Analysis

  • max time kernel
    122s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 03:12

General

  • Target

    d590b5118729d4e90a22110111fa34a6_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    d590b5118729d4e90a22110111fa34a6

  • SHA1

    cb88d4814dcb9cd75238e9dbe328dbfdc1d3bf08

  • SHA256

    414ffda167824cac82b1f56c945f78781bf9b7694e1b1366479859a7c1874387

  • SHA512

    3076d7386bca2c2c807b322f1ad2bd3eafe9a682dea4b00dbff2afcec189badcb75bd6a573f6e03042743491116b2ad05f95ee499df70e89cac49a75614e4f4b

  • SSDEEP

    49152:jdH0agmH5C+tzpDfa+Ad91qeZUT224YuGr1oILZigMiMHCYkUODZFexJlGXWncJ4:jdH01mZN1LG94gUTj461oIL6iAkUOl0B

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d590b5118729d4e90a22110111fa34a6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d590b5118729d4e90a22110111fa34a6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2660
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275470 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2884
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:1692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      13892c27748e63672b16291d9e655e90

      SHA1

      95c66bef3824ebfd3ae85cbe0e2ee340c121198b

      SHA256

      a0b103038a6f73b529c4c69e17084ffc6bbe0846cf81531d6f23c25df3061404

      SHA512

      b1fcd9da4491ff570af6aa7f611f5f8aa9512502b70f993c5ba7ba108f12eeab0c91ffefe10fe590ddcc88bb8e1e60361332f90facbe573a12bfadbcb53e0874

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c2f70e199e97dde9aaa4cede1967477

      SHA1

      3834b18301703cfb6db8c1da3ecc211298e4aaad

      SHA256

      475c481ab278deba1beb2d35cf9e871f727a3afdfe34c952d6748d38cd0abcc1

      SHA512

      a7a7401e577c259efd9b6d38936fe32ad7182a72c812b07b324e42e1938d35d67cd5556f12649b840e57d87f928729b0efe46b8e72beda7ee6e48a97d71d01ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b6e8935802d6d7fc561a199d84d70555

      SHA1

      f2e08db6acfc4c560577ef8a251fbffe301a51f1

      SHA256

      1c33fa767f342c6029a471e93e32f531e6ca732a0450e19384ebd3f9c35d3b32

      SHA512

      69bf47d06bacac667bff7fa012acdecd19937d60752ddd25652e7e0d33082fb64290329f81efb8da455e426383230e51e5779750c1008551880f8655a8680ad8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4f37f4da31ce3e23309a9485f1614260

      SHA1

      7d665901793ac2398390082f7c3c9b5ae67b74b5

      SHA256

      c9e7d79c941eb9c8d330469b011d72b46f9a93005124092417734b54822e292c

      SHA512

      bf746d612d5497f2854b883188ad03f8085206314c8b6e06790a4bfe2b124beef6363b884f327e947d9af4f91c2df87aec9a83463d8ac05fa09237caaa4800ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4ba72daa4842999db78bea3553cd82a9

      SHA1

      79def4da4d0971240d75a6f9c8d95fc99faa3c39

      SHA256

      b4c0758235b61913b639ece8c7ddc68de62507bba9e047d131523b57026eebb3

      SHA512

      c1c3416bcbae4a545659565edab8a7f9678c4f1cf57391a5b70c6c7d0e60da5d3310a010fd7fe125d2b980f3780ab3ee266a968ac0df24f8decb1c1feb75208d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      beadc75d79efe8dbf2fb4d1a1487c109

      SHA1

      a91fc6baecf3053b6a8a03e11206991dbe17e27f

      SHA256

      b36e3fe1a6f21f6689cea3062456d38c38848e4f1982c8b7f4ca670e03973932

      SHA512

      6c1ac658cd9a32d04c5b46256bdc9319ea8e9a3cd46cb0b0c7d9d3abd732834368e9cb3d155ce6ab53e6f5642074767b3a1bf8d826d70d686db2ac3fefed5c68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ac8cc4a6b76362119feecfae83d42549

      SHA1

      28acb00043db476d0a56521f14b049c1c2613115

      SHA256

      a52056b2775b6b6beea4b6a9201763cf5bbc6a0b5a686fcc807cf9d929236fe0

      SHA512

      5ae3e03b227292b69ce842d33bdea6f778b036934f3fd373d5d6269264aa2dc514e37ebca05492ac590ea4587aa5ddf23a6e42d6ad887506c42f7ea4bb7967ff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b4acb9df0f16f052df5ce6e258efc4a7

      SHA1

      27daee0cbf9509d1d61a92e8d86bfc40f32e11fc

      SHA256

      253e725ece88d3f6b1c11869b43b02cafce38daf57b9c33584c30905571b126b

      SHA512

      c09c175674733c64ba4f7042be0f343c2c16e8c01a8001f68b9967871cc3daca984f25f88a01cfee0fb7c0b19cc3399054710161a42feb88ee615d5758a1b6ad

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fb85fa8df5f919e9ff3e2c04bac8cbe

      SHA1

      ede54f4a60f6a446c5180c280387261d47b3eb7e

      SHA256

      a33216646bb1ce30eccf0abcf8f4beba00c046a3b5e4bce07ed0f97e011c6aca

      SHA512

      e6f89f2ecb327dee1c83242e1a19d29272554c4eb0e6f4bd20dc5de8de97682bd7ca1acfe37315ef4fd57e36b7e0bcf6f6d3047c291085ca6fd9afb542ced5b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9df19ad40ba88171bad96411f3e99ac5

      SHA1

      1bfcd9058963526bfceb786b9a1fd63a3696d546

      SHA256

      bb3c8a09e5c825b10433f27337e52071e28908c00cf63b136b45c30ee61adb46

      SHA512

      b65f7da2c1a04e11fd57287933d4a0238f1e8a5a5728b55d3165740d3defdc1456241d7dc1e98b9834c58da80d3f6daf6b3626d7bac9b35126afe5380cd9fad6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9af89ce9e2fb0f2bd1d698c0d967dd50

      SHA1

      50b46f29cff06a702f0f0c17a23f8ac8fb414f6a

      SHA256

      d4fce64ce97b931535c8633657edfc94765a2e40c379d0e551f369ac08db115a

      SHA512

      f410625cc8a34d74838790e20ee9916c5213b68529de6854ee97f8c514628bfff8f60c9e334812cfcdc758409674856f796c4ff5e82b2f30cacae0bdcf8e7036

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4f9eed925b77716c68e807cedbdc7fe4

      SHA1

      6cb3e351c7d729fca84a61af1bfd2456b4db2f58

      SHA256

      dc0e98b461d9d3f731e5e17d8c0dfcc0908a70bf748a600c7e77bb5a0a044161

      SHA512

      fbadb9beab2180091b876ae84681a949bf346facb5abd7675e15c77a8b5f067c8dd48e6d400d105eca7fbe211651e9fd11f5dcc108d5cfd74d4d3290f8de33c6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53c1563544958f85254245ef9589127b

      SHA1

      1e655a602ac58c374ff9029dafc9098ba6990bd6

      SHA256

      33133612119e642d22f85877484b2c50afefad3a69b1899a7855609898a15b13

      SHA512

      243c173090ec3797cd7d3ae782ed0f372c785e685242f6b1845bad2c0135b3ef2b1d74686f5fad65e1276c607d32a8dca1ccf43879c0ad0a663ea4cb3709d18f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d3dfef7e2b1c48734adc45e3f3b7ecec

      SHA1

      7383f486b1373b4fff4f34aba600d11bb5a5798d

      SHA256

      c37994b2c4aaec9dc7f009e3fc2b6e6e4116feb5fba56675c1a4af379998f95d

      SHA512

      70ab15e4b25bc93996fe3987d49599aab6ba5cf4eb8785d4cead9d56e208b1425629a0b6e71acc7775ef502740043dc786d6cbe843cc02d9993ea1038148a81a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      208cbfd6a989ceae4a9f6a10bc089086

      SHA1

      7faa3173cfd606bb5de3077e102dc5db4949e54e

      SHA256

      b1e30842dc4474481e3889889c395d408bff3530f85cf0e198aa2560f6b80533

      SHA512

      11e04645738f4e10baaeb4f34d3d832bb9acdb6ca36c77c97038f0e222260ec02cf79121cb79199dd9b18c8235b95c1454a11d4c3de8c32f48c090dc8ce1a73e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      89fbf78d6440cdda83350d97df565244

      SHA1

      0271cbaf9f58df1eb23d790ab66ead3887e7c881

      SHA256

      0a0550115c5c62954b9d951e6d523c9959d18e7d8bcfbfe80ea86d532d9f8c5e

      SHA512

      8d003f2f15c157a6e51e894a35198ccdf5f63004ffc06edde46873556b5d8d7bc36b6c88c7feb917bad56fb8dc5313ed44537529380a63d96fd409091af47ab8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58bf49c57c4f61cc25ffdeb8c74eb153

      SHA1

      087291b3af5d0cd20b66d233e46493b6017763a7

      SHA256

      52bb8dd09496168f850a8d0f190b00da22115759ef880a2b9d2430f9772c74e4

      SHA512

      e19e9ee4e98cfd21dcdfb01afa2cc280acbeabcacdde9533f5fc46d29dfcfb1a3e8abf8d23f7a087d0d628e21f9c31d1daab1c9774ef3e40f74f92797b06c902

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      613c51ab3c88a8ea273ead595994bdb6

      SHA1

      78903e644ab90d61f570abe3ca9804454a454ca4

      SHA256

      42aa10afd3ce55722cc76434bbeaba45ced66d6a4bc218225c1fdbf7ecffb148

      SHA512

      1301917636d0eae40c69423a2dae7259fb2e6665ea7c1d64a37da17d93d57e47e7b76a72c84be1fd62e821eb433691b60a72719fa7eb6f25ebf9c3337aeec96f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      386ce0526e4c15be57ab97615b3c233f

      SHA1

      b71d6509a872b854d2a5437ce04c500fbec5d29b

      SHA256

      307e8d09c3b8bf8818bd31b508a23d208d4cb62c2a90659097ee36db46a53734

      SHA512

      f4c14517f3acb6cda12b7b8f1f3aba2dad164bba6b3371ef35de41ffab321e306ace25875985f1acbabfd5c9fa93f905ef5730979783ec97101e8b108c8df5e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dcfac98d47dc33a2f4164c6b5249f069

      SHA1

      c3eef18e477931baaf837efc9787288162927bf3

      SHA256

      63b3f979acac82a04fa2e75b892d1b887829b526a371da970079d75a4acd639f

      SHA512

      55a2519dc357f2597754c1fa450c5a98e00649c2ac5ef6df70a9b51a5861af6134dd66547254f6a3377688dbf424896a0e6330e895e845ee7c98f4adc2982178

    • C:\Users\Admin\AppData\Local\Temp\CabB50E.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB511.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/2688-50-0x000000000A370000-0x000000000A390000-memory.dmp

      Filesize

      128KB

    • memory/2688-0-0x0000000000400000-0x0000000000999000-memory.dmp

      Filesize

      5.6MB

    • memory/2688-1-0x0000000000400000-0x0000000000999000-memory.dmp

      Filesize

      5.6MB

    • memory/2688-497-0x0000000000400000-0x0000000000999000-memory.dmp

      Filesize

      5.6MB

    • memory/2688-494-0x000000000A370000-0x000000000A390000-memory.dmp

      Filesize

      128KB

    • memory/2688-23-0x0000000000400000-0x0000000000999000-memory.dmp

      Filesize

      5.6MB

    • memory/2688-49-0x000000000A370000-0x000000000A390000-memory.dmp

      Filesize

      128KB

    • memory/2688-51-0x000000000A370000-0x000000000A390000-memory.dmp

      Filesize

      128KB