Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 05:04

General

  • Target

    dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    dbdd027cdfc5b84925a66d485950a487

  • SHA1

    d067f3bd08b5aaf4858d1509047cc8b9589ef9c4

  • SHA256

    d145db38fa0c2a58879c9df83d59129ef25507f8e5e5c268f9d417b1e1f7852b

  • SHA512

    bc6833a495ac0fbd17799c866817de2e5f5e4fb6053f4adcf63718b8c660eb831e1d58a8346d880f2b577b701ab042594a3a8c1406ee042bcae40e7ab08910fe

  • SSDEEP

    3072:t3/tEqC13oE4h6anfSZTT74INLts0mWvUxk3BfBK88SizsL:tG0h6vZASh

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://dedeyusuf.blogdetik.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22b278155b92239b421785a3882605da

    SHA1

    ce0bc98c6fd9430269d337bfaaf14d984511fc03

    SHA256

    474bdaa6831c0a8c19fdd78d6b2b6389d66772241d71101447b5f98aee63934d

    SHA512

    d5a43556b685a9866317710f8538a47582b2bd0449d0f115c8b61ebb86ad2506cc3287459f4b4c38156b964e0925c609fd295bc255289495e1b62e684f947f97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6a42cca92ae36e1168b343df1cfb30c

    SHA1

    d97c58dafbe4fd066d7a68833ef07394a5ef91e0

    SHA256

    e2c7d7f2f22f5a4c160931e96c7e695551e4188f23a6a325abf4ba0abd3801bf

    SHA512

    4d0515c44c7916914c6560fb7cdcf3c79b110fd42885b3539e8189d37e93470fce69e260e6eb662f834b9c4fea32ad46698f7f6219d3bae43639ba6e646970b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13a6cb959fbbda74475cd9ea8afdf1b3

    SHA1

    920413fe1c52774c0cb12f7bb99f262e68297e16

    SHA256

    6b15842d4b8596f7b678ed61b4cf23ba37b0164ae5413aa62f384f3d8f260d21

    SHA512

    6db4396323a22def179a538c777d5ea203fbdfe712cacb1ca497a5108724b23d6b02cef0583eae0779cf8b7d174faa8e7cab63d3a0f52daa5d19d499cfd9e538

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67df878fedf6657940418a88afb7ec52

    SHA1

    3884e43d217a6388b1605ba939448068311cb1c3

    SHA256

    9d73ba277d89b98e3f29dab16aa6532e05b8f0aeb4bc2fa081985f44e7e924a1

    SHA512

    d073850dba5c392ccf69c4cb4697998208343990f296d5d5bd5b01c132106395d6d22af10e76e216940e6b43413fbc311692b59dc58a172d17480a18a32fb5d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4b313b3b7691e6a2d54b050077e7cd9

    SHA1

    f9698200d3154b036802eb5c2e40e9c07a06c098

    SHA256

    96d1504286ae4cb700b237d50009a6d69e9775fa674ade3e3362d7cd2a8ab253

    SHA512

    72e74efba55fd5b67799dd3d012e0d2c839ba202f76586d854c21a6cae2bd9abd463d972f2e60a02aa37959baa7267a16ae47f5ef3259618ea9fe4c861672a05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    deb26b4951cd23a161940ced894b2d7f

    SHA1

    3ab6fac7e0d0ddf3ee5ac7b0467881af090a7c33

    SHA256

    77ffffabd115ca053939e024d3e38465d5051db02a131fb2dbda79eb7527c544

    SHA512

    d92676e9cdd5f93a35a31a7720e479cb13dac36627890614c497a4c95c374918e42b7de7e2529dd97fb1956c6e7ffaa10d23236cd1999890ae4654e35c13b57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fab47868c4d777c22572c947c358744d

    SHA1

    4514146ed83c2f39041850728928004fa3a49339

    SHA256

    978a0d2476811584f5c971313a1e0356ed165664b91c715161b4dc104000f494

    SHA512

    5057315038c8a265fa3483102877892505348b838d966b32e12437900bb3832de73392de4f58a39e769ee49fc09884322c45be4b6533cfdad3c2a041af1b41b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    813774e6a0f648d9d04da5f7fc1a0636

    SHA1

    364d3dfb17dc22240077cc30d28025ada414945c

    SHA256

    1666b595c8e7faf401113f06aafe59ef5f4cc991bc1b4a6dacd2fd9ec15872ae

    SHA512

    4f060a6f8a64719b5bc73856d8ca44e6ffb335f25b4d66989bb533ef04538802e6cedb58cc28fb92d5b1d8dd88ba28540e6a52d026652c1db69623d03f964ba3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15fb3fd214137851e9e293599ef246ce

    SHA1

    22797de5a9be8bc1730e8863d4615d023fc00e47

    SHA256

    8cdbe0100baf78b5cf30d2fe85b2908d118ef34e8e7efa69c29d6e308c73fb82

    SHA512

    1d285683d2f46264d7c8cf7a5c07ff65535f5730e32704bd255032ce9918b0c56d56cd39b35652d2507b6ca339160a4b4debb8567adbfd9008d029cb8a346804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f458e7339548e9018a733a88e44802f3

    SHA1

    84e757213a00bb906c4dda689a402ba3433cb416

    SHA256

    4a893bf7938abac9c28db55847fe0ed7956b441231afac81264a92e85e1b768d

    SHA512

    6b8e6f45248d0c79a1daf3844cd3fd8aabcb805734821543c756000f93aeed438724822a2311bf767b3162ceb6f64e15ccadf6e0a3944390fc03806e9929575d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29498b4958549f0dddc6f80603c74a16

    SHA1

    7fcb8d843a7a6a4c36f822d157696fabfe18c835

    SHA256

    ab86b08eec444396eab8ff5e4883b0992548d0f4caa96154c8600126fdb423c9

    SHA512

    0a9ebe32658fee1d725a57b07238ab2a908cf09f084085683a45eaf2b3684c09f1a3fdeeb5c93c62e8acc685f63aa2d612628a3ed7cc6261d86397f3a7a9d2e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2754eb8df9f3cd0feeabc01381c8c6bc

    SHA1

    726881b647340a6eb3336d90ed77a357e3f79b9c

    SHA256

    5bc42218ecc07c29a4f692e5b07e6a9703d615ea9db68b72b05ad7505a30a48c

    SHA512

    418da194bec7272d81f6f53a9958ef97aadffefd98c0ac3a4d726808a47335b574b077df0562b67bed38a2c126a2edcb9f635f303817ba5bc6b82cbd162fe2e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6729e2ed61f54ef6fecac9cd4e81044

    SHA1

    d9df001d4ea5afab038ebd8ca5bb4628ec9213dc

    SHA256

    634c387f8420d86a0d6f53703c0d4563d63bcf37b256250dd46e6fc6ddd3ce65

    SHA512

    eea94d68fa7efdee402d803c1928016e04e084698529c27891cdad907a7a92d95595e7fee0a881208dd923880fc64a0f36c73e9dca076bfcbbcd2fd5eeadb9cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab64c2e4d5a516ff0520d3c4b4d21358

    SHA1

    eb0d0c79b4516634b1df1336078ac634e66b00ca

    SHA256

    368f43d630a5ffb0194589237ea7058cf83f0c424bc5fce751bb00ce176c9691

    SHA512

    e87b0786cb91edf0873074fc55a5f26a9919c6341674027cdcb569b64b735127b92296abd82e18f48c9820ff441cb7a376437423ccfea54dbe2cb6742c2ef024

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bf3e4cbb461904fbc3a7095c6f10555

    SHA1

    200fe3cab81065b15daa4b3ab20fecd63c5f2aab

    SHA256

    b56b9ba823948826c5cab56c98b2313700455bf7819745c9332b9402427bd780

    SHA512

    213cba97eb6f8aca658ee5bf1c83edbe430d4652efa6c03d6f1d673a6f861528e721eedc30b740b9452a34c7ab668e3f094ac5c64c256d3fdc69d6592497f189

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f7ffaa18ee8b1716189b1eff36bf2bb

    SHA1

    df9c4ab35c378699b15bfb5c18aa603cf50187e6

    SHA256

    e3583538e444a836465432eeb94fda52ee16e9250df58875da6703499ff2a2a3

    SHA512

    d0e4a4ee489bbe87fffff844c6e5c7725190f957ab2f8db23919cfb09cfc23bb8c2f4654c1a14ccf320206a68005044953fc67e4c3b6c0076b6a30ff5edcd9fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7207033299aac6ddeeeec4bd2e536f3

    SHA1

    df6863bb4f3703a8a4f29648d677208daedb6721

    SHA256

    1123f31978b7d4a0f278d7d4a83d14628857957f09585e44eeb60b69229a52f4

    SHA512

    67e58340cc5e01d6a4cf9ef6fd6cab4a2b2fc20b4d7a79fb8bbd278976e01fa9b7ffc1327327ac6d5652156053ab1632ac56fc5034d369de4e7be5e2a2f81ca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9708ac30e2874bbff7191c51b2ba601a

    SHA1

    7e3bcb4075cd65ace963f9ae1314b854c9e3f2c2

    SHA256

    14ced7ea80bee85c3e40b4bcae67252e852769b98af8b47a1b7cb379c50c8e77

    SHA512

    a2106f3240f88aa40b8bfb7992bf94ebe68440ff51b4d78d854fe2e4a4bb62615afec8d6f0b1e3b201da908c227f044e1f23730a3f02b415c969c4d8342739f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bb3342b5083238ab821f0e150441e96

    SHA1

    d19d93d97a8954b01a59ce66ca7d2c84da1b6b74

    SHA256

    9d64fd511ba3956fc0d7370d083b21a3c4c320c64b723af76e94734cd823c87e

    SHA512

    0bb9f548aaf62811c022a177b146f99788d052d1fb4a98aa3e67eefe30c7095ba348aec49fddb3cffa7f905b6e19ea3a89f1bf0212522eb8d0dd208afc6c36dd

  • C:\Users\Admin\AppData\Local\Temp\CabA23B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA2EA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1900-3-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB