Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 14:53

General

  • Target

    f6415affaec71ce74152879133c9660f_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    f6415affaec71ce74152879133c9660f

  • SHA1

    19f3475c6e10667ad5af59243baa1195c6ffc999

  • SHA256

    d31569c9fcde20aa334f4e8bb70a54b63c72f2b6ccbeab7ba7b18fb40df461dc

  • SHA512

    eb01ae4c6b4c1b965eacdfb012cb4a4ca7a4db61abc1cb4c2e1e3035f6ae7bd41f9d5a82cd9d006f31b004d6e1440a37764318f01cbb73d2f1f9735d4effa8fc

  • SSDEEP

    24576:b1sSpMOSmno0qlxs2jzwRq5yjRg0NpFeF+bmZaubvGGknJb1bfZaubvGGTjj5:bnM504O2nw05kN8+Gbv6nJXbvV

Score
5/10

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6415affaec71ce74152879133c9660f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6415affaec71ce74152879133c9660f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://user.qzone.qq.com/604756086/blog/1281876115
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61c01490255b097d0abfc0bb3aad1b1a

    SHA1

    773322db870bbbe5306cf45834c51a5435684dfb

    SHA256

    09e57054da19f6ba5d2deed526d63567c54cfec3f20b10033e78602251ca041b

    SHA512

    75606efb855ecd2d443b70ba03fe5850a8a59d1b1ef7939977c67d25f01cbf592e7e87b5595e441bbff8dec082d87e06a88f7f9dd2b36252452c108cd8be4591

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30b11fa0a878edae2cd2b243306b88dc

    SHA1

    be054b960c198d772bc15e4904125e293477cbbe

    SHA256

    25ac9b4f87f554551ef6ddaf481acf2281023fe2f2028a731b8f22916a231ca5

    SHA512

    3ae59df33007a69fc042901541f9eb6d25993bc62c68e978cc764537c7eb6f83fcd010d9e79cd2260c7290662f90a58edadc4bcf9c97e384de63834900ce626f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9455806ff5716ac54f88b2690b5703c

    SHA1

    0f042bbdf67ff5c777ec39a9f258040d36ac3d53

    SHA256

    8ddb2616fdf5d088e33228da78cd0e341e7b0b35833b39fe0b9ae6ba5fa4ce00

    SHA512

    04eb4e9f0e45a34311d97a7dd749c0e1b5d094ff07bc5f0794bcd2f93a175d63e6912274869ec59cc11a2ceb4d1c622033e3652731bab9ebba821010d50e233f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7236768c991bd183f4f3b57edb305ba1

    SHA1

    d02b62f6bd62d78fa3361eeec20f06555b871976

    SHA256

    a744cb6b14735d3934988521cb81d0b7f6508907d6e91e2173dfe67eff37b0a4

    SHA512

    54d8701e4f956ed39fc46994237ed2e13f73006866527f901aa1242a32fc0462254d367cd5aa627a7cade8d7ab5350db8c7a21bcad53de5c7988406f3ef2df7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e48f735c60c925058985751b1d2200f8

    SHA1

    0ba19ee3df6b768a7f67695eecdfc03ea7b4504e

    SHA256

    33175afa6d43a3d13a74c0362a5d89b31ae4ac3a5428fba1594b4da474d1fdc9

    SHA512

    f2038b0d66a5cc1fa3ea02cbe2f2a836d8c5b4402ef7591322e011adee80f522bde8941e45ca3fa80db79b591f7b8f9b0324948243b4278b24185a6a576ffc5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14d34fe2f71a16ca11d879d6a6078337

    SHA1

    d4b896b9b867beef358642ca1b9c5b5fe4aba6b1

    SHA256

    e8a9d2ac8881bbc494b509c3d87e5e303955815b4bfbd56525f78c6163742644

    SHA512

    ec4a0d5da1b3666a1f8ad65b3b1ea64610342a911c4688d34899ed99e61588d1261215022825c27614282b6ccd3ce093d1ae5013655bba8ac880ab645986122e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c49a00f86c183ba94b435d30ad27b738

    SHA1

    e4e22cd941d3b65317d833b72412e43bb29e7975

    SHA256

    6b7589cf8f21a5a7d5b0ba3837375a568ec84289ebb5ad9d011e849be426eff5

    SHA512

    76987d4bae40adc9fbf394cde9d3ac70030c83de657a8e518ab5f7191d82259c6e42cd9bcbd13e98ac581f85d45786e0bfb8a747f1e12739fa8576c1934b2184

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    218347b589c59f4def70c8386e5bcab8

    SHA1

    410224e3a7ac56c25901651e5413ee6e407d6c9d

    SHA256

    f21636c0a96824a81e9bb363b8ae3728a15296dc93d3bbd31bd06f38b3370d66

    SHA512

    ad0aaa40cd44cbb9852ad92716b522613eb6a70af5564170430add218956e71cce0e0e639d81f966c1b0c727be7cbd732e0a93cf59d75d8c3c6de464168c188d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9691fb3a836a04c7882cc195971d435c

    SHA1

    611309a59acb88c02049819793db68c7e97d504c

    SHA256

    f2cc0d9dd88dacf3647b78a0aa1dcb916f914eebc1d5d56d393a7a17226f0e7c

    SHA512

    bfb07a3e150283037f0882eac6532b9632849ba7ae064dfac148d3ac6c812a4a37e546f65be7828837e04aae30b66c357f339270ffbdfeb57f64c1c8f4919efc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de0d28bb435ac89f531fb943e5e0dcad

    SHA1

    f9c2995347ff9ece46b2ca8598c514546e8f1158

    SHA256

    6b8a775e5ca39543b2ab44055f126afb771686eee581ad265bb31212467affd5

    SHA512

    718bc5916807df229e55e7943c5ffb5b3d9e7fd8b74e5261e47f18d6006ac5d057e26b06e2aa63dd38f70a95070d6352ba14369e6f68ed3bdc5d12961d4d60b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    414de669c539195076e30873df4f71c3

    SHA1

    d2c45dedf5e2f1f207eddcd96c7421a20c50ba9e

    SHA256

    395f4168a0e0cf025ae6011809b6c405a7b29612a100e0c2f0d83939146a21f4

    SHA512

    20f3b41c66e9878f092817d86147f55ca51bdfe374ce3c0cd4dbfebfc88b1ae2dd481f22d930e673699ec762b4084f350726ff99586d3ecd53dfd9ebcf190fcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52dc91648be582a6fdafe603c2ae3b94

    SHA1

    48836f3ba1e176f00db671192dfc7b29b2d4debd

    SHA256

    dc11eada7edb42a42c475cd5827cd1eb114d8c214b9a23da10bc581225ddc3bf

    SHA512

    b2bcbc208c533671a110d373b6e78d2cd1af4c606ea726cdc50f303e4c6dec9592f35a7ac0c7890caadd7ab08a48f48317dea07dd5ca624cf26cd5f155cb12e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af7b70825cd7feeb6c19eb8ef608d598

    SHA1

    eba5a2bf6bc0c4b94e00939acf02632eec08ab42

    SHA256

    5184de25c485012214923e48f7c61174503c1c166df5c70ae3aa34864b188619

    SHA512

    6d2ff01a15b515417fd5ac1cf57c3df61bef3b3fb999ac8851aa01da2cf8f72e9400b90416262b34e1877b62e606c35cad20a88af147d67d53cf1d14cab9cb6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2d7b821630cc49514a0c0a52a6d6be6

    SHA1

    53b1333d4239b23f25289776f179b1a5746b97bd

    SHA256

    7ffae8f61da2da2502057da7516da7fb85d9f5f1e11c5416f2bcf90234c5f8b5

    SHA512

    1010c3029f0d6b6ee6e5fca5a586ce1ab4f3f764da336f0c4101653b040b39c4399659a74b7b6606b57b4fe4d257699d387948b8c5607661c225b518dfee6b87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b95b4e092d5ec6556b0fa8a2f0d8dd1

    SHA1

    db27a68facc42cb3b0ffe05b780cdba4936a1d2d

    SHA256

    5b7df22f447bab7fb042198ddf3dafe8ed0fd23d56bd111983eddff069329a47

    SHA512

    8ea110ff7a6c511e1481e53891fd9a08cba301036a98e2baa43ac20681dec8a6179c8aa06fff1886dd27f49d034aca2da4ffac8b88aa855176e631cc103f328c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b88079628b9b9ca50f761f4183fb9fd6

    SHA1

    93065a505168b66c1f7ef84dac3dbe43d814f2a5

    SHA256

    55076619230d0f8075e2d68d759e0cecb7e02ccc38b96adb53f6b55ed877d24e

    SHA512

    0ea91ecaf83efca9010afe4f855ae7acfe2a072af296ee429f731e242f3d574377b46a15f3e8d6902c23d26f51ebee5c5c943578c35db8a45e90ed51308e6a13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e91159e983003575a3232b3a59c16cfc

    SHA1

    a94d0bf6443d94cb70f34db74a819111576f63d7

    SHA256

    d7acbbfd89e94f6d8d6d4222af8492579198989d9f6a73f175799ee768d331dc

    SHA512

    11fcf5bd0f7b0a89c2606eff4437e74ef1cd1e293454627ae53bdabcbe7562497276572f5386d7f9214fd9580f4fad96981c65ae38688a93a038c703f0481568

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da1e42f533c64f2add2274ade6e25996

    SHA1

    f76a637b993fd682235ac36ccc3df4cff820a464

    SHA256

    75a524b7d1ad72ad94af8aaa9fde15f462871c1e10d55cb96d0fa2864ce21c84

    SHA512

    34faa436ff6dbf6476cefb7cb74a9e458a7ef2bce11cd6f4dce82ed067ac677d3ea51f64bc85a898cd382825b878bb8aea9d3b26e3b933353b6713bbd24daa6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f1d88ca58345df6d5e522d67267d841

    SHA1

    a84f03404c4e6a85b23143f5db13b88a67722564

    SHA256

    8e8bb69dd10aa2a374ef8136af2665143555e76a582c3f10d1845ec77934de3b

    SHA512

    8bf119b7bd2ca3e0313aab21b6a68c08d0c93046c567b4c4d47dc79d7f4dc27c8170bd19fe1e7464bce5fa173e27657d780cfc946fcfb2271ee26e3dd1f88715

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9b857e9038da0a0e8d425493da924b6

    SHA1

    e1f4832e5a24929100720e812747e1df1e4173b0

    SHA256

    2608bec63ec5765b33673c0b119f76e21c640c41ebb51f2d01c1abeda2ecd698

    SHA512

    f636da5d48849e91a42b8e4c8749999ea5d12c51b74bc54b0601b3440f7c4cc39938f067b993f9888d1266c3cd3e7c16a7e7ecdf0c006c9f891352b2562ffe37

  • C:\Users\Admin\AppData\Local\Temp\Cab9F7C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA01B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1876-45-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-37-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-11-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-7-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-5-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-15-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-20-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-22-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-25-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-27-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-30-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-32-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-35-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-16-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-42-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-0-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-47-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-50-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-51-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-52-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-53-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-54-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-40-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-13-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-2-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-3-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1876-1-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB