Analysis

  • max time kernel
    119s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 21:54

General

  • Target

    d727ddb21ba2a754ebfcd64053796ac6_JaffaCakes118.exe

  • Size

    145KB

  • MD5

    d727ddb21ba2a754ebfcd64053796ac6

  • SHA1

    03f11470d827e11d0c1f3ac25f848282264b504d

  • SHA256

    d772410f097f525acf0bc6b6d2008539ab4fe27bcc76200dc20b01219938544c

  • SHA512

    1077cca7510aee9f07a9d09e048b8941cee231bf79826e12297d29c18454fc8ca17d47a8cc8f8e150560854b495bec204b90467c1b71210a4f4ccbac92415d9e

  • SSDEEP

    3072:GIbejFUgrPc3pvbnzs27KMHwTpRCopnvvNQwin6/T6VtE6nD:7bwUgrk3BaMQTnBnvvy8T6VtXD

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d727ddb21ba2a754ebfcd64053796ac6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d727ddb21ba2a754ebfcd64053796ac6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\d727ddb21ba2a754ebfcd64053796ac6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d727ddb21ba2a754ebfcd64053796ac6_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Users\Admin\AppData\Roaming\Dvejem.exe
        "C:\Users\Admin\AppData\Roaming\Dvejem.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Users\Admin\AppData\Roaming\Dvejem.exe
          C:\Users\Admin\AppData\Roaming\Dvejem.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2836
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c766d1943a729b510d02e630a830f4ff

    SHA1

    1f5a3e2cd97e2589866e48e12e462c6e394edf76

    SHA256

    7b71e8b47808786f0af30dcae0fe55e046f216b0183e28ae1384a284df9c8f98

    SHA512

    f48af2152d2456668dafaa0fed4bee969ee5f9b45c56b1c78f900fe9ff36c1d9bed6a7ad9e5b79fdf046f4bdb8bdda6784337084c6b78908a5e1119152307bd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bff9c30d1d7f3dbcdab472dd7221f51

    SHA1

    c1762feb790134ab5ec7efd7e90bdf3a1dfcc2cf

    SHA256

    52dd4cd665f6665382b620e90aed90a5483d8cbafd73caf5bce89d1426093b07

    SHA512

    4f2e1529c6a852786252ffa13727d12addfcfab25e44e16958ec6156ce45251543606a09d7ad598fa6f3fd453afe7c43df4318892a054db6103f8224f5bcbc1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e08e8ff4b9f7a1079c77c238362e571

    SHA1

    de5c6d3b129d9107cfa44af2e8e818ac5aae9db1

    SHA256

    87140068aeb0005bcce7d05de84e516229327ccd5ff7d998def4507f986280de

    SHA512

    b84b6be2f054baff6ff840563097b00bc4475dbe84c43c16c236150294017584ad97c4af96c815de9ce67cf211dfd25ce97931c37a81f5a9105330a0b6c7d9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac845867e0d052ef4bff0ebc5e97ec67

    SHA1

    9744b763e43f0c69ec0b98e4d82bb9c9c3bec842

    SHA256

    4172a175db903a16f3aa8f3fe864ef29bb53cfe541b2091768937ab065bc0534

    SHA512

    c945509bfd012e6f59c2151779259f6325443430d67b4d729977f21806ee523e5870f7e8950732ba4b621d36d2269189c138855c817d6a9c167daab1cc149c63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3109716f772215f0408295fa14588c04

    SHA1

    7092b68d932a2dfd03a2d615fd62b3b24fb628fb

    SHA256

    1a79b44b1cf5c8abdf5bbb2a35ef261408d584fa957a45a5181669ee7af22bd9

    SHA512

    c0f80eb799d1fcf70430eb5b1c8826ef6fe6b1ea0e9e4d7444c7ed1a23267345f6c8d0482e22eaf2aa42f470cb1ad99d3b025c57f1c1dadf84af2134ea05473e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40361e41399d69e937068cccb34ef708

    SHA1

    3b93981086cf32bc54437cd8f28279c356c99780

    SHA256

    24e6a022bcb10f902581c0c429de793e52e022e0c0a530117430b101e85240a7

    SHA512

    f125b3d7e4ee410cea7d33a568d19bcbee4343efd6c1b17c6743468867c5f1559c3babc0a8a111b275d49b967796416c7cdcbb854d8657715c571240df03d570

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53c296b64d6d795453fe1ffcb7d2977f

    SHA1

    2f23ddc34205e5c0d4e691e2ec6d644546602b0d

    SHA256

    b5d870b6018e201cd35abafa5f61bd67b8cd05c3afb817fb9158da259daff849

    SHA512

    5a545fff4049b921b288253dcdcb04ffe8c7c454e7fdb49131142ee2e25555d6c4273f155a234729b7abbd02210a5ee5c51a5d648f95c64453532b396617a686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2fa66f341f07144252936b2a404db33

    SHA1

    eaac5f37b2d0f5b40603a9f0c1297c9879cdb1ba

    SHA256

    01bbb08fd45e51868cdee8e687452901d59e8f1c3a7731ca8dd2c61c71abbe41

    SHA512

    b9dfc00cda294eb8d3343b1a41e8eeb36edf28d1fb3993026926a12816d303cc4e060c1366062fbb94aff1f7be868c1ddad28779d91944757552cfa3afa4a02f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    490b2cc76550827c7385472da8980fe3

    SHA1

    68b6b9afdd4df35051150fd150ed2167d1c03c53

    SHA256

    639f03192f9c2ab957999251bb6062a291f0ad22e301f45ce29db2d574ed6c14

    SHA512

    8d1b3685ddd87d677378c30762b980ee3ddc5ed20cf0c08dc7bec69f7bbf8770de8d0760d35b7cdeb06a24562ef60d6cef9fed412fb7329fa51e233e08a0f0ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bffbdaa4d6f64e5c15d258783962ec0

    SHA1

    51eb6932b3c74caf917bc2dc88c415ff6c5a0982

    SHA256

    e75e9fa115447ce95dafe11f41b80408d5ae5284395ed05ada92c438bd0ffa50

    SHA512

    5da12f2f1f69c272a18622a2f838b80e2ef39e2c2ed654a2b91e815bc1ff543e968ecb84c1259dc232e8d5599462afd79e005c96688c6b8299011f70346eb471

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6eb5b772b9a2c5aa5364e72696151d6

    SHA1

    68ec13d2afca66a04bf30c7168ae42e99e6be785

    SHA256

    0cfbbd7a2dfb68366674c56098b8768b01d64995c5f82ad1d0ed692f1bddb72a

    SHA512

    4d8461c2799bc2c308f71c413dde33f493d22bda7f44d0cc8b50122d2cc86672b898457958070d49e0e71eb29abc7e027ed5c40925a8fee1332902647ae0b417

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    894f7c9fc0c9da6662d9f1e9f599ecfd

    SHA1

    e0fa57fff087908df1a552206d555a7e15686154

    SHA256

    ac27306e819ad81405eb0552b0f327c71ab00572af7505d90236c1c24ab1e803

    SHA512

    d7bea95bcecc65af02fe9bccdb0fc7b016679210325f2917c697ad5494938465407c03e423229ac636cb752fb6816ffcf0729a24172d67f4b6868d1094fbe31a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    544c94e51adbe5c9ea2a427964e8eff0

    SHA1

    19a9ac8c63c3a1a64b99d9d92b7670b306be3a23

    SHA256

    4ffd25f6ae93ef618be1bebaf29334341a4f08cceae6f8a7e2651d12e48de85a

    SHA512

    b72df6d02f418440333302213dde1d73934ff04c27eee07aa7e324cf3c9a4953d55dab71b05d1cd00f1b258c071c53904e4c74da55a7a2142bb93f406ea3a283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae82ad91bbb2abcdc6b9ed0e35e541f4

    SHA1

    00a3028006e7f889cbaf86e18afb56955b62881b

    SHA256

    aa215441e8f6354c3b1cb6e5a56e7e9cdef2e1e05e1219e29c8df18dbcaafed4

    SHA512

    b8cac1768ff769f37df95e7a1cd261390fade279c717895a140a262364b64f4029c5f8fd665a5d622462db328b1d94c1a93ff1fecd50dee99b4838aa3df8f8b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74cca7d0fdaed4a85b0ff7f0aac3bfd9

    SHA1

    854d9b472575da38bfc310edd239db604d91a205

    SHA256

    ddef7ba94d9724c22a54309f29627f0bf9ea249dd0d7628f46c7c7656a96dfd3

    SHA512

    acaaea701eadfe8264eab1ea554f1803ddd63c04bedfcb0d936a0b59d1eadd734d3b6a33725d966a7c273dae1e861aed5c4077e84c1802803b25b13ad21f2611

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c189e0e1a90a880a11bd33c5b70ca020

    SHA1

    16c93999a46a651b13476e0351f3e8c205403372

    SHA256

    5d6071217e857aba5c1a1f7d34a6c79483f9dd4a1f3cf021508df6a86fa68b15

    SHA512

    c0abbfbfd76d7fb529d6f7e8a7c19f37ffb8e1780ac405546309e563c74b79b92b5307e9f5d6694ab48088b01c26d09d348b5df3046322b811058d4074a04b55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5915bb4352f93bf80524a9fc42f63a3

    SHA1

    30ec4370f3f031fe1f6cd2d6d9b82f7c603d558d

    SHA256

    39a61270be131844f09981cb283e443877782954039c4c30d3aa2902f9e52c24

    SHA512

    8cfca8ee9a5203ad5b7d929b4a18827b6f636befa2ae5732123e147cbdff4452669682491cd08c593df045327d7d6f5079e22b68a55814173fa20fb6e8a0ac7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3be348334cea31cab025b3c5ef27888

    SHA1

    f90746173285864450b8d7baac0a6e30116e6116

    SHA256

    cb4b2ca44efb89562ddaa4449bb3aa0bc163b3fc4cf269e8324157794ffe7bac

    SHA512

    8080e524e1e1e4f5b3a9bc63def00126c9932318bd1660543100465e3653c6aa315cf6cfc768c5d0413b8800493c379eaeb44635e8cd798229c48e39c16fa017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b813724f717e7eef0cf2cf369389172

    SHA1

    d5f3d14541888697deba213b4a19e5642a6caa42

    SHA256

    fe9de457a94b65a9d6670ec18c951f54a1b061662826a87e95dea6cb39c07e12

    SHA512

    eb533276ddc2587998aaf7c966cb6c2399a6ecf0ad62418c43364bab9dc42cc6db0d8f05dc8af3ebf7929c352f838b3c34edb161c73c96a3de5c659abbfa5135

  • C:\Users\Admin\AppData\Local\Temp\CabBF4B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBFFB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Dvejem.exe

    Filesize

    145KB

    MD5

    d727ddb21ba2a754ebfcd64053796ac6

    SHA1

    03f11470d827e11d0c1f3ac25f848282264b504d

    SHA256

    d772410f097f525acf0bc6b6d2008539ab4fe27bcc76200dc20b01219938544c

    SHA512

    1077cca7510aee9f07a9d09e048b8941cee231bf79826e12297d29c18454fc8ca17d47a8cc8f8e150560854b495bec204b90467c1b71210a4f4ccbac92415d9e

  • memory/1712-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1712-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1712-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1712-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2548-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2704-27-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2704-28-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3028-3-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3028-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB