Analysis

  • max time kernel
    136s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 07:40

General

  • Target

    0034f1212179755bc4d28a3f4792afca_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    0034f1212179755bc4d28a3f4792afca

  • SHA1

    1bd974f713fbc6ed070e32ef4745480a385af408

  • SHA256

    cc00e8e28446453d64e011931374e528534ffd90b97ab949fddf9c0e4fbf43f0

  • SHA512

    178e486abfd863d0559608cf0bc9ab10c82778afd1e7552f37b22614848e1e77d703f963eb3bf0f80ca5d99d9893905fea1560454adc1e28c62633968aa2838f

  • SSDEEP

    3072:YD1Yk6XEp2j+dneHR0vL5Ed6ybSTkYOgxT5NDXBpX8vaa:Y2kmwneHa5Ed6GrYOgDjpM

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0034f1212179755bc4d28a3f4792afca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0034f1212179755bc4d28a3f4792afca_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\0034f1212179755bc4d28a3f4792afca_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0034f1212179755bc4d28a3f4792afca_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Users\Admin\AppData\Roaming\Sxozor.exe
        "C:\Users\Admin\AppData\Roaming\Sxozor.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2244
        • C:\Users\Admin\AppData\Roaming\Sxozor.exe
          "C:\Users\Admin\AppData\Roaming\Sxozor.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2728
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60367a1a7dd280950c2159070fe16205

    SHA1

    74949fe38c85893d0d5d3a8f39bb2e4e3e32a8a2

    SHA256

    7d3679924ca5407e845b2a682b43763a1150d96abdfd750da071ee26a3da5086

    SHA512

    c65e9657c096c312d27a6a28de87a473516d754ebf846ff85e903d5d968095aa1db9db87afed03a70850736cdde31b95eaa74bffd4fd3cc23c7ce20a4ce46458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85d145fe79e2406fb2f0fd686f5ef13f

    SHA1

    0c4fbf53a6ecfb79f9de4c2aa4f76968e5ae3ed0

    SHA256

    e99689ead481b45a4b18325b8f95d8903df36026b2a7cc97f012521d6479c4e8

    SHA512

    c1ecd56bdae6cf6b08960a9e7a41b4cc16f96a8c7fec0f60ea03ab40df6a8b8e74f56e8f0b62ac3a9208750f1ada80076a95aee79d40710e66eaddfdd6beafd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    067472a4ac6a064527a118549f12c136

    SHA1

    2d4cabdcfb6d73c1c4d92b42d9684149230df0d0

    SHA256

    10120d914864f28910d9800071cc66a339368d9b54a113c51092b03efcaaaa79

    SHA512

    de2547859951e3ca74dbdba667cd0e6c5e3cac26cbe99ef0791f5a745b73a66247dfbd4e0ad3a13f918d71846b42a20719ce60093186a67f5e17523ba6fe6e56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afe33ee4e8e5a78019d45566aec28b01

    SHA1

    d096008fd29c3c9346adc9c8371cd2daaa9b43c1

    SHA256

    f89d7fe2d55c1189f494331a5fffca4c9a729407fdbf71558b427c085d6ce1c3

    SHA512

    3062d1ff4ad3222795689d56718c325624ae1f8406998705c305a04da6839c8456bc912fb432c1b844a62db5be4a68a4449428f17a5910e8a67323763643e71d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc14dbe26a1c61ff052f29d2fab979b1

    SHA1

    43d9b6e926947d9ebd1216f6fa1f5a5b7205ffa8

    SHA256

    5185e360b64504ce4ce310b935d5f7e3000f62c0b38d51a470448ce5edae9f07

    SHA512

    e0db46d93ff439fb4828b7f873a3dcc2305417c70d155591d39b0707996ee0c89c613c3b705b936dc747d0b8a9d1cb7737b7d16fa24efbab2cb40da5695c97ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bea7ee6ca327950c7e65386af9f5900

    SHA1

    428fffb2afddf23b9f3ddb61d78b0cfc6272d55b

    SHA256

    60911e4749189e6cca6a13d156d9df3e3dea56f175000ab9b8a3162b2dfddd70

    SHA512

    b3fddb8d29fecb3a5174057fc07ae1669d4d9bc1ad683bace5a66cb76f2b1205677420215b40457ce392e6ea9f8eeb40638ae8130315813df8850d33f3879c3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c1ab75cdd4027ee9f041acb6ecc8c5a

    SHA1

    272abf160f49edfbae135f9497b13a329b258349

    SHA256

    3b5f8d6ef3c57c149de14cdabf734e982e647ac176508dfab29ca0221fe7af62

    SHA512

    61f9b94feadf616dc01da8f184cc3a4d469e4ccb478a158c325229df9160164a51a5144fc9e460eed357eb57fab0d914b8871ddfc0b9603ba053a76689ed480b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05d41464e7504660a68812c40156ca8a

    SHA1

    7e5b1480350075c428085c1bb93374101bc208f9

    SHA256

    c2d856f0e9c7417e879b63321462532a911e75e7d666539d1d89645b24549091

    SHA512

    455d3401992118227ef23066b6acff629a48e5848cee1994922fc51b2c7a00f16d682fcd54418855eecff1e9e4d68be80a90cfd54f15707b157d2aeb4750b896

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d5092ad6a2bf6b6134ac48fa5c4d966

    SHA1

    9e9234192fb136160d6732d1caa3067a1d723a21

    SHA256

    80466e69aec7ffd5b83acd1c8f5075b3eea86841bd232b16d9f65c32f7a6a2b9

    SHA512

    d363dc9e67632c59ec7d44518b56a7c7dac0c6dc416c5ccb036dfbaa185bb924438e3ad45c7e7dc1c32f15366d3d6e5f21f743da6b8c70eb3bfffdb131bdbc2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16187475a1a3b8678b9eccc55407a8a0

    SHA1

    6a9f10da67bd7bcc5f4baa580e468a838b5ff94d

    SHA256

    dbffafbc351c4621363212973eec203771fc338aa761b51a5424254ea5dabb5e

    SHA512

    79983a8825a37ad9676eeb1a98388f868ac47a900a3c27c3e6e10a8883563e2c55d0aada9ffe57d820f367614339358bf8d5c8cbf78a5779f417ead88db28b2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b4b5d6a3d8042af30120d9dbbe74c79

    SHA1

    f0a087ad164404c1857a592defb7e1d1b1958785

    SHA256

    2ef688a0f5f421d36b6b31a47a1715eb242b136b09d9da3ded99a784b945a610

    SHA512

    654651f31065c27f99eb30b089429a2094d7d1de7d105fa0c9dff3cb443be1d5d4df31294bc98624dfa91bc3dad3731c03782d20b953f0a0581b730c70ae6a11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    028c86a0b7a89177414a78e452b8b112

    SHA1

    50d864653370ff67f3a0e9a594ea07a2dc16ec3a

    SHA256

    ac7128c333c253a4e548711714f9f0df5ba1fc6d0547b3ea501dc0e8c80be6cf

    SHA512

    6f51c483a8bba18858f06ce042c866210df501e67a02e9832d53381c429589762dbbcc7862d2505f6f1165f2726143587532b5045b4e7ddc8b7295cf784577ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f78351076376a845e6318646ad11d56

    SHA1

    1d328a1cdd1217eb7ef16ff4afca23f407697054

    SHA256

    5d6c0c5ac22ac84a09979066bb07b18ce919cee14dd941958fec5f86a6a99880

    SHA512

    e1de6434060cfa612197be6a8550e015e4211f586f867c1c609438bd1bef67179c502d5be91d3353e4b693c01f3a0d7f3d4e7f71e2286ab3956cf7cf01d0dd1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b66610e6df9cfa3b9d85cc31f3353fc3

    SHA1

    f27beeb5ef99ed9cc8bead047f92f068197496ac

    SHA256

    e4782ff12710bdf0b39c52872b875e20dee5887fa255ef5b6a47e804f9fee203

    SHA512

    2407d0e975bf1b51370205d40210d85304a28084d5ba2127d417a28ae741643845e36630a2c8031967b0476e5f66d77236f70ce045e45422acac0b1892539951

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e19b016b94042201d4b1989139b548f

    SHA1

    f506fae7c8296e83aad72609d3511097a9d290f8

    SHA256

    685b77e9027ebc789e31e9b3b65b2ea2c5ab3fc8735de63ad1919b1d1a712694

    SHA512

    9897652b5a8b767413d85ea8264d407c421b398c950b34f7014dd0d1a3663fd940bb01b4b12ab325852734fbf3d90c26d1b577985c57dc5d5ff822d8aab7f8ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ae7f355d3579a7ffee1b7d8244d3a94

    SHA1

    417beced1d6670572e78d5f4531c5ea12bce15ed

    SHA256

    938b205d21a08d62cf4ac1fe649535754b2d54d2e89b4f0b1ad91c27bc3a1d30

    SHA512

    e7fa9c41996f0806588b9f39133eed7ff436bc838b4d6def9039a2a538002b7311421b2b4f469cdb7f398de722f2e136d4bd7e70f638810fca37432559d44196

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9c698d7118a1b5d01d31f96de9ff900

    SHA1

    c7fee69368508de42ef75807af11b82d45fda23e

    SHA256

    6fe027bce546dd5cb6233aaa948cd07fc3b5e3ffd241091e92db08cccd854375

    SHA512

    e6aea7ec1e6a6e884ad8421bd2ff1e136a69ab7b0ccd73de39857f7e4c40446f6e91e4ab9bedc39499163e2c1b5d187937db1e5594d620abb509d183520d99ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acb425be65e89e0c618e7d0baa5b8bd7

    SHA1

    d2ad70c9fa460e33101a908bb418dfa61dd3c09d

    SHA256

    f870016b97d5a5ffcd1382e8ef7aabc6c46736a67b2756f8d693bba7526ca430

    SHA512

    429fa735c59f0770bf31ee65f1220d46e4880c3136ae0f559559d54aa91738dd52cce8ae95ca745e6dd847652a4ed90322b33e7956a917fc6273ccef90a44aef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c011f0f5a52e2066b2567754ae6666a

    SHA1

    2cadefe49cb12ff366247850b0d717f5203355d9

    SHA256

    ac709c855da1ea3131d5d4716ae70103e33b9cecef63b7b935b24eeff473b955

    SHA512

    f92f2e4c3edb6fb74ad098612129e047aceb0a21c611a7b72e791020f8b22393446a9326c39d8331fa90a21fcf9c311fa1c90b47aac6cdf9c681482d0b65cdf8

  • C:\Users\Admin\AppData\Local\Temp\CabB741.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB7E0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Sxozor.exe

    Filesize

    156KB

    MD5

    0034f1212179755bc4d28a3f4792afca

    SHA1

    1bd974f713fbc6ed070e32ef4745480a385af408

    SHA256

    cc00e8e28446453d64e011931374e528534ffd90b97ab949fddf9c0e4fbf43f0

    SHA512

    178e486abfd863d0559608cf0bc9ab10c82778afd1e7552f37b22614848e1e77d703f963eb3bf0f80ca5d99d9893905fea1560454adc1e28c62633968aa2838f

  • memory/1284-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1284-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-32-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-24-0x0000000000280000-0x00000000002AE000-memory.dmp

    Filesize

    184KB

  • memory/1284-3-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1284-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1748-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1748-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1748-1-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/1748-2-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2244-34-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2244-33-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2244-50-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2832-55-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2832-54-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB