Analysis

  • max time kernel
    121s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 04:06

General

  • Target

    e1ac90f2c4c5ac69da2772f388962ebe_JaffaCakes118.exe

  • Size

    141KB

  • MD5

    e1ac90f2c4c5ac69da2772f388962ebe

  • SHA1

    bac8b04529acbe2218c4e255f19ead17605fa109

  • SHA256

    2f94da76aab834a3c5bbea1e4d8bd2a2192094cbc57d941de0d187861cf7bc34

  • SHA512

    17b91d9feed5953f0c31d0bd69899cbdf99b876790d0dfed27507e603dcc6c081f629f2e67b1645ff3ad444515840f701e8b78900a86dd5b2633e90976aa698a

  • SSDEEP

    3072:BHo9usD7QY9fvUgL0bXnM0Mg9Ro+7xbWyHbX8nKYCNt:BHVsDB93UgLkwgB7xbWzKYut

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1ac90f2c4c5ac69da2772f388962ebe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1ac90f2c4c5ac69da2772f388962ebe_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\e1ac90f2c4c5ac69da2772f388962ebe_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e1ac90f2c4c5ac69da2772f388962ebe_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Users\Admin\AppData\Roaming\Gqjxjd.exe
        "C:\Users\Admin\AppData\Roaming\Gqjxjd.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Users\Admin\AppData\Roaming\Gqjxjd.exe
          C:\Users\Admin\AppData\Roaming\Gqjxjd.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2820
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2836
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          280f7406f8c4b8688610ff574e7d4389

          SHA1

          46d07b8e9ffd9e2292615acdc09ce352a9fa8b29

          SHA256

          ffb540fb489ad5c26ed3b7947a60052017a235e61c5daef71bafe82cdf19da9f

          SHA512

          d3df6eefb1a5809152bb5867df75c7fbff6990ff289cf41ac3fdf8b9bb34ac838579f4858d51963a0b62d13648cea68832adbff7667b8d09c9ce58da6782d132

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c3370c9fc4f573cbc4f8026cac644b81

          SHA1

          b69baa943054d5438013646a81e1d2362743df5a

          SHA256

          deb719a520012cf10a0e59c3af005b06d351cb5445c40f66aa4f27a01246cad7

          SHA512

          76b77db4704317169c398eddf5555cc2f57bb6cd0fe60b9615c87f2199b65481047cc767414393b792dc928bce343e20c066130f9b6ff909765ae87c7e5f35a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          00a2dd28cbb4bb209edc8bdee541d98b

          SHA1

          18f6b8d1d744b982d61e794bc96b749a3300de3e

          SHA256

          e0cb7a90fc621831f8641c992b656b223e40bb4b816716b921ab3421135a02ca

          SHA512

          59eaa39d520e5ad48c5fcb6e225ac4ab5766792ff19959198b149643a717a85dac348ccbf6bfef6eb5fb499fec4b1f7957fd6b577eccd1c11ecf818ec7428e94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          956b38cb53ae4a2a00f7fd5d889cfd40

          SHA1

          46ffe7bfa7d3d85b43b981caf0e47604e505e717

          SHA256

          24b7f9112b5696be045496ca5077a3e3250f3c65548e1e29474cd706ebb49a63

          SHA512

          174cee210a3446b92f0d094d4f924043acabcec84c2a9c2f001a9f8462367fa546bbac06da380d2a49962b93cf5e036c65ed5e5474e0aca901b4b904e4482b32

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6164dcbba75eb89625b6c10712702f8f

          SHA1

          2f8b96044b0dddd696e9c6b6945726c54b67b8fc

          SHA256

          f655a9c69d7e441e7c4a8c3ae8cd4ae986da49cc8347698a8c545479485148d3

          SHA512

          2ed9316a7b6e25d0218f7e6ec1e2ffa991f2b0dd6984379a26a8f00722bc45b1d42eb139c6ccf31a9e67d98314d05358536f7a0904106001b17180848281ffa1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bfa3369b037024d51712b790a4580cf5

          SHA1

          f70f4a28d3f03f57a03d5ff3c6c9ff245ad2737e

          SHA256

          d0ea8e203a7316ac2bea66bdd2eb793096f1ee76f2e7cca8de0e2af9a75d1ea2

          SHA512

          594076e615c1470887b58e2b81160102252832009032eb69f2429f75c02a24a15d1823418082a2b01494c8350d1c86423f723acde9ef5d5297fb035056ec95ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ad52aa409486b8d9d15a9548f14c95b1

          SHA1

          389de9401e09bf14e9f629b7123350fece6c54bd

          SHA256

          98a77f9d2580ee81e208412bcb18750016cb4260960f4cba65f105d76c065fdd

          SHA512

          4f8cf55d6c0206278113c81ba7260b29318c6fb209a0769da17d587e3ce285ba05da4335dc6e68485233d56dd81994b499a8670585518167de6a61923bac1a62

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ee66f21c69f3bafb489e506f2a2d9023

          SHA1

          cd173f8112885d92bf3cb5a810603a39c04f92c8

          SHA256

          e8beaf113e15407323e7830b84695ce3d1d4ad03183eb740d926bcbe71ddc1e1

          SHA512

          ac490f24c54cf69e6f9c6c8a4e5aad6839128a4f2879a641583eac4ca3a47021404622838aa6b05b34fb5b81c00733e6a5c4007b79a9d6691a8d1d2ab0b92604

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4ca64f521c245b39fa518b5aae614cb0

          SHA1

          c19628e8716fe007154a362d0c96b80ab8a7f1e7

          SHA256

          257dc29407a7f073bafa8e8c2e369c71fb6ff3f866099dca7a40be640b8e85c9

          SHA512

          6dc7bb369af54952852df1459ee73558eee2e8793ae80c5506e7b6cf19e997ca51332366222cc03e61fbf4b8df01eb7a585d3800749dee28c669ba77148c421b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3286f12121d3c4ce299174cf79578aa6

          SHA1

          b8eefa5e1e1ee6eee67192b8e89b34ae9deef7c7

          SHA256

          856db3e575276082fe284a40bc33c90d565d0496c480f7cbf69ab89130f8e653

          SHA512

          b156efc1a532684837b464c335561dd0e8130cdf64e7cadd751cdad386c1c9b85c9247c1eaf997709c1931cd8fbf8a33da04f5d45edb98930d55d1946b2a8cf0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          355172dfe4030b713cf08cdbbe8df944

          SHA1

          78fa0defb8cf0ad07220d8c5359c0bd41350c458

          SHA256

          587d8761977c5bfda18e972ad02c041c98a451c95ee7e45de9ec62c2680364e8

          SHA512

          fa8f2c2385785adfacfef6bc25f0cbef15f5552605eb91398cb49a0061399b022b9ddf67b8c068f22f4f637f4ba58c89daedcbe3d1e86aa8fee9659543be2708

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8d6b38741ba3c088d287e854734e84cf

          SHA1

          00db001509e61897c4f6156c0123df6eb4b8e5d8

          SHA256

          78eb639542fbda675f29c47f20ebb661260b7c123f2c09cbcbad63c88f0c3e20

          SHA512

          be7175836165cb9f7d6d5fe57850c8161ab6b0dc23195c8deb4850e2d7318d2277f486f517f92b583afe193fea06a07f7aed29e7dcdbd6d75dc266d5743b8c93

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ae82e809f303214a1c3ef40d1fe931bb

          SHA1

          941356e13cb432038000526eefd1fc4bdf9e4925

          SHA256

          743012fae9ae913b7ffd286aa9c1984f695dfeb3b3c26442749a52e412f39547

          SHA512

          aa1573665c479b6704efb24ef8af0d722e726c45e9a6acd8fae95158a8b9f86b7b2598be492dd0c50b481d99caf6258ddfb75ff672a7d011e5025af34b5910f9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          845f72642f8074527965de4b6e4ccc50

          SHA1

          d8bb4ef5315d56c44f8a8f0b5469506a89cf4662

          SHA256

          c7d184c8769368c042a1e2590d42da899632cfb824f5057f6f0a8b608f965005

          SHA512

          6961fad3e330e9a6d3665d44ca00e203dcf659c24d64487ac7924dc27470ae3895f72acc089af370819727b4fd4189a5dd4a84e8acc453a6f03f76bf6346bb30

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8d15dff0e58515ce1ff72057eea91153

          SHA1

          33b580ceb0dbf5116ba6141a98654593192be42b

          SHA256

          c2f8bc01139c07fede7e0e0f04eb5de25e3136c174407e701ebc4141b1493d12

          SHA512

          c9b9c6b8a5ac33f606997efdb5796808a461de26ac821b2be1ed2109712ad57874c2e6849164cb654415f26bc4e98d62d33e77d6296ebd645ac50f4b0c627ca4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8848f84717ae4546bc83c49db1a54b50

          SHA1

          d55491e87bd31e467d129c09159ec70187340db6

          SHA256

          77b660c7146804bbab079e64dd155014ef121a7dab58eb66873f10e48638b8c9

          SHA512

          27adfea43e95287ed10d5a4529bc266c2c50b3d25af7ea069a87946ba9057659dcdf354f256648dfa2cfc213ee06208d7fe64f9e5a1da257fe0eeefc1b7811da

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7ddc9f7d42cee38a26217921b9e318a7

          SHA1

          a07c3c932bba9bc55a27dfae34be0bd784c6dad9

          SHA256

          3c3647236b41d6f0cb5e106a8411b705f95162042f42489323b52692338fb28a

          SHA512

          10fd2985bc32d9e08e36a76a2c794a052cc05222e3f1063d888e4431e106ad00f1cca2b53f5f24d26b9a7fda510c99ff4566b289994ac4234340fa00331ff3d1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dd938c06225916dfc607d0054a57ae23

          SHA1

          6af5efb02ac7b70080e6d3391fdb191da68f185f

          SHA256

          9d936a9ddd2f364307d41d8c38e1cb952c9f1e196993e25d2bafcf718ddd2ab4

          SHA512

          c086af1777fcd4e20e5d3428dac804b305dbffc4ad854ec96f4b2b5d18294dae259dce7fb44b3bf94b5965671cd685182c61144b6a44be8af2726d52bbbba188

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c5740769a00349491a72d49a10731fc6

          SHA1

          afd0607161196015e442ac68238ffe6980629aa1

          SHA256

          0816117ddaa32c0a22ccca263331e30352d7e8c239cd01bc32675b5e5ae96c5d

          SHA512

          00aa5c0610ff4977c003f2b70f23b67837b0fe82de2880ac28ec3733a94a39ea23fb405f136be10c283ec7fea85771ef41831c23b5c7810afd40adf8f1b0b202

        • C:\Users\Admin\AppData\Local\Temp\CabEB3C.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarEBAC.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Roaming\Gqjxjd.exe

          Filesize

          141KB

          MD5

          e1ac90f2c4c5ac69da2772f388962ebe

          SHA1

          bac8b04529acbe2218c4e255f19ead17605fa109

          SHA256

          2f94da76aab834a3c5bbea1e4d8bd2a2192094cbc57d941de0d187861cf7bc34

          SHA512

          17b91d9feed5953f0c31d0bd69899cbdf99b876790d0dfed27507e603dcc6c081f629f2e67b1645ff3ad444515840f701e8b78900a86dd5b2633e90976aa698a

        • memory/2404-3-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2404-0-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/2540-29-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2540-30-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2908-1-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2908-5-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2908-6-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2908-10-0x0000000000430000-0x0000000000464000-memory.dmp

          Filesize

          208KB

        • memory/2908-19-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/3040-20-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3040-25-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB