Analysis

  • max time kernel
    143s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 20:46

General

  • Target

    fd1d0dfe712ab423428e83510c20afc6_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    fd1d0dfe712ab423428e83510c20afc6

  • SHA1

    711006952e47cdbda316ecd2ca1f7cf789a50488

  • SHA256

    8474fe41166c39378ddac930ff2a1a218848f60a892ea69a784303ad2c0ee16a

  • SHA512

    0c14227962cae2fe19fd02bb3e1d03a1caaf90386d2513f0f6f99bf607cd4b8f7ffcac59dc31fa0681047e6d131758aa2223402f6ea588a9164af91bd762ea85

  • SSDEEP

    3072:8woIzHZuCZm9f3UgY2057qE1QIG5FpOFju05o7znMXENYYscnY:8whZu19/UgnQqe8vpOFju05oPIgHY

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd1d0dfe712ab423428e83510c20afc6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd1d0dfe712ab423428e83510c20afc6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\fd1d0dfe712ab423428e83510c20afc6_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fd1d0dfe712ab423428e83510c20afc6_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Roaming\Igzuzc.exe
        "C:\Users\Admin\AppData\Roaming\Igzuzc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Roaming\Igzuzc.exe
          C:\Users\Admin\AppData\Roaming\Igzuzc.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2900
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2572
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e89ed4ffc702688da49bbeb5ddafd672

    SHA1

    a788d16d55c7ade0e245eb527b661005f1c22183

    SHA256

    cbcf3a417aa1fb0678ff019542a18bf67fae21c4bab4f911918b5ff0fe48c7ee

    SHA512

    fde3bd4899f0b8176ffb82b48abfb36179a1e9631ac8149870ccfac1e017246f1aa26279ce935ce9801e5f349b271976d6d5c828355939f12b34fd19127b6af7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c48a68d2b8696bd94a686646291b24a

    SHA1

    9b87d9e2994f95ff86314c568e12ef456dcc8f69

    SHA256

    6acb304ca1c9c6da2da427b1474e55f47adec35002b6d1df9bd3c6e52f496661

    SHA512

    6d87974097a77ad968626cf031ef751b375b2bd63d0a674286727ba53adae9c44163e652eced2beeac227d07da74b87b7582c005cac438b16c5b22f632cd7669

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce210454a8d55a805ef6d8fb33f78daf

    SHA1

    febc45547a3c6984f5ebaa4d0cd50cad54feede1

    SHA256

    6aee1ad68b4b1eca58d3ec5feb743bb9886246013000b8754231159e84b945c6

    SHA512

    8b8d3b742f6272f4f12f1499011ec61ee8f97270c52d2b7959a416fcca580b1483d723e5a1fc46a673adee035578677c6728e3fee9e9708b1ccfc4486722d162

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2012c01881d970998647066a2368b91

    SHA1

    918de475fea74d8479e9a12ef8b65a3396b6268c

    SHA256

    b5535a186d2eb303350549ee97b7409e30b2c20ed7604f95b2685bf437a527c8

    SHA512

    b24b371658e463485f79678912ad453d76a369afdd3eba5561cb24a0130772ac26580cf40d58c27b0a6b5a86611c5322cbd3107eeb23f339328535df2fba1fde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c41c3dbc26eca17609db50ad23edd886

    SHA1

    0c7e7c2e6082bd6fbaed0263ce2371e9729871e4

    SHA256

    c85f9edf8f0a4229a04aaa67b29805fcd76b05a4f570ec46c6c9e95c5796db72

    SHA512

    dffd5d51088b998738adf8c2e29dc4aaaf900342be7e1f5d43e2c067ed6d07a0d7c9ab8c9568f4ee8d3fa2d762656a56d8ffa2ab5f26904a240c23df834b81cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cb439144d02337c57559b9e49e6df2f

    SHA1

    b77f82f8db294a0d0f1502b13f282d04bd9869b4

    SHA256

    2f05dcff286ee07e60e01699b205b6edd19ef14718fd8f0f0f5d82b157bce5c4

    SHA512

    aa1ec000160cd700508971082f2f8a45ad099ef79dc81c1595dd1ac6e92922e0afbe2a08a770783d03976745c5d407f0c4d5703d76878460dd2c8cc1163d7977

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6ee31d0d3fdf243f5152935cf09f664

    SHA1

    209f7e0150a23492dfddd8557bf59fb17bea8369

    SHA256

    d9245a71efe87c5e56b2fa26888bdd028aa8f92d5a52b755e5d9ffacebebbb7f

    SHA512

    3b5d2df5a54d0628b1608a6da0be732bba708272689c00618dc63646cba35e8a0e632ccc22855a6e85a6b6d220057d97b66040524f44f7fd4378fb3b64334bf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f7c1d7b413a065a3af2cf02225ad323

    SHA1

    4f57c00605a74795b901b0bf02623ab6053da11b

    SHA256

    6a6ae89cea34bc4354765e1a54181f72a9fa7d8a16ddd539a4e35da9667ccc3f

    SHA512

    ae3205ad3ab77aaaba96eac0fa2f215a413d4c120b5e08fd99eb6f8348c62a825ce4c09827895729de0efd33fc2b2a8fbd22751ad61f79af0fbfdc668796076c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5401398ace4e60b2721cdec3291ed26b

    SHA1

    229d63f317f5da9a9dd5ed0327fc789b9710b4e8

    SHA256

    1f6f2a55a421250b93be09412d549f49e723e390614ba7665d6be77d7e328c43

    SHA512

    16915994418bd90a02a6bd02ecbec70f3e525c9c81fea7f298bfed6958880ee7bb735474dcb2d7026d01d7f804efbc021e408bbee912b6c36169c9c93ad42239

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e194e3c51b4e8197f0326d997e27b9d0

    SHA1

    e8554b193e017b1d881426faf41e5270e2fb1aa0

    SHA256

    2d0c261aaabbead078708e6ea3328830a7ce2d5741539704c1c11302512f430a

    SHA512

    90c752e6dc2dc8fa69a1fda94a87b3e61c499cdc2ff0e127207fef06de6c1337d44ed0de96d5f51afdcd1cdc1f81b0b8d5382cc12a73a3933ed482416ec1776e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f92a1314703d836504c046c00f374c00

    SHA1

    03502d88b4fcc2e04928b5fad64050bd21f384af

    SHA256

    61e0be24949b10072fd710f5603eaaafa5510493c37d3b4f224b1db7d9af1733

    SHA512

    39703489ce739e6a0cb9408ecaa377176434ad958f8a5a49285b0cc94250078e946e67e41bf1429cb57eb645f47648a8f1948647f712172156d0cc84ebbb3f11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae8e5be28896cd28988d470d17da8d8c

    SHA1

    bd09bc14d20d1264778d62591edeb597376644e4

    SHA256

    642328e4e34e2a960672c4d0a5f5ed581c393473f26b915cd6d3776deab8449d

    SHA512

    cd56f5f40bf5e666fa5a9614713e839aa4d1a0a925eb0ffbff3024e4cf7ff910c91441a0edaab1417c4a64bd76dca9a631b5e8afdf885663509c3177bf468d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5640dee809a2c9c9cb5b74f9b6e7ab44

    SHA1

    86a98b035ab375ac4a5ee6a7092e787d5492d9ae

    SHA256

    49958cd8898d0c2d99b76497bcd16dc8c1730ff83609333138c1d74afa782c27

    SHA512

    860def01eca5d61fb46d364ad7e0e4ba68093ae1c0923278004f845c0116e571b4704cc722fd61dfe751482f8c333850ad8c7f54cd1fd8fc7fcc4f71668b51d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe26eae90c1f024a327ba0d3495c2bfb

    SHA1

    d466a90bf33a7f4a7a48683e50c88d8936cf17fe

    SHA256

    9e075caea9743cbc8d28d7380af1fb322227baf26047860d68683e90a653e376

    SHA512

    5af78e37f7c2d8213428128a5ce72044d29301568c287267d621b900ba8dcf159ba7b612c48c57ee027866b85671ed34548fa6a41b63b7d407c4b91fc52079aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b72877f49e6137f8b9098d2b760bbe20

    SHA1

    dd53992672ed3655e53282d20af5e1c88a8f0386

    SHA256

    4ed25ca9138126c533402ca896e350675ded5a1ecd73e9c24f6b41accf5da68d

    SHA512

    47ea133c8331a9dbb3c1281abdd364b3423de90f08b5edbab099cfdf467926bf8bf7c58c920b1360a7f4bdb1855ec3882b53a6061e61ff47ce4191ee204ef4d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a742b87db98c30af9442c99de079a2cf

    SHA1

    c3b760d5ad208f55b6ad3b66ccce0af4ecc22a6d

    SHA256

    7049b7344c3960091270416cff1cad10927182c3d07aa8654813262e7f613e12

    SHA512

    08d29da4fd7f0471536bc192c143cc56e999752adf9c6ce4c89ccdae5ac22bd84a50f5af34a5bcb627d1768012cf6ff497ec290fc87a42ad4ab633efeca84710

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbd5cf78692a73781f3250058ce52d77

    SHA1

    4ec64e2541a775e832ac5ff5d18997c087a8609c

    SHA256

    5d6e49e1ac97d6e2d1fa04a9bcc6ac094b1bdf76889907ea4a02c8837f0d2a8e

    SHA512

    c3d748044a77768b1093ad9cd0d2e6b90a46b8b0586b5a5d2c8a7e3ee6bd006ca46eb061dd4ba444fda53597f4e2fef194422f5ea34075f4db7c21206842aeb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75e32eebd6fcddd7e8c472f5a6d2ed61

    SHA1

    ee8f40604a63c9067b183ae585e9415c04942dc6

    SHA256

    3cdafb9062702a7de6552be10ce99a320a02e84aeea0e3b8aaf796d08a4934db

    SHA512

    d52cada8dea0e6df1e5e02117cea35d87cc9f0c6238b13cdc33daeba7a0b41662a1ba837d1eb64e01f4f538220ede5117d7c44bd6f1baa8a7fe438e1c79ae2ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e06e021ca710251c00b5e3dcb5813816

    SHA1

    4893171c154c89c0f0845d3cd31a48c80eb88f41

    SHA256

    6857f551894053da30f74752d11cc9acb6ee482fde2e793b25c134aec04224ac

    SHA512

    352689589652be50c176d2da19c33f80771bdb3f09e7d2546af4c79f3f2e18ad88d83f5813fe1b903a6b4b51ae154deaa968bb623b4150cbccf156183c3c5c82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbb310598f3d98deefd79da9527661ae

    SHA1

    d1c2803bf7c6b26bfc116f386c1deb69a272e7de

    SHA256

    02a3e2e8a9c8ea5a98436f7067037bee02f182627c16f59fee9e768353e94641

    SHA512

    9b0be905f03b9e2ac6492701381703c2ad2136247b9fd6fe0b67980d031c7391f5218ad9642509280706104d01f9c183cea1c345b7069907dd4c84756ebe344f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4fd04f8f6e1a81742d06ffd65d1ae9e

    SHA1

    6f9e472dcb1bd8bf42c469f8f58e1346c9c734c5

    SHA256

    ac31501ab18078d9fab4aa6f71294a16e08cbc1e1817547f32291b084ddd6a66

    SHA512

    46d6cc96e4c8fcc0659257b5abffc6acb32f7c1a5be9d591fa50f759dc8c5dd30250a5a726b24317a5323b9688119639395a937d1849f0c43ca130eb6d0c3b0b

  • C:\Users\Admin\AppData\Local\Temp\Cab347B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar34DC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Igzuzc.exe

    Filesize

    168KB

    MD5

    fd1d0dfe712ab423428e83510c20afc6

    SHA1

    711006952e47cdbda316ecd2ca1f7cf789a50488

    SHA256

    8474fe41166c39378ddac930ff2a1a218848f60a892ea69a784303ad2c0ee16a

    SHA512

    0c14227962cae2fe19fd02bb3e1d03a1caaf90386d2513f0f6f99bf607cd4b8f7ffcac59dc31fa0681047e6d131758aa2223402f6ea588a9164af91bd762ea85

  • memory/2632-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2632-19-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2652-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2652-3-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2776-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2776-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2776-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2776-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2900-29-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2900-28-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2900-30-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB