Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 09:09

General

  • Target

    eb02276f5d3511db2aaffbff160f215b_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    eb02276f5d3511db2aaffbff160f215b

  • SHA1

    7fcfb36821b1a730e32ec96effd029f5441a4444

  • SHA256

    2821a5445ed9bf510e13a71247a8bca772745c196a9002b30bf93b3bfa877ffa

  • SHA512

    7a2c643b7c6a8da2d6df22583bf81e30aa355bd763d3f388d4e175b34b85fca275713ba3cbddd9bc52fc3cddc12047a8180df9d1ca360d33f67b871d591ed59d

  • SSDEEP

    3072:SfZDZxpT4mgvUCdjtj5Tbd6mF0yQBVdJxPUocNxLFJs7P:Sf/YnZf6BD3so3P

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb02276f5d3511db2aaffbff160f215b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb02276f5d3511db2aaffbff160f215b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2188
    • C:\Users\Admin\AppData\Local\Temp\[UG]Metin2 D3D Hack v2.0.exe
      "C:\Users\Admin\AppData\Local\Temp\[UG]Metin2 D3D Hack v2.0.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.unfair-gamers.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c19bd566cb9364ec40ce69791116a12d

    SHA1

    c5880c55e95056aec197eb8836231f548fa48c19

    SHA256

    b4a45d349bd0525da220cc67e09741264a9df32e9e238264ad5907b4015774b4

    SHA512

    9193cc3a3167c9694c9e3e801e26f16bb8197fbf91f20af7ba5b12ce0366e0d0693b245d5beffa02391f560d7f8064319b750b512df8424269ca16f345c650e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f54dce2a205841f5501442373edecf97

    SHA1

    b764456fbfbe9c9fa41778a250c7cf941177a638

    SHA256

    849e6f932bcf9a5b766edc6b55b34e8704360e75b8554b79567578a69075f634

    SHA512

    baf14fa3be59dba18b9d0b8809039b1b70710de9cf6522a3d5844c79ef23b9e7f08b0240823f06b50589e1eba40fe981a090da6e0543a41ec45a88e32b38961b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94f7e39e1f5d10effae711b2d5ff1646

    SHA1

    b66f9b9d500c4096d693267bd7fc9d607af8cb0a

    SHA256

    d63b7ded8601988b21b34e505cc7c8c3d2333760dc46b4b3758b7e78838f8dc4

    SHA512

    9b5a88c6a13388663301f01e599e91defc3903a16035c2c281e0d2619e517566b7c3b68408fcc04af751cb67626f2f35cf20cd9ee09c74d200c74682b14866dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    750c9281dd1473d410064144c956e1bc

    SHA1

    5aa4e9bb2d57c6b9d19889cab6423c49d61acc3e

    SHA256

    cb041c796863395fc6faab3455fc8dcb9e43ca4cb2aa05a79dd83e63bba22f4b

    SHA512

    d21c159e2073614f9448a951bb8056dd5bb64da197be331c11872dd24753cd170a834ba16d86c721602b3f5b09a4ad61353cbcf146a8c934b7b0f44a2829fdf8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d255d60956a6fbe6a6af7ebe906c23c1

    SHA1

    0a53fc7ee7c1d9a9dc2f96b48c7a36605f5ad33e

    SHA256

    0aac881d30a7e27f1a5a53b7df5c6440ed11a86660c674c456e636370a5efb75

    SHA512

    c75341b2fce1fdebfb5ddde35af957568af6f9fe97d5d3dd7b280de8acd4161287eadee8dd522ebc21ec4feb7ca0a0ba07f3ec85306d4afdecded05aabf2780b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60ea6070982e0c9af9ce651f446c7d02

    SHA1

    eb2971b2c7934343e3735caf5722dbe613dc5b8f

    SHA256

    651e503df50127132c5f3b4b0fef11d2534a87ade1719d15f0217ac92f2e115d

    SHA512

    d7d3367978bcafab379ebcb964913572233fb13740b10529bfb733ab6e823a8cb315dd4db418ff2e42a93539584168af70339d3d506625b72ec192662d0de78b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5238db94ae118fe61ad43bb0653092d9

    SHA1

    6b9be0c43a5da431befc850254f9d3e6b6b8604d

    SHA256

    2e74c56d951a3ff8fbaf1c036977dd8af955e228ac837141f3033422140cbbf1

    SHA512

    b91017a876bc07cfb32b9c7e0560a9a57e96399a2e70cb3a16b493c79e7d63c418ed6273750fe920d680ee27926c6aeac6d89a9dae94cb89313c88b60bb6213a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39f282b64a624c4fcc68ee9a26e5fb90

    SHA1

    00ecb07410b18fae4a89c44881178b3385307800

    SHA256

    32eadf2d3523038ffb45e3ff11d68660b7946181beb96923bd39e2a11faf1f60

    SHA512

    2a69207453fa3c231cf3e64b4bde3e115cbc82b792e9370ad796939d4ae6ecb5e8761cfc089f94861205d4bbd6ce0482e38bd742742ae28b393371a2e44f83dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ac8c9c45e743d9864de82bb5677303f

    SHA1

    16bd4b8d7141b9e613a364125248d1beae457ac0

    SHA256

    d07b8cf3e2cad7eb7e89f24f655f06859fcef5244e0697fe6ed42a2ed609a3a6

    SHA512

    5c61841ad580e537cfd6377eda671e1372749bb3a835ab6bc27a19fe98da69272815eeb6045160b261bdf6442d6ab5abc727b30362a46fa0cd4a28738a934275

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72593ba078d0a4f9b4d7b69afeadd9bb

    SHA1

    48a25191adc3b0b84293dedfcd115258fb6758d0

    SHA256

    71959178efee93bc2c137cb215a9e8a7cb251d84f4cca8f43122b45c4836005b

    SHA512

    1ac999fa1421ac48e3eb506709870177c320ce67b17f0588c5180267b0565bda5a76551cd04b0b3b98655672f780e47dc0726c493c8dc6cdab273827f944f8f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d815db52bf57caa5a8926b8e8e4a5ef

    SHA1

    bfdbda5172760086db644c6e0f9ed3dc58362ac2

    SHA256

    7cc5d75e2ecfb1200eefec5825b980542040252d7d72a3861234c4b72b42b0d0

    SHA512

    ad6dbd6b844729af16318c80c131c44295358e6307aae1f6a0f2cfdaaf240f68cf6eee018aad2d03537915293ae1203fb3a92f59c11f9ffa00e4e7f9a93c3be9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d709744763ced28a70366488afaae32

    SHA1

    93828a4829f221ecadbe77337f58883166c008d3

    SHA256

    7070ae2e602c76aa5791e20c9fb417dc08818f533216b5a5306f9f72822ea885

    SHA512

    e723e07afbba645f9dc8db9c84dbd3bbfed06b68256e712306e4234f4d9e411117c9f42a8d886c0323bc7f64c8fee389d4dbacc00c8e1290272a2947f5331ef2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b63b8356362b16c65df6570727d26c4

    SHA1

    f26f6a303f5b66c57e8453fee50eafbd858a717f

    SHA256

    14f4e51393ceccef4adf1f782bedd039cf4ea81c625c93fcd0061cec532673e7

    SHA512

    f4e1680fc864ea56482dce6d57752b049350fc34d943de74fe7ec5a8af930b659ab19e51fb46d35fe4802a07913ba8ff1fc825547e0c5b1306f6ee9ccef5b9ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ac112dc1257c370272cdc32845f7f44

    SHA1

    40a0b1487492fe0b9fb5a33a587e9485150f7548

    SHA256

    315b7934eb26a185a1c0fd68bd6b695efb022c636208ed0c10540e8a258edd7b

    SHA512

    7c55368ce8b2e1a6f7969625c384ef77f5703ec33cbbd4e71fbe12aad48515008dff03997c4fe7d1c5fee2ee275712d0c58fb92656bdb6977568e2687d748385

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1208faf9debb18ca96b0f1884281573

    SHA1

    2ad51e5163c6036c1b7faf980a19111e5b6805dd

    SHA256

    13cbc544d4b54ec652b8ffe110b8067c783a7d8ac117f39d98cadb1d10096798

    SHA512

    94d2fb6597325a5b110fd6234ec37e07d86bfbdc62d3b1ae6e6ca19ba9d6a01eb8dc7390aff2c7570ce483e8aa87b1bc6edeb49db212de6eb68fa8a1c4673589

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c9c99de6c8f2e63e8c12b2f82e2b98b

    SHA1

    08fdf9356ce8fa08f7bb29e5e0660545c04b2082

    SHA256

    069daff2986f2cea5637c383ddfb72e6fa946a8d07892d2137f456ca4f74de82

    SHA512

    b3ca59c27378a283c489933c3df0fdf5d57e4e95f6b0e68eb184827d0fc70193e0132ef74c720e73d9bbbbf00820c737e9f1feda8503bb451f647d4b0b7d8aa2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fecd72b7977723af0b1cf5ea7e12375

    SHA1

    06eba4eea320189726473ce9dcb2c81533a222ce

    SHA256

    3cf67df8e749dd004cd39fb8c5689a5a6923b4738cf205dcf06ce7dc05def00b

    SHA512

    698db24bbaa248aa987c1f80c5d8e18ec38bd4adcc1bb68dd1ae3ec383d59ff56cce4c5e3f15d3e995b7ba4a511798bfb293bd74d1e2c7edf4d3b5b2b0407efe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab419e51d0c80780b2183823a4067b54

    SHA1

    7aeec83a93307b129e5d0a6326ada2ede8aeb589

    SHA256

    35ab12ad358201395c0e0c27a5e4d439fcfca30bdc777ab13f677a938f42d29b

    SHA512

    1cbea87efbb58d9110c72557846121d465d40842a2ed5ad7814cc98211e97515a48aa7e0a1db8adbbf4dfd59e91f60d0e6f0db6c3b9f2d32e35fa686e40bae6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab1d751b9bb1b24ec547e1dbfcf8d415

    SHA1

    718e6dae98b07123147358903eae99449831ba6a

    SHA256

    e49d95f9ef2459dd80fe29688d95a076f55a0b55276a0c8d695a318f26cda983

    SHA512

    ae390c7d01e446967befb45b3fb0e586362c93a931a448e54e57d81851b697acfc6549bf40af1a57d837f3d700f43b55cb9ff40fecf8130e7c4c21deeda7b94d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73d524d6e73d4067e2d738ef16418186

    SHA1

    0ddd3ce79dba10f19ae2db0e7f0ef727b516f9e7

    SHA256

    d1fba2f3e66d32a59dc8719eb259a620d919715825be63ddfaccc226014cefd1

    SHA512

    992b31ed1983262bcb2827b68eb578a37fe269889cdda985ead3df9d8f5d8fa1dc9d55c066a1f7386388068bedce1f95bdc57e13a2896d9d5e0dff6f8e48412c

  • C:\Users\Admin\AppData\Local\Temp\CabE840.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE8C0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\[UG]Metin2 D3D Hack v2.0.exe

    Filesize

    72KB

    MD5

    7ddd6c13df6f42a75b372957a06873e4

    SHA1

    fdd8a37c5d58346ea6162f602763f52c0fb17ffe

    SHA256

    68edd968da75b28b358ec55a49a397b042feb4b4ccc8adf788c2d693e051eab1

    SHA512

    9cd30dc07bdc378e6e9b75084a2d3e1fb679f1406d40f917cdc3d74698e05b77c4e95b82ab77f1cb60b56321c700ce81ff70bb7b6a500e839dc22e2035b2f5e7

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    154KB

    MD5

    e3f63407c2dc23c2376757f610b5e8f0

    SHA1

    061b13c25812ac7b30b86f0feacdb4eb6e87e43b

    SHA256

    468aa08d352b48f334fd7091030e4aaec7d929599a7ca82c3df51748773d1daa

    SHA512

    79fa694eb5f9f23f44cbdb7a3d65826b98ffcb03823053a474686f8326c28955ac6bb4acfa03dc39697e8020f23e099ac0f8d48ebbc86775109ddbe1056fa80d

  • memory/2188-452-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-307-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-15-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-17-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2188-16-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2224-3-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/2224-0-0x000007FEF5E8E000-0x000007FEF5E8F000-memory.dmp

    Filesize

    4KB

  • memory/2224-13-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2224-1-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2224-2-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB

  • memory/2224-18-0x000007FEF5BD0000-0x000007FEF656D000-memory.dmp

    Filesize

    9.6MB