Analysis

  • max time kernel
    122s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 04:21

General

  • Target

    f52b9c5681d3f4fa05188c39ada8a2cd_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    f52b9c5681d3f4fa05188c39ada8a2cd

  • SHA1

    97bb98950817d877405f743daf4148a3c5c9014e

  • SHA256

    2ab5cee7daac67562f8c9c40513283b69e3406fe99ce34f6181b494ca5ca576a

  • SHA512

    2355f7a314ebb43f8859fe7bd4096d6ec46708224557b682a8559f8586b0be3cc95a1b2ee0408e759fe36d8f2f4afb99a8b6a90bad53280f004fffa3409f6e08

  • SSDEEP

    1536:4MUFSFoINm79U4fIAthA081qWMdItmNzxoUpocSYqwT7M91BBZpoumYWlpaW+VR:jDFc24fIALA11qWM6teqg/h7OfTiUf

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f52b9c5681d3f4fa05188c39ada8a2cd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f52b9c5681d3f4fa05188c39ada8a2cd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\f52b9c5681d3f4fa05188c39ada8a2cd_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f52b9c5681d3f4fa05188c39ada8a2cd_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Roaming\Axdidi.exe
        "C:\Users\Admin\AppData\Roaming\Axdidi.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Users\Admin\AppData\Roaming\Axdidi.exe
          C:\Users\Admin\AppData\Roaming\Axdidi.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2600
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2600 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d803a7c5735f8fe6895ea78134e60f3

    SHA1

    052e1de0bc99ba93a73d7c6f465eb51421cda45f

    SHA256

    0372bebb41261c081b13c8c79ba6ff032dc62beb4dc3c60fe723eb8ad69b5839

    SHA512

    c60813cc2fe3315b3ccbab7cfc27d0c345c8d23384dbfa957164a6dfe9bdce76a84f17af0473c2f19ea0947728b8d0445e058e6f504e02b6d47f383c4aad7b35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e7cbd5470d926626b6d1c1239097e57

    SHA1

    082a495e0724cc6996394f53587b413d0ff92e45

    SHA256

    e17fc2d37599a10a2e29f25ec76d4eff607b52bdaf03aae01e81ac5c45960515

    SHA512

    8ef621f5d33bd6e80ac9a7a7e4eb1b368444471f70904a9933fb2b25a48ae86183290fbb8eec5ff8fa4b206af97b9eb0832576eda319d9db8b01bcc57676c643

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74f0968b6cd754bf47c475b4d38d54c6

    SHA1

    ba28cdf69a48a52ea26eb7bfe0164fc4d0e22907

    SHA256

    339bba377048ecddb1dd0fa64a8b4e269514ad179c986589ce064246df63ec94

    SHA512

    7afbc400d0f3a48ea6ca7f58024258e8d6cd8b3820f19632184d81671b105470282cfb4e8c17b891a5942f5f93de4e03499f950d0511916b3519406b4c79347a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bcaa1fefc1c1280193781af00c0ff37

    SHA1

    832e7be8e293af771db69a45b5b36e4398cd2f68

    SHA256

    ebc8fd8d23e46487f05483adcf1fd2c1d063cc536facb768637a109ca655e1bf

    SHA512

    846cb73df9b58f265daa4fe52e9aac9154f5bdf8613ee68c3f5dfcf71c679434f16c0a450648ef6e1361aa04ce85618457eb716c08d4c62bc81745104a2c873b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c77eb4970b68727a6e2c623240aab7ae

    SHA1

    faf1596d92f88755e6e0ebb7d49f4a3ef00dc439

    SHA256

    64b5d28dcdce74594daff91ff16786bd9ef179a46a83130f22362582f7057908

    SHA512

    c380a30d497078df6a342706114eab21d3ae8c4a5bde26460569c8b0953f4d97ad539f55cec2e35b2b70f4f7ec8197c39926d36c02d97f2d6a1eaafa0bf3dd09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8c99c49b4f5196116d0a39e78ce9241

    SHA1

    7f3862661e6684734f072e13bb1d8bae278940d5

    SHA256

    27f09afc4985bbb4151428a59b2a351055d217f1de051bd905fb56e4ff2ae182

    SHA512

    46c82e907fcd4d8c578ab3d18300791ac584edf7127cd8d21493518532eee6dd7213fb698e54720985b9e3152cac8c87289be170548d9255eac8bd9a1a2f99db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd724f4cda59237ea1f573450471b939

    SHA1

    d83a03b2ab6d29936d8af08b8336cc780a9f862e

    SHA256

    f817443f398db77e140d4a1a045e7d5fe116523a8058412a2dd73563ccc661e2

    SHA512

    ee71f9d5b21604bd46af73e27df253e056c4d67bb9a2cea4e1d11e090b84dad327416a74d5b236be2251421ac2248fd711fe46f1478001fc8fc8af1e4f878b7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6f98f7f1fe76a61816983d91bbae627

    SHA1

    f65e1d07243f587ec83073f4d93c651bc6282d2f

    SHA256

    c4884b421ea326977c785bec9e202c1b25f721dbca5566370983e86c6fe5f09a

    SHA512

    0b947ff46ee5880fad31babe3864ee1a2e98d3777df91570cf764c093be91e5d8b79e919b49c8da652dad3a970b494b74afc963d7991a30cfc30d8c8679a3cce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef1e959614d80060215672d78c2d68e5

    SHA1

    330011d8bf24336610747795b04af89c42094293

    SHA256

    e263a5a8695d295112fa3e897f4f4220101bfb4930e2c53d5533ac6003a31825

    SHA512

    1b984b07f7441ebbb6fc3e736adce05273cce4fef8ac5e4ad7d4b5c6fd6134d552d06e7bddb92407081dd6eb7864f13f50f34024d141de899a1c7e0194c5200a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49217a1bdc43302da038be3c41525d85

    SHA1

    5426f9546e7d7612828d360fc60a3b5f82381527

    SHA256

    2b000b65e902a938e46233d105795b5435319fcd8aff00a8c8627890022513d9

    SHA512

    09e93b91f99b66427faf747b447dcee05ad3bc9bd3f143672ce7ed7df545aa138dcd4d3209a9bdc2530e8c5e39a0f1b72695e880d478cfd8ece70af54d2dde25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f32e615499320d64160cd6a7c1bbdb18

    SHA1

    8a7eec0fa577803736dd9cf31fc5458ae4149a95

    SHA256

    d400a99ab8a0eff3b7954009121a8263befebf93f7a673bdef8b75c305b866e7

    SHA512

    077b49c9f7667193061480fe584aef1030106554cd1a7a08cdbe6da7c3877891c07476b79f40d58b813d88c73424d514cb4bc38b59614092599614219080e043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be8afd85a21296d279dc1f74c9e4de4d

    SHA1

    7ce173041e37daa2358aff9418f17e8f2f19ccb0

    SHA256

    8876478259e3e3fd8e2442472e5c0f41b75b7f9950768b59aa67e9014158f6a1

    SHA512

    b3c10fbce54e97bfcaa4217c49b964ef528253736f98cb7d815dc42bc200e7d319fcda71481f54a2cb06984811edb4d99f1e877a4fb0c7b00d9fb92faedd4470

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    029d9ab02617f2d2dac341a6ccfd4c06

    SHA1

    566c06e7aeb1116cd058e9dbc1ed776e39beefaa

    SHA256

    14b63a49a925c004e3fbaf3d2c3d60eaebeb60adcc16081f5c665d36dae1543a

    SHA512

    13f9112c197e1d5c4bd6212bea66d523ba582af1182102d40709d507d3e124743fde3d2e0e7b42fa3a2a5277ee3ee122db13b6da7a7575f35630195f6c62b39c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    881e2cf2856cd4ac4817e18e632e4417

    SHA1

    1e522d4517e1f7aed9a986a284243b8f43c61770

    SHA256

    6f740d100c631a7d1ad17a5b1c9794806e013c8f599eb4df3c6c9d6f96a1c8f0

    SHA512

    c13a634133a608ca3bf3790d32aa01722a15083e75eb87fb7c1ce14d7c5a55d973c636255c67ba344003f577a9019b98f138ec8312ee5911c751d49ec9dc0e56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91758fbd217f5c8c5202ff20c2a4b3d2

    SHA1

    27d19bb87587b67ec182ef246cbc36fbe9fa118c

    SHA256

    94416ab03eeda909c5954b4978806c35366f3380434a7f40534ea04777a3ad27

    SHA512

    dcbe335fa38ec847fe2ad4ef25847e8c47f47ca88031cd64fc3d55e48930bd1d2873d6b2fda9014fb720609170a909bd3f2876577c856b64e16dfb3a2cc41e00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29609ba60491f82df0630543e89d3b87

    SHA1

    ddd9d1f4f6dc8dea95a7cbf45c069866d9959e8e

    SHA256

    b7e7e3346449f6e27c5536b79f5ff6e1a3959c9ae0c99e52a23425756e83bd01

    SHA512

    63f374af598e298671320795a74001b441359933a46b34c16fdf17db5cac83aea34ec6671989a2ebdb06775c81f1e9aca65716682b1f216c8acf259650575255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d9194710c7d7b3e99804c5eae64c973

    SHA1

    a0a172b165446ea6d86e2c45a576e00ce70dd6f5

    SHA256

    c8768ac85355d1617b02b085ee59e462ad294400205586e015599dc742660824

    SHA512

    5e33bb46bd51505f0aacdcf448c07780d738317f17e48321c47f1fc55e4e07e13cbb2d122844e86cda62bbf1dc9c1ef4e00037bdf4d59a472e59e2054a9adf60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f588f3c7beea69c449f2601cbc6b0c4

    SHA1

    ab5a595b692f366fbfedaad5aef9d174ccef505e

    SHA256

    8f25fd60e75f43c0b7890d7a7bcbd856e4b10c57b77488b1ac4270871a3ed9e7

    SHA512

    f136bc4e8efbf0065ec53f89b60a7f926ff2a8ac5b5706694b8acd4559035f0fa1f2505a6d4b61c12e5d0fb2281f03b10ddf825fb661e73eab7eb5ed4b8b8893

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3864a21e1f2766fed5902faa93ba6b3

    SHA1

    1ea36e600c90030836911a0c925b71b54243c24d

    SHA256

    bee73fe27b0f68bdaf3ca5c3fa27188df55c169ec61dcc3c18dd07fe51512648

    SHA512

    27630aeec4c61dd0a081e54f308c7067865813b8fe0fa9705c41e152df1969ceef51d04715a25fbf9f210e6a26d600e249d21b3c61bd9875ec04946c2ae4eb95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27887e2f898025dc23c28efddfef07eb

    SHA1

    27a10f83fc26be68d944a846b275338696998b8e

    SHA256

    8d7e3d2d0a923d9363e1c5a735678d8b98007aeec15598e894f8b100d91abf14

    SHA512

    a6da245a39c01f0d877eef17ae3be2e1713aa6dfed61edf3b494073d3774c823817f4dd31700a693e959e3fdb31a3c7c86386a5df1507a8c0598417ae68e6401

  • C:\Users\Admin\AppData\Local\Temp\CabBBC2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBC34.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Axdidi.exe

    Filesize

    124KB

    MD5

    f52b9c5681d3f4fa05188c39ada8a2cd

    SHA1

    97bb98950817d877405f743daf4148a3c5c9014e

    SHA256

    2ab5cee7daac67562f8c9c40513283b69e3406fe99ce34f6181b494ca5ca576a

    SHA512

    2355f7a314ebb43f8859fe7bd4096d6ec46708224557b682a8559f8586b0be3cc95a1b2ee0408e759fe36d8f2f4afb99a8b6a90bad53280f004fffa3409f6e08

  • memory/1856-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1856-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1856-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1856-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2148-27-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2148-26-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2812-22-0x0000000000220000-0x0000000000247000-memory.dmp

    Filesize

    156KB

  • memory/2984-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2984-1-0x0000000000220000-0x0000000000247000-memory.dmp

    Filesize

    156KB

  • memory/2984-3-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB