Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 09:17

General

  • Target

    009146e68b3ccb693ae32361226b9bec_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    009146e68b3ccb693ae32361226b9bec

  • SHA1

    b59a7a3f92d15562d9ab4c9a6505cf7c8405e564

  • SHA256

    aeabdc682987605e049f07ea85c62d3fcbbc1e5d2b56e1baaedbbd0efceddeca

  • SHA512

    a15841bb47b7ea3f6cb4e57391a52ac36720705879c7232e571dcb82b50ff933f88ab624b3d5f64d8de99684d2be331de9a81e7c6f77071a6975821ab9549ef8

  • SSDEEP

    1536:dXNXdlRH+Dwk4cSGesvhC8plnQ85+HwClgfTQqPTFTCtOQ8CcfiA:ddtlRH+UxGzh3HQ85+QqoTBfiA

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\009146e68b3ccb693ae32361226b9bec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\009146e68b3ccb693ae32361226b9bec_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\windows\svchosts.exe
      C:\windows\svchosts.exe auto
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:2836
    • C:\progra~1\Intern~1\iexplore.exe
      C:\\progra~1\\Intern~1\\iexplore.exe http://jianqiangzhe1.com/AddSetup.asp?id=137&localID=DD00013&isqq=3
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6235c93a7f8d8d89e35814e13bd4d837

    SHA1

    cba0be40ced700babf9437ba61273bf0946388c7

    SHA256

    9632d2b09e6f1e668d4a200dc44970bc893101993a136b1e41555aedb180dddd

    SHA512

    623f6f676ee9ab16edbc944d15b2684ad0d2ae5866099b9c5c337faa87a55418f273f6f1fb44080da1de68a3c84c280269978118309fb7d38a3a05d5640e2ea3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    591aa2e41359eeaf609de19d85bf2dcd

    SHA1

    fdb4c7ba140e21f89bee47991eb2d01fc89f979f

    SHA256

    4d9fd19148154049157c5327281a3c8d8f83a7de0cbfc358ab08c88fa874b6cb

    SHA512

    07c6b51e23950a015521f12642f1375419fb06ebe2e458c0a9ccc17fdf8821f379b37317394ed59d055a43ae31a5519fa71bbd2b9ba0635a4caf3b9f3461ab85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a5b9da1462da5ef3b4842cdb19a0df7

    SHA1

    ca35dbc71f6466558e852cfddc603d6589384216

    SHA256

    a9ca02a43d52698f5e895250698acb8382db7cc4888c28cda21f4f4d32838e24

    SHA512

    66a59ab1a7b90832497f14a478d705d95d4f74e21b2d7f5e8e250c85c0730d40a0d44fd35126e4541ad39ab5c73c2a26be2dcf72d22a9b3937ee4dce4dcbdc10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee30ee4943cb7fbaab02bed2a1040ae7

    SHA1

    9ac218978f5b8fcccb76037d0af818063058548d

    SHA256

    c92d7f89ffc690624af425ff30b5f671da791da1dee2d46449f3209990706c12

    SHA512

    f7ea790b255922191475a1bf0c18888679b88e4a25060f650e0eb12e4081e9523cb35a724b44fb44c2c385e8063ce73ae64a32c1e0d49cdbeac7156656d53f33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0a6f83b6c9f00045fe724682f69edd5

    SHA1

    4d992087e38322a73e9500e319403f6de03101a4

    SHA256

    317daaedc7fd160ec7753968eaa0b4e330ad2db6d00a1629f157fdd846e1d227

    SHA512

    8c37527a468a0c8b5392b4de397afaabcaeb0dd69b18acd556e9a67b74093747976a4cf4a22854cbd375140d2a60b020f4b6bccbede28f02567c808ca3bcec30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71dd85f3ccaa7c810a0691888cedf472

    SHA1

    d3272c926226b888df5060dac5f54e6533b6244b

    SHA256

    d214e4623d91c5c7c20062607a5449b97263ceaacf1e4d93243c97761daa39a7

    SHA512

    0e21d64035c4083982c7e07d15bf392308fee39e7e260dbead463fdbc91470f1da10ba236a3a999a44d0725190e25ca0865abaefcb53787f0b00715614872a08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e43e7b2b1bfc8bddbe1da7f737efe88d

    SHA1

    c63ed7b75a6014d77fa5bbdd36e18840cf4258af

    SHA256

    a91aa32a9327a8e1efb081f6661d797f49ce8d453fb2f0061807bd814c042ab6

    SHA512

    29e91ba884f0e6b09e381d1cd7676c41740cf2a4e6fb82364811ce7ebc6b2f471be01d7b7bdc05ac1b15d5c646d6d59921311f083487ff97d1d0c107253aa204

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6959398e373f76342a3f1009dfdeab1

    SHA1

    af7aee54833a5f0d15956afe5f60f8002d0fcfa1

    SHA256

    c3ac6cb7cf3df3586d5650edbabc311b8a59ea64c53bd6c8fdb9491868f6ffe2

    SHA512

    240852a569ceaa94b3e0dc4ae7d25a49e8ac0d92e5f67d3ab3d9ba2d9412a3a688d99ba1112e812034dda67d1f3cf5c9b9f52f8c19cbf87b806842b63c56934f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e5c3910776e186053114ac6073f78ce

    SHA1

    a276bda3fd49ffa081a4d5c3b797813db75077f6

    SHA256

    17ac375086165fc46932a870a692b12932459df9d4aed145bf78c8222d198086

    SHA512

    a122f67edbfca5edc9acf804447f340718145f67472ce2a0253ea94a5195fd2dbeac4c03969e93c91efb800eef7f8fb5aa62f093cf24c7476de2c2ecaf0dfd4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd69b497d8774b567977cba57f6d1f55

    SHA1

    87d9241470da277b22c515dd36bcbc14b03c3860

    SHA256

    e128e208c155b0564df888d355401fa6a75ee87f10332c543a870dd1aaf1e51d

    SHA512

    7407c93157769694c42a0f10ecdc69ff06f778526f05fd82b79f882985f432652397b949e3d4c7a76399d202c7e5c8a8926c8377ecfaa850c5d7ebe922f41d44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f96fb5a6d50f2530759dd7e956a18b65

    SHA1

    b2073d14ed4906e28074db8ee4aa455d8733b6c7

    SHA256

    f04e71e0e6d1c1915bf1c9a4d5b9ec212a6c68d23720364b7333c5be80897647

    SHA512

    e7294b3ec0fb14f72d5b56a814f4df02f6fd143ada2464a19e6b33f6cc8bac7c67fb6c6fecbb6912e4efbd780eb690949e8579f6382260fca5bd4b5d24c4cbd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    310a4e3f01bddcf59a4377fc95c3e436

    SHA1

    a08c6967de2975d51af33a21131e6227ceb63803

    SHA256

    4003ce8cef5929a844cfed975582fc85deab256c17698422ab464958dcd14ae6

    SHA512

    414c40776e5417d9fa5774ffee9c1f038108471be969952b27e01b457306eb3388d2182de900bfe9dfec6eff8f773ae64fc10a9d24044c9c6e0d1b8abc400270

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9a68fa5d59285446d53ca97cba3cf50

    SHA1

    50e35fba34bd1ef26e26f996a1e3921a33f86e4c

    SHA256

    309c95079971228b2442c581ac3f97113eac6a19a94e5c8bf4dfad1bf66fb18f

    SHA512

    ef369cde8bb11e7f254d8c8632a06af59c060f063235365a54ed867e94d21c9923213b09abf883113441117f349d77166aa8853f181aac7657668b4ec33d07f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    069da7c6734d91593f95b025ad814edb

    SHA1

    18fb11cdd627421af49416b0f36eeca1171a224c

    SHA256

    f4290a4dbe32502d84093ce3174039735ff8b0df41fc2443e531802e8a3edc31

    SHA512

    71aeef2bd27fb83eeacb710ef6711fe0022fddfa73f80dc28d094798520631770d2d30bdbf2f09119772eaa91617ad689ebe10da9bfc84f2af9ba3e6f0b9ca20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1456bc10aa758310066b9d5908e20a15

    SHA1

    c9f7e99f85211e2d1610b8738e381292290239fa

    SHA256

    e499bf30d758b4a8de49a3431108a34d6447d4bda7d1a9d2a683210347d62e76

    SHA512

    7ad25cc684878b8f0ae9e49ce524cdbef51a6eb46c989df059869fa67d55a811d7f419b60d4501e409e8b1c1f1018cf12d5f847d438debc03f7ca549ef8e8f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31cc151e0218fd384ef0fa5d62000bbc

    SHA1

    adf484d5a1fc4cdaa3b2bf2f984dd2dfee535300

    SHA256

    2acebd230cbd40ecc3582e2151b37fc6aacb9a37dcf27438249d0a29f2b3348c

    SHA512

    50e68ca7205cce9ec31f3dc15c87138d622e28bf860fc55376b18887fd1125aa02e43ad74c4091c682d03211e2ca2df7031e2b1b00a7567b55384a40c335d6db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    542964358bb9859bf930b897d3ce6c3d

    SHA1

    046cee46b47b9400edbe215ec20d700b32dc7967

    SHA256

    68b359440af12add72f982c94765a2cfafa1fd016f1abba709086838db4505fa

    SHA512

    abee5a4969785c3d62cd5d0ac5312852cfb41fcd7f9b36c9f026f4eae045aec1a2b2ba116c75627b4da8da5615ad55c6ab4248aa02a159859037b0b3e26a394d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    800eb2c0e851a3a57d8663ef82dc71db

    SHA1

    7d9b31a1ca87732680d71a43a191bfb8607e8539

    SHA256

    7fc6022b6ddaf1d99bf662309cba175bb4e7f342870aff65c845cc3d68bd3258

    SHA512

    83b01a3c8136bd8afbe57e79f45fe19ae1c620b5c95b5c3f21914e757a259933f9c88909974b3066ae605ebd4ae6fda8fe0aa9b5282ba581e570bb47136eda26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    044f8bf00d6fadf086b8761500f6fdb8

    SHA1

    275657064b8a316449298add545c6e5ddf2f2103

    SHA256

    6595239ca96a8809d0aa44684bb028325c3960d0d58ca748d884ba4cf4f9b8b6

    SHA512

    b1e2177a51a9054def5ca2e3e4848d93280831f03ca3b35f222afc417e83c63f7d933038569a078d7f1a7ba9ee872169d8a829d308da720f034ce4cea423b6ba

  • C:\Users\Admin\AppData\Local\Temp\CabFC7A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFD1A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\svchosts.exe

    Filesize

    88KB

    MD5

    009146e68b3ccb693ae32361226b9bec

    SHA1

    b59a7a3f92d15562d9ab4c9a6505cf7c8405e564

    SHA256

    aeabdc682987605e049f07ea85c62d3fcbbc1e5d2b56e1baaedbbd0efceddeca

    SHA512

    a15841bb47b7ea3f6cb4e57391a52ac36720705879c7232e571dcb82b50ff933f88ab624b3d5f64d8de99684d2be331de9a81e7c6f77071a6975821ab9549ef8

  • memory/1280-20-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1280-0-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1280-1-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/1280-10-0x00000000003C0000-0x00000000003F1000-memory.dmp

    Filesize

    196KB

  • memory/2612-15-0x0000000002970000-0x0000000002980000-memory.dmp

    Filesize

    64KB

  • memory/2836-450-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2836-12-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2836-21-0x0000000000580000-0x0000000000582000-memory.dmp

    Filesize

    8KB