Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 12:30

General

  • Target

    fc4cf9904189014bf163ffb1cefab765_JaffaCakes118.exe

  • Size

    553KB

  • MD5

    fc4cf9904189014bf163ffb1cefab765

  • SHA1

    13d69333012357272d6b666d248062297f860379

  • SHA256

    3d3cfb1f4b6f38442074b104fceab39bcf319db41f71e45ecd690b5ac7b91625

  • SHA512

    946f713335dc2b7f7d25405965b158286a032fc0314c82865fcdfe1adb481c42e285b1c5522636d8eda70e47b8878b96fd5f1eed23b5c111626314644298948d

  • SSDEEP

    6144:he34R2vP67zh36dqXEV2rnCeZG/t7FTBqTzP7n7O7L6K2Bfo7pF:52XKzh36VV2Go0ZTsnz7O7L6ju7pF

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc4cf9904189014bf163ffb1cefab765_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc4cf9904189014bf163ffb1cefab765_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.phpnuke.org/s/5/4/54108-93590-proxy-switcher.exe?t=1727526615
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbd0e7d3c8fa8a1b7187cf5df2c500a3

    SHA1

    81ca08acc29a6ea3553c9986871f2be52a74560e

    SHA256

    fe2f44e39a8eb3e32531d9c3c552d912b26ba5ae87e7aa4936c1eaad529bdfb4

    SHA512

    8bca2afd355a6f7933e26ed3c6e321015b84b377180cdcbd86962fcbe72b179fdd8f2717bd4e8fde8bbe501882fee774242b6c351c8381fb277a907d06c47c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf05f6d9700b8ea442b02d45c3f1b18e

    SHA1

    f0224b0c2b92983f197b9b57b6ff3dd81a7d07cb

    SHA256

    f4c94c6690e3e1975d57b1270b7f394247755341505baa95d247494570fa24c6

    SHA512

    9dce4aaba8b7cb60f0e7e0318bcd7120c8623baac91519c94bcd972fcece595919eac4d7e3e4ba8281e4fc390d61f4b55ab566d9700b1ca02f61b29088413281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6823779d53c15ded6b36610d270c916

    SHA1

    0f74338c1259b55cb22e6595e2d4ef8da0bd61e6

    SHA256

    fec5a38f57ff6e8a6be5db1539404aa2bc4adf9b620b8e1defc7b41ea2081e5e

    SHA512

    0757bba90ffa7dc9305aa852b9eb400822aad08091fc50d62920e83291f5bdeeaa3b44c049a126930103a78ffb7b476406079c71b292b75210004f5a8f8be1f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    528ecec32135c04000b7d39c8663b05c

    SHA1

    0238657aed6e495adbb2af4087cdd7c640ac75f4

    SHA256

    286dfc986393613efe63d71c1c530778e84a0c3278802a7a6f87fa4d39a7d330

    SHA512

    fc5ba3ae14b8fe4b52aeb3dc098dadd7b77e48542cac189538bc582e1fcd4bbaabe9acac31a66aea98ad9f4024a4344dd65789e98da1172000f6d00b0d30838f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8fc587ce767e37aad1302c7ba3e7581

    SHA1

    c745414f6a9bb50b26116b58b524f668a7ae6dcd

    SHA256

    5a0f0807793fc72a1dd40a917a0fe1ddc130a5f4f4bd1b880b24481a6c9ed3aa

    SHA512

    1679ce478f3da75c4b30aff6af77db46c18a53afa9152c417b46f30902837fc53fea01b4ced715278076bca319b0a245585a0e6ca821d14845f9c280cdc559d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2c721dc561e765a5f0eeaad09ebcf9e

    SHA1

    caf29ecff24b66be5387e45544615e35cef469e9

    SHA256

    63dfafe45d752767af2f5035f462e89af4a5f29c2707f22dcd257d9887e3a132

    SHA512

    a0d903243ee202c0c7a251cdbdf41a63e22ae4a9880c1450487f30af2cc16aeebeffb505332a9c72ef34fb3c50fc346db8c850005d38aca18ce6479c5554abac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c83916ebb1731d2364731b3ae784aef0

    SHA1

    a692d5b7d9ecf0308e4240517d8134c7bfaca0ea

    SHA256

    4934fff85b0f08e45c6398166b86725f341a95b245bb2ef4a25f2c91a3675bf8

    SHA512

    13f0d8ba2767b688be87614e7bfc0ad52297f9fa4f36f636b9add3578abcdc3792ed76a700db4e3943b83241373b43f5bf6ee3ab6d512d11a135a5c45cf4da52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77fadd037ea84c87c769bbc21ca1f052

    SHA1

    a360cdd67fcf1acce5d9fe49a707f7716d068e49

    SHA256

    f4e940043c9f5634c3f015d64fcb1e735638197ac73a6f1f4e5e7182e3c2e5df

    SHA512

    4f563572ec02cd9665d678858dd0ce0135b468f678ad798fe0e4a04a055d1a6bf4f62bb865e26f3eb2dbf23ee8d2e8a9a106e732b2617daa99498fe4f0bf16ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdf990c499f1be5a9faf4137240f022e

    SHA1

    582b3d35ecb432cea70dfd9bda37b647d8ed5cff

    SHA256

    17475119183cabf77b94f69b1b7c6d6a6b29659ce3717874596a50c9d4af4fc5

    SHA512

    f38c76da8c96e8ea8cf44410d2df46074ef7768a622bb56836c17dfe174ebfdaf36b347fcbc648d8669006b2a789fd0bd25180d0cda03881e7a0fd9780615965

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fcdc8804f47f6bf6a3bb2513ca9ee99

    SHA1

    da2d8cfc0bea6ca760e46022eb34840fd76d9b57

    SHA256

    f6a9be58d32e24345f05475afee3227adb0706512dde29ae86d6bf2cd9b853d5

    SHA512

    43ce8b921f1bd2ab11bce742514f675f3c6837352135479279a85d073203afb4f4370df6f30fc88a53fd0318789d2ef8d001061d36863087d32d3efb586a646a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e4b07deb144a8c0a16c6ca78916b6ce

    SHA1

    ddea8bd51299a30b1d0e86e407cd8fd5697fa4b2

    SHA256

    47e90206e03c7aa9d9110ba61b6a3d44dbcd1bf33cabe3d0e416760e56590390

    SHA512

    16068548b5020d834707eef7c9be076d835a11567b5a161cf638e37bc8c86c9b0077b4774558892565ed13b0cf26f1a936a7360ff24651a3961e5044c63046ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3eb25f167d06f74608bad83e1368d31

    SHA1

    63f6fa4419301e1d9abbdd54a879ca238a184aa1

    SHA256

    ec1675af8fbcea98f7556ff11a1da75cd527f7fb6210e5141341a865fc157e1a

    SHA512

    2ac3b846e7f4ea245cd2a4b0015361b0d55d14a92144f2c45069d31fffeda2e10a62df7f9ea04677e1379e301d1bd80cf0650b1e57e1bc8e8de0c8c0612ec7db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea53a5cebf4c5fd532890486f2f3a70a

    SHA1

    aa8d86fffea7f2443751ca8bd026ec36d2290e5e

    SHA256

    d7857274e76397bb2d60437640a2b68a123855e3a3b3ce077938f2c4821ecc99

    SHA512

    5b4b36d68fca821454aa54bc01e65deeb2be789e8a7b87e6b9d76f2bbb7f0cb904f8671f1be0f074aee84922fde4767b06700be756c355353501f9b886f02c4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c0ab5b3b3b367a56e26af8e1b4cad31

    SHA1

    7d0deb310296dd7076b6510814783eac56d6d2ce

    SHA256

    4905a84524f6bc6ccf25c6d1cc3b03b3a60535e28b395df3cef36d5633262a62

    SHA512

    e98ba2eb958df5d9f60043872b588a35af263e4de81675d17a170fea1de6c43b695be13f55469707499c59d80ddc6dd718db2f89b78f390d44434e414c483dd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8908247f61a9e6fa647787e568ef84b

    SHA1

    aff4b8c9a1139be5aef986b96370ec1dd705a8b2

    SHA256

    a6e1b7652eed68d817633a3f5a6fdc8d187271ab39c770413554176d71a73680

    SHA512

    bae1b6b1428e7af58d82066a77454d5fd1e22ac1ace45ebfb9a8b5ad1af2e6564ffd287d64fee043f78f4f335eda684d53995b218090c2e3abbfad1be92a8cca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa1d1f4ace541bcb71d125c501f079c8

    SHA1

    23b6a9be20890f7a76c8be56ce9dd01aa71513d7

    SHA256

    eaa387f15cdea0d793c478311cfefd04d5af0235f518921124eca867e8a7bb77

    SHA512

    33bbebf87266ff8040f69bd1a0f76fde7a3238e2c44c4606c80babc4246247daf14b366288840ce6c63b1e0a98d01e3ba75c1adf19dff1e29c4210574678f093

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c2d3c87703896e849cccb2bace12c78

    SHA1

    6e9d5dd31d4b84e02c8c01171154fb98090da25e

    SHA256

    eb2813a858eb0c6707e0b5e588f77554c2171f7f7c63f081b1f45bc22026a5ea

    SHA512

    ba5a28087eb92044d9c80652375c361ce7ed3867867051c19a1e9d7bac4a2d4fd0853baa5e5d459a32d5c039229eb39c49b274fcc4dffa4c266bde7497a04408

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53968c427be6b79c8d725df0346ef7a6

    SHA1

    f9c219972db791b829c9555481e11168b390b1e0

    SHA256

    891c080211a90df18e65550ef94faa68d62e8d0207e8897c725bfc0116f139e1

    SHA512

    505c251cffa67a96ebf1dff5621506b0c6a52473e5a86fb4d9ea0148a1d1f8f01490d6ef17cd99a4ecb410f59404d551f49dab7eed54f146b9236a802e61b5d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b946a7aeb34c8586a757262f67c4f88

    SHA1

    95600bd7d82d32417c995761ea5fafc933ed737d

    SHA256

    7731932f398b98800118650ba25aadf6437e206fbd3f00d69622f16a2bf9a39e

    SHA512

    54d5df89625803bbf7f9bae1e40af578a289c0bee4f8d59fda38884f5e5949618eac8c83910e21e7e49ed34862838440a97ce3ba20ffdd32ecfbbe0514db8d2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3983c83a206e5c565088f7931d7134bc

    SHA1

    5256754bec3f50acde9b50ac762770e9d1e37a56

    SHA256

    f3badca8e566a3b263b44a0c608848f9ae1a153a1d384784c72ecc2b81da4b29

    SHA512

    5abbe85a54e614b25e1cce86f31aacac76c5ba81d38c810313ca99d94adb0db5ef28aa9180b4831f8120e63040e6cb8dd030543c193b10076cb52e44c9d747e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd610765fd75c91a1c4a70391930a0fc

    SHA1

    eaf0dc7c787e012291f5eff7d9c30d6f4c25fd68

    SHA256

    6ddfc0dcbd293a5eaaa7af696f323184f35e26a4c6f2de25d83d4b43b5f07f5f

    SHA512

    aa5fbc90d843109eaf5ef47fda2000f4fec352a4fed1e4dd2225d8fe34a10bec4b36134b4568060472a85c68eda438d8ea108c006b9dc450b50981bdd978629c

  • C:\Users\Admin\AppData\Local\Temp\CabE515.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE5A4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nst8D14.tmp\ioSpecial.ini

    Filesize

    400B

    MD5

    d74bdfe8fd5c2a75064b45a7871ada44

    SHA1

    c087e2a9dabde9fff3f1dbf66d01d51767af9bff

    SHA256

    733ee524a6ea0ae77ca4145ee6f792ce7980778d597db505418205a4cdb58d90

    SHA512

    e070485de981aadef2c400fdb7259ea6ac13089b8d8412ef5b0bfbbd9bbbc9484f55af8c14c83de25d5f8ab2390c8070002dc2720e4419b1cf0327f052cc222d

  • C:\Users\Admin\AppData\Local\Temp\nst8D14.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    22a22af786412fd36b61c744e4f286a1

    SHA1

    02360371e6008afa2351761fa319b416ee8ca84c

    SHA256

    19aa1f6f990b5ab14ebc4b8987b38587e3e588a82ba64091a06b5365959710bf

    SHA512

    d3d88ebebdfbbfb71449df8a1b186803590808c39ab8ccf91e65e098d1daeef3323ace43106bfd2dd19edd7123d5d7d6d11ec1bbb488d40ada269b0c5a5d366e

  • C:\Users\Admin\AppData\Local\Temp\nst8D14.tmp\show_page_toolbar

    Filesize

    1KB

    MD5

    ff34ae805e246c24e7a5fe5578ec913d

    SHA1

    c0b842ff3b5aac1318940f876fe4d119edb476d3

    SHA256

    94b36b6924e6f26fb8a9f50fea824ea59e58507a17391f4e4bfca9083b286288

    SHA512

    80e1ca6c284f751354154be21e72b925897b3a717065ea46fb9581c2be0a1fd2ec3722097e45cefd08c3ad8d75eb17cb98bcd953e5011cf52481364d44dc754c

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nst8D14.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8