Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 20:22

General

  • Target

    f08aaeb5bd62b226afafa41fb5309510_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    f08aaeb5bd62b226afafa41fb5309510

  • SHA1

    b7da20d0d59c0cc459d0d5462e8bd8150e13f31c

  • SHA256

    d777ea681026ec1aa888ebfe083f59af4bcc0c37ad8152fc9771cec693964d07

  • SHA512

    08fd9a2be2f64ef96255ac3d7f2a95a2a4a1b788bad9fa290a9bef123647e81e0e467a2f5b604cc2237874e012020e926d5810ec285dee0b67eb5915f914d3aa

  • SSDEEP

    12288:eP6oYgNWRiEeVulsEOZGABiNKQkUcOpDtJFqr5ymA75GWsQElhYxz0f5l+M86T50:eyoYgN9bulLnGUcOxfwwgVhYxzOW6d0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f08aaeb5bd62b226afafa41fb5309510_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f08aaeb5bd62b226afafa41fb5309510_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.watch-moviez.info/how-to-train-your-dragon-2010/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a073513399c5a51709e1f4b3f6a8d05

    SHA1

    e6d1d292e8b040a17769d213d863e337cd05eb2c

    SHA256

    8cd22df77531e88427d49e0d03dde3406917ccd764d72f03c55824bcb9abaae2

    SHA512

    ba3b9539e07a129d106b16fcaa5ae52b55810064515ec0ff1de772fdc4dfaf8894074964939f9b31e1bf10f8746109f7163182b758628cae0c880650fbfcccfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ed6fe9d4b8c3ffd8714e8e0edb73724

    SHA1

    cc7ef74f8856ac1a6f0ff72cb2b807f8cfc1ca5f

    SHA256

    aeb191f6c3c2266fe39b1e0dcb1354a7676f5d2c598d5f7861652565e18a6e3a

    SHA512

    182186ab72ead16c749ad2b09c966b56063e749ae9715945c2f6bb348e614b37aa2dcf68703970acf4e671b62bf57d5ec24d80391b168e7ce45b966515b9598e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fd4c2c518f2ac5327788dca709fa714

    SHA1

    bed1b22cd841d9f90e7f7770da0b1bb42f1c5d0b

    SHA256

    9dc251dd75108f9289b5b7f935a4153c9f69ad19fd095e3539ad8b6472ed93a6

    SHA512

    b94f1248ceac4ff85eefc2ae252dc8eae4dae3dac39cd35e35ec05f4d8caf284ab7ca2191237d7baa8539a45a3e88863b36ee01528144e842c3844514affc3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53cf1856215b9948c6ff67603651b8fb

    SHA1

    9da5a0a77a2be3bde0937a33b32b30eb710702e1

    SHA256

    53e823e11afdfa76929bbbe9074cfec311be2cd4c222e73f939f29b1e18bf4cc

    SHA512

    179ffa9e990987fb1d1ae005a3686907c6629103363a580b5bb351ea2b446305aef2eea8ac74d4a4c43bc474a41a43169a9428c21770319d04676f89cb0c6b88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02ab56192a051f9bfe79655de53f04ff

    SHA1

    d2e34ab5e64a34da6cd5ef774d5af2d496d160f5

    SHA256

    8ea0e8d63a768d09027626ee0f4f4cc49f1971c0f223d249fd154856abab9ca6

    SHA512

    5857b47c8623f1e010403ed52df1d15fa23bb6a45406304deadf8496fd55bd24286bdfcba6cd0df4ac6d2eb2888fb8e20c99c704d2ba6460e115dae3ba7a03a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28bc34a784e5a5aba0c4c2cd91612afa

    SHA1

    d75700bf23ef6898d4e420cb337950c0a7a01003

    SHA256

    0d30d36999e8e82bc9625da832923f9c0c28336d5a4afa16cd6f86312aa21e73

    SHA512

    2d736e0ea7cf873199332ae87a0a84ba5490aee3b8ff89bbe14513723aa61c1d947f9c398cba1be243901583f806d967f2a8b33fecf4f34281f7d76082bf2631

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95f3ababa92193077e48087482461841

    SHA1

    26c887ac94a22bb12898d0b63f038b1062768290

    SHA256

    03ad8a2973a47f174d46845416716d2166ab7308fb9613a55e5d4d4c61a85b32

    SHA512

    a018f6714b07b041d9ad8741108e9a02c330995441f2db6c455ef9af422f25a148a24e6a5b122605c5265e08b26556a9ac53e88b209f0205bd0ca06fa998c340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dbb1fd282c59492914b8ee2c589f647

    SHA1

    4043ac3bbfd20ade0ed0de8ff9cd6adc6313c38e

    SHA256

    fcfc544b93601b4c1e6a258d820ba6ab3dc62c3c4b3a3ad0ecc98ba1a9dc0c59

    SHA512

    3ed16c6c25e68fe2c9859f4f26527cda61d92b1ac5482bfc7695f01092e856f7e10b3dadba507e3f41367006ff3045bce78b787ac0132e759be0a2ba4f8fb11e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72ae1c6212f04e718ef175fd4553058b

    SHA1

    3c5eb548fea1cb1e78aeebcec9c8318af5cec229

    SHA256

    b908ad59fce242f3c58606a3a4fb89f1c0d7f3cf210bd2a552a718ec091a7dc9

    SHA512

    ac983ad6e46736768abd687a1faa35c23c321ae8bfd16cbb2936e3eb30f1e042a7415c1aa7c60693729fae961b3e63c4d83682e051fbd70749a5c21d971c9ece

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49bd8beec36a8fdfbb0f5c9419032c7c

    SHA1

    8aa3ac1d33dc0d8264694731345e506136ced1b9

    SHA256

    df76bcaba0637ffe72c9697d74bcc78593f1555621cd0336c34568224cc393c2

    SHA512

    132131309d7c15c80415a913a404cd5f98a1d0bbe70766eba24656c20fdfd2b214e5560933bda8baf99fa897519a4224b9200d5b3a936d4bfdc4540515666dcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70c8f28cdbc046fec7f69167c6ffb656

    SHA1

    24ffb4550b20e741cde1a26b1941986d3ee9c1cb

    SHA256

    8d1f453237d172c0e18a1a0e2bcf72e1746b97a462fecaa071a1a86c4c2cffcd

    SHA512

    95caa99ecef01ab4f4506618ee38f115d5ae61de31d3a2acdb72b6130b88a597ee031c260a2c5cc947b1bd8814484fbf762b2cb862316ca2b38d2fbf521ddae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5de69edac233613f5c2ff357ca4a4a23

    SHA1

    de0bcc4282c4f1ba322d6a2d0f77631b09766834

    SHA256

    0d3eeb20b9dc17693d89d949b55b4a4cdcbb45fe5048d88f1206d174ad06a0d3

    SHA512

    c9b5b4fa6b46fdfc1d84a0acf95a1384902f3667b6f37b24e1cf49ee549ac4afce85561993d221da936e91f278ee127a2835d9014fea5a707c582261d225e52b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c26181134997b94c2a87f6f10a22dbfe

    SHA1

    b191a06adcb396eee2b24c8dda36d130ec955bad

    SHA256

    3201f7a1a20e0931d4849e989a6fc533a615037661ad952306a22efa39da3416

    SHA512

    8dd2e03ab3290636e6b9e9697a214894da91e84f2b92466c7707cdf66dcb62afaded65c38bb13f7c4ef827ec339640594ca1040628902eae5cb931619924e12e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b92be0260b63ffc899d40cc2296a4e0e

    SHA1

    69535b41469409c086bfeeccadf834e771f2574d

    SHA256

    de8a5c58146d039ea3f85d863dfd615dd15d6ce36b56e6f78f89a14eb60f27e1

    SHA512

    012675d0333f02ed0957e5325220087e8a51f537fd056a68c8c1916bc644375b9c8d3f5ee6e32c2c5b5d79400986ec97e5bd9f4e7523b0687cb765f194a58403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36d82294365e686f0abe2255f09f9920

    SHA1

    b8f9931bd0d6518248853f20e9b71223a6b4f60a

    SHA256

    f082145dbb1e96ef1f65139562857a94ca3874f22ab1ae9f810211ffaac43fe6

    SHA512

    360b0f9dee6a5d20c377835f3bc3aefd31a4f5df709bb6224494a00ccd58f3ead96a04ce4bc2a5e518f656c1cddd976631ff119e84d1900eb70bda2ceb1090d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    016850edca8f50ac33efba8a4764aa2a

    SHA1

    7a8001a6b15c46af8f802655081ed2ba3d126793

    SHA256

    fe56295a0f77cbdfac31b3348c8512f7ac0a9674c1081e0ab7fe89bb96cc51de

    SHA512

    62a9c4dae18aa9a905e425c9fb57866da5fd4a0202044ebeddae4d273e36432c97adbfd3b9ff79853f872f81939c809a9d6d42f51a61a5b12665446205e05074

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edfa6fbc2125fcf50c4cc848f7d5cfe5

    SHA1

    e16f089cd9e3e69822c6b75d68719b6564ab2e57

    SHA256

    8de290837e9ae9617436a80cd00e3d9a7687756dd2e8a896f468bcd6b718b0ef

    SHA512

    c2d055bb7e33fc46fbdd2e8cdc92aa67eee585fac76b06ec8d3dda69fb7eaab4d3cacb90099f100e7a8499c13f3c1e0ed314fc997b2f26e1a422a5bdb2bb85a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42224aea08b736acfc96ac862234fe77

    SHA1

    daadaf4bd83c849ff1cc2bc6e6172753db0a0b66

    SHA256

    ca8b1cab48e1f80e642aadee37d11dffe04d0337faeea492850f153dfaf674ec

    SHA512

    eda8e421f511bb2127858a5536f744ff861f665fd63e19e3a9c146f94ab1bcda2785ab926f23617889aab401f5c8d3f9c400dd45c9248e1056d318195e3a022f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    938d3d1e7861a2072ea26a976516f095

    SHA1

    c884be12d7133bdc1e1211411337d0195dc66c61

    SHA256

    40c6fd195be4f5159aa71ff219afb88fcfa6d9e1f9f629b47fe4381dad5d6141

    SHA512

    5e9d505d57f5152c000842acf4404870603c06b6c336ffb6effbcab6e016ed23e78425a57f37f2e9f6daaac1604827107178a4cdf1251720fa951240e7607027

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b892cdb89bc1bed944449b45acf01e6

    SHA1

    0881fcd3f55dd966bcc62f6b70ad42bee15fa848

    SHA256

    3b7dedfef58f6130a63a059c43db4f3513c2e955b608d38a75c3736cd00ee072

    SHA512

    4571277fce925425376313e10590c0d3113ced985965db2ed12a0cf2a3851435496d02b0c08d6cc37084baeeba42fd43cf48e4d431228e29d72787aafe86985e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d80aec014ef16b849b8d6299fc9c5b6

    SHA1

    7ca2864ee54ff5c78d6bb96475889fc82b0e14a2

    SHA256

    24a1d25a1038087bb3d9db86ab52c92ad3d0c422b973552ec8e54ecdcc0c7064

    SHA512

    74a7b70ac11271c9d7b4299ce3f751504f524dbccf2ab13c5b21e8974393d0a8f71e000e1b6e7cf66d2b260d4ffddb894ab25a8f7c6caab298d6e8ee489536c8

  • C:\Users\Admin\AppData\Local\Temp\Cab1BCD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1C3E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2648-0-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB