Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 05:19

General

  • Target

    fb963a652ca701626826fbd35d7956f2_JaffaCakes118.exe

  • Size

    6.4MB

  • MD5

    fb963a652ca701626826fbd35d7956f2

  • SHA1

    2a242d47f5b962c33b47405f39b59af6a3e5906d

  • SHA256

    d81f61983abd66ac6901646014151aca3cdfc90afb4a76b3578f137ba0649bc9

  • SHA512

    5d0b1f90c29071154675c676a531ac329ba587a26626d836db0ea8afaeb1eee6b2dfa9ca52c695441b520856e1485ba393b9d6aaa7eaadebd585a4103e96db8b

  • SSDEEP

    49152:XhiZ58fVirJRW209ombBGB93TkbX8SlZX5FrBtV+1PygXBL:458fViu0STXjrdGy6d

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb963a652ca701626826fbd35d7956f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb963a652ca701626826fbd35d7956f2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.2cbb.info/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a8f5cb65415ffa28b82c2cec2148f84

    SHA1

    a728ac989e24c35dfa11b2bf139a84f96930f7f2

    SHA256

    d201eef6af4fe3b103489f0d688a0c1761d43b3112112a43216e6a4e437b0b77

    SHA512

    c858dd0306f2dee23cee09a749473abde34076f6ae7b15cd61c57bf7f720948ed149baf10f005092570ad3805c78e038d93898dfc3c31529231dd2773836008c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5edadb6db907e38e26d02eabcdb00400

    SHA1

    9fd60afe48dff433f96ac89bced2b3c4271dd7d2

    SHA256

    8ec7a034e3effe01e7f9e59777457e70b22b5bc753f78d547110b63ca8214fb1

    SHA512

    5d19ea30510fdec0d19a280ca64af0e6387e0620d1fc51eea4affe436a4975794b03b55a879995f6d4f28cf4da2069e37a58214e392c2cf04cb0cb0d560dd6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a9bb493f937b814c2d23b9b436a0226

    SHA1

    0ce58590745fb6ff78c84162e01f0405ce07f08b

    SHA256

    aa30292a28d10a0970bb688e8d8bb3aab1df31d3e8ca6a79b57931e4d69a6c6f

    SHA512

    30bcd425e8eec510cccfb745fcaf2496dd0237a4a241777574667049a7e8027a2d86add53503f63ea7d0987a5f35694d0fe00fcc4e7ef9402dd6546765d91c63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b134012aa71def1fbd786c78afd03a3f

    SHA1

    a5d0681b46fbbfb41956a3b7c148ad2d1f17da2c

    SHA256

    c003a776db8f9487b75fb597c7ed0d51cd56957460201649f437551daae431af

    SHA512

    c906e815653055e96b8d0c39edcbc919cf0c7d57ac1a62691c21a395803999becbfbd8258d70ee2cf7db3dbe30436b280fad03fa897e91ce5db2d16b523a1971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4663af1fe54242ecda432283b0de971e

    SHA1

    2c1b83765ac9da2bee1417e5c74c3ca1354dbbc0

    SHA256

    6d378a72f6d10aa23f2b2fe7757b0f0d1b8c1b38dc3838fe061cb2396aced949

    SHA512

    416bc3988a0e14908952cffbc6fbbb4be95de289e3ea8f3620887d1eff648adbe39a9fac11d3e6e0e5eac236b9df6140141af4bb6de6ed8e83356bf7c254ea85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08738444941191f4beae1ac4e3a9822c

    SHA1

    2afaff3e2a0c01e76ba18275fd6cf0cdf900c6c7

    SHA256

    1dcccb1d943a5cdb94b2b635ef9d65595d87d58b46c88f431f6aebc5188dce6f

    SHA512

    66047fd0ff30efa0a3f1636f1f00cd9929c2870520b60a89a0475d5f857c3c8c1e09d08105b988e0bae2785dfa1cac14c9dcd23cf10958196621b1a8cc9a7c7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77ee4042172fc294e953f85c99ab9beb

    SHA1

    dfc3a614d7fc57c8348c279c64a0570f48b92763

    SHA256

    755be6721a94a30542125a360c458dc545e950427ff9e8ef20f9d4df5a28cafa

    SHA512

    5fba7de8296bc27378a9294aa3193b05207cf010862c2ba7bf83e81118682e938746d991ce35ab1c3e39c5edfdeed8d7b9bdda92b233a9fb1dbe166e1376651b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f253481f4369701850accd40f2e0c61

    SHA1

    2ca35c9d6b80c995b5d9596d7de50c2d6a646965

    SHA256

    1809e4943befe2ed05f7d3b3e0313e39491c8383ce9a55aa3fe8fd649e848b78

    SHA512

    8f8b5f7e99a7af1016cf0933d97ff05723b0ec1bd48ec1aa5636ad2021979cc00707863dc282e5c7df3647e01de5f4d5d6a29cdcc096da607a62203f7b2362c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41654440426982a214c738a2c1336822

    SHA1

    c0abd4a618357aceb307cc85217504d8a7355ab3

    SHA256

    b6a35973ece06541b694712a39bc41bce12dc27439952badaadc4c96852877d1

    SHA512

    f9b75da8b90407ca05ce4551f5e1d81b3d0a8d846e2258f5de74b10763f89f340be3aac979c5c01a3e7e10164098d454d1918c2e62774320afa2ed3b0f52a643

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    168c2ac0c1758ad13baaaab2274d4ae6

    SHA1

    68d8ed43b42e0d1adb045dd99448d987c4ca2dd4

    SHA256

    34e8bd6e4bd11da44adce157c83cd74a07ab0e16a26b2db16c3831625328c7ac

    SHA512

    13b5f13156a6c3510d6fa7067451af8026cac346c4bff0884804e79a8e7a6c9f0b858c686d4325ba5c8d5c81fb039fa83ec1fb69d35239c9f09a93f9c7764e44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c80d3f7e8d990149056476f9c05f06d3

    SHA1

    8e49542fde7ce8e223f2bf3a0fecf94d349b5803

    SHA256

    2d274a5872b4009173581800b3502822c735ca7fcb2269e160724c58de1a123f

    SHA512

    275f53d2c3bff6d65f4b80fcce14100e6f327059d4e79df44ae28cbd975330341108c504d229c5e1fb80546d16391de3854443a4e7e0e1d4c6e111bf619d24a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e3f2b6db036201e3271227c65073759

    SHA1

    53efc709acbc6dd7ea78dd6c20d86b0558f6b4de

    SHA256

    0084abf4c9dcd5879c3a49a7b1c901b49d1941a560ab96215a62cf6d7fbcd200

    SHA512

    b1a749da2852f83899b92e4252bfba2972bb0674edf61370cb36bcd5849ad38cb524fd8d21affa759d5d809b8576647bf55506bd3241360c2d59696d1886a438

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c72989ea3f1a5473b9294d9f8873b39

    SHA1

    3d6b5d64a8496a6448396d6b7089199cd38ff18f

    SHA256

    a2310c64d187fce954623652a125b20ca422bfd7a0039a9689e2cadfa0b66bd6

    SHA512

    5f10e3e44c7affd5f8bbe61ef050516ee80d771a0f8fd5d5480b5a1644850fcbbe44449b57eb02b2380ce939ec98f469d4387fbb4c81c15038ccc751b307f818

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c020204fa79bea45fc9243ec47d46979

    SHA1

    c444934f7f5fd53455d849ac4e99c14762a715b3

    SHA256

    5e5671865b3952449286c590df16ba5cdd2b69f0303163be15273c6294d6b1de

    SHA512

    9f019c1fca4b6f2747a997aee466d34c341eec4582a6f32245c79a912af9f4580a07853d66885959dd2ab849462ac7db63f28b85839bfd56c886c9d521fafa3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f0666db0fd2df03500e5ff152f67e92

    SHA1

    c2748512183bad761f2ed681a0cdc4d01939064c

    SHA256

    8279279f6f640ba90477c942e2516fa782b9e47621a7d3133fa51cd41f5f08fc

    SHA512

    148be2d91655e6156748a3052f2779b98764a93ec43079974dcfd67bad2119b3b8ec2d871e9cb0158e0c43bc2890b7638fce21c85180ba462bdda2716766f77d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc4dcd3e8a48757953565bca8d346f89

    SHA1

    1c939988bf15a4cded1311dd20bc7f60e3a84210

    SHA256

    e770a264353b1a152c3d38bc52e74a5de55b55683fffa253a5967ecf9646d588

    SHA512

    8c5126c98ebb755caa259dc3ba11098291cacde79213ce08694959b671cfb8f2cadb927a35a79741bfc2118a25a6a36ddffa97a67478a66cf5448aef21bdfb09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8218c5ee6b38b43fc746f3b5d5f5fba4

    SHA1

    e28ad1968237c3d10e6d457882af97ff47ae71d7

    SHA256

    cab270ca123030f6e479a6b0342d6a3916a1c2e8c3a5da34303c2de0ef7d89a1

    SHA512

    2a849f7041a1bdc72c7c5adccef45a91d7b0bbd50a37a2839fe8eb791c0cccd751f5c3db05fa0c86460a252dbbdea332a2d7ff791525c007307824a7dd1607ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c4d698aa2e6ae584282ac3c919536e6

    SHA1

    6c31e5b5a58c158242cb7f0c75f5217ea8d5d54d

    SHA256

    f67c126aeabd27f019d6977962a74435c116e293f274ade8ae0fc1681e605049

    SHA512

    4850fcfc6ba40835a08c90b8c7cd3f4957fd6e3d6403f774c937b70d34bdf924a460d73e821cd123c936c0d7dc9c5732de5d20e2a4a36166f6f5919c6408bd86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3404fead3d410cbeefdfede7319ea481

    SHA1

    c3a7b0802bbd55e02a877a83ee7d4685dbe8e542

    SHA256

    85b282c831404d8861363f95c6b9a670e5ca42745af1a8956f47ab99df626c09

    SHA512

    892f99edff0aa8cea2294a48a69ce2df21d08204ec5e350b3a4b469d57f94ece31a20d715ef91575c356bd4db3977d4d72b6ff1c2a48b5a1657e1bc893497d18

  • C:\Users\Admin\AppData\Local\Temp\CabDCAA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDD5C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\E_N4\eAPI.fne

    Filesize

    332KB

    MD5

    3102c454a9543e58fe3ad5f783f5a690

    SHA1

    dc98fe9c47b1b4123ebe5e0132c0ba2d391570e9

    SHA256

    039670ca85824d4850e737a308aa8e628c83551a21711d549b17068fbdb2d9d9

    SHA512

    5b3218804054f0a3c24f3705c4902f333db0fc7b39aa81c2b71fefa0bc7d2a2ded14a13ab01ef3627889ff167ee7f565401ad0e5b5c9697d40f14f67228b9807

  • \Users\Admin\AppData\Local\Temp\E_N4\eCompress.fne

    Filesize

    160KB

    MD5

    71756e8ba6bec367176481c67e673f23

    SHA1

    91e40f02fdaa8dd36490336068b95e05a9a326ae

    SHA256

    29f3e0d132b07d9ea5c48f5ed54ee3ba1b0519e895ea9c0ef5ec518f4eb42d5b

    SHA512

    bd42728e7b751b12ddb945329de8d8b520918a8c3f1baecd3d9582b1f92ba3e6a8a9e17a93d827288460461bc8ce423bc48872fcf38cc1200e594dd84216967c

  • \Users\Admin\AppData\Local\Temp\E_N4\iext.fnr

    Filesize

    216KB

    MD5

    f91cfe6df71fbbbe56ddf70247ab9b49

    SHA1

    6d6e25569bca49c19f2a4b07675194a1bf055eb4

    SHA256

    7169863abd2e9a59ae706235224222754c44eea12a4304f6ac426ac4a89688a9

    SHA512

    841a0632b0bca43d590f72602a0161e04c77e1e881d5bd6d294edab4f9c5577bb8e46f15dd6a0c831e5774fa53e449397146d57b8575ea04506a64f3842490aa

  • \Users\Admin\AppData\Local\Temp\E_N4\iext2.fne

    Filesize

    480KB

    MD5

    338c9901d7a5cfeafd5b5a0c502fe96a

    SHA1

    0caf8271b2ebe5d3bd6fd66223e3a7a1e7d3dbd4

    SHA256

    6cf3add9e8297e2c6e0dd3ecdf7f8500c123c7779e5807a3c58de62aeb19156f

    SHA512

    45feb22b3fb505cb37ea0eff3494604f04a874ac6e8e2e9b2f2bf4d801f8d79a613967d23a4d69ffe0609d1cdba2c1292e5c8a3ec98df779db51b9be77a02a96

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    11696f334778bda9231aa6b72bbcdaf7

    SHA1

    09c604c90578fcbd4f596bdb013938a7523afbc8

    SHA256

    f1cd13f9ec76d87d4f5351ec5eee092fc530cde46bc71f74e0bd6c9fd7de9b9c

    SHA512

    071e8bd5ab8e4f12bbaf949c6979207257147eb8aa1d6ef7741ada64938721a15f8e78c6f74e74b642bdb5fde1e99b6059275c1e6b3d294f6e6c9071dd5535d1

  • memory/3060-5-0x0000000000400000-0x000000000094B000-memory.dmp

    Filesize

    5.3MB

  • memory/3060-10-0x00000000023F0000-0x0000000002434000-memory.dmp

    Filesize

    272KB

  • memory/3060-14-0x0000000002440000-0x000000000246B000-memory.dmp

    Filesize

    172KB

  • memory/3060-18-0x0000000002590000-0x00000000025F3000-memory.dmp

    Filesize

    396KB

  • memory/3060-29-0x0000000003B70000-0x0000000003BF8000-memory.dmp

    Filesize

    544KB

  • memory/3060-36-0x0000000000400000-0x000000000094B000-memory.dmp

    Filesize

    5.3MB