Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 09:26

General

  • Target

    d19c4c639b1a8985dbe618ea4ffe0de2_JaffaCakes118.exe

  • Size

    5.5MB

  • MD5

    d19c4c639b1a8985dbe618ea4ffe0de2

  • SHA1

    d46b5f8ad1fd0fe79e68e03318e8de195015fe23

  • SHA256

    fdd1b9fc42ac2aa94b98ce25237241c7053abf3382386b7e9129592b71513308

  • SHA512

    d83ba59b7133e8b5ad5f2ebdc6fb80275b530e985567c161cdb0e4db477cde759040f1922836200d2e5a0884b60765f26c1b525c306b5f29b6ba4b1234058cec

  • SSDEEP

    98304:bIAeqRN5bJms7l2ntRFKwxkLa7K34aukFX9E+hyseji8DFQT:bka3bpl2tRkqkjtXXcsSFu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d19c4c639b1a8985dbe618ea4ffe0de2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d19c4c639b1a8985dbe618ea4ffe0de2_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.io/EJIT
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2050217fee59fa1edb169155e138324

    SHA1

    8d93e1aed616d3908e07fb6ff8ccc0b880d81788

    SHA256

    031094a875d90cc5feafe13eb8f5c79ab584b301f4a1f15f2b2dabaa66bcbacc

    SHA512

    63506b9ce063002f7a7c6816c1f67bc3b0e286d1a12e5a60c883bf4cd4485fdc6471e61f0a86c7360d0e27b92b516a8037e5cb36a63d10b77a203cb3976e43c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5010a9826844c7c7141331477be5eeb

    SHA1

    88394578439d481a9c5597f8eabde930218d687d

    SHA256

    9c778eca4ce54fc54ca558b32ac1e502109a8b075f38eb24c9a22160631dc89f

    SHA512

    9b11799c2c0b57b2d4e3c050733fc564b993ea49585ac0f0b9314bec6cfa3b46fb0aa0a724eace40ffbbcc2e1f417f9cfb224240ef7439e606b39d57bb755c21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    169b9a6fcf19b26b350825fbf89728dd

    SHA1

    fa4d2b71159e35708471b7471aaf91aa0b14dd5c

    SHA256

    595518e67679ba2c5af3ec84db151abf35be91ee0d199af69388164902546737

    SHA512

    c446c5bfcfc5a6a0732468a2469e9b8b207144d444863f2d8415da1a4b746bf7e9ec271d610d56e49a1ed614e1ee3928a13ea9131adf80a6afd7b696ac3fff39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    309ea50b76e2c65490de48c5c4e5ce9a

    SHA1

    c2f83f26b8f6ec0387cf6ef3bbd8d0986ea354c9

    SHA256

    e6ca8b311112fe809272d52fe0b3f30e086a70d432d44dd7e3f096f23bdbb5e3

    SHA512

    7ecc2d7441e935829db7867381f616106bdbf06f7b0dbc4e812faf698554f73c969c23661135f4e18ecd0486ba9516b66c8ad662e7c3bf25bc188c469a5ead11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5165f1603bdc408ba8c24092808823b

    SHA1

    c7df354a17352e12733813000c12b1dcca61ddb5

    SHA256

    ea50d77eac071868fcb2ab235464dabf270493c351b333308037fb58e7024733

    SHA512

    f6c28fa527c985b9adacf2c647b006f7fe33ce8ae1011c3de369fe380e20c5ea35ba6691046a014f8ed57aabbdddc805a6e2481dc255fc72a9086c7d95b6133d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17156669e7cb4330b10208868b971f90

    SHA1

    5011a8041ce7f6a4345f8062f13f0ebaafddfd07

    SHA256

    eef7a78dcd33adda9aff5c08faee73e3b1ac97bc36ad5373e40cee6785b8c2fc

    SHA512

    d2ccfd1702af10bb7bd33014f34d20fe68f7f8997017f53d2e167d6190d3c80548cd157eb22565e91e24021f34ec9566c87759eb207a68f521115d896bf79257

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e31a147d5ac64311dc6197a2180201b2

    SHA1

    1f9c036a3a500bf62bde8e4e2a8999bf6fe82699

    SHA256

    7ad8bace8ce586d2e65b54786685ebef37ec4316e1322a538450fca396d4ed7d

    SHA512

    05a4f6a34e60743c5eefcb8b191237e95e6f2f737b43b5e7d8aad259395a8bd863e1375da56b86f86d16581ca0986ee63281560d39c00bc02afaa5ec371375e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58bc306eda1482aef93178e9949b8219

    SHA1

    7885e3b42d3cb8897a40bfdb490c58578c0299db

    SHA256

    9a29b4a48fbb365286999b8ee7f1554892c265465588383823dbc7837ce8d30b

    SHA512

    2419fda9ed4caac528f0e79997e01fc1906fb2ff46f8a858ed1ba7df4b327a11cccfc4b00e0e64888b9579f231d16661c3047b961bfc4b58b0b95adb6148abd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62580809254d853323ef6a4a50e8d5c0

    SHA1

    f88d6afbe4028edbd7fd61926bf9a8edb2f1176b

    SHA256

    3dc53a3abd4b95a4f7e5a22b148c60318bd84a20fe13fca8cdd8d902cb863c86

    SHA512

    5cd1607a3c1a4ab4f9253e27cafab81c02a0f9b0609d8baf2f184b5e543ae6bee12f537027470a633c980e722300f3d8d241d6c3c9a9aa9ff7bbe6e04766e281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54b2173e5d6dd5fac82484a6c67e28f5

    SHA1

    03377c2680ca8e14202851b38a5a0be2acc006dd

    SHA256

    f1fb089484f8bed8c1221414b6e07a8e2e27bebf5ef754ddeaccc5f3b4708388

    SHA512

    1bfadaa75682abfbfc3658a47431ce19d20dcf300426028fc1462302ad6c607d203c57254975c2e3a4618d18fffc976c4eeb68ad657a3f5d9c5fd9dabdb6a4da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb547d399b49745338f2b30b02bfcf93

    SHA1

    ce17e8bdaef5ab7360d4c4bb1b8926e5548222bf

    SHA256

    0bc25598e43b6057763b92142a0aa564563846ce107709198fcb38cf86d62298

    SHA512

    b59becc42f8cb43aa0a7cc3e7006dcdecb77bae3f3534da83cb121696a89b8848f05918ae4377eb5b50b0440b83e718b0eb47c2783403ff900f49ecaee285d77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f87df0fc0d57dd5f16541358c5c217bd

    SHA1

    0740be6cfca6701a7600d67287151ddafb6f689c

    SHA256

    01bef3587aaae347aa96cff56c25005bfda0c59a10db6131519b624c21d1c969

    SHA512

    cb500ab7d8181df1714308c79652183a5e0720ee90e875f1c959588847b70d24cec534fb5a30238195bb3d0d0786d7e6e2a15b114d76713d865f4caacc831798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7128ac76be50b68927330ea78a07f2f

    SHA1

    18ab6fc55ce1754dc5a6d9482869d94e85213f4b

    SHA256

    047d137749d5ac2e2f8f8e6469c9aec3f4fef5f453caf0b5c3b6d6d037959d36

    SHA512

    83db01bce200b02a160008f958eb8bc7b3fbd4fe781ad309d68d5c357e7c01fb22e433855f0ddd2a9ce4086744203a33c328beb7d30743bc94099a7288d450e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bcfc4454814c6993f3d09a7d62789d34

    SHA1

    7ca8932a3ad437d204161dba77fc9d374fb24ac2

    SHA256

    358cad25f1bff9dd489c2397a105a0481fb5098a4771dca4f375437b2375f73f

    SHA512

    1ee7ccce3b2a82a33e8f9cf573e810ab98393674728db539eec69f94cde970824b203ae721100fb9b797ec9a2a7cf7e7c0dcc2c66d7dbe60a64fa913c51d33ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4313880449eb3d2e43ca78a972d5711c

    SHA1

    87361a5838e1346f4e2875b3a1cea678285893ee

    SHA256

    a21f9f0e17b0c169f4606422e8add01a3373d4f48f6264347f8e11dbbdc4f8aa

    SHA512

    388df259b4783e9f8fcd86aec2a8e8c83819fc9319cc5e1723dadb5b3d3e61a60e0b09bcab3e3ca4437f7098d16ffc3ca95e8630eeeb9c63d007b5f4bb74d30e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e520e3cf86b6092e3c654a8d6d19adcc

    SHA1

    a65a55ee77ac5ab6bf65828b56fa3087b8a86d67

    SHA256

    3f30f0e5cf5a7d9009f00a7537e9c43812d1cb8d13d02e5976a5dd13a344aeb9

    SHA512

    b6e2467a62fcb44f9f820cdb6b223e1a7883fa2c763cfc5bb07e0f97ac9af97931907c14e94059a6dfc6bbfcb3ceab93ea8dde2e8bd32eb12320f8a735c05791

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca6d322b811d34db173fb173071e6632

    SHA1

    805e1f071937b1b745478801d31c495741ee4b74

    SHA256

    5825d212d9536fec2a2b0360883098899817c5f6db4ac781685ffea034f860b9

    SHA512

    8cd515fd9f0449219431273b3d3686930e6317c5c366c4ed8b998db036320a2edb4fa331282d61ce5c55a4375f4b8bb94b3eec381c1830afb756ff383ed2d939

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f537c6a2d85d05b7e45f1bf8ce1a56b

    SHA1

    3c29e5092bfb666387a838cd5dee11e208b4e758

    SHA256

    21bcbb362d07e61f9c52a43da1cd1ea7bebc38819b39e7b4a3cee24591f9f6aa

    SHA512

    34b0e2c5f395a0ee974d3e3ac5291f941dc59e2c2ed12f6217b8786137037098f47392e8c4d77acd447d949c8916803b639fe03abd8b64d08e4ed5144d15b0e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dc4002da1c8a6b1d56500ec8748b701

    SHA1

    f7b07eb46d15603c2dd7a9fd838fdee4324c6bab

    SHA256

    d106c99b61353d1ec220b52e79ce1cface9cf4be334ad34a8f791ebb43deb366

    SHA512

    fa4f421a18073224010ca9587b6694ea5e31cd73c40dd78dc968c0a6309887c2978bd43b9f3c2e643d943c314a945a66d2447bc00bea4fa18f07913c5090a883

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d812c34c2159bbd9b73b6e99feabb5a8

    SHA1

    39efca930f2e49c4fa4e0a0d1739f7e793e05b15

    SHA256

    83605cbcc91c1b22376bb76194133355c7425048147a1dc924fd1f0bcec3323c

    SHA512

    46d6b65058b9642dc27ac548a885eb3e878126c809dcb8ae1547c679cc227108861f70b7810df527fb1da6e6f148d5e63a351c455dfe648690a79a925e408405

  • C:\Users\Admin\AppData\Local\Temp\Cab7F21.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7F92.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2644-0-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2644-19-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2644-18-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2644-17-0x0000000000220000-0x000000000022A000-memory.dmp

    Filesize

    40KB

  • memory/2644-16-0x0000000000220000-0x000000000022A000-memory.dmp

    Filesize

    40KB

  • memory/2644-15-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2644-14-0x0000000073EFE000-0x0000000073EFF000-memory.dmp

    Filesize

    4KB

  • memory/2644-13-0x0000000009DF0000-0x0000000009EA0000-memory.dmp

    Filesize

    704KB

  • memory/2644-9-0x0000000009910000-0x00000000099AC000-memory.dmp

    Filesize

    624KB

  • memory/2644-8-0x00000000004D0000-0x00000000004EA000-memory.dmp

    Filesize

    104KB

  • memory/2644-7-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2644-6-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2644-4-0x0000000000220000-0x000000000022A000-memory.dmp

    Filesize

    40KB

  • memory/2644-5-0x0000000000220000-0x000000000022A000-memory.dmp

    Filesize

    40KB

  • memory/2644-3-0x00000000077B0000-0x0000000007EE2000-memory.dmp

    Filesize

    7.2MB

  • memory/2644-2-0x0000000073EF0000-0x00000000745DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2644-1-0x00000000008B0000-0x0000000000E42000-memory.dmp

    Filesize

    5.6MB