Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:43

General

  • Target

    ea85c35da0e0ad4d3af647f14ecde0b7_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    ea85c35da0e0ad4d3af647f14ecde0b7

  • SHA1

    8581ffb38a7b6f03e5db4c38c4c6c4a65f9f8397

  • SHA256

    3b731a6eb75535e16f881da6517370e7bf9561838954e5171d43e903bcd61a4e

  • SHA512

    7e97073c2fb7e730748b5c62bdf77c85486a7940207f59c3f2daedf1d75885ca27b83e95583da31356862a413c1826d910fb90def4358def03f46304c9d24559

  • SSDEEP

    3072:YD1Yk6XEp2j+dneHR0vL5Ed6ybSTkYOgxT5NDXBpX8vaaI:Y2kmwneHa5Ed6GrYOgDjpMM

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea85c35da0e0ad4d3af647f14ecde0b7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea85c35da0e0ad4d3af647f14ecde0b7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\ea85c35da0e0ad4d3af647f14ecde0b7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ea85c35da0e0ad4d3af647f14ecde0b7_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Roaming\Omxhxv.exe
        "C:\Users\Admin\AppData\Roaming\Omxhxv.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:112
        • C:\Users\Admin\AppData\Roaming\Omxhxv.exe
          "C:\Users\Admin\AppData\Roaming\Omxhxv.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2748
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2660
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b890f8576df6ab01622db46935b49c23

    SHA1

    928c9116f3ec4ed04697e76e955848610d28ae12

    SHA256

    c8f65ad347d4e9ae4585c23460d511bcc5ef222936e361c9df8207b64198e584

    SHA512

    1ec36a1e454631111f961486b09ad7dda25d2388758739d88a92d82783795853715ad79bba091ebc5e20f0005805afeea7023d5b8c981ef51034970820c0f37a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9f499827f95d4ac5bdf1173540cf56d

    SHA1

    7adb33ad5446ed64ba593b8fdc53ebd6480d9ece

    SHA256

    e12c571a9de2e3340592fa11686ac05d65ad4e8d19d952fce447cc0a725bbdee

    SHA512

    e1e849937a62263d7c56952f971cc6fe36f431d2cd5b01b4b9823ef121fd54fb2eaf30978be63a5c08d521f607cc2941f8b674ca23f778cf41448fefe32ab144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8322a702ef9f1605881486f2fb393f6c

    SHA1

    9bd280d9314ad7c44e40b87eb46fde4778ddaa62

    SHA256

    d56a1166691e81b016b45de37ed7ef023c3ab72849e9c59f763626926e6429e0

    SHA512

    5c27d83f1d8361d9ccfec06a81cb1dd6d4475ff7d6157ea7b9d5751d318ee7413d115342cf3243ca26578ca7bc5fd02de1104f7c10a0f9654733252b0500868e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc6e9d01374694e8fa260b1b2e22eab6

    SHA1

    bf945a914cfc04706d533818d19cb846545b4788

    SHA256

    5c604dded37c7e3b4eb8753a9453e3aaee1eb838d6f7e50f7726535f553fa329

    SHA512

    67c5acfa59b06d5f296a90e752e299392b5510e7cd3c901cc46de70a085314696ad1ce673502434e9f1c151b6d8ce35d631c16f02f4ff7059a56689c4b8d7e15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a4d65e6399a79530d27ed143eaa9edc

    SHA1

    232c64150745dd9385fd080c8dbe13937a7b53e9

    SHA256

    bc0a8ef0ec675e1f0187443e518e69d8dc2fab97583ec81a00e26522dd2ded2f

    SHA512

    2b1840e05ae5fd9c615288978d3d63216e06a703f46d98bf499fcfbd82bcdafda0a0a5d2854b1e9b95c1ff4e257157cb40fcd250017b5d71d8f35e35e2d3ef50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d351bccfdabb4bd18eec310007cba4ee

    SHA1

    5762bbfbfb45fe7326bc5b2e5804b228aaa4cb4c

    SHA256

    929e2f165ddad45b7eae5718769b342825a1cdf78c23f84b50cd2d0a47daf5b8

    SHA512

    652f75d49229e65774ee3f1d5e92a098ecd1372317842d4061a384a74b4e1d23cb97d2d81dd9a5e2f0f9898008a5419c0ce69bdf457a9537c751cde1f62ea996

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f242bfdff50904221278fc2aea4cac2

    SHA1

    96afe5a6d5327bc4c908f60a580b3ade073485a4

    SHA256

    602647b3323e252e4662f78f8dc294bd569cbf59cac53b64c987ced3b75e7d81

    SHA512

    0065731087d893b8c1365398b8cfe3f4b40d540d7744a93cbd40029f129a8546a035c85b0b8bc89f851536f7fb399c6ccfe076b57475e07823515fa7ed71d327

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f07e9a9c6628372c622efbbc97d0116

    SHA1

    16cbfdf50847705b96df54fbd892d949727855e0

    SHA256

    647950a8bd1b24afbf4db4ad16a08129cdda2bba57ec8e8b508088a96f0b1e9f

    SHA512

    fa22bcbc2937b66adbd8f508f37fb13f168f9f40202b5e8a032e47eef6305ff51d25fc9691e79d5839d8d2153d24d9e18bd6519018c9acae5ed6d1a453c9b9fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a0874ab493ba7b9b706c3df8e7db189

    SHA1

    b45afdf0e44547e03e2aece8f29358889c00078a

    SHA256

    9af18e2402f91a02f83b40f8a536a469b9437573b6e6b82fa8ab0ce56a4cff80

    SHA512

    091b214ea97ea7f10f8521a8425bee49ba59976bdfe4d311ad3e3e860d76b4cb12bd7845ff4b9787e6cee0ff9a4e4784ffc352801e58ce01fdd68e91b831d9e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4d58d081dd36eae942992ce7657f853

    SHA1

    a93e7409aee49b572a9e2cf95ebb5fa0f48769c1

    SHA256

    ce3c0874adf17170621b9f61c092372caa007a8073e8b1f57c02da04084ffd3c

    SHA512

    c91afda71c57b12b302d45db79c8423b84fe7c52497ccab83af5c8cff077048f23316eb323e3a51fd14392b4422c082417f14722ecf39eba6e6ddfecf9547a64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b42472f6f4ef7cf0fcedac93ccb1fd80

    SHA1

    fa381d838af18283d014f7c7cd652e8317a58ef0

    SHA256

    706bf9b70c8af7a60f092cef7ff4c815e83ea90c8f6361c12e342c30396fc6e4

    SHA512

    e0ada46ad2212c4c86401f681b2aba04d2060eb8d30a17327cc593dd8c0d9e204f409d21a5f0945bb7f3fd67c1427537cb2d7668969f49c467277a15b6d69007

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    366ba508268b589da4133a69af3fa832

    SHA1

    3b77146e3ef43bca55f006653144146476d37c6b

    SHA256

    6e34f7e69d4b3d27419fa24523daed4683e84e6b11cd75fa2ce204d65f1185a0

    SHA512

    65f508cf33469f9a98b94c685ea96685af11494797fea85bff71bf28972d7b9fb9e830770afcbe2a45606a13cdc2dc980a311c11508cfdda48f608afee85e3e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6c9b6ba489d5c5f8ba814183d2f5d54

    SHA1

    fe855001d6c3922a53113c3222370d726ad625fb

    SHA256

    f5a442ee8582be702e1435ec7ee633ecea6a8ec12a27e1edd63f739b2522e420

    SHA512

    5503ecff0d7c4c0733d9ac72c2ccb2a8f6cff1c8fefd68ab657a24615d6c2951b223c5c71141c1bf9be7b54fcc0d4be80cea46e409b3cb90f40078b644e3d281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ceb77c327dbc6297724d5bd426be15b

    SHA1

    c2300f79d926769c22c82ebac0c6db7ccbbd3041

    SHA256

    8144ae3a485dfa653e7df6470feb5f53bc851fa14ec2b581005418fc515bdba6

    SHA512

    5ec04e21a73d82b71fc26f3d03bca9ec40c0109ce9449cd9678a8e3d2e194cb8eb325c3ef98ccb552705373bc14efdf6ad29fbabf7c57220e379f3f7ed835125

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45dcda9213bfd9aaf99e831da33120de

    SHA1

    ed8b85371cd6fc9560f95e334cd92d1c85d66d79

    SHA256

    e1f5cca79e224f518da63d0c7cd4c064229e32a3484247661aff39648fba1842

    SHA512

    a5ff531fcf659bbd671ae6af7ea009cc464fa6e1490aeda911a8e0a2f8e387d59a4dc2324d806be652f51d7d0f62f385bbe57d7fcc8357a370bb67ac865a0957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23a4b923d9e75efa1a2d1b5a8b94020d

    SHA1

    c85bcb4c4ff8788b86f7b62c251483c463b40dca

    SHA256

    8ba6b1d297c65fa00b91c1f7a7c63f4d72303ad57d5f96e131be9e9480b74f29

    SHA512

    05666c96955ebb71d676c1541896d469b942ed50d9b7d475f95e5d27296b742f4354dc4770a0e08a2587e7f93d36b45d398a97fffcc99648943fe0985ea4270a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f85e0c02c822a1f97c11765dad2e910

    SHA1

    5e9efc82e0a7e2e37d484d17ec9fa615e27e2a3e

    SHA256

    4ed4c16de64e1f5e00d35b939ad5f08acf44873ab50c42fe667b7c77db3a2931

    SHA512

    4f0e988e2fcf3e32be73c6983668afb867b9feb80d58ad022bebd11b31af58a87be076c4918f106eb7bee5b1fc975e4df7e0fd9e7746b4feec7944ccdbdfd614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62cf96346f1637cacfb62017447c9a53

    SHA1

    ccd6bface2e59655c1cc6b7dac72dc15b1bc4b9b

    SHA256

    c20c2dc371ec17ee13d6aa3354ef5c1cb3083367f653f1b93feb5ba4cb056aff

    SHA512

    c1a0212242e0994b8418bfa3b3cb3f7242c9b1e436568ec2e8132d62bf7fdc63595484c72224cd0190c315499b1c99e533e42e75f77d24c4d6579766d6a8b4c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d6f186db3b21abf30a9278a2b91ba85

    SHA1

    461b95a956c2347f0cfbac196fd78de508047935

    SHA256

    ff7ec5558ad2b739d6acc39bf21c8d07739277a4f9ed7a4a66ff909997f8bf5b

    SHA512

    ec585142877bd09f62c3f3ec3c9677eb8cec3a89e5e1d9167e4b05e626dcc73bd6621992601ba5f26a14d3d36572d27b9341b9316bb565413c336325b4457643

  • C:\Users\Admin\AppData\Local\Temp\CabB59.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC0A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Omxhxv.exe

    Filesize

    156KB

    MD5

    ea85c35da0e0ad4d3af647f14ecde0b7

    SHA1

    8581ffb38a7b6f03e5db4c38c4c6c4a65f9f8397

    SHA256

    3b731a6eb75535e16f881da6517370e7bf9561838954e5171d43e903bcd61a4e

    SHA512

    7e97073c2fb7e730748b5c62bdf77c85486a7940207f59c3f2daedf1d75885ca27b83e95583da31356862a413c1826d910fb90def4358def03f46304c9d24559

  • memory/112-39-0x0000000000320000-0x000000000034F000-memory.dmp

    Filesize

    188KB

  • memory/112-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/112-36-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/112-35-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/112-34-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1712-13-0x0000000000220000-0x000000000024F000-memory.dmp

    Filesize

    188KB

  • memory/1712-17-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1712-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1712-1-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/1712-2-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2120-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2120-58-0x00000000002B0000-0x00000000002DF000-memory.dmp

    Filesize

    188KB

  • memory/2120-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-31-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-32-0x00000000002B0000-0x00000000002DF000-memory.dmp

    Filesize

    188KB

  • memory/2120-3-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2836-59-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2836-57-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB