Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 20:10

General

  • Target

    f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe

  • Size

    103KB

  • MD5

    f085f337dffd82aac309f93fb69ffc2a

  • SHA1

    e96d1ef84c3560a0ca6cfc320300af11fbf89c91

  • SHA256

    dc5e3ccec9014264bff3bdb337c99eb9374d5218e47d9ec5274b5d1d4a642cd1

  • SHA512

    f320f3aa7eff578072204b471bb20812f2824d891aad3d8ecdf5c565ef48a9df3282cf8a4d0babebb607930a4dcb7c35ce25a7934d92773cfe7343b1f92533bd

  • SSDEEP

    768:OrlsJ+XAKEAREKr9zmrpQQDc8yrld+Ki4qnw:yXAKEARZC6cyeKi4b

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.visualware.com/install.html?e=errorcodes&n=10091&x=f085f337dffd82aac309f93fb69ffc2a_JaffaCakes118.exe#errorcodes
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F59A01A8B782D93EA6991BC172CEFFB1

    Filesize

    867B

    MD5

    c5dfb849ca051355ee2dba1ac33eb028

    SHA1

    d69b561148f01c77c54578c10926df5b856976ad

    SHA256

    cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b

    SHA512

    88289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    425243f5d2e78a278dbf2067721b71a7

    SHA1

    0259144c96bed6aafbd48bf57d6c217a1e8f413f

    SHA256

    a51c8a8f5571cf8ccec91d8b49125c70b6915df9847648677aba48db3fd986bc

    SHA512

    7ef78d40495b3267448fb1fd501ea615a49e960ada1599fc17641c1d045dfd2884bb2c8dbf481b7c7772a06ce4b176d4dbae0b0a6df28011e1f6a6f1c69fc604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9aa22f9fbf032e3e0a8d6323fa1880bb

    SHA1

    bc2801857e697d13cd232bc4159ca851ae292b91

    SHA256

    99c433df98c57aa9749be5554bb05a18c2fba07b8a927a9397a66b7d9ff0b202

    SHA512

    c728eb3d1471571c43f73f017095e98ba5d94c9fe1954f2950a1a69554d72bb23f64d4eb67f3113e407e1364f4293be02008afd714cf34484def4b465de271d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    587c6d78294af8fe05a89c46b4746dc5

    SHA1

    2b1971bc56e1cd1392561b0ba953ed1ea2f235bc

    SHA256

    9761b1e8bf7c15c059298f555203680b2bc9b2ff16815f09efc74ef31dd26a5f

    SHA512

    ac5584c2f9ac1b1f74099bced4598fbd568e56a84da2c5d26738896017fef2ae8b5db988513f2989717d84ae187dd9c8455fc92c1ab47e2f593505b04cd38f45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2923e863b05e85661a756c06fb0eb36

    SHA1

    b9b595cf58afc6d9794188f1d8431f6dc75ec0e3

    SHA256

    ca4c6a72af38a1dc4c96f56ea335c2946a0f7d2072d77ae166703a352d6e3f38

    SHA512

    073d331199eaa4d78a9444329e21bc02cec0f4faae7fd6d455992afb24a6a080c9501c9dfc9fe70bb5914d6a90943d885a25edfe267fad5409aa6425cd0fc8b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3103f5c1067031340073ab2436f68d90

    SHA1

    eb6342b875caf8a71590be4abcdd9df8f7d7f69e

    SHA256

    57c506ee936606520eb414a15741bc654dfb0a64b952be1c4a2749286d1e7a99

    SHA512

    b9808d3144eedb6438cd559e05ff19b2a4d867c999876fee3ebc554ea81049d4542dce25982af2a0b6b68cd5d6c10818b4d8f26dd22f05cb0f8fd5601b430262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    addee51879a5ab32dc35ee779cf30c28

    SHA1

    fee1ea2145e2b910b6a78a92c930a0b30bcea183

    SHA256

    4fbfa9da5df965b0aa84f689b17e70b9bde735ce5c79fe144c4e4f79d6bb4a63

    SHA512

    708f833c5476cb36febb3b4a1f1a1a3eafd5ef0936f7e4bc3e2f023259ce6899cccf45cedd2e0fa37628092879d8a4f9290e8d46348e928bbecafd48f6dceb5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b924c1908564ae9b6996039fdc136150

    SHA1

    03d057d9fa880121d4d223e5720cabbe7a2b52da

    SHA256

    6a6ecd6793fa068e06716b0e93a083d93577301a2daa4ac4ece3c51d98df5882

    SHA512

    f4eb99c7037f946953316c388adb830aed025b84891d226520e480f912b0e39a31d3076b0dffaa59dea1682ea79972b4e09f47a1e8696a1a74fccaa7d809b02a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17c0766c816b17acafb2de554beda9c8

    SHA1

    4ade84955fdff906b148078c065b4df4662ed9a7

    SHA256

    aa970130d708c67c29a02ac884235bc03f5adeff208abf015ed8fb74240fc393

    SHA512

    8b88fbeb8e864fba640bb7cba0c2a6dd1de99c9360a4dd56401d09248c9283918685d0623382de8c9db7efba8bb6c14e9a1cfb45fdcfcfac70d2e9ee98d51fb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13c4260f72a3def5b8e3041ed33b04d0

    SHA1

    4172c14a6df8d63ce5f53612fd6382421cbe5a0e

    SHA256

    414c30b72d52cc8bbaf070a0cae179e27dc83b70b52e24d0248624f1f159065a

    SHA512

    ba2474ffa617de7fb9f3b5b7bb7012e9f5906a1ba48e9adea70fdcd575f3e78b8199731b86dcea988cbd1e0073675228aa9f58509e2cc583010cac4e85d98194

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11302ca4c0c9d5521d3a12d9a2b1d4ba

    SHA1

    ea16b54681d9fb02b7bb4bfe454e591405e26237

    SHA256

    5ae4a1f26b8f5c935b25ca35774300f95cb5923fbce436137a79d6cbdd10dbae

    SHA512

    4dfd41526f5a00d39550b600e18b0fc925e5f6237f93f3d4a27e51650ab11705a184f264c9dac6555732b8d45358e29bc6d4a2b24e7b2a7f60ff79563ad16124

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    390af678fcea78cc3181f4f2d8a0b34f

    SHA1

    d61c50673fb58666b0341fdada3264f13364837f

    SHA256

    976354f854d4adc8d6a0ef7806090c1ee3b1fd7f10066ff77b6123c332851a75

    SHA512

    b2a65852098fade6898010f354ffc9f49507c43a96d6d33b09ea8c54b26c22b74585ac4d34d60afd50300d6bbe3664bc04b2ea6ec15d28546fda434c98d73157

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a9b7f6737cd81e4e15273524bf18871

    SHA1

    785b3e48813f13650cfd9de9665503ca828621a5

    SHA256

    93cab0a9b96efa235ed8308fc9ae6c8cd6d2d53aaa70628ae6b5a60512db545e

    SHA512

    50911db7fe93171a222288c509562aa026137bb224547969d6dd86b2ecd90769029e684147a69990791a348e0f95d9396e7e02e5fca661997b2ddbac92a5c651

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4d85e5776c6d8b41115b1adbb94bdd1

    SHA1

    d6421cb39840325c4ad48faddeadee31b05f4b80

    SHA256

    34b3f71b8569fc978c22e661a8e1006cca697abf9e10e257b9e895dd414c273c

    SHA512

    ab9bf21b9d31a2c1cd664ed1f1502f9421086972592b2da08ccfc2607613cf7d0f162c5988e2cc44e55222f4ccbf0b517c066f41c5317de9e4ae00ae40d73624

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35ff3c8e8edd5e8cf0ce94d7cb67d35b

    SHA1

    7527784a1e4b52cee9c163a9ff01235c9b92feb7

    SHA256

    5a9730c3f476a8a3fd5030754f9d799165c02d5560cb8e8ec5f807f842b4ef9f

    SHA512

    0cb50a69decb31f5d21f834bdc41e9225bbe5d5b32066eb30419418449ebb80329be95060fbe8b14e23a9dd37d3d1d0ebb8b3eeacb2a94b54fefeab7e2c90d28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c688f26982e3bca6c1abd5636710ae5c

    SHA1

    02e6c8b5d1179876ea5124dc7bd934c964baea23

    SHA256

    ffa259979da8962484e5bffc5ed604376b1c65e953eb525a958a517fc3615330

    SHA512

    0cfb4bab33ad1e6966aff18b483e38a04e28b482777f1f7a771a75b41c9ca0b48bada94ec72a9189d0da3b2752ed09cf5ebcafb409880566b21f12b9e5a38233

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1

    Filesize

    242B

    MD5

    0ec98b5317abccedc7470b86e666d434

    SHA1

    0411127560f438d16d1c34046053456030777177

    SHA256

    b34f3a9419c6687f3051cb3841cfb76b986b6c19fc913d942fed7d4ea8665203

    SHA512

    1f99f2ebe8065e382200027577684172be48e8c9df42578e7069abe00bf5b2560441ddc70c96abd6e613ae46cc8f4f890b8f6fad52d0a06b158451191c8c0a99

  • C:\Users\Admin\AppData\Local\Temp\Cab82D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar84F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3012-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/3012-1-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB