Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:56

General

  • Target

    eacd2953f341d15c5da324428b0da54b_JaffaCakes118.exe

  • Size

    856KB

  • MD5

    eacd2953f341d15c5da324428b0da54b

  • SHA1

    52afd061c404d4886a35c147926df116dffa3e08

  • SHA256

    92c4f470ca756f46e038b4363729300aa0da8dfccbee60ca7b7b4c52d0d6c1fb

  • SHA512

    ba0fa95082b43e8d4da3fe4d08d357f533ebcda78bebf73667e5e3b93365a6d9a66a71cfd47815970b2c7c003c7551a21a0ded4cf3e18f5ca3b07219c0e748d3

  • SSDEEP

    24576:Kxz0H2vz8No857XeKOVejYFSMHTLpPHugwcvlp2HRW0uyEMcc:Kp98gVKAH5Hl8HRW0uymc

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eacd2953f341d15c5da324428b0da54b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eacd2953f341d15c5da324428b0da54b_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://postal.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    ded6fe8d049dd53da874b55cc170a86b

    SHA1

    348e60d23dd08eb30d18fd7230a98fd1c86705a8

    SHA256

    b6df5a74ee1fe2e0ac265fd8922597c9420df368492653612f67c759a1d782c4

    SHA512

    a916bd52344c89e87a6dd707a114f9bde919a77bbf86d9634618fb6b4f273ad40e61f5e8179ff8ca5c2d1075f3e7201e5304deb5970e226a796ba527ed406940

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f61ac801fbb37c17f0cbc334574d759

    SHA1

    e992d9ab81e8f827e5cab483ac1b4576bb18bdba

    SHA256

    8e8260c59a1f9762564b4118f89a73cf093bee496337c0bb91a6abc8a7ab7523

    SHA512

    6174f20515b5e1892a1d532fc8235dbeca8deaf0333495bf92cf30717d4ee824c7187792ce21bd682911bcce8d6363f3b5dd76ca77bcaf150d02cb91124b2684

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d54d1d3bd69a302c9de418a13f28d9b

    SHA1

    b5ae3dd5ae53c9c1d1173fbfed7e7f0e504cc53f

    SHA256

    4278f4bef3bfeb46a5d6908a10af175b15cf0fc131335788f8b38a51764af5be

    SHA512

    4375f6d1cd3671ec7194fcb6ead79181ad4d246ae0c3b74575f02aeda62484d76bcd86ac0eb71858ca529ac9d3032ad44bbf4881b3157df85aaaa539f0152ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47a68d183b827b2f525a40fdfacb3d30

    SHA1

    67920c269f7216c72affcd28c43f51381c66f0c9

    SHA256

    2fdfcee491a90d32ce57efbeb6e54fae4be5b393be19765b355a33c8e590bce5

    SHA512

    4846d5dda082cf9209b81f476fd3dbec7e7669c3b28b983bf2de4b518cf41e9a9129e0e5d9d94636458eb404764abb60951b438caae718585b8100632b312c7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0287249df459b81057c76a738464b013

    SHA1

    96554b8f66f721cc562a4c70950c8d5ec93b0785

    SHA256

    f7e86cb251958ba2898c5b600e3c135e93136559b4b4f953c6f7dad2c5fbc181

    SHA512

    a8d29876279e24d93abf881334326cd5c0a13c18c6ad7412b4b41584bc11b90c9517ee44a05a4beefafc2a838014e0a831a726dcde2077edf6b162cded2bc88b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f463e07036068667374dff44b6d708f

    SHA1

    c693590d8f8ea9882033e1fc6347edf43458af8b

    SHA256

    602747719284b7ac0c15fe65e5f441875cd940ae852cd609eeca9999970d8308

    SHA512

    198fe0fe1f6361a26b3e395e595b308f17412714b43f781a4edb304322ae8a68d4e51a20d6ae37f9b6779d6da9f290fa37af8d40d6b8dab45dbdf74d8bfb035e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    138cd7f3c0024274240fca0cda9dc4ca

    SHA1

    dcab7c1b02e26fd3d284e9e6eabfc9914fc19bd4

    SHA256

    0dc20c9c515c0ee8fe1bb4c39bf7785885504893e2de6872447dea44dcbfdf8c

    SHA512

    323c0360f48fc79ae310918712b083c932fe5553edf2d49a96d2900cdbed94f50858a355bd58edf410c09dcf523a10c61c1ce6e0e8853a5483aa6b3fd096fc2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab62990c33890072358398bbf44d0e80

    SHA1

    a4676135cb03ea0a0b4a5040b58fce4fc7ced066

    SHA256

    15773f09e59233dd5fd49b528cb8b091e00e388f6ed2d460df1d38dfa0c7f4ec

    SHA512

    1f916bcc2c0edc29c16c65776555193bfddd320c92fd4d2404eff52db7f9e0049eacec01a73390038f5306547fb48bfc20176480eefe7efad6201172005da656

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08c331cde0c177e8d41120b62b67b7b7

    SHA1

    e1860a5ef4bcd09053501ef4f014b562be4226bc

    SHA256

    a6079ffb9e3e9c4432196c6e6d816e830d152c525131c86a91d756e4ad279679

    SHA512

    b3a3b828ac69258244afd7698612130f74039237ed14a8b0ede8596b90463aac0a5a0d873e7d6b522017dbfc9c77d3c92c84434023d460995c56ea7b0bc41458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e14ca44b4734bbb5b484c59d863849c2

    SHA1

    c6d424ab9b22364203f04e42ea23fc90e9705a1f

    SHA256

    19bd64282c30df3c96ab266225793c9cfb770806a89ebbc278a0a0b77f5886d4

    SHA512

    7f4f8607a2395a758d420b35fd7a35ad21379f1e5e523ba465e092bf687e101a45f2b28464ff368c86370b73002ad31348f1b983ee06d37d7da20eb634a32a82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a73616c283a57f686948c79899ae0354

    SHA1

    66afe06ca25328a226a53c3a47308ae1b6b1a969

    SHA256

    53dfeca7cc3bb106d0a236a20ab812c2b3ecc268883a7a1e456a2f4995bf93b0

    SHA512

    3e1587bb6cb0967748d43b4f907d48649c18765f182b137aca27c5c743ed01c7d9cfdaf013782ba0cd0dd1508ec87808e6f0f28e92986facca27c0e22e8c85ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2c2f5900a7cb3fd5e08dd15c5b63301

    SHA1

    6496cf354b1ccf196fd6a6e26ca0a34224f49135

    SHA256

    bf314443eebbfde3ae11bd4c6acb39694436e09399f8af6a676d4e6ebd6e8c3c

    SHA512

    8897ea8a1226e582939b86abc3043536f2759472a42f63089c20a185b3927b6eb8773b417e800d8113672bae6fea059883bcb9bd11da285de9ad11e0f97cfccb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ad894c6ca1eadd9b9425ccd0880059d

    SHA1

    48202285660cde97883493150a631c93e6e8ca6a

    SHA256

    6bf17734f408911412117630bf1c81b970146e5fbcf4faac197223e541fdba80

    SHA512

    bd3d688aa7e0521a0ec1f1911456a5aaa922a7954a71157f5e04d3b4b3a7b620c70a1362ce0b408f77f8d444f96c09db54770d6638ea4ab8d6de3cfbe543d9b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    552a6e589baa77b1511f90d1248906f3

    SHA1

    3b6bf9d81d0f3e7868a5f329d19c6fc6ad00dd26

    SHA256

    de45d4c63ca68f6baaa83b1b8b32cb7eb4de7a52d3d423c33dd440eba3ec09a6

    SHA512

    415d8053947298722b3db36c55591eac744d41d366627406b120e3e92b7868db4071ce58be152bbea561e39479b66dafa05b036d1eb066246db6795dec07ce02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    add9d62ae372d2810709bad186f9b5a1

    SHA1

    872b7439807dbd4533578efec4c75758cd3abcfd

    SHA256

    c48b7eae0209f339cdfa1682c3402a6b113675c8b47cffa68bc9a4e8052b663b

    SHA512

    d8707745d09703f346cd2ddca1872b0f93a10bd90ef709193dbe50f31f928742f9a18765be56d6f6d1bc30567f870704830988b6608a40916c829b560aa212d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72e0af0df068bb50a76af472f2a7844e

    SHA1

    9c5e8e5fa2cdc099f2ee76358c2dbb886144b85c

    SHA256

    be9661ac3e1f95a3951e04b66aeb7891a46504bb80d10382867228e7d8da8094

    SHA512

    6f6aeac1bd46b72a1f34c29b644f65f081b22c9391cb32b5b725e3cd36e6cbe2c928080bdfae46a2398df869972b2754d8c523309823c838140fa4354fc783e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    629d3967fa5f06720f1a0ad78635631c

    SHA1

    edc109e5c36f0bce4ef1d1e6394bc196e56b6889

    SHA256

    b57acda7d6fa2483335a74e10253de2ff3259cdcc23eaf767149920eaa37ecd9

    SHA512

    ab078dd63e4e54c3153f9a9806bdf8ed4d9af3f7b101d7c7e6c07eb1cc085925e6fc9ed2ac6da12a7e37cfab0a696a9fdfbc1c009cbe49930e7d0d0ea07294ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b13996b4a3224d6169ac9296c2e191a2

    SHA1

    d9669ac3243894ae9a1e1559f67209820bcf4e6d

    SHA256

    551cf9a8e72a9065382eb2160aab79a993c39beeda1bd7ebf03439f45e22affb

    SHA512

    c79b022ff15920c856e5c49327d988b2cac01f3adc4c75308edcd81b2fb0713371dc9b62e339784e62308a36d9b64e4274e32978d62b9435173a0acf60805cd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16dea62068b62ea225c1d84eba27b0fd

    SHA1

    4be6e861b0d16fb99972c298e27870d234aae935

    SHA256

    ae8f11e5d8a5e77d74bc0a617b60ac87f5d094c65aec95541aa2ca22c40c7cc8

    SHA512

    2dc8ec3d8b37ced69b19b326eb40bc1e6f9516d4e6da666a0e6eaae74cdb02ebb5d95d3078a74bf6f370a369d7da134e210ea86f7e4677e7f41dd2e6bc0ed3ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    0dc09d4281eee0b3ff415d8cefe87170

    SHA1

    7bd036a691a82c8d877cc8e9c47c7ba69fc8ca14

    SHA256

    4c5c2411eac7e1cca4029d14c3471bac8ed2aea0d9c5a35cf45a9f7cbf5e96d4

    SHA512

    b4f4543af5b7eae9914b82cb815e2a964ddb082fcf038677ed7090c38092cf19ce44829bad647c514a9c8610760aa07d61a88651c1f9b833b43a9139a9d93513

  • C:\Users\Admin\AppData\Local\Temp\CabE9C6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE9C7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    41KB

    MD5

    b49d9b2a8e575f4366366a34255baaff

    SHA1

    4d4b006bedc8d61e5e24fc9b437928af6a8b72c0

    SHA256

    3b3591e0338b323ccdc6887694209ecc329eec48649e4ec5e5c5fa501db7ac2d

    SHA512

    377b43615fcdc499311d02ccba0c33676bbc2c439e18db54bf6a31e56e701b6801e3bce87a0795e5a0dc44c2a2431db4cad38620e9f16e583fcd6f726a07ceee

  • memory/2396-33-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-1027-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-468-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-474-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-465-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-0-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-467-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-36-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-35-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-34-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-1029-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-469-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-5-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-25-0x0000000006A30000-0x0000000006A40000-memory.dmp

    Filesize

    64KB

  • memory/2396-31-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-4-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-1-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2396-1019-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-1020-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-1021-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-1022-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-32-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2396-1028-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/2396-466-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB