Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:55

General

  • Target

    ea751206d6e924731566a4c48b136c64_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ea751206d6e924731566a4c48b136c64

  • SHA1

    6c85e978339bfbb42dcdb3d5421ea3949213dbaa

  • SHA256

    e6cb84f4156213a4db248b87950fd95d5117b5de73b7d3f1b728707b44201c26

  • SHA512

    458a5886de2e5047e354c6d7185a97151b7441b72d243f7f4ee5ea7fcb64a73541510137b7c431ab9c333139cf5ca3f813913d5e14e9b3d8ed8f91fc5b9bb144

  • SSDEEP

    12288:3sM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQCB:cV4W8hqBYgnBLfVqx1WjkPB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea751206d6e924731566a4c48b136c64_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea751206d6e924731566a4c48b136c64_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://search.searchfff.com/?source=Bing&uid=530544ab-765d-4d85-b504-d0b5c300ccd8&uc=20180109&ap=appfocus29&i_id=forms__1.30
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c FOR /L %V IN (1,1,10) DO del /F "C:\Users\Admin\AppData\Local\Temp\ea751206d6e924731566a4c48b136c64_JaffaCakes118.exe" >> NUL & PING 1.1.1.1 -n 1 -w 1000 > NUL & IF NOT EXIST "C:\Users\Admin\AppData\Local\Temp\ea751206d6e924731566a4c48b136c64_JaffaCakes118.exe" EXIT
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\SysWOW64\PING.EXE
        PING 1.1.1.1 -n 1 -w 1000
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d198695084df99542d099d6f0b5a92d

    SHA1

    3bbc50e02e6b726cf3dae98e34b0cc4304bd0b2f

    SHA256

    d040e49e57ff55da838a5a93ecd0027ded2f9d77bbd320f1741f636288cc6ff6

    SHA512

    6158c35002450bb47dfaddc87bc7342b6b55e322f9db41a6236f1cfa1c83fe30a4fd1efe73f87d8abbbfb11786a983ba858a599c305babc8d6e3765442052a0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b8f829f60d583bb9e689cb1634c7f85

    SHA1

    782b5cee5e91fbbf51eacb533a7ba8a386084432

    SHA256

    d33e9992e1fbeb5b22b73027f78092fec786492fef644e9dce7ae696ac0fb243

    SHA512

    15205f6a33f375f2529eccc8c895508a87776ba0a9c70ce0ceb67bb9d125210ba89bab1844e00506d81e591ed30d92bdc2223fea45a9324b5026a284b8659911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    921d57f5137d4ce66fbca828870b22a5

    SHA1

    572bd09b37738113f0cee6b32fac60a5955c9984

    SHA256

    d3ce0f46391c4a2f3e77325c5037760afdb0ed29a42d880765134102e7e66b75

    SHA512

    eb8de1179cf7a45e80155ef14418864aae8502a71662c9cdbd37d40430ec5679b8e4de4195f46a70a5fcbf7bc2dc1750fc9dff13b838b55780d378be1ae35057

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4867d4a8ca44529a40690a4a3cd910ad

    SHA1

    b8c3d03cbd941530d4e0b5ed8605d821de36b9b4

    SHA256

    17661824c6a78e1f6fb12c6694e2ee9ba9f4a768b6d9051d0fcebd50f348227e

    SHA512

    ec8b667c9415bb7ce5c6036bdc9394ce959e0fd34856c02a96b5ca1e160e50160e5dbaed72a54cd0bc53071d08e1b015ed562659d31bd17a71ab594222d1ca44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ab1aba85ab4193facf42d2ca3496cff

    SHA1

    4efbde1d485ce1c24a3db4adfbf34f0f40db50cc

    SHA256

    ea241f1b627b969df2acd697bc974ffd4ca4a45c0a19f1b8c089f90b130f5d37

    SHA512

    b1f1ae3c2a38754901eb6b15a0a0c74da8b17c5c9ea552298f7c2c6dd6473fc4637b2d6becb45ff838e0e28b81da42d8918aec6ec12cf6b0c76a844223ead41b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4075de5e6020bb1324cc9ae33370964e

    SHA1

    2d185b2abecfb131b72af128b6d7856db7426152

    SHA256

    414ca6a0671afa17de6029a710e52c64dcd00d5ce27ff70cc1398a7734e69306

    SHA512

    626c9d7e335d508d3154804c2c70ee0e1e22045f274ed8342e9aab0500d211b467cacad4fc9329bb32e5ddaf0273ab82c5cc262d11d221c2f83f41b6d7a7905e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f3f45f915abbf1fafe494027045080b

    SHA1

    66b0d46063dbc9ff9fc10a11db615e9daa3ea135

    SHA256

    1a9a9e177abf89e60139fbbdb49aaa1b014b6b99a6231114e639363d2fd440e7

    SHA512

    98e8a528f171d714e6ebf4ec4a94ccdab737fb1bab32e105859ae783fb930cdc9a1fa1ac1a318bf1a3f3173ad1ba34d16b30605a59f35b8b9191e529f7942fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6fad189d31d1dadb988e9f0fc3fb561

    SHA1

    536c53f8de5f6b5c44310bbe47f64cfb63a1c8a1

    SHA256

    4115543e5fbeb713076bd357f34d8c933caa0fa1936a694ef835b1de725453da

    SHA512

    e4a6f7344ace302770f6016ce299076bdbddb24bd10485780aaae51d96cc6a9a83b9f7ce89d69eee65ceedb5669d5cea925190d4659b1330281a04adeb0dabd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de91933ac4416d73c81bc8b530596914

    SHA1

    999630c28ca52e4ff88d174820d87aa558ff6eff

    SHA256

    dca593b7fb2474857905588a37fadd1c6bac543ca136157b807bef99a4bb5d38

    SHA512

    234a3112f03b7fd97034394f786451a90a44954a5499f068d35f2a079e7c6a1c686faf005d957f25ad759cc81fe1b33d304b218976fd37734c48b70fc02b78d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c76ef299905d0aefd22fe0b929ab0289

    SHA1

    7fd230324ef6261246af5e983ec2cc2be9427a8a

    SHA256

    0ed304987beb550bdeec8ce788dcbdd88ca8dbda0d42ddaf7a1dcf31ca28d3e2

    SHA512

    541337b775b50babf4f2d51cf6323e281391e733751b3097674aca5232ec36b676cc54846a9e6f81f0c3a1971f9eab80eb8bd159ce2f638821a4314a5172bba1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03fd01ae9d0b84ecb2397b77323aa73e

    SHA1

    298f5b32f43db398af2b8e77d25ade2854c2b77d

    SHA256

    a06c515ddf2a3ff7f2f6ed4332cc8408d0ba881ec92b4ada033fd3c52fc047c0

    SHA512

    0b183e85f4cb37999c90ca6b99d6ac34b04fa934c12abd6d7a9b6ab634441172d2fd0145f899c79239f5e19c3c840cbf35f0c2283f7ea1909252b25f04ce530f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ed4b6f88bbc97f6fb9e09fd20eda684

    SHA1

    d7f82e54accd7b319455743805974ee87fb70203

    SHA256

    10c7119511d5916d8e87ae7563b21421517321b7b79b1a0b3247734d4fc846a3

    SHA512

    8a4556508e9e9de7b84f93df6432c1e426434205d60ba5db276e925aacae61b472c93f00322ab07d0a43b6e0c6e242d20d00cc516792b92453123f98332fc55c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc6a47fe002521a55f9dd6b505d1a56b

    SHA1

    156856d3e748a363991c12f38ddc24d4a143fd4a

    SHA256

    9d1319b0ff5010422ed342cf28b602b25a1d94226c42b298d934e214447e5e4e

    SHA512

    7ca64a5909b9c16a8b759193506817377b4d55088d653ea761f5e1c1a461fba3d67888904d38066f53baa5d2827f7503935513adda4cd18657a6c8f2659a1c9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4cf33a8c2da95e745d53f8be7dd10961

    SHA1

    1f2b1bc1a174e9f3e4641c692569585169f1a9b9

    SHA256

    98f1930d4344c0a63252094c1de2cdbc6f6604c48869b9ac9400cf31ae7125b3

    SHA512

    704a4f39b53c1cf7872d1f66dffb234539e1a4d6da19f29a0a14b26400cb554d5396b7cec93894e51fbb397b8d32c766a12abdfce4bf0482ea6b647b547b963b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a8f2f1a8eae28b12de3a67a1c2705a5

    SHA1

    116eefb1b29ffc76be77058a0e9fe09811ed164a

    SHA256

    956f0fa4ca770191f4e4976ed6286ec6007a71f6af6560093071eb2dfefd0d53

    SHA512

    2d4aaa69a387e4e6adbc0076014d10f452b08815e467bde2355f674af872caedfe5e0da42dce53ec6d924bca7df21600af76d49eead1990bccbb4a9b80c235a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f32ec429913c412ee877976c047fe717

    SHA1

    7bee8f6576a0c4839fabdbf9c391e656c2928a23

    SHA256

    e0101922ffc6cf7dde10821019b26e017e4f84ea85e4a45e751997b8a04a3e4a

    SHA512

    00bfb4c6bc8ed6cf17e2477c13e397dd6d9a2afc8c8ae546a6e9c2fdb7515402b9ea47809a279cb7247dc91763358a656af3481e9690747b287638354b3c060e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    751ab121267c6dbeaa0ce07f8129ceb8

    SHA1

    e106e37370b93f55679bdab0b54b7c210692312f

    SHA256

    7d14e4c95370f506eec95eae85947f91d60e1730714cd4dff5ac92f892473208

    SHA512

    258df933992a6a854ab6d1451128a84cbeda485721573980b8e1c9f48812e6fb808a58b0818d862e851cb8ac6f7f8e92e743fe3942da23dcd30a3b13b2f3b9c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19976a4d1cae8e0c5bde03633202c115

    SHA1

    a365c3ff3c4f1be3ccb26b0f1f1076f8fb130d49

    SHA256

    2e6d0b22d707b31c86a066801eab267ac1ecd21e363dd370a4724e30f7e98c28

    SHA512

    dd7003774b9356d839f536cde8a32eb5fb32804f07561d90b6b52cb550fa2b1eb79b768576bffbfed992879e05a29477af77aaa37c74bc9fdbc8236bc69754eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b0c58dd4bb102a3d68e0b37192f9af4

    SHA1

    9608aa05c38cc31d8a660fff1b88ac8d3ee4c823

    SHA256

    599557e1b1f27cdc0ab3d57855d2bfacb68a89ae15c3842d4cdcb0f92902d2f0

    SHA512

    87156b4cd8b8898df8344e2d17e161e5848e497af50c268351f3362642e76b067d257a087dd13faba4a5e3a6b86850842db5e2bc3660d127b3ad3f0e33882e45

  • C:\Users\Admin\AppData\Local\Temp\CabE9D4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE9E7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b