Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 02:56

General

  • Target

    ea752bd9988420f1497145fc2b53e7d4_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    ea752bd9988420f1497145fc2b53e7d4

  • SHA1

    2b371eb5747a8cc0daa1c1ce7ea7c5d35adaddb1

  • SHA256

    96e9689af6a4d040f970dd00d5e05ab4d64fd10bc9da6f2811542be6acead877

  • SHA512

    dc563481ac0b32358d551a3bc5cd3ac7a30715272ae5e07543e546d224b75614fc90cbac5bcca21a9c130c4a2fd384d3d22d72cdff24b20fec87ad53c46521c4

  • SSDEEP

    49152:Qhg6I7xd/xTE+wjEflFaY5Uxq8Rqrhlru2pDdcsZpxjy:tSjEgwrjuWFZrjy

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea752bd9988420f1497145fc2b53e7d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea752bd9988420f1497145fc2b53e7d4_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.111dnf.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0727ba32c8337df4289f753fc12c6945

    SHA1

    5127a2448135dbe14bb763006cd3494fcff11941

    SHA256

    391a29585af2ac248b68f1c12f5868aaf109172b80edb0498ef1e1a3ecc3f61b

    SHA512

    250f089d34658d7ee3478e2b5ca544dbec4e3cc77d4477dae33f83bc113c4d80083230c2119daa34531447069600d54878f0017b1df56d774d8014b6502c2ee8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d88a7a59891a03424a251fe210bee72

    SHA1

    f1d229717ca0c9e6dc3f4642e06f3073bad91aa5

    SHA256

    9bc4f105db6f2b434ae7a59f8e2ae580e6fe6a10aa1d750f557d9d0bda443abf

    SHA512

    ebe86d20229196cddad9b8f0aa767efde67a75432f2c3a8c44c17355008009a6dc9ce8c16d140fbce898155df09eca1c3e2445aa0fee220ec32facb367cae4b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    175eb60b2218b8e0d2263479784e4e20

    SHA1

    a7d9357d208ba2ce0c149fae3c87ce6f225f96af

    SHA256

    56373b6db51fa69b8537b26eae75c1ed017aefba0fa505dc903aae8a528feadd

    SHA512

    4e62f0f47cc3739519b06edc76594b0aa02efcf90766c42860fd68cc42cdfaf0ffef444f93941fddaff0ae68d179b0e87df6bf17b33fd45169591ad70707329e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0e4bd4bf3157988c796c9a4fd9fedf3

    SHA1

    cda6591143389f2f868b10c626d8a53d8742d297

    SHA256

    f60031f73c0e1e48bb615e2e2ac6690d1bff2d39cdd5ffba5aade776c4fc81a4

    SHA512

    e3c6fb83f8a6d344ab46a8a9903786832f8a13aea2bc3e69702ab780119a59fce81381e244682bc7e9f63e528d9725f33159bbf43e33207091f0b018e3260735

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e280137a3f8db23355b3607b1a2d8f92

    SHA1

    b8a7db5486b0ae32def31cd5d7c7a795148c210d

    SHA256

    64486f5ff25f9b96ea9e5b1bce6d7b122ab270dfce8386bc4f4f00c418a99485

    SHA512

    e3deafdeb4909f6a8894d1d1886763b9f16d9f0269781cedf86896b09f32d1701bcfc5718b4a928edc32364a8d64ffcca48d635e026821140da585fd3d69670d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63dabc9d66f8f5d53337742056169ca4

    SHA1

    eda75ddf5a1ee99abe863f186f91e775d04a8790

    SHA256

    fd65b3bafd26af71e0e4da4975602d91a73c831f4628ef216e9136106f826fcc

    SHA512

    e84bc24b755d96367d23511972fa88238b9e0284fc38a3246de948d8253a23c12c60c971d39b77558d809ca97f16efa3e47d2cdf5d7062cd1e7608856fc6a61b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f1138d968fc6b1685d03cb062a22d82

    SHA1

    a5174786639e677a10c6b9e1bbeda063b1732849

    SHA256

    5b6b4adade349bc526acca14d1ab916d82d58a83e3f83b20c7f096a619b0d353

    SHA512

    23c38bbfb78228d8849f6a43a9bce4bc3fd350c956449b5cbb25c180f244a2912f744ffe3328737ac972c69f77d27086002317f0afcce478cc042355aa3fa977

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae8b93fb290e9e2c6588b6191e8a867f

    SHA1

    7b069dbeb82bdc00a87c1e253eb2e05ac3f5e9a6

    SHA256

    73e2057f4497b0c957cf2a4becbbc9176182c50a916d9cb1c7d745c5dab51bdc

    SHA512

    761b1e72080ce4527de8732558959a9af21fbdbc15717568fd53fae3a934deff0fcbd284b28b13ba958b52baffff9007ce082434c2741b2299347ae32bf9a289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dfe2a04df05816e2aedd6ea39d53f94

    SHA1

    1142b1ab5b0519ecbe5712e7a9851d7a1d3dc8ff

    SHA256

    1a9d293c0148fa5f81b2a2bfae844b1c3b522a11e0f766144cfa76487fe0f817

    SHA512

    4b35786758ad7445d660445e101497f6c30db61ffd186b6c4d237e2fd5eb38b27ccf00dd8867f1be2fd49e996086efcf6cba34267440218d83931f20a2770d2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fb6f26dafcb87e19a7c8913f15a2262

    SHA1

    f9ac9ca39a9434337502ea9339cb62d13de59a09

    SHA256

    1ba0e19d7d405f4f272dd7048f298042f27db083f4928eeb712248d26a5436af

    SHA512

    5b77f37b3b173cc041d140b0767fa0ae2c51943fb8134f68ef022b2aa93e58a37cee218ef4c548980f7c6d4905d04a74c6b13cfd2a796cfbc4dd2e4b6c32b3cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00eac9840002489b89ced44e8474a2fa

    SHA1

    fb4b67b2f75a146cc7274d20fd39ac27c2d8b198

    SHA256

    e9b6b5129d80a1dd91f7385e631f9878137616b50cc717b8bfe1eb1adcda5b75

    SHA512

    3f519d10928b2f12db05322b057e7014413ca43561bfac82b2e59f343e3620df17f1a1ec04c8374b3e7d5df9a8c4a8c2598c3ef631fa9dce0d8c3ca2079aad46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b1ef84a1e416394185070701029eb72

    SHA1

    a448fc217e87bf40e06e39b162dfe13836792391

    SHA256

    5917090b7718d6437faea3504c745fdf2c19e0820bb4ec88cf0ff92d46cf81b1

    SHA512

    594d3b2481c30bbdc7e63cfe8a3ecccc64092921c737d3dfcc1923c0b139c47c79c820c0e49beaf919958378ca6586588b607366affc4c80043984e07c2846e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42ae6eecc174e271c0a7616879f72937

    SHA1

    065519588b68999e7a1ab1d91dd8e769229b827d

    SHA256

    650f8739d4fc9cffb64c0f386bd967636d66eced92edc7088cf2342f3b7d4d10

    SHA512

    71ae40be296b1a51451d3c49172afd0b8f4f75093023819c5113cf5f1fd283af92858071bbc28da2c7a7ee00aa3b74be28ca674233a926e61e4a4822b69944ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f2709386d90d42b266e3ca031341e56

    SHA1

    c7075b042dadeb18d1977c3b6a9ccc10ce26194f

    SHA256

    9876df5ea43292ef62cb35b18bd9f7db46f55524fb0042b627f859be3ca7ca1f

    SHA512

    958a4e9643e0dbe3cd433ba81e59e27ca9d212a823896c4f463dbf04818a9922361055253681e5b641b65ff807b3c2240a804d34c20c56b973da5ef91afc19d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    069ca6c9da371cd72d7698ebf78f7d0c

    SHA1

    074c840994913c3f942302a7474be68f47472387

    SHA256

    94e053afb5f2bc7a6d6005a9176259d45cbefda813a9aebd75ff0c05bd57d856

    SHA512

    dc4fa546c5a8c9e9ed6cae7dbab7bf660a10dc9230b49b70d265e706cb072e66c4035655e8e453f0196625f2c6a346aa79cd57c98036122679ba3649d2e2cb41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9765479efe7a4ae7df96d45d745dc640

    SHA1

    c0a50f29e8d12e586a11d4a76e142093b349b369

    SHA256

    f52685834bc457b6f35ea10ce4301dce8abb20d4b1a51559cadc36c43112cada

    SHA512

    8bcfdabd4187083d6eb2c9be35df288b3ad80cc48142fc026cd6679c64e8ca445161c89fc4a97c62b22a6e1ecb93439669919d937d85844ae7d9eff9e34bb8db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59fe5aa70a5e23d6321a881effadd46b

    SHA1

    659b312a94a8cab269e0db3bec04f2825284a96c

    SHA256

    28fc1050b213ea776c9dfc47e5094db795e90a87bd631d409300c3652b507ad4

    SHA512

    1316b869bb67f215986963f03f455132ac4c8e1de43ee75eb8dadec012e78698c8884d3787ab2d29651afe13840828ae9183738311625dc609ca65f9a70c2e95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be47a253d0ea175091e8230e69860d9c

    SHA1

    d7437f179497ba9139a42ed16b416fd2fb43b36c

    SHA256

    c1764773a34b51572bad3d1a72d0ab01866e79f108bc448061be0e7945ff927b

    SHA512

    2a56d305eb48f31fcd76da894fd9981cfae87dc1602b221cdf2d0df6dd3c340a72617fad7b148f239447879ee6ca06f88ec485fc6043475138ca07025eea9953

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b23fb3ee490f70ed2911477a0d54245a

    SHA1

    705e37e76157a0f7c071fc46dcb109e8c387faaf

    SHA256

    2cff43dc3f6979f063583e91796b36ee94a958f23470d83dcfba3d6c3a352884

    SHA512

    728f7c686bf5b75b672020f6128b6de21556dd381f2df806ce7209e2969b6c0f4a9e96cf8efbfa191dc598cd5dd136798cd606c98f9ac0004d3dde490577fdcd

  • C:\Users\Admin\AppData\Local\Temp\Cab8391.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8454.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\E_N4\HtmlView.fne

    Filesize

    212KB

    MD5

    4c9e8f81bf741a61915d0d4fc49d595e

    SHA1

    d033008b3a0e5d3fc8876e0423ee5509ecb3897c

    SHA256

    951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

    SHA512

    cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

  • \Users\Admin\AppData\Local\Temp\E_N4\eAPI.fne

    Filesize

    328KB

    MD5

    d0e0d53a970aaa7068bdb41a6b8a7c5a

    SHA1

    b4fde4e2b7924e1fd76c094a5a7244d1fd351700

    SHA256

    6898d235f653db69a96a614259a6512db1a89b638d3c00dfaa72339595d3bdfe

    SHA512

    f4dfd2e64f0505861286fe71cf272119518b1e0b18e4ea3095d62c616fcd6d6dff953218fff8da6d42343303d56a9eee815f0ba3ab16c6514e1fe19fdb8c7660

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    3fe72f93ab5f24a0ea2d753013a41c4b

    SHA1

    9206cd206c0b2782a2b1ad1d19ace97bae6e491e

    SHA256

    db32e8ea1d91009ca25b79d7e863a08be56632641a7a145326fbfbf0931b6c79

    SHA512

    24ce75304e6b5508d9bbf425a68b1907bc51f30c168dd3b800f34e1f7fc1aee044818848d1fde40e7556af5f16f94ea02d19344bd9ffda1a6d011a624d6f46e9

  • memory/2504-0-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2504-7-0x00000000003B0000-0x00000000003E8000-memory.dmp

    Filesize

    224KB

  • memory/2504-11-0x00000000039C0000-0x0000000003A21000-memory.dmp

    Filesize

    388KB

  • memory/2504-32-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB