Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:13

General

  • Target

    ead3da29f7cd9c0296638ec477309637_JaffaCakes118.exe

  • Size

    308KB

  • MD5

    ead3da29f7cd9c0296638ec477309637

  • SHA1

    b59ec0003287109c95aff4f6bcb431681ab43766

  • SHA256

    ab42d984426449553e8eb9b1cbf0ae09566c8bfd746a551e6bf29f7d8d2cdbb6

  • SHA512

    28da5dde6c2ae41979a6ada4692037afdd89baa87ead9a08876d3c1d0ee46dba3c34e39255c631bc736b5685c82cc223573cec0683af1b3d2163b5f17a275997

  • SSDEEP

    6144:avmkOy/MkykmmqKZ7pSMcEkoRagPbq7qv59EqZ63ZD+qsE:ymkOy/Zytxu7pSiha0bKqgqZ6J3N

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead3da29f7cd9c0296638ec477309637_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ead3da29f7cd9c0296638ec477309637_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\is-29NF0.tmp\is-FGFUC.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-29NF0.tmp\is-FGFUC.tmp" /SL4 $3012C "C:\Users\Admin\AppData\Local\Temp\ead3da29f7cd9c0296638ec477309637_JaffaCakes118.exe" 81486 52224
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1532
      • \??\c:\program files\internet explorer\iexplore.exe
        "c:\program files\internet explorer\iexplore.exe" www.xiazai189.com/new/dd22/default.html?from=fs0001
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2472
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    843ff142ba438e9ada672f1a8b4f51e3

    SHA1

    99bb0f229246cfb648c187db45e4b33fed9bfa83

    SHA256

    9d6734d73b35e38124904136e0a287d6be20a5aaf963ff21b97aeb0e3206ab3a

    SHA512

    a6165b470867f348b1b0a2fc0f00c9188c5d950a8e101225c71d25c1b934eae269729e6d6443f971f3830f6b5b192275646581dc5566d06309e08284127071dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30550ae2bc1aefbd9b62f421cec416b1

    SHA1

    e83c8a1858a2392baa149dff69debbe6fc36ad2c

    SHA256

    28f56dbb0af3ded5f5fcdd28632c9b7cb959c93095bb62b6d8962257dcf6e84d

    SHA512

    f33657d0595184f5f4928fd285f60e39881e15c466f29c92e51646a80c403ab8e26808f7d7d7d1db082101cb3a5dda89098aaf2cdb7f367214e27c703824cfba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b03026e252f6e563e1771e935e147b6f

    SHA1

    b33cdca9bc57bb20f6888abc46d54b432c8640c3

    SHA256

    ab9df052187af9e686f1a799c8ecd32a2a323ee9d3e51c15ada3d9f2a512a243

    SHA512

    577a7088081c4fe92b88e941368acb5a242420354bb70adff68d826cf81ba245f0a2c71387b001262183b6d25b6dcd784fb82d183e863157debeb8696efd0be4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f5dfb69cac520d6e287b39a61ca2004

    SHA1

    9dabd1c4b6697f04610c564a85064a4249f39c5c

    SHA256

    b6177b0a9341b1302d81a4294a7cf6500f491ba7741e9b72cafdaf627a84471e

    SHA512

    a101d3fa80e60616b715f5d4a0773352247a017f747d3db21c78f4e37fe8752d8e307fca40ec7ebb4e901cb82f23c2ad95cedff38ddfd96009b22f4a73249110

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff12dc207193269e3bbc58c964c31c8f

    SHA1

    be8a2426fb274820fbcedc23e39deba3765239b0

    SHA256

    b721b544240f602af81863ecd3f59546512ebadc1232da8d14ddb8bfa087d0cc

    SHA512

    801865082210df8f82c36c39998c951937016d5f5354c000cd63edf300a560367a7e8814d8a596d34106212b7c1f9e14c776420fa9cc464eaf7f3b4f7951b7f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9ebd9c832bdc8ac81c5345822ca8951

    SHA1

    1e377a792d0de7d0260610a291f17bbefc064c2d

    SHA256

    5c2a763bab8c80b1b40ce2b31e16e0cf7eb483032a21cfe8f5905a9bdea6faf8

    SHA512

    e2800730c45eed6b3650323bcd14bc1cc4a783dc77697f4bac028ece69ea98b6dc1e7199c5b55e23866d6df5fc980764cc695ed49a4a95255e13dece06c06abc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfda53b32983bba6854fb2b98789cc55

    SHA1

    63f682fb30efe78addc2beba7c2a6d3edf0a3cb9

    SHA256

    90750c10d58f9d95b06573d3ba9f7f7e5eae89a5f860adc432721efc511590d6

    SHA512

    9775c3b8f0c6947affb7f735068f0a22b87f5eb1b10b62f3d62048aabec15b3fe88d5b11e1065669124731b025c4fcf10dd7f4f3bd177c12f6a52568b08a1d41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    475c27847068a3e5c00c866e2808ab31

    SHA1

    d8c4762e5e04cf3309b290be894e5aeeb41a2469

    SHA256

    b463fecb6a02bb1907f5174ebfaebfd04e66dfab3f1bd827687a81c872486fcf

    SHA512

    4432071e49ca32253b7c617b03a12aa853319323a42c9bf3e563714321ca669b9d508fe93394c02a3ad04af0097694cc07d2e921c0134101a9afab296d66c6f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79b5c21127690fe4db035e96a76058b4

    SHA1

    07b055feb415b470819378a9955716a659ab22d9

    SHA256

    eb70add34415974b254977deaaae49090237b5879f6197e2518fbd2d6b6d7ca0

    SHA512

    a3cc312a8c7788a52d431881adfdb3c437f84e1808daaca0e3d0bc5fa14b0a9e1cdc01c3fed9e0f22176176d0b098889d24f8ed9aba2de87f803845e95d0e8b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b428dce41ffe040f89c67f9c623905d3

    SHA1

    0b9f85ed7ad4c1a86a07f3ad2ff7dbbe1f1357ab

    SHA256

    7ecdd4f822d8df583832c0d5e77e27bb7e30ff9351e5426e7b04a23759392e24

    SHA512

    d9d8cf6eba0776f9df017f554c14f8825383f8dfdaa72bf286d60ef111ddcb313231e2b575858220a3765d128c71ecc08441177efe4572001153c8db13489978

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34936f6665c0038a45b82b83841d79aa

    SHA1

    30b8fd9db38ab60483e047e0d1645a94b3ab6268

    SHA256

    abc41c0fa1d516b96481099de790f6e226efadd81215df23d38f0d0ec975c665

    SHA512

    2f94d5ac4527baba142da4a07475deb4743339bba4fb3ce45c0a0076f07a45802de57212f4f70fc06246e806337a520d588ff8a3c1adbff5e429955e9d7a7bf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a498de1d47e1bd7821ea1902733bcb97

    SHA1

    83290ea96ca3825384a989b80596c3b241de5898

    SHA256

    db75101e00adc899b9bb42718256a84e6ab95a88ab52852446eefe026cb50bdd

    SHA512

    c98038e6e9f434418c5ad64694ab6cb0561c358fa6db8eba359516e3ba7ba4b6d86ddcf0ebc822e91face693802c768f29d076f70f87ca267b6c27e6bf2a939d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daf9d478bd2e0dbcad219a8139a070f6

    SHA1

    5c95ae782d7c6d8ada29e469431d25856d4458ca

    SHA256

    0830d1342789066afcbf9ceb81685ff3f408446f841a49f767571bdea6eff376

    SHA512

    4fc033dd5bdd39a6889da940c51af571dd13166cc2fe0b929ad4c5693709ce1d1c9cd0525bbd3b9bfa0e9aa24e02dc013904821ce6bfb6b68aff359653a443bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3276b17ea83e31f3f183162c2d7f406

    SHA1

    b05dd7c2aeb1e4fb34dca99ac6fd4b8b9e43a27d

    SHA256

    836e407643d3e25cb9c0332c111e6709ff91498fdecc5f910928e6b4d7798caa

    SHA512

    85f07914a4cd9f7a86b2a5136238ead95e992aaa16d03b9abe4616f2acaf0e9b74c830b18350963b370e728e32489a8be228bc29d9258c030dc990e45383d6a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92cd08f548a661f135ffbf841072f510

    SHA1

    b37a083eaded8c2dfcbe32bfed8b72fb54307303

    SHA256

    b282cb5f6fbe30b5ee9fec581a41859eafc04129c0769fe40aa841a128918eba

    SHA512

    da585a3d2c97adde49428d53db9f95bb8b5fa935d91ea134bdc24703cdd49fd57ef276bf177d3fb68b1aa81c3e5f77bc4efc5eb7b35ae855640b4ab6832a11ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7000d788a6675d839e0d522f9116f673

    SHA1

    fb5b9de425c3f173d7572dbe3fcc945db609d72d

    SHA256

    228e1d0911722b0098970b6142ed718d286882ea1a48ed20827b19b90f4e78ba

    SHA512

    176a95c1e60fca7b123b6aba3e321952c18838957e64bf1f8d371b4390545477448263331b908eb961291d459c2866b7aad050582d6f7478c6b3faa5e74c9a86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    959bfa74800cb141dbc11fbb2256e700

    SHA1

    188ec87184650a2def819baaf549972f5861cd1c

    SHA256

    5c5f64d847b01953668badffe55bd22105d296a8d8124ba6afec4f843c11d8b4

    SHA512

    6364ca8fb79ebe25b8518a389bdfc2ab71f593ca14fc3ed1c3da913a0d427072ed34817a9ee0615cee593b02afbe7beb4a46e7a216baf6e48364eb967fd330e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3051c5916e512ebf3830475294d34ac9

    SHA1

    a3f2e5844a0605d0462d0953d4ba6bb43102352f

    SHA256

    1db237fca3f035c35771e6d08bbfe6e3260cc11ee3fa4935da3ad28db9d044cd

    SHA512

    4ec2089f07d12f4bcafc3b8e7bb0b20aa41ab615d8e50863996708f60f733a56eb33a10c6f458dd79a49e328d1ea85d13dc8eb8d59e9252debb0c5aa3182387d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5f0e30870adff67cba1558fa6b46e3e

    SHA1

    ca9c7f51b26c78a897cd98d13416780b2dd1c6b0

    SHA256

    7c9cdfac0a0cc5771c53fd1c24ececab21c9121bc206797d27dee7d72c6e22ff

    SHA512

    12ccdd8737ee846edf7c5e6dac9505c7a40e88be0ec399ef8cf42666cb7939324f74534980f5eaba3a1742d78b7832f8677362d801dd59e6d2790a7dd401a229

  • C:\Users\Admin\AppData\Local\Temp\CabB148.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB1B9.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\is-29NF0.tmp\is-FGFUC.tmp

    Filesize

    652KB

    MD5

    581bb44526a65c02b388e1b8a83fe86c

    SHA1

    dc387f115977b5fb94d9c9084f33a1c231b50acb

    SHA256

    385a9bb48f5180984867f3bff1d327250d22ab4399137b343be291c370ee3699

    SHA512

    aab4cb6dd5ad4ebfded18748c5cd1a4361c154459f36a4cb49e32855b6866f92d3f065cd9cafa16e621a4216bb176f1554a8bbea7fd458b317eb1ff4c3c2bea1

  • \Users\Admin\AppData\Local\Temp\is-ULV63.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1532-16-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1532-36-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/1744-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1744-3-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/1744-37-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2472-38-0x00000000031E0000-0x00000000031F0000-memory.dmp

    Filesize

    64KB