Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 15:09

General

  • Target

    f6476bdbcfda0bb7b67d9c1c05d419b6_JaffaCakes118.exe

  • Size

    250KB

  • MD5

    f6476bdbcfda0bb7b67d9c1c05d419b6

  • SHA1

    b374177a67362540ee2735417c91d2becfebd41b

  • SHA256

    d274c43e0538eca02eadde5fe9d29ef2c1187fc8e518ae1e615e81fab26a8bec

  • SHA512

    14d5a196668cf354c0b86c034e46edb1063f4cd67c803228a0a7bf1173973cce7a143ff6eca4fd904983e9c523a27135f191ea19ec261bd8d7b11484a9d4fa5f

  • SSDEEP

    6144:8hieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:NeKrJJuf86AYcwoaoSbr

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 26 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6476bdbcfda0bb7b67d9c1c05d419b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6476bdbcfda0bb7b67d9c1c05d419b6_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files\WinRAR\winrar.jse"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.com/?g8
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2664
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ping -n 4 127.1>nul &del /q "C:\Users\Admin\AppData\Local\Temp\f6476bdbcfda0bb7b67d9c1c05d419b6_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 4 127.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2712
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2960

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\WinRAR\winrar.jse

          Filesize

          11KB

          MD5

          9208c38b58c7c7114f3149591580b980

          SHA1

          8154bdee622a386894636b7db046744724c3fc2b

          SHA256

          cb1b908e509020904b05dc6e4ec17d877d394eb60f6ec0d993ceba5839913a0c

          SHA512

          a421c6afa6d25185ec52a8218bddf84537407fd2f6cabe38c1be814d97920cfff693a48b4f48eb30c98437cbbb8ad30ccd28c3b4b7c24379ef36ac361ddfdbf1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8b5cd8e896a208be60f6c6569c769a79

          SHA1

          9f5fe43a5766edc73a4f80e9a0849b6a9c1da624

          SHA256

          20d1ee2a08bf07b9901de226f6c4f8651d116b7ce872a580c9f08bd80eaf5a6b

          SHA512

          62e342b38d9208d2e56766be0781180f71c7a72822b0a4089aae64f9bf366c825237d6854525c171b56caedcaeae634a7b53e6b66f6a2a0a2fe7d1cfa85f0689

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          affe7a0a4051f1fcae3dd135e0014de2

          SHA1

          f5973d496aff2d756727cb5038b16d929c348bc7

          SHA256

          e97416d6e6fa9c971d9abc74efc11564ec713e1c58d5021b6c67bd2802ae7d3e

          SHA512

          9929667d01bbeba1e5f8a5a773ca6e243c05a6d47cd4d103dc7fb7582f0a96da76c4f19ae10a93ea3e54e5200596e8f5fc7ca3d93e59968a7228335711dcb029

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          58f3d845869e8ff7bc26c08380b3e27b

          SHA1

          6661ed9c568a56f5b01000113326a259e87ff39c

          SHA256

          29356618fce7021d7e77e89623f324d55e658a2891a35550383649f35b0bc298

          SHA512

          e0b66c2ba0dfb760a4be1d9da4948058d9fe7bca9dec2fb5f5718746d599ada804247bfad05026b4a990e4743e977ca8360e657a93fe77d3503d8ed2fc22285b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c7ca20252cc2e87fa4bf12d3b32ad773

          SHA1

          8152ae9bef5443e14b0a2576312ae0a381c6fd0e

          SHA256

          0ffd0e61d72c8178319750a7cde93ce88108907f2275330b7b7ef02aaa408a32

          SHA512

          23d47c0a95236ac5e4dfae97671a5e15f52825f28014e3dec3d5b2fa759e909e2fec395769954640a4bf71b5d395377787b82503511a78e9d2b6006062226420

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          12cc5935d31699744b46db3e4d7d7f61

          SHA1

          4deeff16b9ea3bfd595682529fa77e8470f79056

          SHA256

          322e9c08f19bff1f6d8d25814b33cb0a9ce61f0216b17f129c5ada5be8a987a7

          SHA512

          1341a8148bc3ce90e5358104197d9f8e30e6fd9d2787cb38ce0ab49c2473655eba75c53c4de60bc790a6a4b2d02ea17d26480fe9fbb0f54100738ef3f146a880

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          6b42146e2fff5be6eaf8070d53f50b80

          SHA1

          f974180306a0753fe752ba7939471d47ac05ba80

          SHA256

          3a29f7f173fb58b773de9a07e52beeeff947101efc0038d395eaf250a600c9d3

          SHA512

          3688eb814e9cd194f78c63dce29ee2422cb1367ef2d65eeb745aa19745653dfce9974b1638e65524c161829dac804723864262fc6a984f5ab86510aa893e637f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9331abc19dc240844e27c08b084685e8

          SHA1

          8eb7bad7494f04adfcefc4c13cc6890a0e45ef3d

          SHA256

          11318bb416f29ae36f0f720a186312a229b09a6c8a0f4e25924ec92bd70fe8be

          SHA512

          b77bcac43823be86cb0c24718c2f54a401b59fecf2c6fa25e926a265191fb133a2db722302bf1473971a0f4630bf10ff3d130a274f657b4265f4961fd5c90008

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aa1687bf7d4d4491fd043ef0827126f7

          SHA1

          5c48fb9cd84436793f4a6f5b39085e06ed939dcf

          SHA256

          bd63e5c60dd12778769d6db4bb2697e0ecf70fc292496cb8a5eb4c4053ce4cd6

          SHA512

          2d7eb07a110cae6128773dcb24bab1444868eff3ace69c729fe2469f61737e9bb008fe6bae88b938c0a2c0d9fb591904b772d30dfb10caa3f4e76808ab814915

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fd94f6133a706090a13961916b37a6f5

          SHA1

          9ace011581fc10ce58b125db1a9770b2332ebcc8

          SHA256

          deac4fb229ad21b23e0a2d5ef543523b2b43cb380699b4264605d56cb1e5e123

          SHA512

          821677757b3cebe7267be93a4343f73b255d6d0acb95292b2cc8417abc606ad714aaa5a4095f1c49754b4353fe8a88cb494b6272379ca2654258a8edcd79d2f9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3ff7f80497668b544c155b82a78881c6

          SHA1

          7e8c556bb168be218bd2d90913171165d3cb63d0

          SHA256

          d64d29292d4eac792db9293157c3f1810df934c2633b78de16726b180a427bb3

          SHA512

          7fa5abf0a7b9f878bd622f82d5d921d5377bed73c254d03156365d183fd5f7b8351329e40c5cbe9d18788da3ad4bb8e1056da2120a34b2f50cf6d64b7c060b22

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9d094c17aa42f31c9c7a3aa3248b0405

          SHA1

          ec898385850facd17154e4e64c658d4c6df07689

          SHA256

          527d58d291bf64bc7b42baf6e37436c24c187e7691ef9fdbbcb3e20d544c2fc0

          SHA512

          7e9390bee69d78e0e9e6c7a1f0df40cce954752d7cb5550fe88afc914fec77568d776d589180a2366fe7a4ac44327fc37576f00fb30858f49cfdac023de3eba8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2ead90cb5d29838ca98c70787b41270d

          SHA1

          3b40fcc904b2e247b1c674cea885472ed732aed6

          SHA256

          83259a89e438d295ff93a147f3ac5a29819767b561f42287cb9dd298727a86a3

          SHA512

          8dacdbefddd518f59f837b07804aef542d90662260fdb8c769d9a364e6fb8c85d0ce5a0fc58765fe02fb7890e0c33dab135f115de5fb90496f4cf16d17436aed

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7369a8a55854cb84653c9ef3aa59148c

          SHA1

          c54456e8dfc0c4d35c54021831c8d97f1c8ee88b

          SHA256

          2430c2ad8f0737c15fedd5769aca7c4801849e0987513cec4aa6e647ad8712de

          SHA512

          8df77c7f90071242142b3a58799e3f7be47938ade8c6c20322d97454aed59a2dc5d5e948a7836910c893758c9dd2b776878fdd26620c0c4a9e5684a1e25013b1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1924682b68b19d80d46e3e090b3f012e

          SHA1

          520fadf348e26422d591ea0c6c735ba686edb8d3

          SHA256

          4d8baee6d5720a057c70aba83f30b225720863f4743ec0dc74ff03cb17ac178f

          SHA512

          425e08210d144549f2a5a8e0ba7d8136c95e6f5496c538701c74e2037b187a3c6c76ddf30ca0fee5910b3e87c8591da59fb6ea61965bf7d6257df2d1a35e1858

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          beacb8e9da5f039885a4476e0820a8a1

          SHA1

          2dbd351d6c0a1128250b13b53c99a6a2da8dccab

          SHA256

          1811b55d224e2391a6efcddbb47940cdeb618fe354ff567bd107d989146dff2e

          SHA512

          fd187df0808cfbe2cd410661d9f035339c9300c35c1334e76a326cde7f12fa1380c02c81f6e3e319ec79c3d7429fb38ab920e9eda8974a19f6f01357b77f52fa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          afc50c6668ed4a84107b6ff837a2aa3c

          SHA1

          56c63b53748cb15c790cf4b850c356da0e8ebd38

          SHA256

          8fca151ccb2a49a6b64612f8cdd91b378d877c08c6ce234014e4b1e09b7993db

          SHA512

          a07e13a1e37b9d627d27a3da70f0c18ae2f2e4e4ada52b49b245a9c7b7532e91bf977ecfcb81da53c2b1f58aaf5cf0c0cf428bf7e14f79ebd4b832cc04b35367

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          38ef007eb64699ea43cd4d9a71a23222

          SHA1

          507e5b9c9e6e309dcf1618a6c4babff48f181ae5

          SHA256

          50ab13a64591a1e3444db61e941ce91020d5f9f8868db3f2632ecd9bd67c380a

          SHA512

          debfe30109e9a600e75b05bc5720358aedb4448bb1d745e2270ebdd25d062f7a318b15841495f89074aa45586b4a1e328f4939b1a1a034b72f827e171d1a9306

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7f4fbd75946415ba702f9ebaaf9ba8a8

          SHA1

          adbb2d064cc68a9be839164ce1c144c39f54890f

          SHA256

          a0e113dfad975a9cdd9bf4a8f54e380cea9df57110dd9dee32760dbf3cc94498

          SHA512

          67da277978e4bfc78d556afefedd9c4c5472df5f78c26c64f00dccde70bf84917b01b803f6cdc62b373a0ed56fa6ce0d70334dde0d591366ac520c02d1d9fca4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          18bf0b7f3937e8da37ef2ade33ea0ecd

          SHA1

          06b3249f75d652fa824bc278a98d32d1889d7d91

          SHA256

          88f5814ced965efc14f40d9f6e999692a7a8315b4f09feeb629c9696b2f3125f

          SHA512

          9c84c3035bfbae2cdfb94730c864b4d39ccc1139f874a75795bd840f54a2eb2cac846f4b0b3d753a64b93880dba328f79fe7276a7b280e4f4993d3686ba8cd42

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          39b7d51eeef4acc161c0213b793f2d2c

          SHA1

          aa0775db66842bc8e268c78bc11f1ba971929206

          SHA256

          80af49ced8980ca4b3d0deba97241a1e941ab953c79b5045f3b77be082c093b3

          SHA512

          97dc7e3712c823af9f95bf3da9bca2b6ad004f3bc432124141dae13d23cf0f6c7b562fe6d53eab294135ea57e3e4d44b3d554fbca2d495965a7c95b255fae8c1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4c341f2450a43ceda35cecceea620398

          SHA1

          5e7021a83d5ed873412f48ffd95136aa01561e4a

          SHA256

          a8ba603e3c275c50d0fe5b2afe7c4408a410bc011109ce44f045ac3848f3f6f3

          SHA512

          e9929d9986648a5e6dd1e00401d139d9143d9c71d9b960b878b222141e9edbccba0639d31b86920000ae0241667cebcc48b98c2202f8bb007a27ba9245d6a9a2

        • C:\Users\Admin\AppData\Local\Temp\CabB4C1.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarB4E3.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.mmc

          Filesize

          255B

          MD5

          a0c4d2f989198272c1e2593e65c9c6cb

          SHA1

          0fa5cf2c05483bb89b611e0de9db674e9d53389c

          SHA256

          f3170aeec265cc49ff0f5dcb7ed7897371b0f7d1321f823f53b9b0e3a30e1d23

          SHA512

          209798b5b153283bea29974c1433fe8b6c14f2a54e57237d021ecc1013b8dc6931dedcc2fe173d121c719901045fdf2215177ba164c05d703f2e88a196252ec4

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.mmc

          Filesize

          149B

          MD5

          b0ad7e59754e8d953129437b08846b5f

          SHA1

          9ed0ae9bc497b3aa65aed2130d068c4c1c70d87a

          SHA256

          cf80455e97e3fede569ea275fa701c0f185eeba64f695286647afe56d29e2c37

          SHA512

          53e6ce64ad4e9f5696de92a32f65d06dbd459fd12256481706d7e6d677a14c15238e5351f97d2eb7bfb129a0d39f2603c4d14305a86821ed56e9face0bc252b6

        • memory/1452-0-0x0000000000400000-0x00000000004B1000-memory.dmp

          Filesize

          708KB

        • memory/1452-36-0x0000000000400000-0x00000000004B1000-memory.dmp

          Filesize

          708KB

        • memory/2960-1092-0x0000000002230000-0x0000000002240000-memory.dmp

          Filesize

          64KB