Analysis

  • max time kernel
    137s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 19:06

General

  • Target

    d2a3c8590b20b841b94078847660ce57_JaffaCakes118.js

  • Size

    2KB

  • MD5

    d2a3c8590b20b841b94078847660ce57

  • SHA1

    5eed4deeabbb7adb3fe44a80d4fc56e169417f8e

  • SHA256

    17fe6fac4c303d21e4e0c2ce66ec94da67686b2d10f00d136de7827f0676facc

  • SHA512

    c310ab20ab9057d21159989ed8184818a12f233620b8b1070a03c85cf2c0e0a90a55d704108155afe6f22fecc2154e04e9fce873b00e5ea10a8ce79bb8b83e47

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\d2a3c8590b20b841b94078847660ce57_JaffaCakes118.js
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://%77%77%77%2E%36%30%37%31%2E%63%6F%6D/?n21
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3880a44cf550ede9b6c4511edd7c6b20

    SHA1

    8b7ad49ebfa76dcfedd885d049395a7e7b0ab12f

    SHA256

    7b6e630abe9b2f57af397eb11ea0f5eb3d855f6a98fc97d3136488577a1ac6a2

    SHA512

    02ec8696223d7caf3a9325613779c858204434b931aae34f36e59fcb9b6c7220a757cf2ea5f0dac36963b27c9cbee6b1f37fd33b4a5d82b092b360622bce38e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dae62b1fdbacc8022742d2c424ce5601

    SHA1

    87f856c5737a0ad343cabd2746a6428670e90fc7

    SHA256

    9645d67c4189f8db8f1de066db032d9f8fb179eda8294759355365ec4a4989a3

    SHA512

    63f442b7e60521394a19ebb84a0c81eafaddeb955904581066fb9e67e4e0d343aabd490ba1139a5bffc387de4f682142f8473e51dcc78b6e55459e01cac1391a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    262ec3547384f053e72e59ce16c50bca

    SHA1

    76cbcba03dcfc17cc984560eae88166bd2593864

    SHA256

    312842a62262544cbdde462820849ddb8fb40a9b049aaa5b5c2d8affc59e843a

    SHA512

    754a66ab87710835d7643ada8ce0b926911fc5171e1533e8163b271bce1aa0890ddec672f3bf5c6bdfb9a0d7219c9f8c81858f7cb0dad3e4b0c3f3a2c277e1e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97902d2a276ab41ff78e135efae55baf

    SHA1

    1a818a7edbf3078e7756dd3854eb3ce7adb626ee

    SHA256

    08782f59557f2874b5fbf3d52728f60993ef82aadb421929942cb0a3cff0664a

    SHA512

    da8cc1919a8b012b5897722daf60c8cd7073158717a8990f9793871a26d92a83e0912c427276b957c613a50ce520052e5ccd0bde812d99d544349618e91a0c40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c87e8c9a8253051f985bb5a036490653

    SHA1

    563e5ef6e85118a8c25b9532aa0d30574c7a1494

    SHA256

    316eb7aaf6df903c4e65ab4b85e51ecf3c0cc92c5776f095e0c2af269564d19d

    SHA512

    b3ca74288aa23aab924bf499f6a0f1204de505f15d94ffbf6dbeb5ce852fa6ff8e8fdda676b9504ab350e70c1f4c7b245486fa9b983327fec099eaf8a7704213

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f20a79debe4a6afdb0067af71c5123c

    SHA1

    d31779c145bda2494453e564f3e1092daac5add4

    SHA256

    fa8323c4f5b9ab41279f9e47671f2408fba90eaa82623f3126903217d3280c00

    SHA512

    9729c7d8fb950536fa2cffb1ed16082b578ce2115bff1eb875b4ae65641662cdc5c0f1a0fb3fbacff93625d8a102ff7eb02a839f72a8d6e1295f18ee41465e71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2bcc9d1675c7aba8aaad3b9f3f0d1a5

    SHA1

    1b376249c10f47e03308b0df3b7d9de3518e0f91

    SHA256

    9fdbcc651f1f73ba62ed58cc04a69676ed9451cfdddfb1f1984a7f4db86f6c1b

    SHA512

    e901256c3bbacc76faffc29d46a473253bf34841466fafcd0450084e0349576545f55d85140e1229ad385ff8aba735d8bf4408a9a3ccdd13450bce47e0d9ed6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9942fcb27e6f976b47d0fcc1b7c5fd20

    SHA1

    2f746c381f824880e83d45feecc45849721af55a

    SHA256

    c7d963713e2c98dc8bf0677bd7dadaab171d8c6dbd5272b5e3dec1f5a8ccb90a

    SHA512

    e030f37667c8e2f32bd90b3decd7cd6297b3761b03e682d3544e90ba3490ab3d823d418f23207282a33f37a4ff01ce9adc808fad9e9cfea84d4a6ed76fe1bc3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1abbd9709912b51b982096688e2f72ba

    SHA1

    f2b13accaa79ce7256cdb09a87a73c6c290f220d

    SHA256

    17cb0a36f0e660d78920301d5372c7d5f991fb76644e9421425426961059e799

    SHA512

    fb0daeed221f03eb199389a0d40ff7dfcdefecc24a3509eaf4982a108c03bf88c30b85eec54cd577a10c157d2c353418574355d7e70515a65a904017d3e1e6c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c27858a6be849584828acf762f2478c

    SHA1

    025286e4848540b74435be11f7c01f5eca99f065

    SHA256

    88f2c9f74406bd61b679f1f6aec768de3d3ffb0f8c044049ab129ec64d344cbd

    SHA512

    b82073d0e15484b05d6d69a2681acb562c46a5f15f3fec266f732c45ce4df329f8a4ef07fdc321037d44cb888b86514de190252c4e4b175e195313ab9d269b0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce03d863f9de5f79a9537989ab6b63bc

    SHA1

    04b52793b8419b45b9048f9b288fa2504640bffa

    SHA256

    d3b1234c74a9274c5d7fa1e7c0dae538cd41dede49986bdd5b5e7871db209146

    SHA512

    9e6032a4a19d3ac2920a01371cdd5e7c2422ddd228381e20ace35ee04d55c5e519689bf654f2eb7184064268035ba4c03fff2ac55773e0c0f2b5ee1b706c7ac7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15e59647afb87d00e79c29b020c327df

    SHA1

    d4ba3ce1e3f6c2c65bc8aa87d471b00e11cd44d6

    SHA256

    3b25850f82f6966965c99f8e68875734a17305b507f66ceb97c8ca44c8457e10

    SHA512

    5950d35e3fda02bfae5e0a91722b347e9586de21116c3602b7942229cdbe7cebf285ba7b62e4d89bdcf7b863cfea55c8c981bb53e4d82470d7c276ef602b54b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22ee0c6a3ae7359d2ce3340f7290f742

    SHA1

    7b59021599820ab7623b43336acc994dbd600842

    SHA256

    1e028b7e30f73a077b5821937f688a514f985e4c7e8c0d01e067980da5b4b42f

    SHA512

    dd3553305bdfd3d41aab2ed613d4f8aca707a2effa7541c7743e1ade0f336ffb2230be948b2b3e475706bd4dd0d3c0fe148160f39d33b0bf325ef1fd666f023d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8ff4068bf926ed199303c9fc65da88f

    SHA1

    a031ddbbb6b030c233b0bfba9e2c2620f0fe90d1

    SHA256

    417275a7779f60d9fe2a3e1c5cdf09ea899ad3538dc264ab3575d126f6378421

    SHA512

    a5604eac7d08400fe771bd1027e16c9fb5d4af30c21691f0005f3bcf7e491c72f680ac39ff671a88dc6b568f3e6c96529872bf2c271fa186d9b1451c61a21833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4ede6763c7f3f9ad8bfbed2a9374ac6

    SHA1

    e2cb3dd1c5ebdfe448450eb60f44d9d614c70dcb

    SHA256

    48d97cb6c27e4cd6afd3f70cb7b61bdc253c7a98b6c60c19e4a1e5dac4e6faa5

    SHA512

    21d035f8f3c34cb5929731d201e08e10ead2bfcc03579b3abc9d47169db23e3934efb1a8f1c4a16ef60e4d76f95a1b587428958a6f65d990d657a6110bf443ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cf595ad4cdfa6e9bf5b45c76a4dad41

    SHA1

    78d4512ce6f4b0c1e1cc7f2d2867f3f57ffe21d1

    SHA256

    fe7ec8aa727b51e5cc5088be1d51f12c25e9a4dd31502d842ffcf7c6c9444eee

    SHA512

    27157b28fb76116896ba54513138d89a7a8355d10a9d01956baea9666d9c6c27119056466d138bd4c83e6a47476409bdb64e1943c61ba3bcad7c710efadd34ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1725d9a68f31b5b5e48d6e9bd1726830

    SHA1

    0e214c938f9e9a3f1502747c2835e186ad3c18de

    SHA256

    53fb07df8c2326c422a1cf34fde4afa379f7f08cc8a3a1b74f633e6a7a751b0a

    SHA512

    7c38928616f7cc49e303895056ca73ffab26006374148c24d60fe629466226f0741c41ea2f906cd4af8213d62e9ad3aec33ed6a92af1b58164b2e6348ebbf820

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    082892eed0ce6febab4ed148b59db8f4

    SHA1

    20835d0d16d37d44f3e683ea796934cc626f80ab

    SHA256

    5f2facfd8221c45b3e7a6899735aec53f31d26807fef972c6aea9df05b86d5a5

    SHA512

    653ec66f632e21a03bb5b7cab4efb7c733263f7f519cd78555ff71326f2391bbc10e5ec57dec9c19289f9050ba64c84cf77fd87cf318b2ed915497ac8b63ccdb

  • C:\Users\Admin\AppData\Local\Temp\CabD156.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD436.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b