Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:47

General

  • Target

    eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    eac9ca5064c637285e9eb99757240ec1

  • SHA1

    b43b66954f9c062acbb61a84515c5d0471129660

  • SHA256

    a648919ad2c0e4dd5753d91a8abd689166d4913c34a7928e4e25d9a061dc6e48

  • SHA512

    4557541087894cf8db0c22e747c0c155c1023a1db8bf3353688c783c76675cb479c7bc21d6e253e41cd1a1404a2bb0a28e354a563ed13c6c749787f5546330d1

  • SSDEEP

    6144:C6pcJfxZ4YdrxizmDoZQbXBnxkE4SHHZe:CNfhrxizmMIBxkEz

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Users\Admin\AppData\Local\Temp\eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\eac9ca5064c637285e9eb99757240ec1_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2800
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2022f77f5af435b06db36b20611a3bc

    SHA1

    b0f8b5a9f2e7a1fea367e2c3be2c8ba4db2bf337

    SHA256

    ccbee3988d8af5fdf988386cf091394f7311f3901150e29777681bfa67b5833c

    SHA512

    6f4d72d830fcef9d71e54e42394d2dd5645906adbd6ccdeee79dae81c450f7fc079d0b4eb9199346e15fd3205c6b4e1b18e68578fa709286c4525af13823e3b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3050f206f2fdac25d08851f25fd6c68b

    SHA1

    947da298fadbdbd191dbbafd5d2c171cc63a2a41

    SHA256

    f5f7c5ae47e3d74eec1c67e5c192bb2633354b0285f47c99bec6e8d30ff64169

    SHA512

    c4ebc816f48449538ec8bd9f2e30d457cd57e542d11f3a64b640004ea1a08dd142bdd627e9b420e0bef39205b8070cc1d3927939876fd928420207b285469e81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01bd470f1d0fc34ec41e5892012ef2a5

    SHA1

    165e149be1142360bf0c1720a3fbfde48a7ea762

    SHA256

    2276e4e4bd5a35ca86853270cafbfff7639d83adf114754c9940272bb0f9e279

    SHA512

    52209299f5285112300848638bb011af6cef9ca917368b62aadfe318ee26b8d739553cae4accad3d9439ae902599229c3aef61e5ea56a37810f0d0a014107c08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e26fb21d8fd14717185ea7c05a8f4481

    SHA1

    ee7e3d91a3effb2848a0b67326e6ac47bfcc26d7

    SHA256

    d7cdabf3eea52a7e9e6a6a7a4c4e425abbeaf9d6ec4069a36587e6b2f644123c

    SHA512

    d60594c826ffdfbf6573a1aacf890d36e9f1457ddffa566052a4168bb66b39d6e00a6ed2cd6160b4e031bf5f950d66e20ef0116de3bd6fdabcb50954f085d34a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8de38912c278e7756de21669775e9c47

    SHA1

    d28962bf05cd67e8ff86cce7aa02af9f901774b5

    SHA256

    a26f88ef51c0cecc0663d9ad2c44f3615031d94fdcb00911130fa8eec233be61

    SHA512

    7119331623be9c045180f7f0a8569520092715d77f16b6c82d97b0c3618cd7055224b5b541a1c66b1aed90ad5ba4902181d8dc52845cf1d34ad71ba4cfa7d108

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44c5df30600e4c03c0452d611716e9b5

    SHA1

    23d699cb88a6524ff4cbdd0f0794e3b47cc0d258

    SHA256

    ddbbf4535929f65afbf7708b2aa098b492a51e2ad9eaea7e7577dc8046117026

    SHA512

    d9db1b75aedd0d11e27212b2eab24f03d05c2c25b5a314e05dc6a63757f22075f8c48ec75b838f95fae5f443d5da0fa2c6754e195ab2e40a13d59dd0eca0ecac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88bdc2d10f4d7d280712ed1588e32aa0

    SHA1

    f70d57885e8acdd9bc4d49832baeacd257964de1

    SHA256

    dd2f4629c1304ae508c021362b687e92587fe34a90af6745d84e6bcdc225a944

    SHA512

    de0d3d54788b4148af95115d6429feb6ae501a9862ec5778980cc21b732a642c61a6f991cdda27250068d0811ca1734e17df340dc33e58a3c5732d7e36a20f65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a76fb0f3157be6063494c6a4bca1599

    SHA1

    0c4fdde15ddd5ab65ba4ef11dd29e6f286848b1d

    SHA256

    7cab34dc55e5aa87075af1c7117197b4bdda1424fdad18e4ec464e13b99846d2

    SHA512

    7b3d78946a2caffb9c666a10b4bbbf69446875276b7e6cfd905f87f0c99afb6da9470a3774616d3f67324d0465f68e2f28af3b30296d7f2a48bdde84e64b407e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13adecb5aad04f793e26fb704daa48fd

    SHA1

    5c912c175307da61114bc4348b22deab077ac4ef

    SHA256

    b82270254450c7a8e9dd5f821a0957cf7e3bf349a66b45929260058d4f5dad1a

    SHA512

    3c58b1294a0ac23eaba308f4e8ba4054e5877ea9be2c61cdfc30e14d91747c65402ce4dab192cb573778913eb5f76462ad7ea4ad744314a1fed9daaa1273d023

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c53a62d5fb3b7875e010910821a7f94a

    SHA1

    8285c11e1544ee64788b7f8f41c3d60621d07e42

    SHA256

    5b679da98c947ef11b8e3f94b6e2baad35357df16e50ab64a7b3f6e5f42eb331

    SHA512

    aafd520f5c51036f84745cea3070cfda296bbd1e3f400731685e436d162a94eed5b0618298516cdcfba196bc5b01b56503467d738d02e733fe177590c72ba452

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    978c116f74ae046db23798492f1cb4dc

    SHA1

    3376f8613b4488ed78eb16e52e716fbfd3a4f9ab

    SHA256

    e672b5b7805b7346f5d01f7da388b5aa0936f736c1ae106595eced9b737c3870

    SHA512

    7d07a21747766bb924ab77bb1c253c3abdfbf10df4ca378eddbd71e025720db4d8851886059c5818d3645e20b5d1a97691e1d2683311a0ffd2ce96f06e4d506b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    163b471e8c12b60593505754bcc7f24f

    SHA1

    4ce3089b55af5cd23dfe0e4edefa77177460db45

    SHA256

    c9e03bd5473733214edfaf7be7720a480ee5be7622570b2d22a0d53db28d82e0

    SHA512

    66e8356ee93f42ac049867fda6b6e4901d4cf99842b651039ec19d9d7e07cd119718e7d7e9a3ccca838c0b919be44f926e5f9478387273023a202eb521fd3385

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e1be71d571491bdb4e391509d4edfe1

    SHA1

    339cb47f7b52d6ecc2214f8050ed46d58250bfff

    SHA256

    239599071d40058b1779b56f371e47d5914b5582c13deb7dd37e04a98f47ee08

    SHA512

    6299c790eeeb48069953f4809e6a56c1a874c9ed42916f6ef11d1386c1499237248dceb4fc027d7ce546a7331eef618f31fb5bda14565625262cd0b506aa9ba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1936cab7f6077ec05f14a608f2b6d65d

    SHA1

    2fefd71a7965fee283e25772a9317c735f29c902

    SHA256

    730aab69796bbdb6f7e58294659ee088d2e74942f08beb6218c04a92e3c53f0d

    SHA512

    813e96927252859a1846a44a915af7bb0a1f2812b18bb82c2e2b6ca6f66c5b738b33aa77b2548538f41244faa5df55b90c075ccf1d90b3db0e8c80c4be851926

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f43c48ae64a0020f2954d07568478de9

    SHA1

    515e9c20e843f1a0f87459ba3a391df2c25c7f83

    SHA256

    951b75c2833255c22828e1ede95e65e05e31968f0dbaf977a6e7b4c397d2b622

    SHA512

    f80cd340717c6403375084d1eb0a68965e8cf6a2ec8d0518f2a92af72eacaab1ea430571c853c8a341a3bebeca5f62f90c17b574b8d23b7b89f1d7554348a68a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0572f222cf33d493a34dceb73ca546d

    SHA1

    5635cbe732689fbd0fad9f11ed25d0150fceaddc

    SHA256

    7084f61431cd9daf57d2a52c0a486115dd277ddb04e273d10775c4e9b1528366

    SHA512

    ba323328cc70c3ccc7274a321c71618d169309976e8f2c042ba75db086d986ae86e2929d7df884a3c22f6b71e0b1f813eaa59f921eb932de4bee9637b50caa35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7e67d4100cc007f3bdefa3eeee5d379

    SHA1

    c1e6305ac8ca6e4c91479d5f9ff097bcd2457442

    SHA256

    fb6d64de3cbb5b857324c0b1b368110788b67c38c24fbd4938ead883772ce73c

    SHA512

    39bd345bfd8f2ee2fdd57e4da2008f965038428555add85393a3fea9d95fcb08a08680616315aa85eded44982f41acfdfbb532f04496d8ed5b7ad80551af8919

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b626c5e6dcdde193dfdf0227d9e5a494

    SHA1

    04ada45eacca7b27701b2f9795ac1b0900feda7e

    SHA256

    4a577b4b13a7c0e1e84cd4ec41f4ba78a9edb9fc544d919b6fc80e2479f9183d

    SHA512

    c7779b030a1d9e7a4b574e9265add39f5c816bb1bf9516ba99277ee63d419a081e6c5ac9ca3fdfe7d5eec7c2f9127300f0d9025c4b439d9e5fe197982763776e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed47463ee282635a289ce54bf82f3f5c

    SHA1

    7f1bf2b458c5fabcc0beae1ea378418e1d355068

    SHA256

    704de100ed015fddf623b472985704ac67ec6aa20ac1fd6586e542901a177229

    SHA512

    c5038a375671e6c2bc83acae08dab1e16822ecbf8e8a6ee6c307f919207a178f3c7e65e3e9a30e73bc90d3e107c8d6ba837316387b816d89d81ce94218cd550c

  • C:\Users\Admin\AppData\Local\Temp\CabD395.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD407.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1960-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-23-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-29-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-17-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-25-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-44-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-21-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-35-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-34-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1960-40-0x0000000000380000-0x00000000003CE000-memory.dmp

    Filesize

    312KB

  • memory/1960-36-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2512-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2512-6-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-4-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-2-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-14-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-33-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2512-12-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB