Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 00:16

General

  • Target

    ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    ea3cb873084d15bb616da461122cf5a8

  • SHA1

    655504b1aa501b9cef757578d887826c88dc18e9

  • SHA256

    5aebdd15d9d937c587c1445199c1119cb4cc9ba75209156d223cba83daabb6d1

  • SHA512

    ddb997d46d0cd8c93da2bab0e0b4c52f090ab5885bcc6e3a5902d82ce6239bf0878e5c4888e81e4d8d6e5f35952ac6f07952a0d39b682adf6e06f3c9c7128f41

  • SSDEEP

    6144:xQq7zwkx+Gj2ldlTusrV9BWW7UmUZV/v6yTwVABUIwqgIt2ccJ5iYB735dMjSw6:70kfj2ldksVWWKcVoUBiQrAYBTDGb6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea3cb873084d15bb616da461122cf5a8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\l43.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\l43.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk43.icw"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWow64\WScript.exe
          "C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk43.icw"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2756
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2244
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\a.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2660
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\EditPlus\kk43.icw

    Filesize

    132B

    MD5

    33ebdde8b51ea0e7f5aa0a83b2265644

    SHA1

    be0c08f1f3c712e7c88eaf1792db3e7b68953c39

    SHA256

    25a237b2976bada35eda640d366a6923cb7d877452a39254028b063eace947fe

    SHA512

    9a457bb35977ec153bda788fb046e2f847b83d1878358eb97e5f0b9a117e482d439599e710c92bf0a7e32af0fb60e8923178e9dd02d83d85da88aa589e0b11ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1317289519056668266ae953cd77019

    SHA1

    b93af2b0c195ca0c53cf2540a903193860f2d8da

    SHA256

    242d68438300a50db5e6ab540ddd9d33d251aceab2710d3882b0f48501d16863

    SHA512

    e8fce6a20268465402bf4d74a8a785065c1077cfbb65554149807404b277cd4f743274e35ba70d4d6a798e32cca0c46307a15b7afb9d9c9d180d3f34ac082fc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af18b7144fe9669d70288d7dfe3c56fc

    SHA1

    0db472d31edc2f816a5fbbb7e4fc41aa183e9a7d

    SHA256

    59e5fe4850dcecec7a1a6784bbdad3c49de915dc97a1c545b85a15e72a2d2671

    SHA512

    cef61b127e23afd4819c61480b525ad6da6b04246eede675fb766c7c7ca99a7e850f706566825cd1f1423debb8d6caa25cb4443541d2a73b149f4d0452181f81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa0332a6d4504d4a9fbb5a250f681fcb

    SHA1

    87d4406ec59f3159c416464f965561e9e4ec373c

    SHA256

    6fabbfd6978b48e6f7042039433eb8dc50366f3dd0af418ca5976c25545a9d81

    SHA512

    286ca0ca6ea5f578b62bc04c56d228fb21c23254d12e418fce76920740a37df80930c4b8557ecea5f82cff9bb91519f3d1f96dd08ff2934426cea819a20438ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b3493d16749ea1b526d7d25f7d15eb6

    SHA1

    2520cf3045271f3d22e174b514b724f1847aed2a

    SHA256

    bb52e7956985b5ec17549db7d6db233557a47f34397d5e24dc053e8f982edb34

    SHA512

    6d2262a75d91580838c61fca3be806752188b7f66b9584ae299e5384511ca46ee2b31aec8e8d59f6728e938515235fc6e7b17c3917a2cf6374a1224dcb20322a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c01fcff8ba832e5d60d8e3d8b5e8dee9

    SHA1

    37797f9e784123673c6b51195d2fbee68801a4e8

    SHA256

    6beaba5d09461aab3945dd442b80c6b8c890a9d93816a84cbf95ae5638de4053

    SHA512

    c13a90eefd43e0f89cb42c898aeb85184894d9346aed7659554292357c04d351c48875f3d2f864f2d0948a89e5b75402dd447cdaafbe01cb837f0110f3b3386b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b688ef3e1a35dbfc14224251f0951f4

    SHA1

    ac36d88cafc87a9a225f1b770e8d13aa58f84835

    SHA256

    6c59c88869162eb76f628db6c7dd3848f6e1144990013b97aea496d15d39d764

    SHA512

    35ca57eb47a98d8fc6a105b806fa30b08c68928060db9f67adfafacb9be73e799889324696ea5b8fd0b3f3506e3b64d42304c385d681b48e541962c2084a5d88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8fe55d19ba9ead945f5867adb3eef48

    SHA1

    812befebc591aedd423ff0c9fbf92d5b09a10453

    SHA256

    b0ba9571b72707050a9f7153a81650449d4ea0d5f97edca9f48d7b962c554cb0

    SHA512

    40733b1e55a5c05bfcc604da126f9f02288df5ea911c44ec798a116d6919a12e33e4d5916add8d6f1fa80dfec614cb614d7902b65d582d2db7b40c733030a1fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80effc8c9188fdf3be8d784baf72fc8d

    SHA1

    86338214f7233724e22ce39f6780fd0d291a72b0

    SHA256

    adc57d26979af4a1c54bf12cf6eeb3572e5273a997f2470936bdcbb4193015f5

    SHA512

    219f7861c61c9e75a4baf8961a61bd3dc3117d86c084b7ad6e9ccb03017a15e0869c844bac6bdca524c6349cb31c62ef3fa90056096b0e23d9bdf3b0ca7a6ec4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    485c9c1b7077b5cc7a28c56281cae047

    SHA1

    f6176603a051fbd846dcea7b0f9030b952aa8a12

    SHA256

    4be85f68f35eba57aab08d8f01c9ea1a3803aeeadb80012fa07251c683c3a8ae

    SHA512

    0bc49cd0b64db95f5d49516e4f92c1a6883ba37efe2eb8cb857872779667cf659ae78fadc054536467fea03d712c08948c2f01272f85291e4d5a074516b21825

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21429202ad853a4d39f8edb40d5618c4

    SHA1

    70e5f937c32eede0715a6fc3caf32ef566358afa

    SHA256

    bd692b10a1f43ee90b8f00b8233a0e785d689aa13095b7329b5ad9a92836abb0

    SHA512

    996d3ddda3df76e345fc32656b345278112f1238649b49f9838c0acbe5069ff355eb1840a6ca0df0c3b1b6589f533b9259b14018a923801669bfb3307b32e006

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2527934d05568c47a31081ab37d6b0d7

    SHA1

    6d0a27a08177dd8bd24a2eedfdc324911844387a

    SHA256

    48b35f743c1610623d2d0b67be2a8175b53e7aa3898de5a7b5814ccecd72688b

    SHA512

    61ad934bc96f4d313a812bd5d0ca2787039af9bcc1f2192e0743b9b9966a6a2daaf64dc1294a27fe8079d89a77e704f573a7a1fdd1b3b28fff86f7069c4b68f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e98b4b651ee713138b5554e598099ceb

    SHA1

    307ed42ae24c977bcc758ec81ef68d02b22d5877

    SHA256

    47f42c56d1ca7d740903367c077376262aff16d8a2b2f1f7fade612c4e2b767a

    SHA512

    b9dfbb1c212c439768b82080f22ee2c115592418688e88cf81027aefa391e14146d10ac70e268356dbee4822e6357c2ff30a56954b20b14b11e0d52fb3fd261f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86d65eb6d12ee593d583d3288a5686bd

    SHA1

    0058eb166c3925a0a422155582e3556ef90915dc

    SHA256

    ca568286ba981de577c9b228910d0989cc127b857fa6f9edb76272199626fd17

    SHA512

    f5ed8ff7275e8e62360cf80531aca04f641b70c87c03359f708d5c47e1ac6a3ea1689c38d7d808d2e5b3082eeefa78ca4f5ce89a6404052c4af62c7d40de725c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6bdecaba50c32b5af6fc0e8ea211530

    SHA1

    499786d0dd319a7c92af60e01c81e3efd72bc09e

    SHA256

    9f35ab669fe7017159f171e84aed55a9021ae7a3347fe52349e498c2695f15b0

    SHA512

    e21175400f20474339cb4c025f9a70c772b06f77a41b65f86c14f5741486295a90d5f9e393bdf63b16cbc1547ff576ff5d79409807b8c2ef6fce65a3ec9e2632

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    172fb188949b7f24f9625ab616819ba1

    SHA1

    916ca0aff53df02047e47d8fa869321ac8b5b779

    SHA256

    9201c5a279e297b97f27e2b3789c051700ed3c0a37b2a6186222b70c71792876

    SHA512

    6337d8caea2017947ffce7e0689d12e7522ee9ebb6413aa654bfebd2ac48b8082e47f5b59db788447c774dd91ad3fe104b55c76835b1fea9b7a9d10017e8e1dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09237c15bba76f1bea909ca86bb4ccee

    SHA1

    58d90c63c80bb1df3f0793afe1cd6066b7b1a858

    SHA256

    cf3fd2cc2408edb0c75be9cf472af6329098390fc8d38af80baae65fd5d1bf76

    SHA512

    9f4a2f6484186d22558864fa578314a3a089d84c2be1b615597c1d1dc435d3fba353b0720297a570813e9e4ca21c961e98e5167f4912e768b7c1052c6cdb2591

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2b7c8db80aa27034426c2bfd7655217

    SHA1

    045dd84775dae0019381ed6984ebbbce2be66df6

    SHA256

    6675f1a84b8ecce65b5bb7ceabff2ff061e6a9c761ca9bc4d8e7efdefa6ff3b5

    SHA512

    fe336901f7f71f7d070e4301638c24e07011d62cbcd2397132956b75e6c861395a5aeb90390d0634bdbb150e62e6c494933761a03f180bd5e2ea89bece812a90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90f10730f93471c4a82deb8ce58967ab

    SHA1

    ceb6642bd481ef0032b2beff008929c07b8b8337

    SHA256

    7485047e31100b125c138e98fa679c9c22b74f09b354744c323abf35f912ace2

    SHA512

    436dcdacd6cda64c3cab106a957d16bf937aa2be7da8b1a1f844c237d5402f7b10b91d9c3713ae3013982a67999ec33698593553a311eb2f2ef946187165f1a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b6a584e55fb0e672ebf76081c85d765

    SHA1

    c381fe2b66e10087b18e18d35df070dd84cfce2f

    SHA256

    46cc212272bce0d429ea9b571ad36c5339a912ba3eedf93f967effe9008e873d

    SHA512

    d749dd55d11ee21a2f9283225961792664459acabca8fdb388a2da21230b47ae845951128c74e047f97baa3a76e44d30605f48b367ce00dbe2c6cc51bf6a263c

  • C:\Users\Admin\AppData\Local\Temp\CabCF63.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD012.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\a.bat

    Filesize

    56B

    MD5

    b850cad2b7b0f2868b92aa8164c5f765

    SHA1

    62e671e7fd9ccc004d53621b6b378acaa52295ea

    SHA256

    28d14987e59854e2ec2fc46a05a05748f50f9db89cf180046e45a4874ac8db56

    SHA512

    a5e6e954f7952717e859bd9e62cc0c52efa8052943e8db2f4cb3640e3e31f5f6d70f310a1176bfadfb84be9a0c94c919b12bb49a65f7c8a9018df238a4db2b61

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk43.icw

    Filesize

    840B

    MD5

    fdf007061fa11ce3ffd8cf8f8ba0f818

    SHA1

    a9746be7e1c744059f62bc7088552b36bdc0dd3e

    SHA256

    fab27fd077a7db2b49a37465d0908241727e7cb230348ed8e0da9432dd6096d6

    SHA512

    952a519b54b0f1dd0f6e3f1ef115b2923ee2356ed7ed80efd8abe55a300f40fdb68d3eafe918aa62fbea376bc4cac845df771a6393f590d0be444051ff65a476

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\setup04316.txt

    Filesize

    346KB

    MD5

    552a4c8813767bbfc8f4ea544e56f6ac

    SHA1

    343c95818d698d5ca80e0c962bf770221909f312

    SHA256

    91d668957f7d4e345b899b11f82a76a7928364cc1be99a7f9b67808e8a2e1c1e

    SHA512

    e194aea5bfc0642aa737064070612f6597586e3ca7c9b9701e5c730ee17c7b0c37500c78513a267e182b0d9ac0bf15374aa27ac4fea74515877796d8980c7072

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\statistics.dll

    Filesize

    80KB

    MD5

    b485de47dfa038e4fc1b6f1782d07ad0

    SHA1

    67b68902d56bb7cf1d3292bf152f85572fc53786

    SHA256

    74ea2288ae1fad84f215ab40b0b9fbc0ae50996fe751fa5d615ae8586d1f4121

    SHA512

    5558228f6fb0f92eba5035d4ea75e722c227566a4d71a523c517628d1cf4b0e2cfea94495cb09423b21276e0ef568545a3eb628daa7f94a258a8659ed5d6cdd7

  • \Users\Admin\AppData\Local\Temp\nsj9A8C.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • \Users\Admin\AppData\Local\Temp\nst99E0.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe

    Filesize

    44KB

    MD5

    7c30927884213f4fe91bbe90b591b762

    SHA1

    65693828963f6b6a5cbea4c9e595e06f85490f6f

    SHA256

    9032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994

    SHA512

    8aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab