Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 03:15

General

  • Target

    dd8f55557e31ebaeb0c5403cb4a325e2_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    dd8f55557e31ebaeb0c5403cb4a325e2

  • SHA1

    d71fbfbb5571a1a50e799366a5c7fba769ec0905

  • SHA256

    7085c6a3593e1e99cdbb1d138fdb54e6c179d88e8cbc385fc9a486910049d5da

  • SHA512

    61cb9b4d94dc2a8bce6d7b2a011d7b3683dcc3aec06797a2f7bccf11b60900af4e3c059e4dd7f9d6f87cadc4d0a8a38aafce135de1a64c6adcf7d63a3cc81217

  • SSDEEP

    3072:yci0UFjANaNvz5TC7MUpxRGDtVW4vBENcXHAqTlqDChEwWL:ygalIVjR6tjvBRAzc+L

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd8f55557e31ebaeb0c5403cb4a325e2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd8f55557e31ebaeb0c5403cb4a325e2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\dd8f55557e31ebaeb0c5403cb4a325e2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dd8f55557e31ebaeb0c5403cb4a325e2_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2860
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03334bef69e5eb8806dfab3382a87458

    SHA1

    83d32fd38f5e5086cc095ae3c9ed4f4acc45e373

    SHA256

    36a250b00ca03057a40ace50cbb8219ccb86f74791b63f028ad19287e261cc49

    SHA512

    7cb4f5b2cc5df7d83063806e683bce44fc0e139f8106217a95b98272bd4b305440aa87a57d112d28d6a97fe3d3370a4d877f7e05d90fce746cbed28a410397bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e8d687c4bda56886daae9efca927e9d

    SHA1

    4065e08ef5594e41638dfc00b1d821049a131ce6

    SHA256

    c4ff60234d531ff866b7a9a557d2361338f77906274343f70dc8fc9d853c10c3

    SHA512

    35016e5ee93d4559fa42f6e5da416e3bd807417a48574494e874d6fdcbbea7f7df1ed97387936309b0836eda1948ecf6fd435b9eb793d51438362e6ec51d835c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdda25428cf6000c75869634c6fbccfa

    SHA1

    d2ad91877e6010176f2747e9ad812e5bb32d7c93

    SHA256

    53bfa162370d22bc0104808c0f4bae07827501a82bb6e9834b267c08ab704c01

    SHA512

    6f4e881917004cb0d1a92713a7e9a8e35987a1d3288208023aa998ff6c044ee174c9775b3b307b1112d391d2e0fe3df61df43ef5dd288bc3b1481040a246a47f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e56340300b54fa9e5117b91826924511

    SHA1

    cb735394628a34ff1e049e74c731f42fde428e02

    SHA256

    03c20e6e183f7482a97d200dc24fe0e1d7ba39db4952b6e17e6f2a8cb419ffb8

    SHA512

    8f515c51dcd9e5f167646accae9702cb849aefa0491054d9f0aff8f2860792afae17c580dfcb378c52336fc53e402b26d52af3132c0bc3212299d41bb6197924

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cf1982beef3fbbe2c4658cf71d8dff2

    SHA1

    e441ea44624ba6e19e27fa9b6d6bc5b5c6001c05

    SHA256

    69eef5c83798c8f68045129539821c3d9b1498295df34c6c406078ace14f66c4

    SHA512

    e9a7572836dcff3004ebf7c49b7983497c6252563f5466faec8c25ae195d18be3de5750b58578a41557942aeb8ea39555d12cd61e8f67f93463bf33858444d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50e2bb369ef2016b64edd03a179d22af

    SHA1

    c0ca9494ab7e3ab77da84eea6c6eeeae64cede98

    SHA256

    f7fc8bf52612be862166e8d99a6429a96c491c0f0c20733e85664a41a06d3480

    SHA512

    2830fa0238a7be7f5e2debf24e48df1d945159369aa1eb679d7ecc4607d777330c4cdf6a8f21e782c8cfd1b663fcde623dffaf296be29a6e5a96cbd22cf50e1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc583a68b4b52b97160469fa2ad13da3

    SHA1

    6f6aeab01b0685d36353b0edc93539b6916fe785

    SHA256

    da6c800878dea8df8391eb2679bad8ed7e4dd9b906f058e2fa38f2c72c97d94b

    SHA512

    e38cfe96d4bb826ab4ad4804c63ec636a75cd255e4cd88327fbd7b64ce7075e11a5bfadc8729e2495022052b9ac9f1f98955337516dd4db2227c96608ba3875c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8bd082be70524b88ecabb20687e547a

    SHA1

    0a240437b8017cb69d13615c5f6c578e80886011

    SHA256

    cc5313c3654dbf4908b70dc26867f7ce9bc4bd23f36e4606604aa94fecc3c1ed

    SHA512

    ce871339de0fc31406e74ce43cc678ff90efbe57579938b5a4c4c16ed041a80158ad62e91f8e12d412244093209ed69f64f01adc874c4739aee13b3f9e7cec33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51da51ac0e85c01599b640cdcde16fca

    SHA1

    6c309ab8863d75fb08c749d605692d96ae051bbd

    SHA256

    3eba14197ae6722827eca405275c0ed4f9f957058c5f4d7e6d336c610d551f53

    SHA512

    b7bd19b54f2b68a38597ba4d837b82b00f914fc27b90a2b4ab6fc010e05cb13d94129abdc8494abc11cb693a8e8a36ebc544e5adcbf2b6108581ad721a95a4b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72b9d0795ff5f282661952a4b945fada

    SHA1

    b62374a2aae4fecfc692715a47a670389b52c776

    SHA256

    b47149c65872641bbb1c08a9537d4830d441bdc7d61372ef228b23f4ede3b5c4

    SHA512

    e07732f8b08f55e7e06525fda2e77c3574909031d99da43fa1864b64bad8a5d3c29e7e771c4b519313ef31d3e66b615c45d25e4752af65dbf955984c106c2284

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9c74b9ffab6ba4a5623ac5b8709842f

    SHA1

    35156b4803ce23f16e18d9e374d6c18646db6014

    SHA256

    385e98ce98424303e03490a7931f73c50137ed0b1e5af92a08be869dac14ba38

    SHA512

    c8643f6ba00c1cded91d581fcc4605a401685ce75316e0b302df47010cfefce99efeebb8caa92023849623314f9619e9335830c7646a11a0a5c0e3215012ede7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00926804d94863aac7e840a03ac93ff8

    SHA1

    f7583924d5adc1aa9e4d9816c5b6952522b4c3c1

    SHA256

    6024ddfb6042496d95e17c3868348a164537628f203fa3ce4707a9700e2510b7

    SHA512

    a6addae0e80b9c76a4940f8c0d8c7291cbdf168307b46fae6ed5d3c9c6eaf4efbec2ffad289a5bb2cee161c862a5be79fc3d4a84f37862b3d9d68b920dfcb407

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e386e06b91838968686b9468510211d

    SHA1

    7723c10752b32261751397bb49b994ff3ff5e778

    SHA256

    23e98400441896eee74acce87e30ce3d094b8e327eeb1fef9afa8622c3871783

    SHA512

    f7f959338927f38f50d02ab85448e63da81f25d7ab366e9a0ea8bcc06a4e902eda535751d4173429b4415b32cf3da5803e897de1464c7812996a8e375618d398

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    626e6bf0eb7529422a8ab51fd9dad45d

    SHA1

    0ad604c325603e630ef2abe58ab0b99a06aef2fe

    SHA256

    6e8899e4adc912b329fa7531d069038eb666fc97e744964de432b20dcc21a215

    SHA512

    5172fe75ca37bcb05793ac58b935c84283b595a343918289d4a8e6baeacb728ea1360c7fea62646bfba189c835583c82766de5175c18dedadd5d7653d279cbfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    142bc30a039bfe1232b7b736d0cc8d7e

    SHA1

    356702c92be9c863192b9498f7d35a1125eea632

    SHA256

    04337f8af8b5909cf87b112ca29603b9db90481c2c7644a5cf719d4344bd0002

    SHA512

    9057a2c70de74cff88e4d78c19e01ddbf6704014ed14c8dc744be1eef379ee487be34596ad784ee4e9ceb09479234aa3e4672eb43bf9e9899727c5eb1ff78ddb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5996e17220c484c39e5b10e87ca270d

    SHA1

    95f49e760c83f6c5ee87694666a475f1ff81950e

    SHA256

    a892734c6a07e022f1dec090dcfd6c160e98ff75dc5a212026ed780d5e1482ee

    SHA512

    1f32f4ef213f5a4d3eb9d6ada869d712f37b82618e7959b6d7f65c9d7ea6f66c87f9a8cdc2f24bd95f2b9af3d5ae0c35d524261a1a158188c078ee18f5295136

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    325fff3397768d0f4145d2f2d0833e3c

    SHA1

    ebe87bf9b304fdefbf70d872a7e29ff7aaaecd4e

    SHA256

    e9ee4355d22cfb65bf6e8b9f27e5e8c6b9605a4f9ac23fec0ae182d098c58023

    SHA512

    43475704bdec821518a7d7d0808e00ca0a4be7d52beb30966085dbffa4df88b4f85834d23b274911c9572e6df11ba6ec5adc0e39f789766ebbe2def6c3fec1ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    211723c9be359a9863d8aca722ea158d

    SHA1

    abb2cf407c41d891605de2ab0147148d81662117

    SHA256

    a27e93b9eb5834b929802320ec7bbfa2ed6a0b8102f0a5d858951486c5bb7950

    SHA512

    8bcad7d2345c2ec4a05fc21f737ea847fcdc99f1e4a22e18f077c88a28e7bd2a7fe2ab64b18e84251ba09963df2afc53379df03e3b74b3538b46c80f934ef8dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b1f52419138e7002377685a6a72c87c

    SHA1

    edf712305eb7f574b9be0e405ba89cc1aa1c9883

    SHA256

    2387fa1975d78cdfbcbb639cdecd71a28faf264d7230cb27a7ce6cb01ac14ce7

    SHA512

    ab980cb08512a6c98d0e80b1337aeecd6a5c9e5dced59efb6d3af3b3e9a4b36df7b1aaeb0e7f3ca0088ff79ab86eaafee4ee33db3e0699a32a7d3db37c7222b8

  • C:\Users\Admin\AppData\Local\Temp\Cab54B8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5528.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2252-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2252-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2252-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2252-5-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2252-7-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2252-9-0x0000000000450000-0x000000000049E000-memory.dmp

    Filesize

    312KB

  • memory/2252-11-0x0000000000450000-0x000000000049E000-memory.dmp

    Filesize

    312KB