Analysis

  • max time kernel
    142s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 12:51

General

  • Target

    cf92dda49a91c36023ae0c094928f8c3_JaffaCakes118.exe

  • Size

    144KB

  • MD5

    cf92dda49a91c36023ae0c094928f8c3

  • SHA1

    e0e94a498147359f329cd32eaef8596e7859275b

  • SHA256

    17be29b1409cdcce9b51f4950c2fbe5745365e89c180ef5f959ae2309a973d1d

  • SHA512

    28059108ebd2c66a9835c40c5a6984a05ea4fb28f77a3e9e58d77edcb1ae5ec5fc00477264d0629d92dd8e57e07bfe435e0784793795cb997046a0dd505b920e

  • SSDEEP

    3072:3v/qp1/WXqOWV6DqzknWeE/sBQ5zCFMFrdZx:e+6V4nWeE//dC2rdZx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\cf92dda49a91c36023ae0c094928f8c3_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Roaming\Dalwlz.exe
        "C:\Users\Admin\AppData\Roaming\Dalwlz.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Roaming\Dalwlz.exe
          C:\Users\Admin\AppData\Roaming\Dalwlz.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:760
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2800
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66b9ae8c3f1e828281888a9434edcd91

    SHA1

    61324a826a57ac5648011476aaa67e7cd8256ac6

    SHA256

    0c2839782c2f7ccde3c2da862ee3e6a820d84c3d2074192f7c4076582dffc4e8

    SHA512

    3fd1b84f3ed95adb7faa23865fe8eda074671dc47c52d82351e2e39de8b42b802537000b98cb931caa8843d83eb174fcf27ebb9da99f0ad49df1c2379cf0208b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc2c6789ec8e997a029d5a401cc92f39

    SHA1

    2be9dbf7b5d26421421dd1164dc61bb1a86f8c61

    SHA256

    2a532165da3100eb278b61d744bacad1cf48d7af23d6dfa57c4b466533ce2a2f

    SHA512

    423c0651768421e067272080462a26c8b9d4f6f64e54bc081e078f7910dbc3a8a8c36cfc32a280efafdb04a9c969efbd48e8777b9686dd760d6f9258648030c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2078ea345ac043dbd21d76e355f966fd

    SHA1

    07a5be23f5afc82791d01da89cf8d8173112e852

    SHA256

    a18aae9b18dc0955543dfd5f30bbf4d7c7d1e167debd990dbbcf6cf11412a2da

    SHA512

    863b978a145169fcaad77bb6762108bd71e213cc810da2c770f4cb920ee6a0abf5a08a1542ab96a51c799a7260ef0e4b0f82274522e8ebb96c936671e4ee065d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0050e003c50f19f9b7c187f1165d72c

    SHA1

    f44cef955949a5f5a33e5f5ef75cd30f3b258986

    SHA256

    47c2b10b3e0e345892c334ad23150bad4674083c6e9b527094e1e81d0fd921a7

    SHA512

    2e58aeac9d53864ffaf120879c98dedf8afc5a516bac4b85d3fd8512e0840dc02eb35ca7be3d88c69ed165697a0263c9b49e33acec1502fb25611216b30cda4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2fd7a5a3841a035362a675df1484f77

    SHA1

    b4a1215ddae7274d88e458e7ff87561a0fba4984

    SHA256

    93517442914895cb11519d7de68189822e40e5dadea662c278c193f3ee08a05d

    SHA512

    987712b6ed571f2006d23b939f7d73d032cd254aa2a23b6e8568cfa62c7b7126d132be8d4651fd6fb1a626302265e688601c41fdf2e7499623015d6a3db17a26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2a9c31b2b7fc14a6687fd87bd4d4f79

    SHA1

    1234500b9fccbf3032caeb61bff7a7a855de1d41

    SHA256

    c6699ccd191cf5be640f849aaf8554873957f4d11be0c841d1e3492ee59378e4

    SHA512

    2f934e07f2e07ba2a3677b2e9ac4f0e176d686cfe868f4ac94ccfac118bbc0a8438aa162f0c0f200d9ae2b1a81eca7b7ae328e91606fd9360515c7a10b94587f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d58d73808a19fd1c09fe303c7475af34

    SHA1

    8534f1110ad124055508632e7e13c15737a23202

    SHA256

    1f20d38d68fef8937d57a175580ef91dc17cb2e5f4ca3ff69ab1df1916a6b247

    SHA512

    fbcd1c6d37774f97d3263349d2958906cc45a827bdaed6e3291a6fd0ecc02e9b7e5830b53228d954fd23ad4e4d293ce4d178e7044efc42c89c3c12acfbefb48a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3364776a59aabe7cfb3a9ae4a8b9508b

    SHA1

    41a72f74e0f6c66a333af515b65f482b88e24118

    SHA256

    044a4fa0dad09304f4abc7595f4b0fda8a7a13d808cfc787b4924ef279747e5d

    SHA512

    7f379d191c3f42657a911ef4d5440288c267b0d40bbc162c5deda8f8d0c16448c4107c8d2c5a38098f1be4ed06f0cdf24ff9b7e782b17dc707aae6f8bcc4a057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79b55abf7b86aa701be4a190ff619036

    SHA1

    c25d3f9ef34de1ee041c965628d40635e61f0877

    SHA256

    c013108d9d2f07dd99c735d46a2175bd0e06d99416f43c80ee5eeae2633a30cc

    SHA512

    b57cc770098d122dcb8e2d789d7707353f38793acabdc60cfbe5bfe8b81de7e56a740e1a075a60f02c8599522496dea1c458a9ecfd5e71c78fa30716a36b271a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d6ba7bf8faa74bd10ab0d9b547f1594

    SHA1

    12f662a3bf29fcb29553c2c297365114514b8cab

    SHA256

    881f4e70f984f4ec3957d11d6c10e1e3cc66fdf447fa99feb4b1ed78f7b03983

    SHA512

    d42fdfc706fe909c2287343331199f8d2f25d8a8b284165c4e5c94b81162040fda6b7914016b8398503a9700747f06a692da1d0aa74e6ff729bb2cfd20ffdd8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53083a2b498357d4a942feadc26560db

    SHA1

    4c025a0b65368a0a4a853958640586afba7cba78

    SHA256

    a1ef11101f11b71f7cd815f6d00df061874d0e58cb6becc2f0d1eff4171a4438

    SHA512

    6cdd72dfc9319ace18b9ca6f26bd83281bcb00e289199f85032f712ba6dfedaa5e2b99f925ff8160d8252d987f369791ae0749efdd75eb356ff6a6096b3637fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0129cf55de6419dc912fec46c4521ed

    SHA1

    8f6a06888fa39add6e616c98c55b2ae5f99aeb81

    SHA256

    13c6dc280f30063d05bbd14501cd6a35e6c17f3143a4b785059e1f07eaf6d5ba

    SHA512

    abc40b51e08ac9addf0c7b794a9a778dcd1c0be9db58db2570e200257860e93103fbda28ba319a5d266f80a15ad20e05d9b05e5fcb0d57dd4c07860187431cfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77ac0a2700c30bdcf13c52b5aeb2b787

    SHA1

    4b9b72328635b8f859f6d95080ac9a93bd3df471

    SHA256

    e18fce8b2667dbf617b5ee95f3ed710df55b68de26233e5d04f8edf4cb92e23e

    SHA512

    190a33725ca7ad7d2645c8f785dafc53d186a4313b2edc17a44daa1307d3fe7fc9158f40ae718c5d4694d136b591e545165617e62720d55e335556c94d322bdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f1ef6bc32da418c6fe1911ee83ab78a

    SHA1

    c778703d4b5c906e9f2067d01262bafa59585b72

    SHA256

    838eee28d6502c5efac8cbf00e16fb428e816716f1917db1c8842dd8678b52e9

    SHA512

    c6eb4425b68a8397216ddea72d54a96b29e9a12e077a7ae38ce572846081bcf3202556e94e93fca7563c2a61a8c5234423853b1490e7fdebf62234ef7aab11f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    032952f2904ef9e477ff7671360166bd

    SHA1

    f2f7fe63f44d66c273be66f6b41792472907b2f7

    SHA256

    fc1dd7862d90c53dc746f846934f3ab7f869118a2d84855a64541e23c100fdac

    SHA512

    b52c4293db6f70e3e48e85dcddc7cbda9b65ab86058ae7752cc876cf35eaf25d41c854ae2a9d753aed98944c62e390ef6adf270f569316f3f161485945a65a22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8255ad02a2d6f8fffdff543ed685ccdc

    SHA1

    acac011e598d5a603fa148ccd2dce5b1d1166be9

    SHA256

    531f4f9ad471a0f0aa55046e27aaa87821425525ab665c4ad0392177ccc320f1

    SHA512

    cb7ad2b397a5bb28458624c96021dc9394673e79552f719f77cf4acd523ec3a75742f444a859de0663572837135632bf76d2469acdf815ca263115e9a9b181f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    868a6f19caf93bf738ca7903ad313092

    SHA1

    12be82d05237c2825c201ead61fa2c31abd0ed77

    SHA256

    587962ce5194e04244efc8d99cadb6dbc11a3f08706068ccd6a01f2b5a809c13

    SHA512

    b2e690f3ac55f3b2548eba845ba27d496e41da96591522b10380a3b393a6a4f3e204e8c3e48223449acfc819152d6d41fa324b1344475af5a8ca34a28d1c04d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4428e9c87821ce1cfd49b7a29c75ed

    SHA1

    a70879e0ed67cdc3bc047169f6b325f62cb62160

    SHA256

    0c14d0cbf8c2d2df7ee64bdacc7a65305e52dbf486a9727220df381b23c139d4

    SHA512

    52acf7c0807ae9c9c06ab78371cf81b935a260a6cbc6a12a23aaba7c495e5eeceb82e9457e8b953233b4b9f79e1abf354926e629f02aa8305beaf6b84b5c8b83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d817027203dbd9afe2283bdf3861e00b

    SHA1

    2f1078ef80803206aa5473c382c34a81b3e275f6

    SHA256

    ee4a72e48d66aa812edc595e4b5b22c48770414323de3e94398ccb07435bb8b7

    SHA512

    c6493871a0a3d2fc68496a43b53595624490b1f0cfa0c0e7ac906000b6d781053e42d5179a248a4e42a1d174e8dfc1e138146dd9673f1c90a04090445f0e726c

  • C:\Users\Admin\AppData\Local\Temp\Cab7ABE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7B4E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Dalwlz.exe

    Filesize

    144KB

    MD5

    cf92dda49a91c36023ae0c094928f8c3

    SHA1

    e0e94a498147359f329cd32eaef8596e7859275b

    SHA256

    17be29b1409cdcce9b51f4950c2fbe5745365e89c180ef5f959ae2309a973d1d

    SHA512

    28059108ebd2c66a9835c40c5a6984a05ea4fb28f77a3e9e58d77edcb1ae5ec5fc00477264d0629d92dd8e57e07bfe435e0784793795cb997046a0dd505b920e

  • memory/2656-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2656-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2656-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2656-17-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2940-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB