Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 19:46

General

  • Target

    f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe

  • Size

    64KB

  • MD5

    f6bcda3158de325660710f0e3d7b950a

  • SHA1

    fb3bccb8a0015c1a4503afefaec288a4a7fa968c

  • SHA256

    8c35aaf7043b5a6e29c96e48877afb8f055b558650d9120ee922cf245732b138

  • SHA512

    f5bd2f7e1e5c4a46e15e35a1eb03bf12d63b8a33c82359225954d2bcf756e59736a40296b2eac14367b3ec9a558343b7fb3eb402831ebcefa269a036d8db201c

  • SSDEEP

    768:LVh3DVlvqMb9EGDtvN7ES5VNvXNGlmQtLD6W7qptyybbJE1C0csF4RY:zDVlvqMqwtvNI8NvdGAGLD6OqpTmC0eq

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f6bcda3158de325660710f0e3d7b950a_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" superquicksearch.com
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" superquicksearch.com
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2328
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2260

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

          Filesize

          170B

          MD5

          1ba60f1f9a1223cd9087b18de673335f

          SHA1

          d0fda4854b6f44373407c019e6a9171b404130aa

          SHA256

          e46f9ae69dc358efdf48984d7003f818bad8358ba619138d11b975b7d9168654

          SHA512

          9a2f05b6f8e6d161ac7dc5aeaca03f8f4ce94243820c47e89bfe85ae3ac0cb197420f30568edf2d7a7fa98baf2ef3d9e4fd3a36b94a0d94496a63cad4a492b4d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

          Filesize

          410B

          MD5

          456f405094116940bcdbe137b52cd08a

          SHA1

          ea4fd2737a7097501f7e58b1cc168fcc327fbfc1

          SHA256

          03c92cebdc9ecd7d844d3169374d8c0a85550bbe802fd1aeb62cb6922be34737

          SHA512

          61b05fa00e69088d8eb080ccc329cb4995136ef78350e36605b2483ec73809156e12b35c218ed35d96a4b6c162399ac8e59d8abed00d6db238f8c03a8aae223b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1f703bdd7d52b3bf75c7cadf9efbf9cd

          SHA1

          a3304a955500d66f19db10aa51a71a8a29109a3a

          SHA256

          768f3aa298b1ad37b783ba0f27c51acb359cbeae9d0cb30666e0554a416070b3

          SHA512

          9d31fce9d1edecf7322295a94cc19edfc312dead278168cb44cf1931e547b35d4ecea272a30fe584cc9045d647fa51958602a52b3472f980e707090df0e93b55

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fa00d206a33df1e928d62470a60b61e6

          SHA1

          a3f4880e0ae70ca340da7efb15a32f9d61e0770e

          SHA256

          28094df8b802d60f23024cb668278a84787300b4dfa9bc7b6fe914b11eca5168

          SHA512

          76886dcc007e2d729ad52023d9d73b79b19bf44fcda5b462862b5927db1b8ec0e1bbb8a27ebe983424b8a3f5478cfa5f8f72628b6c8881a3078f056f7b04e317

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c61e7a5687374e19ae0108c68b339291

          SHA1

          90dc04ec147057a04de753ce784e74c39ec38274

          SHA256

          eea7a17f2d4568798137c187e5ff889623ccd9820ee474382e5dc84a1cbbdb1d

          SHA512

          c5b98969e54cab118afddb74989eae1fc5dcd091a7cabcbfae337f867393dc8ff46ab282d49329bbfc5e8eacec12ffb578f8e0e8cc2fcfb8768a8143b20b7374

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          49254e0119c77d0e92973946e5710d6e

          SHA1

          ddcc37dc22b2a176c1149a109991f81bae4d46b9

          SHA256

          041835a78ba039833888c283e969d23214a24889b306f175a3f22b3cdf8c1be4

          SHA512

          761b3c6993fb8855b506fb465ac78371aafa3465acbf427122be50f3955bb2a775de07fc02ad4a382f77e5095cb5a16a782cfdf62333b4ad155efd9900354f60

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4259b32218fe640b02d0bc2f2be7c2e4

          SHA1

          72378e8fd352345cab0c1f023355923b050ebd17

          SHA256

          2f4508cb4988e95f10c5a2827aab094e11f5a17c99b37d1c25f1d7e6a7b598e5

          SHA512

          2bec51017f7c1fc1518288445c3ec205b9154dc6cebbb27d031ac1fa62a1b71509be5ef2606f53c656931b82cc1be6028862299b866adbccd2bf0d12802fc958

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a918adbeff29d0a5a5b5a098eb4a7e91

          SHA1

          61d7cc68c2dce71f0f0f7e4107d6ed1f49205f1e

          SHA256

          58e6091f4939e9136bb367d28c85cf84c8a62bc4f31d3567b0ae774fd6070127

          SHA512

          ccbe6f5117839b447733260d6d8dff838263a805ae3685570b91a2370290bb31fffe1c74097649982c28c7fdee62434727f5d1218f21a5cc60eb9b4bf94fe033

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a97ff26ae8def2452ef5b65b57dc60dd

          SHA1

          58b26efb6d2627ac74d683cc6c5dcdb9a7876186

          SHA256

          4820c8eac55d1a2eb3edc2e00f242ea3a1a064ace64285c5743607e38e72f8e2

          SHA512

          a20b947b3266f0390589f8e3c25b73ea045845129baccca74780d6507b36c563305c31612fb565b4d266af7db955229231908596e9add5d775ad31257497aac2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          df3bbe6a90e59943c8db1f0e90f9e18c

          SHA1

          6ac37f87e791d8bd2c5e84b2c5310c5f164b2568

          SHA256

          77187c1d6950e6dfb8cf2443fc12e337ca0a8fe3bc2880d3638c320755120ff0

          SHA512

          6afe5bc34e3a9b56dc6ea851fe215543b77d59ebfc9c6e14eaaa1efe599fbca71e2aa3eedaaade6d020abddf98af94da4501da2818d17a882055353e6adff6c1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b00ff794e7bfc61acc37fc1fdfa7f01a

          SHA1

          a5db9f72947995f12f072e8784704cc27188f265

          SHA256

          50d0978ee8fda5447fa62c7a708dcc6e9fd54c5da6e97bc246e1bf90e34ca2d2

          SHA512

          783d3d20ef73f4024c0a17f283ca9ff90dd5b4b86c447f51522bf9a03625c3d6c149f417d9a85324418d907d9644667a353208e24a76fc1d1122ce682dc95e9b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          33b99695bf6e5fa7bd18d89db9b444be

          SHA1

          3a616614b5b85407cb607f835dba79f623dcd3de

          SHA256

          d75d646a35be05bd538a3a5b863dc0652d0c9c0dec918ab037196753b4957375

          SHA512

          332930841765afc7b4d611e1733ece40d7aeeca439bb2913e921dfcbb4d2ca1a030d29af713384264e7dfb7f037357c7e8c8f46271a93db66fb79de9f2fcafbc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3b3406e53e0c4bbbede4ca57b576887c

          SHA1

          1f0da4146292b8d572942fc0cc4427c602f978db

          SHA256

          5a5ada35673cf3c3aa2624dc2d9f0466aa798b2cca4ec83994313da71220c85b

          SHA512

          5f54fb06719370d9da9bf346896e0bd93f7fa7293081e48816a6d7f75fbbee9997ea8f68d6370962e0ace400cadcefb58862b8167ea541d940268229b3d3706f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          de6a01ceb1d24418fa5af63fae5ce1cb

          SHA1

          918af8f517a3004d7dd7e7e84f008e60ac4e9025

          SHA256

          68990128675604dd950037485c6244cbbb3198e3a7721d886339efe24e911737

          SHA512

          41ae8e44f813c4e75d75c65a4d6f1f49feafff2abdd7447b11b3f47458fa57748ee3b64fc133cb4ca07b5f695ae57dafe18922995e4ace45232a0e2a773ec893

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4bc0cf338b503ff86e50ff52d0e803a5

          SHA1

          afdb968325d138c42ffc8955581c7c20845bf177

          SHA256

          cc3c3a7964057471b2c8ed2eff6d30339bf1aa71cc791e82ff97467e8a842151

          SHA512

          27682d93b72f0756ef0c1ed682c3506dacdb1b2871d26215ed7079bf43829ae84af368bf472d4b0e65ea8483427d9da4b14acb36632747e3e2bb1dba046868be

        • C:\Users\Admin\AppData\Local\Temp\CabAC87.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarACA9.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • memory/2376-253-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2376-3-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2376-2-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2376-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB