Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 09:10

General

  • Target

    dfe32d551245b5415f9a9f6dbb9acc33_JaffaCakes118.exe

  • Size

    110KB

  • MD5

    dfe32d551245b5415f9a9f6dbb9acc33

  • SHA1

    fa8e9c8e16ee5f69aac92bd9ef19ea8d47c7806f

  • SHA256

    ce8325366eb00ca3ce573bd48aaf37283798ae4977a715e4416d64826969ed8c

  • SHA512

    d62377135af7eded1bde721baa49b2fcb41f3aaac8c1df4b87527a8d50054a456f0a3aae084392cc8b21b93e0b6b971a211eabb69c673bd12fd7613b1d0a931f

  • SSDEEP

    3072:BHE+0wOsKov0/MUEFAzjYn+EBMqhjj+GG:X8ov0/aFiU+WMqhjiGG

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfe32d551245b5415f9a9f6dbb9acc33_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dfe32d551245b5415f9a9f6dbb9acc33_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\dfe32d551245b5415f9a9f6dbb9acc33_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dfe32d551245b5415f9a9f6dbb9acc33_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:45412
      • C:\Users\Admin\AppData\Roaming\Shbzbr.exe
        "C:\Users\Admin\AppData\Roaming\Shbzbr.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:45512
        • C:\Users\Admin\AppData\Roaming\Shbzbr.exe
          "C:\Users\Admin\AppData\Roaming\Shbzbr.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:46800
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:46888
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:46896
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:46896 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:46956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a09a486b62a4ffe3b02c537c21c6ab68

          SHA1

          f17b2484d5df1495a7df524a3a607f67955a0b45

          SHA256

          5347579d5392c0a0130a75c59d1decc832c1fdd7b9ea75be2b0ed2a1305ca126

          SHA512

          fa2c4e859fc352e4a164271b456b85c30d4a34d444d81e7e33d700e9f9ef73d6e17992c5bff4956f21965517c0344138051c458d3a6bdf710daf9bbd379e3114

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f2a53767d1f406ecf7bf94d9473e74d9

          SHA1

          1ea442de6aeef42081b68fcf4d1e616029056912

          SHA256

          709b78bb5d07b16a89eb403078f1b498a0c1a9bbd778c4d4932f21d31db0b0c0

          SHA512

          d0daf60b81c4e7bcbfcc55f8e00a7b6dc603be5aff823b470f361d5ecb44bc91362ecd4a19e13154bb7cfe7e42e65be16cf5d86f96d8a8eb290f2d9cd582de55

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4aa125621c32306698a95afb0a4fc3e6

          SHA1

          63871a628f54979f740fb0e129ea988639056cb1

          SHA256

          d319202846831eb30c35660c9e03857e250f153ec716e864740c7b0c79cd03b7

          SHA512

          d8d770284ba34ef1562843a49a38c10aaa045b094bd2bbd13b414e575bee02148dd9920c668bb743a8387b055f4bbc3182af6c9d7a31fe2702d25f425b846338

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9699a87cba6f13f599784b74f416f927

          SHA1

          a88ea284695714ddebee9d4abe100546f44dc6b2

          SHA256

          e421b9efb86d1eb5f15297fb31bde23f9f821785ad86b5aaefa966b6a4a5c78e

          SHA512

          8382d41c8c09f235ccda6523da4c97ad5775251b864ff4701bcee9aba27d04cc943e1909fef44437f10980e3fdc4a07b4fc1162f9f697bfa8f6c124ae033b2cc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c31c0c17ad44e988a7252c3d17e7cb12

          SHA1

          fd65ecb7540641ab405247f876cb77b1be8909da

          SHA256

          c62def7ddf597760b5864008ef9966288f2abc4e4791862332ca343b4b98805b

          SHA512

          4b8b8f9c80ebb2a01eda2a54fadb0c12d139f7160c0bf305aec2df340e528ecd0150f464f4ac5ac46b88007b330d86928debf1b806e6515fb2f0baafdb33255f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c8c642d7a576fc7ed4c94cadd014c920

          SHA1

          a2a9df5d49055b6b53855e7ce76649889cff62c3

          SHA256

          9270e00dec5acd1d6766b8e4bea247f2e47b17f7c81bf426412f67989949ce17

          SHA512

          cf4c1ac19b29055c303ea63a495513699bc2d54a613a66ce5ee05f8666c9decae0faf87de186b79383da2c739650af9771099e36269a291b164868f048322a3f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          88ea846f692387986c6af522027a5530

          SHA1

          9dd16e21b16b73cf95e579a65215a677f18a9523

          SHA256

          81926b23d14b51df7e860b07b909523f6bc3120d3ac62cfa58782aed2f27a531

          SHA512

          35c0c749f5a16e3bdde21535744ab8c88ac23a3c0da6a3f19a969211420abb74ba816f2d3924a5dcb2c58ed5989907453ecc1a2842cb4c9fc1c4c7f1dd1a3636

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          79e9ce905f1a35be5fb406276361c43c

          SHA1

          54e50d087448ef82ad057b74795088236ebcf066

          SHA256

          f7f1672c91a108a0dc86e6ef60dd1b65c229e8936c08fad9bb04c47e4875ed05

          SHA512

          a45eb4f2c3d4ba2a9a8e249fecb72e0df01aa5226900884d8f245ea9eb256798c399a7cc63cd6891eea9d369ef98303b352733727e8decff3303f3c216c5ef44

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          818573b841c019ec95fdc5fed6a5ea04

          SHA1

          8f63a4ed88b4bc9b580417946c93698d16186773

          SHA256

          3b18afc5f8c3bc1f85e1c8af60f626989c66c5cce8120ff0e9dd689d1d1179ec

          SHA512

          81e8a63754b36159db262718207282a6aed2b3c0c22de9518880b3b03c483c5fc67534ea3a4e2233b43e1f7da7ff28a17525a5328efec93fc31c00d449be14b4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5d845de5e6cf50916c3b3a998b3c8fef

          SHA1

          d579323615585838fa03bc0a717e28f556fe9fe6

          SHA256

          53bd5307dbcac71214b15cb35ca0890a2dfd9c6274b8195422fb782fbd08ea70

          SHA512

          6f534576fe075e4e85f883f121cd638a7908ddf84f043dc081d6a99d8acf89654d96bb19921b92b5ec291566596b7020ba6f13fe1e85252c3f9ca4dbe83ec1ce

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e59715b4ad6601ac00b70bd715294fab

          SHA1

          94f59091c7a2c20e554a43a1bf536a192a9a2f4d

          SHA256

          c7c2ffcc2c2fc1ccf7308235d77a56f270fbfdab3f669d8b0244288a3170f1b0

          SHA512

          ddf42ed51fff6ce648278eae1940b8a379a2fba06fee2712169b20ff5f49b365613df1524cb883fa95990cb24d9e464776c8df215587f693b5d5218d0bfa04da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          789ad1d362196aec3c0b563e8374c801

          SHA1

          043958d9337f54f8a6cee8a9ae743f06cee72fee

          SHA256

          6cfe0178a038a6725149b72a42747de8a0c8350d068fbd90e13f00008d154ac9

          SHA512

          df37f42e31ca9d09959f243de074113edf75fe4ab8fce8dc18b0b54ac9b23ff265e43b22e3a9e01be9086ccaa15e871da20040ddbf54ae1f395d9d948f2b5ad2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cb216ae8912b73fa883e3376dc80a129

          SHA1

          2fa542b6bfaaef923237387aff26280788295a9d

          SHA256

          27c3eadcb143857ea7f45a763cb263d09860b43b8c43e13262eb483400ef9eef

          SHA512

          61a0dd62fd6f75be1c2d311d14590af792b8c14bfceb9676aaf5b866cc76ba7d430513eb292ddf46eaf4815abcc27db036eec6ea06571f4ad9afa3d1e4ce35ef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          623c83b0e1e42f2acece279106631bee

          SHA1

          04accc549d6f33ce9061a34e4387fcd7271c6234

          SHA256

          b616b0b5b4be1acf882c2fc9453b015ad8cc2de43e1a4de8d82291caf32fe1a1

          SHA512

          123e6bf5f7656c1922c9ebe4a2079bcf048352ee8e9dbb24bb75ce77e9b46c422eca395882da76f24814f090c860e0a343c013c66c1ceb121393e2a8d5ef8945

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bc2c240b47c69fdf8011b0185735156c

          SHA1

          3ebff6d2c821706aef39181ce98b7dff7ff6c2a3

          SHA256

          802f9e708a4f3434b60d5efed7a95cc04d72a1a40fca4472bd18552101044e66

          SHA512

          692c4de38e5869edb4adb78860558b6dfcdf4056b2079851f487c50798e2f02c35201db89302a37e0a7f0b3930861744ff2aa2d6d5975799fe5db4cd293f0713

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          38b507793ecea5a2ef3a4aa71ddde6cf

          SHA1

          d4612dac52c321e00b9ad536453f1cc8cec2165e

          SHA256

          f722fe9be4a336f6844febd953ca1169816614f1eb912cf2d658486e1a4b0fde

          SHA512

          6326c590b28ad0d79682a949334a190eb1bb3c0d6dfe5f2c203e43b43199c7d2bf22403ff4fbf090cc4c75fa09d0b82e0ff25df7042df7e7cfa2b5d22191d0d0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7b2f2ac27dba1e5e30910fbd8063ce0d

          SHA1

          8d1ca9e2a3364de4b1bab99006d82314a06fe806

          SHA256

          d2360081dbd0dd18ab138d1c9cd75e97551aa42e3383ab4a70b591c5344fe131

          SHA512

          a6031978d30d08640d104d92d68e7f81b73e3d9804393edf9a4b2f1667966dac7b9998880a85bd6024daf7272b4de6aa5c34c553be3745ac45f0ad73c004787f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          33ebe8f7d97175dc2a7ba3669cf299e5

          SHA1

          3f0f670b929deee13b727d52cbdbf9114321ec8b

          SHA256

          6c228505ff4784c432eb84bbde586ebb9c867a55496627c6a3a4c337789fefb5

          SHA512

          650c670d6123ff0995a292a59ba153f93152049f7a83ed863523d3a52d432c0acb8f7fef7ae1d57d0bb6f0d06c6a20c089daf77f08bd1915ce3ab0d35236aff1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          30dd586292d363c7660c9ba547fbdd0d

          SHA1

          dadab2bf05d0e009d820cd9f43f83f62f82c6e8d

          SHA256

          7fcbe1d433177b62bd5cc589fcdf5f0f77f3433788bd016a88988e3f02262d86

          SHA512

          e83be399712fe3912a962cb928745ec3cf09581d02b456bce6bb3003f73d2e08160c39ca1df8cfb3e2b063e6d11e6df604b4b1bde91b2e9778606c090c48e833

        • C:\Users\Admin\AppData\Local\Temp\CabE4C6.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarE575.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Roaming\Shbzbr.exe

          Filesize

          110KB

          MD5

          dfe32d551245b5415f9a9f6dbb9acc33

          SHA1

          fa8e9c8e16ee5f69aac92bd9ef19ea8d47c7806f

          SHA256

          ce8325366eb00ca3ce573bd48aaf37283798ae4977a715e4416d64826969ed8c

          SHA512

          d62377135af7eded1bde721baa49b2fcb41f3aaac8c1df4b87527a8d50054a456f0a3aae084392cc8b21b93e0b6b971a211eabb69c673bd12fd7613b1d0a931f

        • memory/1812-47-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-39-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-23-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-21-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-19-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-17-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-15-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-11432-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1812-11429-0x0000000000380000-0x000000000039C000-memory.dmp

          Filesize

          112KB

        • memory/1812-27-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-3-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-1-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-29-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-31-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-33-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-35-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-37-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-25-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-41-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-45-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-0-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB

        • memory/1812-49-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-51-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-53-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-55-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-57-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-59-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-61-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-63-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-7-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/1812-5-0x0000000000340000-0x000000000035C000-memory.dmp

          Filesize

          112KB

        • memory/45412-11437-0x0000000000330000-0x000000000034C000-memory.dmp

          Filesize

          112KB

        • memory/45512-22777-0x0000000000400000-0x000000000041C000-memory.dmp

          Filesize

          112KB