152b0544f884c69172c4d9ed8385778021

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35c5d310aadab26d1c7694285413832c

    SHA1

    31b7cd4a39da648eff88d9f4a5893fe6702707ee

    SHA256

    331c9d3223f218e54d8cc99e69e00b18c1947ed6d2770c8d65472ab66ab4a659

    SHA512

    c023185967875c82727900db223c396ded23368f7f52b9aedaecc144c1ed0f2960b30c9404bb7dc30e920f1cfab8fe2f8185bfe28633c1097022eb535fe58b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baa070cb5519bf515306ff2fa91f61c3

    SHA1

    bc71d691fa229f2dbc2310bb8a5df1d03726b250

    SHA256

    92be1a04dc70a761422d20a8e15fee7ad217df2c7a624d405bf198d76b161dba

    SHA512

    29ab939244c73f291cd01b5b2eefc71bac77f9b44d53d202beb8a35365bad36f7c9d8ce2cb035788bf5fbddd875f7158788c4e7e070bf7b129da68054ec80706

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb39a30d7ec64d5b6d45ae26d868b0c7

    SHA1

    955b81a1b70c199697f6bd51839424bc5c8550b5

    SHA256

    33bd716df9fd0d9ce3cde86c82415cbcfeba34921d88ba9f4678e86dc5177986

    SHA512

    1df729cb62f207d15afaff1152076c50430ae44cf6e4483b19fcac350b5ade53bde3e2b399d25ea4a26bf4e38140cf35da7c282d718a918832269e5c4057fec7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca3d366f24eb64d0d33a3c3e6f70e6a0

    SHA1

    e9499d269816b28db52a1f31d4395db96b43322f

    SHA256

    3f8216e968ae4ea32f4bafde0b476d01f91ee9339e8f1a2ede1ce20924ae05e9

    SHA512

    ad9cb4335791adb3f8faf0743ec6856c57cec5b76e56840ac612a1c4f424f7a46971795232bbc355b254082aec4f2f84af4e9ceb1084d704e0b1dbb68f935886

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91baa7b7f7774bd431ab908f9e0a819b

    SHA1

    3bf86f2072ff8a61ad2809797b792b9772081917

    SHA256

    331cfaf64de508eb8ab6917258fa1d620bd1dbb74950aae53d2376ccd8f79d5d

    SHA512

    3353e4f0222cb88ef8ae30fe7a15ce7fa384b9deb6fcca0d12f7928cf31d1d0fe5121d671fa1391bf2ef0d486f2a8d6407b1d8934484525334dbe42ad6bf3008

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f620bad8cf9752275fca4753c11692dd

    SHA1

    e1f58eb4f366a6057a5416f28b898d1b065ffb0c

    SHA256

    5cf5a8dd316aa41a18ca7218af8547f13c22964b72df8e34199ee44b71101369

    SHA512

    77ec9177bfe06ff79554e525c1c33cd85807bf18ce63360f1b785f750b155549982c4d6685fc92fcbc6563da3973efbe02f9002ff1e60f733f5c2cf92e424b01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66f178c12d5ba006843dd699c385ddc2

    SHA1

    5ebcf4099d0ec5751dfb9cd430e67ede8e31870a

    SHA256

    9508a3a9abe59e631e1598c785c0b2257a520ffe58d449847862529e1dca3002

    SHA512

    984c25b4b59663c41694f903016f95394d5f0e4d15bc724c8aad3d61b45e2800ae5c37e42a407272492070d414c5a228894b4091fd5f16d94de9647f74e923ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    910d6aa88283a16e387b7d9ca547e9d6

    SHA1

    855f73e5ceee08caaffb3f482b0a29ddebac1e9f

    SHA256

    7511dc1b22c738150e1cd9ceaf2643c9d305c3d7d0b5eb2c6b30a828712138a8

    SHA512

    4a0e926414a46df4d48ca76af0727901bb0ed9f69f08a96b31aff4dd8cba6107e7c73492b90aa9937674ad3b0ca782bab2c57ee2ca6d2c1a780aa7be16f8fe5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b56e42f0cd1884e2c5fd1844de403e98

    SHA1

    deb1d9a7db8d95cae87e014ad4772fd698d98ee9

    SHA256

    4881e6be7724adb63b759d2715b54b809a52ecb2a42ad7da1ae5f8b48998d9fb

    SHA512

    11479ee1585b2fce77e0970dc2a67dfb7e267bb13688a9917566042e579b5b33d6d53df9f5f89a879bb02c3b159e8721252f030ff30e40071386fb9e9c64aeea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04763721715dc0e42ed11d2872c041ed

    SHA1

    ca7c5aaf5f24eaa89d5f09802680915ceb98dd92

    SHA256

    3ee288fbc22c29ae0f6af5500ea0b0a45d02751de04aff69f2a10a286e959a04

    SHA512

    3990bce1c2691bea0d5626a6e5092d76be873fd628517b40a4713a8bec8ab886e1d249028504094a8473046c3293bce4de0a1e1a0b263bae4ddc1b9121ce27e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    338ebfa2238beb5ad0c65b03e6ecf658

    SHA1

    fdac1f8a8fba474733cad46ef3583be6be2ba6e5

    SHA256

    980fd3c7a162259b0f4ca5fc814b843870d792672bdeb3571e2f120b3286bcff

    SHA512

    1a40d1f5737b798f45b747e0abf88488d027d807e57afe9295ad92c6094f8460fc9c7aa86d4d4721d383273551c6107675bffbe1bedab41e3f474b2991680c3c

  • C:\Users\Admin\AppData\Local\Temp\CabD1D2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD291.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2444-6-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-13-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-10-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-18-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/2444-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2444-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2444-22-0x0000000000570000-0x00000000005BE000-memory.dmp

    Filesize

    312KB

  • memory/2444-26-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB