Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 12:54

General

  • Target

    eb607bd07f4b98e2989eb976620c41be_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    eb607bd07f4b98e2989eb976620c41be

  • SHA1

    caab6c6258c2b269cef10b453466c72eaec4dac7

  • SHA256

    0e25eeb3da4c36866a3c86f38aed1ad326e3b03c318bae3c162f7c627c1c2c89

  • SHA512

    20ebf93a2a9f6777a825eb50cc894baf7ea6b7d4bcb8a535a476bd51fb206d725acd481d0f63242880d17ae18c599d2158c1979bfc893c1535883996898aeabe

  • SSDEEP

    3072:MhL9pu9V4CCLttfgWDilJi2H46ux+ocevPp:U8cttYWWe2Hru+zeHp

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb607bd07f4b98e2989eb976620c41be_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb607bd07f4b98e2989eb976620c41be_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\eb607bd07f4b98e2989eb976620c41be_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\eb607bd07f4b98e2989eb976620c41be_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Roaming\Poirig.exe
        "C:\Users\Admin\AppData\Roaming\Poirig.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Users\Admin\AppData\Roaming\Poirig.exe
          C:\Users\Admin\AppData\Roaming\Poirig.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2824
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2828
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          acb9f6c3944c9f58a4904906bf14b392

          SHA1

          01088965682f0caf02d176fed1c0a552bb394c77

          SHA256

          abbc96cd1541140e7c6b6b474a072aceb7b39b6a4e7d0457bb8e62c0652290fe

          SHA512

          52ca536fd3fbbe12a6d8464ef8c7132cfc79520142a3c117511021725627e8b1236130e52fae650de6f03cfebe071bf0a7c0ab0bd961ff80c6eb3edf7e148357

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0dde15ffcd22613e60447735925d75f1

          SHA1

          c38445af95bd58676494cb22eda4858083cd2b51

          SHA256

          23d031e5636608f2fcb7fe658411fea9bfb54226106216efe4f9b1526d5732f4

          SHA512

          e4221aef0524d58e5c0c6783a141a68586d2d773d77d6a5d7f40382655af07b8cc2587a59f50ea361e7211e2e8313969b0bf064e9641f9743dee305f7ad509a5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2a61e85f27aaefc7bb604050a9bd64dc

          SHA1

          f2b39cf4c27b38b346ef611303d962024c77aa8c

          SHA256

          572614a77bd6e66a06aafa89d35d57e716ab28d85cc9ea560e910d86e4e7e9a4

          SHA512

          6e69c486a16f19a799f37e65d09182acb9d987e1f5f71a1d0e04ae522c63f16917ab8512fc09a341cac901c090420face52ba8da9a13fd62c9432ec2ed867490

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e59eb6bb05bb7d5891be682a8d6029f9

          SHA1

          bfe35a02b0df154cd28264929088502440dae851

          SHA256

          124b270e6fa6653e71dcffc086e798d3dd79d8cb02dce5c1a8c019fb072f4f74

          SHA512

          143fd094e6a4aff1af81750eafdd727e3e98a8dbf609163aa2485a59b5de173ec1e93a209ba9e8457a337d591068c148ff82222e0a3d38cf20c419a5d0c46c06

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a305989bef19d7d04be8c34f3e33e3c0

          SHA1

          1570fcffcfea612b900b0c4184a1f9596e52b8c1

          SHA256

          8bb3b0ce45b1e6442677b4621319fa7fe8ea31241e3cd4dac0a775fa24e78243

          SHA512

          2e551b1b9e3b52d08a60b225ca204f7d980275d54cf0cb417af3e02a52f98bca902845ebbda88f189aa412ac34f2827bc40a14875fdba81007ab9e63956497c8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6ad62294c566e30d75a71ddaa4e5f03f

          SHA1

          e8d845c1097724c53a9e5ffba754e59a11f120bf

          SHA256

          e920a055a7b2a76dbc8e1050181c95ce716c4d1f10bd5372e6b5ed4060ee6348

          SHA512

          80ff06f3aba4da10f40f14e6b43626aab863b11d69c695cfcf7659b9497b13ef3e44d5dc1d7140566639641684410d662b461b64f4af29f38326420f2623fc2c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8b18b2081e027d8033c7304627f6a817

          SHA1

          16a1f4ba468d7387de6088953a2a9bb3cffe056d

          SHA256

          315fe9a0fb6e8a3e7c9179c09808be3376b204e64b441ad04d49163bc3c90ae0

          SHA512

          d171708bd6a7e27b0171027b7a540ff823da0b4869ea37f83606b9dd5081957d694adfd61fde9a25f2f01a6ad8dccc3155c287b2c6da8610db5b6ae4f4c14d01

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5eb83c8d02d0f793b0ba2cdbe7e7ee3f

          SHA1

          068d8faf4e8b2600262a12493df9e6b3572527c8

          SHA256

          a6e9ce38cc32e759c998059d9addc712b2c6d2551837a81774da783f460bbbf3

          SHA512

          532f4bb92820047f7454634531643a91d4cbaa49b3ecd29c0e9aaf7869c1a862e6d3a23a6e937d8518b47326a4092c0d8d52b4002e386be0f30382839c5f90e3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dbcfc12c75f46902f7e6148fa83ceef0

          SHA1

          6260e5521af360135deb6bef9a68445cd79e4434

          SHA256

          f54321f372348dc12af1d439c913802d60cb1f0994f13aa90b462005d162f657

          SHA512

          eabf01cb1ffe6197e15da9483cdded017decf8a5ec21d16a5e5679dc805a7ebf4ac470ac27585e2767aca284be17ad35567788a90b5a362134b9596a3b39ba16

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          50705640c305ea2a296b23160deb0da8

          SHA1

          264b3d21c642c4453d972c4a628c23a8e05bd20f

          SHA256

          09619a28cf170f1243848f3e15b7c2c80cee90836b6e9955ac9140fd98b7e316

          SHA512

          0a7063bae6b0568f647ff9c076796a5ce4a2a05c053ff53d96b42041c9452028fa99b008616b4fa8280ca73921a7da3c1d697bf052a47e9ab58a9d96d9ca0867

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b909c107f45fdc16299468a3e097177f

          SHA1

          a9bc8dc3ff00b53348ab81d981d2622985129903

          SHA256

          eda1455436a2c8c5e2867948e7032fd1604ce28bae343a3a0fd8fb7a771a26e2

          SHA512

          6c41cbb4c69c0f001610035a6cedc4771a7148885c27b54e7398956fd758da52e87569e2a34704ad635d65eeed4c53d49ea476e7e8aed51ce0deab8701b6de53

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          14dfe00155406ab85261d45d88dec397

          SHA1

          9872b30972d29e82f0a29ad6857e8dedfa4110b3

          SHA256

          5f85f0670d17a493cc443e8c8064310be48ffa2cf16aa6e7167e5640ae5e877c

          SHA512

          853178713432b47f38b068f37d9c78beeecd7a025003d7fbf26bee988157154b675d5e761a7b921e9b574c1c5724e7d3fb124c8a43fc84c27b91d4555d316caa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4df54f888e93b780077a6cb7dcfc1465

          SHA1

          51c380d74af42b65f219e72778c156b8884e1d06

          SHA256

          94d6d5901b945a5fa43b1ee19262590e78893f98cb015a8b1ce1066edc5061e3

          SHA512

          46fbd3542410817476fde8de418d7bb6b0e4366b67c5df7502a02979c603ae86aa30f09810959bf57fd4f59e7d6aabcad79d893c96688cafe5a7d24ae6aa8f32

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c099e0452bdcd2a4bbad9ee1003d8936

          SHA1

          8355e6c74ac86d4d9f738795a9cc94bc16db62bc

          SHA256

          e69b6cc8f76360898a614d036fdbdf2ad5a44edda52885b826722db15e4aac17

          SHA512

          14a1d002b0e2fbf5748d1bc935f6d485bf44d22b36ea452f3beeb9d197a655d0174712fc508e9f05c6b21c59690e2a29adf5590ccc8eec03adf3580647f2b009

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d4838d5a4fbd6dcbb61c345e0312710d

          SHA1

          68ef2fe16cdd3edcc83e50ecb962303ea496fd25

          SHA256

          7532c8dce523d0d43a7b2e197f961b03b4b8b0fd89862cc38ca0ab78dbfdd096

          SHA512

          9029ef0e335d02aac6dddd9a2d64f776a64d1cd11bf50326261f75da15f1b527b2064cc000fd43c020c7d5ab180d4317ad9dfe41d1033725c23b5c29a0c0d740

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fe59dfb8f501e3cdf59104ddc1dc12d5

          SHA1

          8019e176e379350b8fe0c0b3d300870d434e85f6

          SHA256

          ae4f9effe1e5ac72c9db70b6d48ff660e4195740ec8a8fc3de63e65c88954026

          SHA512

          7cc9f215938abca6cebf7cbdad7c2ef282f9f16fca11a60be6786556261907510af0710b2123e69d7d783467be023e6d9722ee606b9cf6a104cd6da9197fa89f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8894b77702dedaa37885f0975dbe2c1a

          SHA1

          60de4b07b75f83c1e82fe56f85d860fd549367a8

          SHA256

          4019d9347c516569496fcf15abc973a30e53959e82ed55b045a4e150d9500235

          SHA512

          30bc7417662007446c54fadc5228e800a168c95e60d92aac6d0412e45283d66d98d2f219be570491c831c60177b6c3bc0a1694c091b32eeeca1088c5398301e8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          56428c8c4e3c6fcb3a320aaed6567224

          SHA1

          e1b3e9a6456c5021373a5395db6dc4ac01f61848

          SHA256

          ca3f32b89faf34707e28c9a2445cfbdfe9b712d00fd879d8c914bbc1af261a64

          SHA512

          a04e21facd7c133870df5192930185865f710f8512a2d9cb84c210ab4bcd663a277a60a37c07abfcf5e94e56ffcdf2361c05308d059cc9eee724ae2b070faeb6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3a75796838623810802e58080efc39a1

          SHA1

          e408ae8292cea968290542814fc0dea355a04a3c

          SHA256

          6e6bf3063bce367ecb8b43f3c2b02962384d2a7b922b6e04c1b8083104043a75

          SHA512

          017fee6c201d060bf9b070b34fe32982129cbc056211cef53ab3666d997ee4b83a13e0461f836212a65c59451b96c0ea2e8a87984b2c424c87468c92a08d9436

        • C:\Users\Admin\AppData\Local\Temp\Cab2149.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar21D9.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Roaming\Poirig.exe

          Filesize

          124KB

          MD5

          eb607bd07f4b98e2989eb976620c41be

          SHA1

          caab6c6258c2b269cef10b453466c72eaec4dac7

          SHA256

          0e25eeb3da4c36866a3c86f38aed1ad326e3b03c318bae3c162f7c627c1c2c89

          SHA512

          20ebf93a2a9f6777a825eb50cc894baf7ea6b7d4bcb8a535a476bd51fb206d725acd481d0f63242880d17ae18c599d2158c1979bfc893c1535883996898aeabe

        • memory/1644-25-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/1644-26-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2244-5-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2244-1-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2244-4-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2244-16-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2380-0-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/2380-2-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/3032-22-0x0000000000220000-0x0000000000247000-memory.dmp

          Filesize

          156KB