Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 20:17

General

  • Target

    d7075adfcc49afbe54eeee05edea100a_JaffaCakes118.exe

  • Size

    177KB

  • MD5

    d7075adfcc49afbe54eeee05edea100a

  • SHA1

    24bd371222f356e171e404e9c2a41657e3751330

  • SHA256

    7d943ffefae587b007d4c320febbbbb37fb5508e0712eb05ae25622135a43944

  • SHA512

    508d8ded45be190a3b9146ab31fb1959f7efe33fc75f43a4b1bffe4296d16f4db8a2b9e329ac57a1b7489c5fd7b48046716d0bd92bba9b5cf5ea78e3ec1775a7

  • SSDEEP

    3072:y5VTs2dzJpdQ12drw4GwLW+ICXeMie6C2ot5TU1D7YUZrGhjAtzMO4GUF+G8oiAz:ybdzDq/31oM1D7YU0Iz54GUFgxAxqGB/

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1168
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\d7075adfcc49afbe54eeee05edea100a_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\d7075adfcc49afbe54eeee05edea100a_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Users\Admin\AppData\Roaming\Feon\ulhea.exe
              "C:\Users\Admin\AppData\Roaming\Feon\ulhea.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2792
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpca8c0f4a.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:3024
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1864
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:1284
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "12459478221162885786-1022714139193936371-184745348490801860214139900681157590348"
            1⤵
              PID:1608
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1372
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:348

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                342B

                MD5

                3c754a714c125b6bb37efdbf85333aff

                SHA1

                1f7e63e5bce55c9fda6493548dbc39f852da8b54

                SHA256

                439c9feeb4335df58dad0b282c2abe0c1baa18f0aaf03a7f2729baf335d683c0

                SHA512

                c1bc1f0f9e9e6d35221cba529bf9072dbc3d0a6b89cbbbc2e6baf4eb92d422bce715029c1be1d92b87360d777f64541508a5ecac5a11e045669e43ecbceb2232

              • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore

                Filesize

                2.0MB

                MD5

                bf5ac86372103d6145b2452e5516f905

                SHA1

                a1fcd7bb404b9816a8c45bb26ffa21f08933ba40

                SHA256

                3433daa65167cf19654777e62701db7ed450966f9435eb260c05ff475d5b2d27

                SHA512

                861c01c1f29fc9c5dad053bac348109af541af7b9a34e9a343dfe682f03079c2e1933fa4c3b007ad29ab6985cb246ffb59a6e2ce2ae452e91775ee783af4343d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.chk

                Filesize

                8KB

                MD5

                f25e6d75199950365d37123b7e301a55

                SHA1

                1fddf35f6fbddcbb36abb6bd94d575345a3c3e0f

                SHA256

                b2091bbabfdb94c303ec5d3b47a5add09935d13797d896074a8d44ef963d382e

                SHA512

                5130b1b43829f60e4dc2931fcf77bf77cf29faa84da9303c139d02c3608f939509fa66e81f4603301a0896ad1c66123a853a409b6b270467dc37b6cee941b4be

              • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                Filesize

                2.0MB

                MD5

                0b1145f099aeee72db56fe87a5d58880

                SHA1

                7ebf4a0424df10fa9de9ce674f84c42dc7a7e1b9

                SHA256

                7fcdd8ed80d993fee8849866e0940bfc0f5691fdbada5cf0e8c4863b3f1c248a

                SHA512

                da6bdc9f901b6222cb03568b167b94d85f05f82d506469596d48feade522ca2d33ce63bf8ab558b908afed51b6f491bffef66b872ab3fc131bbaf544b4c9311a

              • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                Filesize

                2.0MB

                MD5

                153bacaee0f0ddd0b844ced0fc74d48d

                SHA1

                7c16a8c03021d34f6547457a3e21893980b27ac2

                SHA256

                4940ff775de213d5154296a785015a4a30223ed09be19db73c18409aeb842f70

                SHA512

                aed0a679fbefe3cb399ee2d41577926027c1ce1d13b59d88d1484e2bd13de995f9bb2a584dd7f6b13726ac522a465418c7eff7962f80f8f29e2bcb04b66202c6

              • C:\Users\Admin\AppData\Local\Temp\Cab3997.tmp

                Filesize

                70KB

                MD5

                49aebf8cbd62d92ac215b2923fb1b9f5

                SHA1

                1723be06719828dda65ad804298d0431f6aff976

                SHA256

                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                SHA512

                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

              • C:\Users\Admin\AppData\Local\Temp\tmpca8c0f4a.bat

                Filesize

                271B

                MD5

                af8bcd1fd704c43154d20c1283979fed

                SHA1

                bda6d2390d0df13a4684ee83e89aeea75d831e8b

                SHA256

                53a322420b835473482696efbfe202f871d2061bf14b835328cc005adf181274

                SHA512

                d364386625d6aa7819e9b6f3fc6bc8c65cf4d0350d98ee0c48cedb78b96ec54e714eec6f6c7cc7e5e896222d43cfcc5da88ba6d891387cd03716ca58a3b83004

              • C:\Users\Admin\AppData\Roaming\Racimy\icipf.lii

                Filesize

                380B

                MD5

                34220ffbc9b82bcb0034a42826687501

                SHA1

                a8bd0bd92d6cad27b9f73761d11d77867c24df0d

                SHA256

                135312d75ca0f303a80eb3629f21270fcd707e2afcdb8defd10bda64f2810a65

                SHA512

                fdafe2f67c5e30fab531e2b69907dee1142b6e1ab61dbc3dcd58ed3eebb132963aa4d2cac50537061a3d5ca9d56c9f4c31575fced91e47f9245f08ccfe0f6b4d

              • C:\debug.txt

                Filesize

                2KB

                MD5

                f5726cc935743814fa4408a532a7d9a9

                SHA1

                9b9c08a567a38c7b0427d1c166bd500ce709234c

                SHA256

                729080e9ea8c112fb7d5271188197a6c081a1dbb76046e9c1b03a5ea5a3cf9f7

                SHA512

                cd7a7f51c12d3cdcccbae83bdf9778aba5210655305f33a31f5e23eca0994f66624cf2537bbae65251c07fe871f0f441cbc3bfa2643872a91607f0d23b96c71f

              • C:\debug.txt

                Filesize

                12KB

                MD5

                ddc148dbaa3e499c9276d63fd8903147

                SHA1

                1582b752f8ce051b8a5ad767a64858904623ad06

                SHA256

                7e3192f46971c6079f5eee9934cf4ab43465d00cbd75d74423de7827666364f0

                SHA512

                4ad81cd14c527ec1e937e22d481d6b979142e01ca5c23b4048fad694792544398e3ce0d7889d2ffad59e3f49ac6f81b4943c127d8215e919258f992cb02bce6b

              • C:\debug.txt

                Filesize

                13KB

                MD5

                447a4e767573923bb5369872daae4547

                SHA1

                e1564a30e47559abd240738055324688246f4b79

                SHA256

                003dbd65f783e4bc6eec5f0aae446e74726a92816eabd0b0bdac282b2e84a9f7

                SHA512

                8456d8fc1878d81dc36df18e3c93d45aec3b18943649f91f0febef13a8b5670190f6321a7647aa9e122aa1a6700cb62434bf937415064cc6099608ebfe75a069

              • C:\debug.txt

                Filesize

                15KB

                MD5

                ea3e3001e64e47d3f186329d11500ba2

                SHA1

                66b7de28e15e7f4e49589af62b2cf5fa1a7bf9f2

                SHA256

                bc3cb7c330acebd18af06742428f0444cdb75262db6458dd0a591f4fcf07ca35

                SHA512

                6cb00fa132be3e27a6024d2efe35d4f0f480b4ec37d29b0233e20aa21f2ab72ae18e28232bbe2647f1c0e988a8e728101fe2a64cd72d20a51dd785010d519466

              • C:\debug.txt

                Filesize

                16KB

                MD5

                6ef8d0c488804ad5d5383db46b0222e9

                SHA1

                72100b99e3dc6c801a2fe6d3ebc8ef3198da1611

                SHA256

                881d34d054414b878234bcfc87c356f43454b4c786ddd293e8e5909bc9bfbc2e

                SHA512

                8cbed8ee40b619cc7eb28b8a0b540fa42a84c6de585948219d29a5c89afb3bd24274de8ece7c78cff1dfc1c3a9ed331d367e2e6669941150987397fde3bb6e4c

              • C:\debug.txt

                Filesize

                1KB

                MD5

                3e69972e86cd04e293c9434c8fe3cd1a

                SHA1

                3643679f6ca7a00fc4839beeb849f202e09fefab

                SHA256

                11eb72126104f2e2c2e29245e805ec8e5d15c3f7cc55537930e073e8eee32b97

                SHA512

                18d2a335112ec03661ae5f77b2a8143e6f09978f9f7558bae42d3fe6fb7ce59d8fee569ade2a06409b60d02f938bc825cd2df4d9459e471324b1b3dbfff78806

              • C:\debug.txt

                Filesize

                22KB

                MD5

                42ab4e44666c550bb9a3931cec3a4655

                SHA1

                f83f6673d779bec77d7a9bc69d192684841b999a

                SHA256

                07972936e898ea33c73bbc425b16d4ce472444faa119e36a80187dbb17f3d4f8

                SHA512

                490535e7c2f87ad7c88e0bbef8d2e761edd12499898d8dbb453c90602332e6d00699312cd8acfc161541a6ac9317303d3fa04d3d955e1c072d06866864e703d6

              • C:\debug.txt

                Filesize

                8KB

                MD5

                a9a04e2824acbdf080764e035b5855a3

                SHA1

                ed62436202f73816a3c592eb1a2f07f103064217

                SHA256

                89e121eacb57267654fad61daff41fa0c492ff1e7c9801e582b30bd86ce78f49

                SHA512

                5f106c60d3c0c9c56a583d77ef007a776f4498498e85515419196c80ef7466a477096850487ead6b1663b332713feb61b2440c59ebf1b2f5c54242de7c8b5e6e

              • C:\debug.txt

                Filesize

                9KB

                MD5

                7193a6b1919cc8a52b59cf4b174e0db2

                SHA1

                861495c83bea6e96759be34fddf24a92808c81e7

                SHA256

                822f2325ca11839a8d99cbbc170327316783634ddc1765f76b8f0597f9f18383

                SHA512

                4e8cf728cc08572feb5b8f05c1112f957729c9a0ac02df824a55ca429dca8b7171c88f354d1af7ef6de4ef8e8a62b3dbfbd45b251b3dc0a5c1e56087c923d2e9

              • \Users\Admin\AppData\Roaming\Feon\ulhea.exe

                Filesize

                177KB

                MD5

                56904fe867794a2f46698707c682d4cb

                SHA1

                c12e407c6be1a4b9db5a757f815e2531ecb67e7a

                SHA256

                ba36f00d6aa9f37b3b28cde2a907c6dc7415787ef447f1c9fd14c3d1178096b3

                SHA512

                20d04c4234c2a22fa49c514248a3fbf64ea9635e2fc93149f1a5258887b04ccb0cd46c47459e6bab46e716d81903363398d39c3290eeb9e964e68b0a2bfcdc05

              • memory/1108-45-0x0000000002270000-0x00000000022A1000-memory.dmp

                Filesize

                196KB

              • memory/1108-47-0x0000000002270000-0x00000000022A1000-memory.dmp

                Filesize

                196KB

              • memory/1108-39-0x0000000002270000-0x00000000022A1000-memory.dmp

                Filesize

                196KB

              • memory/1108-41-0x0000000002270000-0x00000000022A1000-memory.dmp

                Filesize

                196KB

              • memory/1108-43-0x0000000002270000-0x00000000022A1000-memory.dmp

                Filesize

                196KB

              • memory/1168-54-0x0000000001DE0000-0x0000000001E11000-memory.dmp

                Filesize

                196KB

              • memory/1168-55-0x0000000001DE0000-0x0000000001E11000-memory.dmp

                Filesize

                196KB

              • memory/1168-56-0x0000000001DE0000-0x0000000001E11000-memory.dmp

                Filesize

                196KB

              • memory/1168-57-0x0000000001DE0000-0x0000000001E11000-memory.dmp

                Filesize

                196KB

              • memory/1200-63-0x0000000002480000-0x00000000024B1000-memory.dmp

                Filesize

                196KB

              • memory/1200-64-0x0000000002480000-0x00000000024B1000-memory.dmp

                Filesize

                196KB

              • memory/1200-65-0x0000000002480000-0x00000000024B1000-memory.dmp

                Filesize

                196KB

              • memory/1200-66-0x0000000002480000-0x00000000024B1000-memory.dmp

                Filesize

                196KB

              • memory/1864-74-0x0000000001E80000-0x0000000001EB1000-memory.dmp

                Filesize

                196KB

              • memory/1864-72-0x0000000001E80000-0x0000000001EB1000-memory.dmp

                Filesize

                196KB

              • memory/1864-73-0x0000000001E80000-0x0000000001EB1000-memory.dmp

                Filesize

                196KB

              • memory/1864-75-0x0000000001E80000-0x0000000001EB1000-memory.dmp

                Filesize

                196KB

              • memory/2648-116-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-81-0x0000000000270000-0x00000000002A1000-memory.dmp

                Filesize

                196KB

              • memory/2648-82-0x0000000000270000-0x00000000002A1000-memory.dmp

                Filesize

                196KB

              • memory/2648-83-0x0000000000270000-0x00000000002A1000-memory.dmp

                Filesize

                196KB

              • memory/2648-84-0x0000000000270000-0x00000000002A1000-memory.dmp

                Filesize

                196KB

              • memory/2648-85-0x0000000000270000-0x00000000002A1000-memory.dmp

                Filesize

                196KB

              • memory/2648-92-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-94-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-96-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-98-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-100-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-102-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-104-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-106-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-108-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-110-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-112-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-114-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-118-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-120-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-122-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-124-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB

              • memory/2648-186-0x0000000000270000-0x00000000002A1000-memory.dmp

                Filesize

                196KB

              • memory/2648-187-0x0000000077BE0000-0x0000000077BE1000-memory.dmp

                Filesize

                4KB

              • memory/2648-188-0x00000000002B0000-0x00000000002B1000-memory.dmp

                Filesize

                4KB