Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    ea7beb0fbc9ce99b69ae2d450d2efd7e_JaffaCakes118.exe

  • Size

    526KB

  • MD5

    ea7beb0fbc9ce99b69ae2d450d2efd7e

  • SHA1

    11824f8eee9845a434134bf9b03363de761460a6

  • SHA256

    73454dbb6806c488d74ce3b621dcca5616a67725276e4230896a670d44a8af5b

  • SHA512

    5902b0778cfdcb18d6509c76cbd1867e755d0a54766eeae92845b21344243de54651f1534e64a8e4d7291073ae3a2b8c45babd5c6d937e041720e4640677764c

  • SSDEEP

    12288:xp/15tWJvzR9qHTyM6dn7bGIbtgiwkiT2hrX7C7Inp6gwCXXAw/44:T15tCz7qHTgdn7XbKiwH2lX7qInp6ghf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea7beb0fbc9ce99b69ae2d450d2efd7e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea7beb0fbc9ce99b69ae2d450d2efd7e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.flvpro.com/?aff=3090_generic
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:812
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:812 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee7786ce150455cffd6062a5cf472542

    SHA1

    e7cb7edf0ed7e509672fb0cca200dbedeb00636b

    SHA256

    599b405c943008c98b7bdc4919bc0fb2417fc3243a0e5eedbfbd73f5474a1ff6

    SHA512

    82181d9a44b80c7f7ade35de4497ce4f89bde1b4bafa9d26a8293d61bea8d283fdc1306a7c6b52b727ae9f1a6c91cde603e2e50dfc2e84b18510c1e7b32efe71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b734827833de43415ac06b1f956d5fcb

    SHA1

    c592ee7fd7e70f98171801f96f6ec80df1cb948c

    SHA256

    008e29eaea486809653803608b8a51912278071c3bb4ab0289174ca26897dc58

    SHA512

    964429372b34c24d677175cf0c44d352412de163150c96f86a2e4bf1a766d90757116f013076790af71a22978fcc958c57c7f2b6c215615761097b5e5da0a91e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77c358d3df86384b2ec6d74bc58325f1

    SHA1

    ef13f2ba9f59aead407c6f790350372f54ad0b55

    SHA256

    759d024b45b981f9fba39057f82b2e917787d56f38f2a443b95d4b2f0abba291

    SHA512

    9f380384f3f36376d30653393605588261919bf8cf21dca0d1e0c1b6824deb9b4d22be90cb67accb4e64c74bc0afe42f2b7e2ba142131ea37772aec930be2c32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d99453815601c3775a1a818e2eb4b556

    SHA1

    59b6d4d8180709b63efea403dfb7d0f35120bb8f

    SHA256

    689a5a9181824d19aa82c809908a7fe8a994553725e9c3dc86fec1619eeabe6b

    SHA512

    e2e5a78c1bfceb2f31e9f5f603c49fc4e48e8ca887a9ef533d9b2cb2618baa05f968ecd82543615abef4f7bdfa0e0c865f8ba4528a929f899547e187c076afb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f065666b77cbb36480d7f8ef00d1ea5

    SHA1

    b6e9f3af991f578d757e523770b095cae263e282

    SHA256

    895baf431be958b2a1cb87cfbd01cb370fd4bab6cd074acf7f1e4d62196c2c51

    SHA512

    4bb85a26073755c6af34992df58ed92b3f55817c63da8e3ccf2355e8d12cc0edc558a80253c003466df4f9b6fc51ea93e5dce5deb8c97f39508ca070a5ff568c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    22e9d91c277b6945b7862efffd5ba8ea

    SHA1

    9421b3102fe609823f961647d08e6ce4885f25d3

    SHA256

    2b4fdaaaf38ad0ed052a50653b18ab08302a6d8e39d99872a0f4c80c4174e5f7

    SHA512

    cf9d2d8387b9b0f6c8ae28bd4835c381d26870ac19c89843e12bde89f8505e742eadbc12fd3f4d3abe954fd6187d83939700248a9ade52f0d57bb94281349e1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41fbc40c922d3c1391f55292ff6bac7f

    SHA1

    dd886cfdf50404339ba083474a2b6b5795584004

    SHA256

    b224298660aed9a531dcae2f7d52456a6e9e857fa35fe6934794cab8a291761c

    SHA512

    8f89a199f974ed9fe628bc9303a75e14eb56ca7437b01cbef8787fc3d05c28aeefa1d4795f6b4369a601f0abadcc11dae0541e13e9e6cbdaa6230ef6b2508ee8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d93309e26df7c0d17c9a6fd41dd94f5

    SHA1

    0151463fe7d6b0c96849e85a3f1ccfe640006850

    SHA256

    6875505a6c6c192aca9986d7fc79169963f3fcb17aebf00d3af73438345dffbc

    SHA512

    1ae246478e81071bfbb6c219cf186ee81f4059ab5e6569a34a3babfa831cb8027461ef311b2f65bcc4198975484c79b3c7936a23a428fd08fc92a451ea61ef82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae7c127e69eeac8851eea96e567886c2

    SHA1

    9f2a0fdc98df8d2e282dd13a52cf5c8fa6d56eaa

    SHA256

    4342b5c600f80b2f9b662cc2b76db527c1526569f82e16f6de0a8246d36365ff

    SHA512

    2c88a6410ee70cd147eb3865d3300cbf1837ce128ea0165883d5bb9434b919c41adaccdc40b1b172168b8dde600dea9c903c57499c58b21cc460e2f270be0352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc67f024f85ed91303c301c895ae791b

    SHA1

    a9a4f62317cf21d50bd275356f8e896fceb342e1

    SHA256

    349207f61e2fd01921740b80c47648f6bb76fe8073415e7b868373a706dc51c9

    SHA512

    9866c3a729f9105c49ba8f84e5003091261ad4865b9f6abd2a79fdd5fed1b15dd646040a94f5119649db26a543b50c67dd7faa2392bf7f8e570dcbeac792fc22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4aab886ce4915adb3adb5cbbad70d32d

    SHA1

    12407ddf782379992ba0c6560f75c7f436ff68bd

    SHA256

    1d2f46519b72dcf57a8fcc9e331d73afb5c8b2821deb1a7c338ed1e39ae71808

    SHA512

    a5d7a1f09896345018287f5d4b465aa4d7be21914c9054c136db53eabd14761ba015ef49a541bb873724a9032a6d028bcbf915e2b9001a1bad80b0b0a9aed238

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bbd334280dab3a75747b30096e84d40

    SHA1

    1af6f16bfc0b07eade29b0f5b3a2df9b2e9e4175

    SHA256

    d31b9b1191bdf76023f41df254ba668d1cb44a49150562298e673d53bcc19414

    SHA512

    5b43b019bba39b2a6c54b081ed5fc5100193321c79c42516a35065fa97ca6d71ed9c09f32624ae11f40ca90a75d0fd1b4e1be41f3cadcc36358ee53c68621f5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c66b7a284181150d83f90754975fd00

    SHA1

    206a477ad765d878076b1e4aab2904c20534e0bb

    SHA256

    3c51a4d6a7ca11c7d939be14345cda67331bed34ae547cfc22958d43a7a036c6

    SHA512

    c948b5e07ccbc1ab6074c7e19b159cfb6cf6d6f35b54f4a07e4c86d337f8e6d4a9e9b73b8ac7a90a977bb23170c0825aadada8b8eb5c69d8e37062fbf527c9c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7ec6755f6bb8610efb35b78bfee5af4

    SHA1

    3fe770db680d2d84002307045aca74b11fe5008a

    SHA256

    dc3d3d67d1ee139354561fb71b006d41b1be71fb3421633b9e849740253e21d2

    SHA512

    c1017e87ef547aa66db40f63546dc417828e6be20a58d21c714cdfcc2ff60b143ad634f783a69be6dbc7936b1d4486d0eaad573ee2dfb402206884aa521acd13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c453c495de9ac8cfbb0a9d16d88c6c7f

    SHA1

    830da07c9baca625bfb598d4b2c3b207bdb34ade

    SHA256

    b55f9d0e8880d6421193bd058f93b3d3fa7cbebfd4ed4061034cd6f5f7189c88

    SHA512

    2af1f0c663a91455e0f7f484634ff937a9f6af2a0596331055d49bd26219f3bdd96d72a60dd6e5c50a1454a3311542be373cea707b6e9b79320eee673c4c015e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f21fdc86df59a04bff34073dc5b79f1f

    SHA1

    37aec5d1d8eaad5014632ebb856d97816881e94e

    SHA256

    fa03ada1613637cf89ff8204d78ddb78e2e00a693903f31c10ae6ead1ec462ae

    SHA512

    b45ff1d655885fa175e750f45260911efe9be22c890e553e95c8d356a6d57ce8c6ebc56fb3d6a8c363371749bc22f320998b7b89eb56ca841b16e9be46e71a1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f12d9bc4fa019aa74bdfd38a11358bb4

    SHA1

    55088ed9dbb0981e84a7375d5073bdb973009467

    SHA256

    081c1c3fe8cb7b627515ab215b302953a4a9fd485fc25fc8482c356e7da44929

    SHA512

    0a71abda19f0d89d7aa7cc1e8a193a8f62b17c6afdc8993b26d14ce76b3243d2fb8bb109ac9a0eb1f1c6f559062ef9e46baa1efd71bdf372242f0bbf40d63251

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e2cedf79df11394451040be0620c14c

    SHA1

    e92c8c225aafa23edbb1f39ea9f01b0283b75bde

    SHA256

    538e75ce0310ea08c952b62b3c4744ccca96760bd336092d7d7afb37ec565122

    SHA512

    ba9ca2508de6d328836054a2e91ad3f0757759233296b2816667a530663415d93b9231e1dbdc98b6f023052ed9208493d978e8c28a15e95043537b394e4149b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    255d9d442f1c7cbb2204f45bc1bd1afb

    SHA1

    f0b33e0a8bc9a4b4c5a7b6fdd568c04a318e0a1c

    SHA256

    e7f02e5c58d72ec9cf5710f123ebfa87f657155f58b7ed62bb9b5ddec73344ae

    SHA512

    fdff9cac20e0f34c36e859f1a9dee5724446868176939f8ae0184731573bfb73d338b43501b0bb65b16f74e9ccf7e1814ed11f659f76aabcc19bcd64de0d98f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d50df8cc81420f8d0d13a73ea5fb80b

    SHA1

    37ebe9f867325c68660881a82fd3bcafb2e8756a

    SHA256

    1786195743716d2dbdf5bcaa657551cd0ba81a089eebe1593163d9a491f8ca57

    SHA512

    3ae4d7b5ba658dcfd9abbfc344580dde3cee90b106047c9d414749a8d5dd1046ea02b0dd8a3c6c0f30b905af84f4dea8d39b34914a46b5ba21d3b930031ac323

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fcdec07983dfa536b7fa100102dfb2d

    SHA1

    44bd89ed50ff2e180def6654fe6e1be366c1f282

    SHA256

    3c429aae6f55b8b6772bb83f56729e1a8ca7d9fed3786570737ff02e023d1d78

    SHA512

    bc2d69db91c9686a4f551e12fee1ffc043dd3ba547789e7e63b422e609788ff85f104afb67d79bde97dd2e8942885b86cb3f77d390f747a2e2c7e7cb00f344df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6979e8b9687d9a4b091cae754dd3b14

    SHA1

    0b50e39b32e387757e659e37341145082e55102c

    SHA256

    d62a16c742f337fa97599b9affdac9f87fc13ceba355fa48421bfcd1d398773a

    SHA512

    c8aa384dd9331b0c3ff52dcd35740e52cdf08933bdbf94a2764c5483bbd02d9ae033ea78268c650281ef476ab8ac38c44040813b445e73bb1eb36f026ee30e68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25e34fc3c8b8b5f6821b614c99b14286

    SHA1

    6f4064f80a2e785760313795b26cb518bb19be7d

    SHA256

    379e07d277566d4419040cce850fb944c2f5ef1ae89700863e9d621caed8d515

    SHA512

    85b33b5ee9861b8f57b9c25e188eacd4f6d627a1154198bfd1313e5743cb44e750d8a0b0ef5b782ae5e99504dc27f689cd8733bdcfa6dfde1fe65b7c5ec83cc9

  • C:\Users\Admin\AppData\Local\Temp\CabED4F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEDEE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nstB7FB.tmp\tr

    Filesize

    1KB

    MD5

    461a952164343965166039e1c151fcca

    SHA1

    58481e652a037ac577721ace507bbbeb99064cae

    SHA256

    ef4037215e09f38ac21601e40cabca26bff3f75e86f522f671c00823651fcbf9

    SHA512

    b919ede4c4bcdc2ea6ee1ff72c7b24f4a20113045be7f43c462a9fbc6d1043784fdc5ae7b6ea8d5212c10a914b5586ea7b1ab9d7c7a9ee460df38bb478106135

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\69SYIMK6.txt

    Filesize

    117B

    MD5

    6d567d00e34573e446cd751019eb0cb7

    SHA1

    0f61618af87f5b47e3c662b62f304741564ab19c

    SHA256

    9dd35fc8bea5a48ce91ff21de24b35017495f02bc708590425550c142ea42b2d

    SHA512

    b084944c9a681abb6247437ac5c5af146c08ff7160744428492816c2707f38e161615fbc9c4df558454e1733a4f8d8fdb11cd20574a226b7e57670ab90a9aa0c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DPFYB10N.txt

    Filesize

    87B

    MD5

    df6fa351e90585f67ad04d9f699ab513

    SHA1

    9d0346d2b337f054068eee0f15da61b7c31ff7c4

    SHA256

    784237d2474cd30b22ad7006c3f7abf92e1a42dbad7a51e9fe3bc947519e2d20

    SHA512

    ff576b61631ee9304345c71070545d63ade0d59f71d1cecf659094ac32b19c93f8780bc3003ab29ca63792364d3ed715c296a668895d2c00b0bd4353e5753cba

  • \Users\Admin\AppData\Local\Temp\nstB7FB.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nstB7FB.tmp\blowfish.dll

    Filesize

    60KB

    MD5

    926e4475c00fb5254c32c876921b77d0

    SHA1

    8a55bc8b6e49021a4abbd441783c41d5e019798b

    SHA256

    d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8

    SHA512

    53f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8

  • \Users\Admin\AppData\Local\Temp\nstB7FB.tmp\nswebgui.dll

    Filesize

    157KB

    MD5

    afbd534002a046624eb68a59c836e77b

    SHA1

    68d3ff7fb3d9918f0b81a1be4d9d284b378b35e5

    SHA256

    712d1e92905692a7efb1550979b905aa8402d4b4aeeb264a4aee6c6f3307ee1c

    SHA512

    fde37949fb11b3d8b9f068d17a9236a88625263bc383c5f84efeec05aaee9230674e8d99541337b2b0fe670bd2b275c772f65305720a5c005e62e49cfe225ec4

  • memory/1768-15-0x00000000003C0000-0x00000000003ED000-memory.dmp

    Filesize

    180KB