Analysis

  • max time kernel
    121s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 18:42

General

  • Target

    fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    fcea2dc46dccfc78d672b464ea29b9fd

  • SHA1

    efebaf5bba35c52d994ab6c925073543801c0ccf

  • SHA256

    e2acca515cc2e5226c40dd32decbe8f9a7194ed36a55ddcd21cd68e024c3c621

  • SHA512

    873cb812de8637ac5d72ad0d20266653d773b89115a49491e0a124d68c1763d0c87488695dcb91b58540c8ab920ef43b560faf33d0b3d0bcb16f34b11c6276f6

  • SSDEEP

    3072:PmPWTOBX5Su7HyRmFdu7nmFycVZBSOsq1d8cS2Le55aOJjK9E3/C1rtooSst:OGqjeeLVZBQgGcSEe55nJjggaxtoG

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fcea2dc46dccfc78d672b464ea29b9fd_JaffaCakes118.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Users\Admin\AppData\Roaming\Zthchb.exe
          "C:\Users\Admin\AppData\Roaming\Zthchb.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Roaming\Zthchb.exe
            "C:\Users\Admin\AppData\Roaming\Zthchb.exe"
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2784
            • C:\Users\Admin\AppData\Roaming\Zthchb.exe
              "C:\Users\Admin\AppData\Roaming\Zthchb.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2620
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:344
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:444
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:444 CREDAT:275457 /prefetch:2
                    9⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies Internet Explorer settings
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99cd2d5bde11d204532963c13c43a83c

    SHA1

    4d4fb902b4d87e2e15db45d507244490c1a7ad90

    SHA256

    f9b93d7b66a0edcf123adf0d88007617c27c2e1a888bbe46aa19edfff6b8b667

    SHA512

    0e562dff4a70123362a799e95c3ea37c580ba5d662b9779872fde67b61d860ce0d2e55e4c234afa58268e9e52080ac865ee0eed391bb759bee3686bbcf0de12e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    722681523f18f77efaaa76b95f137d64

    SHA1

    cf644783f3e943502fe6091f713091f3cc22189a

    SHA256

    61b6853eb32de2831323e976499a2448cd99a7b05d0ac9e26577def0097436c4

    SHA512

    ed98506f90ff61e96463a2a3f888af4842705572e40822d8dcffd1cba63d3b5781806dc2dde8c543cf3823fffb13f3afab3778f8a562a6c169fbd355f5f92b6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d256105de7cf508c947e62a7b0145709

    SHA1

    81c0f490ad26612ec3df5203e21663dc75248b7f

    SHA256

    22e06576da17b13120b21770de703964004acbccdb58f0131b14baaa1b73d1b1

    SHA512

    3adf9c3f52e27defb26204429dd07844c6f1b3f3ab03703c8bb8ac8f66a4eed2539099f3316de83e93f896590cc54e3d1667fe0b1069c52af69f045b746c6232

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efc1a316efc092ebb42c1cfd86b4b19a

    SHA1

    2821a4fb1192951b9484fb2cb29432611a946de1

    SHA256

    fbaa979e50482110e3a81fb2505e82d4530c609540af2d04b8f9b785da91a9a6

    SHA512

    88ed783c4f8651783821c4ddde4cd6cc4a394f7909f302b39724e8a1bc404d25b6ae13d744729cff9a8d370b6ef6e973eb56c388d5e072e53dda35752b5b44d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a5557ef510554bbb48e3876019f4054

    SHA1

    06aad29cb5951a3e918c42191eade7ddb89dd806

    SHA256

    bfab584784bee745122c9ec74cd60939da7039c01a7b439968d973c0a0c4c81a

    SHA512

    562a16cde5ee0c3ca9e2e66bd4b9e42e15979f4ad88fbe0d4d3a5df97b2da761fc5ef5f4ebe1511463eb4f1af0a44eaf2be56aa2a19d2e59b94b30ac4e3b9fbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8cc4e070efce90cb00ed2c48a6d0133

    SHA1

    cbeb180efc996ac3c9c571a9498d953fd221faf7

    SHA256

    925527abbe327dfa91662b5e3608153e2b263af859027fc5197a7a0337e95d76

    SHA512

    b25e498d8e4d5008cac223869a59493916c63e5f804cfefa9f215c7b65460695f011e51460aad35069cd8a91c088e1875e0c703598773d4c7476323d736f4c4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caa5734a4ccc51a05770946abdfb0aac

    SHA1

    026e1c1aa8d39b58c201ea4c9f3a66f4fe1ddd63

    SHA256

    f0c576c02ee57558432fe68a9f465cb1feca5e8dd6ad8cd7d32d25d4a54e41ea

    SHA512

    dae5b5fcb1ab94f431282ae41863d459222bebaed503cdae9844cbfa8e7b8fc9070815749dea3dc5a3054148c332eeb0d4b7e4ae7b47c976af4de30d0c52a9bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    614740c54491050d0adf01d7ea645f0f

    SHA1

    d2e4d95b03fe035cf2cff62e4530a9ed0b0cc5ec

    SHA256

    5a5e6d0c3f0fc03b42df3893febd492b82e010b0a2e29ce15e1364cea89ed15a

    SHA512

    f615021aa44ebf7d0ac3045d876077ff013899e86bdeaf64c54378246fd27bd24f479221ab107b261a912b3e4cf4e7d9c5e0318ee299229145f2505b7ba2f865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc47ff0ea36a111a60e8c7f7ebcbf300

    SHA1

    0964be6e983b9eefeb8416347335ebacb75bd399

    SHA256

    737457e487870c7d06659bd8dc50e7b95436da998a7cd6b0fef9dfeb169f8ff3

    SHA512

    bcc13405876e56d0a2d8061b104c626743088824d948b62f2f1e5f771dc085c9c568eea321ae345d2579aaa7a5136aa6cd1bbeae6d0ebffae1d0fbc833010dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7059630e1afe23e341bf643c18b5783d

    SHA1

    4b8cb6bc1e817c59382b7bc259436b3d7158ced4

    SHA256

    7064482a0011d803adc39b7d35901ba6c23dcc41ec723058ed22969461941e51

    SHA512

    7460aae1b3b4e9ea67bde29940504e151abe483cf66b47686bf35b8614c3634279f5402bb8a0fee55c45563d429baa72b530ad95f7b6518294a2aa4368d59fb7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21fb944cf7fbe463467096c33d957bf4

    SHA1

    6bbe07b4e19049fc1567594c20935f4476629776

    SHA256

    4cdb98879246a869c18f8b046c31ab3397476f0120a712295af17df43de24e59

    SHA512

    7804adfd4b0daab119c44036318fb3ec5b5e0644ff0a6e1bec6243b56171c28e349db9bb8694f12cfe089c658a8cf17262573756aa5eba98201b3f5bd94cad57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b9d2eb7dc918e7d1c45e4d17ea65575

    SHA1

    ae3d86b3a45d303bd6e6a2c71bd566bd7e86f9f4

    SHA256

    d17a8ab441dfa6738a52f62d13266fcdf441253e8d33073e09ca5e9958472d1f

    SHA512

    17436d774c0197a1d8bbce5dcb20d0a0b5b581c80649514dfe41956b36b18013835906fad0e733ed17055344478fdb043e7aead20730b5d37500d49d3b725a87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    988244728e5ff6638fe25c07fa62d03b

    SHA1

    3a872ca1f83ef71d01097e3a848b5fc3a2c806aa

    SHA256

    82a5d10c68ca5c8ffbebbdee09157c60fb6d3694e218a105a7de00a2eef8cfa6

    SHA512

    8a9d7b4bf9d51ca4004d6e5eb47ae76f3e33a46040af20316e44b740f4ee066083343dbb191be5e67b90e7a79ece520cfb8f0425aa20f0a2333007f3fc467c59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f9eab4ac3c78fabfa0ee8225887e659

    SHA1

    7c624658e6a0725fd0e0fcc11e739eefa5a1be0f

    SHA256

    a4eb051b179360d97dc9c63e86b3793cbce3c9f684262341ad925077683aa69d

    SHA512

    3602387f6acad038a6b6eb2c5eae8d02a63c8414bfdd36bfbc636dd40c84b8814e849b61d1357df4e2cdff7c790355be256b474b919ab9fe98810c7f724126d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    717648d8f058781407843501ea1c414a

    SHA1

    3c2c4abd099c73d87b4bbf5a35b8ad14ff88c60f

    SHA256

    8b9f1b3c252d4945dc8f78203ff78f6ea14ae14330ccf9d5be7d3ad3b983f27b

    SHA512

    127b3f2a8b988f7e97c3ccd542e15ec2e62294cd3a653e22d204458240746438632b2ef43b7d6b9a613fb5360f9778420a7602f822b36300e84a15c7f414b396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    533d7dc95651b4cd32a7ebd4e8da89b9

    SHA1

    fdad545bb49a7ebe4261b9b48b1a0bef3034b58b

    SHA256

    41e62e46077bb4a11b4df1be51966687719e8c3d592fcdbc67493347af3a222d

    SHA512

    51663eede80860e0c7819099a62a4761bba176e9d024871cb669c7b802116afa1f9d7019c43e6ac858a95b4769b8abd689d2f5ea0e68709fddfbd9226fc36223

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    072cf30a90f30ea993d3f8e34799759b

    SHA1

    2de1203368f93ae0407ef324e6b8c4dfe7ea9666

    SHA256

    737502052b2bf54d6b2750cb5c8062963e42cbf6f38d736dc3dcb6a86d5e9596

    SHA512

    f82409558aa0141affaa7259b3a5c4b38592fcfd228d3ca1f4b59622b7a993c308c333e1e073b26939b03a195201cde42c3cf2ad7580c46b913eb496c56774a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c5f3b4a14804fb665ee583c239942cb

    SHA1

    cbe2bb448ee5412fc3b92b38270fab9657bd261e

    SHA256

    cf22dc6b97a1027c0ce578de45a9f60541a658176eb86e27156d987543a47924

    SHA512

    a9c9d739958837aeb3251d0d1f78d6108bbe2977ca903a5bfe536d6d54ad90002761e045e18aa4afd59a16d1a72abe35b559706baed1753ecb228cea5b96504c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5acc659faee0fb4cb3773e1c5c01c5cc

    SHA1

    fe07db25559c483df2a35d22ba4d9e384f6e4538

    SHA256

    41c5922e07bb2d7b2e5bb76169f8aecbcdfb7a73dfdf5a82818f5369a833f24a

    SHA512

    03b3e3a3429b99f75ab9d845022fdbba0b36d0d2411c567a06509b1adf6b10d83d0205cfd8986ad008f7968dac9e518f96e5f34c1f5659e421922f0d03f7c5d7

  • C:\Users\Admin\AppData\Local\Temp\Cab512.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5B2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Zthchb.exe

    Filesize

    228KB

    MD5

    fcea2dc46dccfc78d672b464ea29b9fd

    SHA1

    efebaf5bba35c52d994ab6c925073543801c0ccf

    SHA256

    e2acca515cc2e5226c40dd32decbe8f9a7194ed36a55ddcd21cd68e024c3c621

    SHA512

    873cb812de8637ac5d72ad0d20266653d773b89115a49491e0a124d68c1763d0c87488695dcb91b58540c8ab920ef43b560faf33d0b3d0bcb16f34b11c6276f6

  • memory/1148-4-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1148-2-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1148-12-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1148-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1148-14-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1148-32-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1148-6-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2620-87-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2620-84-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2784-80-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3024-46-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-28-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-17-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-34-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-33-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3024-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB