Analysis

  • max time kernel
    118s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 11:31

General

  • Target

    d1d54d2c7024df5f6c6ba10e3bb2a607_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    d1d54d2c7024df5f6c6ba10e3bb2a607

  • SHA1

    85fc23d35b46cc765a02f4a512ad324aec563690

  • SHA256

    e4e8f8e5b2867cc08bc0b0d6daa8797e048c85a1e6af13ab9855da6f85eff2dd

  • SHA512

    0dfac71db8f940d04b221e6746794d0546b348e656c7e3e528cd0bb99a3bf0e00e26c516f856fe4fe337789fb28f85a45ea3d6e5f180558840f4f863ecf47438

  • SSDEEP

    3072:7/nIQJqi7fJE0WU+THP5RhwhhsgWwXNwmhurZ:7/IinhEDUOxRmTgw9wmkV

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d1d54d2c7024df5f6c6ba10e3bb2a607_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Users\Admin\AppData\Roaming\Scogoy.exe
        "C:\Users\Admin\AppData\Roaming\Scogoy.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Roaming\Scogoy.exe
          "C:\Users\Admin\AppData\Roaming\Scogoy.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2056
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2576
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd35d0240ead87767917bc8807db3ae1

    SHA1

    b7166e902158ddb2d3ccdd29c7cc842aa31d7e08

    SHA256

    4b80b18ba6f90b2aa8ba90990f399be9943cb37bdcd0ef7e5eb931ff8d377f16

    SHA512

    833f112ff3e0366f03963bc29bc83079e5708da23a1748b60007fa44652e7d57481b251c70204161f985237106574dc44feef651c05e18bbae0a5ad033e87f35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16d7da1f89a2d13430448ba294242aea

    SHA1

    9adabf9d16443488ea284389d1ce0241fafa1f8e

    SHA256

    7d393ba463d6310352a6ebb55a1c05751e41c49c06fa0f9a69001388086fcdc5

    SHA512

    cc1e97cccbad5708e5df44759f38409166fb0e84070be8164c086abf524ac372a57346bbc969a420358a6a28b3f8c44991a8fa2e772298f23589402a5fcfbf30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2c780d1ea43cbdc2e537355ac6c4876

    SHA1

    c169973a0c9289d7ace84c7530421304297ab6b5

    SHA256

    68607b6782bc0bfe9fb6de0d5f8a0a9c1d8c199e6ea5477006f7066b178d686e

    SHA512

    d70b68d1c6ce4880072bb8b2b2481b653bbd3dfd529766c1f304c73a9329eaaafa567ce9c56080dd4c58bc0e5a012cf3c93b74fa20643f2b0e2ce8875e0550d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55aa72845f754644130506a48457c435

    SHA1

    88ba8840c7e849bd3d522ce6af035b9958151f2a

    SHA256

    9030d6f182d8ec32e9a172b5788743ed2fa7a4b6c0bac42c058545566cbdd7f6

    SHA512

    666bc0fbdef227281dc39d98427029095146972e23a09e1a066f02cc6d974ad88344cd1a6b99e923a9c828a1112b3a4c4e1971a0e9c3282e06ddcf768fbbd76c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a019713386e22cec901bbcfad183c840

    SHA1

    496ab108de758095c8e5e71629ad7b070208b6d4

    SHA256

    72ab2c5f6d7988400c4923ff48e5e3b2042ef0ef3ff0b6d6f21744a7ccb7eee5

    SHA512

    ff770e494887a3ed4f48baf8f67c533e07bd32ec0af63ac9daf8bf21de330ce099dc222781e5551bc28e2bc86e1c2dfe79ca61e3c2344b74207e415a79173c2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a4b58518f64d0ebece38b7894d957aa

    SHA1

    162ed44eae685dd91ff083048373dbf384a4e77c

    SHA256

    eadad913f4e3e57950be179caced14540fa85761adc393a43aceaf71fd4352c7

    SHA512

    3167d1e373ea5281adcfd3c3afd4671b3c2d87c344552dac6989fc373a9b77d790f8b70c07a1a09c9f5a747112619e8326998bde98fef382d85797d1a9f6613b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    815cacd9f8bc2e765405dca2bd4514da

    SHA1

    d71e0f8b770e2adab762c143c64435a9c333cebd

    SHA256

    dfe0d561a94d4bdc996bca17616cbc62ed3ba3aebce3664e184c2c633e1d02f1

    SHA512

    5d2bd036c6c47265eec19cf7962b543755b15e72dde91f4c2c71d5e54bb3bc56c590bf459f49010bb2a79e2cb81f33f612793a177dc886bc3cf469a03ee9cb50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3563770ebb92ececfbd94b6466fa0d4

    SHA1

    b247bee594efddc095d5dcc580391b11965c8ee3

    SHA256

    f77ffc9ac3aeadf63053e0e29da48212f1d0af5215f4ca130d10f3b286fea639

    SHA512

    9e357672b2314da5d5556085e21c99f1285d0983c3a27cdf5022b5e7bfb5b2cd5516cb4c0b2bcdbe421f425327737b7d4740acc311f1ae07619b389d941f4ef0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    527ef518c15a8bc6038550f6ed6a41de

    SHA1

    703df0334e36642a5692b67a037ac0a12291b3ec

    SHA256

    69326a7d0324030a3e80d8abe8a308f5409d78ad699a3c322a33d1473c3721c9

    SHA512

    39f20760f74c7b0ed76a450e2ee23c7c42e0091de87479f9b2977ec96c895c47fa8ff7bae44788acdb8db57fd3611e5f0f5169aa8544555941f78402b76198e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0474c1983a25d010f53f54bd105747ac

    SHA1

    f8046fa840db0b07cae60c91e25b12c11f930322

    SHA256

    d85daff5e20d3dd9c1b850de55acc69d2b816da06562bb51a8d0b13420737558

    SHA512

    9c5f61c7e9a0f9df2439a9c73b60be4b6f493f6944c2abcc8a9a662b5500474a0e8bca3dbb3e76eda86c419c5ad73d0913ad8246349dbd5d3b9ee7928399f49d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c97586f2c3d3d21f7db5aba62d41bd74

    SHA1

    b28ef6d5849f6a0c28c8bd412d48e4d2154dc050

    SHA256

    ac58d79d9db567b720fa07587e4784f702424fff1d1acfa1fd2fec4512fd33b2

    SHA512

    6995bfb3130c00d18639a76dd80727473191ad10255f813bd720baec823d2597812c289d04d3737d5eafca4070a7ca9e8f8ae7ceffe979c6c0164ad12140842c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b41aae4867b84f4a8c0924b332920af9

    SHA1

    8b1d26206d3edcd550a21f16f4a578bf5bc7a5cd

    SHA256

    108de3efdd4bb509446160c8317091ec5f9745a9ad1d6f328cca3de08220cb59

    SHA512

    cacff799456773de63ee4988d3c9cf17ea9703a13fce53fa8fedce15ab25a616b31dd2108a33213b07c0424b9c4779a4b52633c58f01f50f90d566cdb5f7b800

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dae6efc669dd3354519dd81a9b3a4a28

    SHA1

    81f4dd37c330dd16bae31a5c643039723fa8a93b

    SHA256

    1c075db29e7817a31eeb9866e97fd6bcad1691eb90fd02b92a92ca72d7c4ad54

    SHA512

    04d56cfe2cc8559ee3560643752fb92a8a19f08d3287d3fcb7515e8b592de508698c5770fb9283725e004068357b75530cf5fbfd4d8486fa297fa3e957438e7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33c70d6df8c7e98b4aec0c96ecb4bd27

    SHA1

    35e4b3cbc564b2f2d16d6bee44c904170c792fd8

    SHA256

    60382788d9521b4c3a6d4025074581d0ec17231074e3be87f0b8fcfaa0bb7537

    SHA512

    d2caa0bf53d4077703b8276d1e518f28fa6bcba8c60734cff51e166dfd831eed586c2912d8c4e67a2434f39738d2f072c86ccd3062c504ae58baa923ef62a438

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc973030aa28b631d7ffd71ceb666c99

    SHA1

    ff549214102333468feb102b44aeb16488c0ebbb

    SHA256

    372896a06b77bc474b7fdb118b2d8644c77e4ab81fb70363943783eeb7e05c45

    SHA512

    d9d982c1c73b6fa1c932ac32377f39a8e38e55223707031c15ee20e53f06a1ead4d60849268e1956166d8f4f0976e301289bb56d0bb8064d5221f9e0524deb9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec2d169764462949a0bc55ef1df5c36c

    SHA1

    8bfc66286853a31e483eeb3fd5ad8c6f98807dd1

    SHA256

    c9019204cc0a87eb0bfe55d158319a09b15962615fe239008a0d15290d0ecc0c

    SHA512

    1f7395eebcb1dada4906131c4f25e534af0647e566a0a92b91d5616894b827a6f78e39e8b0f6c1b1408d11ddd31148ad943d2116adc4247793eab257d45cf046

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cde91427af95701078438f6b3b321d9

    SHA1

    fc7cf1298c930ae948cb611c2c844d9d8b877a1f

    SHA256

    b4a266788509aa29003369ec831e7223cafa8f450cfd5b3f57c2b1e8a305026c

    SHA512

    94627b51f25378bc26f492b7345ce77016b169b6fc5f433188c56b7971270b0d94496adb09a0420236d866235a8e73699c132dcdde6be62201695214df7a13dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8803c41d688660c7efcf280e33e75017

    SHA1

    79fb082623d51f7cb178dee765590a8e00d3894c

    SHA256

    40df0dd470e71e0f6812fb8f429763997f3fd3e6d3aa792402b0d8f72b3e3365

    SHA512

    134eb0d77c4a4b661fcd395c927dc3d6fb1d359c74f60f0e4a045ed0eeb62aa572ca6cff331788956e2d8faf98874b9f5ebe3e166c855fa3bc74234dfc33b238

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    469dab753b9a5a3482b517c7b7a66fe4

    SHA1

    9bd0664deabce14a097c3f94542a54ed6ef04066

    SHA256

    fa3a4cb8702e938d63a2314a9f03b9b81470b4cfb06c7e55d3477bf2a3094833

    SHA512

    062aa45ec0cc7f3d241175752ff9d31021f09fafaa687823cf894586766301a1e633ef6c9347e06984db70bc3337120469059c0d5441adfb480f13b7054cf977

  • C:\Users\Admin\AppData\Local\Temp\CabE997.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEA46.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Scogoy.exe

    Filesize

    148KB

    MD5

    d1d54d2c7024df5f6c6ba10e3bb2a607

    SHA1

    85fc23d35b46cc765a02f4a512ad324aec563690

    SHA256

    e4e8f8e5b2867cc08bc0b0d6daa8797e048c85a1e6af13ab9855da6f85eff2dd

    SHA512

    0dfac71db8f940d04b221e6746794d0546b348e656c7e3e528cd0bb99a3bf0e00e26c516f856fe4fe337789fb28f85a45ea3d6e5f180558840f4f863ecf47438

  • memory/2056-49-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2056-48-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2380-29-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2380-30-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2512-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2512-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2512-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2524-0-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB

  • memory/2524-1-0x00000000001B0000-0x00000000001B8000-memory.dmp

    Filesize

    32KB