Analysis

  • max time kernel
    76s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 16:16

General

  • Target

    023bd71e01ff0d3867afbd57f6b62b85_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    023bd71e01ff0d3867afbd57f6b62b85

  • SHA1

    74e6cf70158d8485eaa80754dcab9ecd8150dbf1

  • SHA256

    d3753f18ccc25a6f582481b70d1b4281994f3b5ba6177fb4db0e4055980553f6

  • SHA512

    4e98568c71e2f0d2d892ee7b5b0f71dad59aedc42e399fb6a6fbaa44c7149f4c8b8ddd5ba49b673d62951bff9ce8edc3d2037bc21b9a0db7879a19d9a63ad08c

  • SSDEEP

    6144:Te34R2uo7zh36dqXEV2rnCAZG/t7FTBqTzP7n7O7L6K2Bfo7pH:32Lzh36VV2GW0ZTsnz7O7L6ju7pH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\023bd71e01ff0d3867afbd57f6b62b85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\023bd71e01ff0d3867afbd57f6b62b85_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.toggle.com/s/4/5/45321-665139-driver-speed-link-sl-6535.zip?iv=2012083101&t=1727712989
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe0b15beb04243608e7d0c3252481742

    SHA1

    939ee4a7474b97e7048636a2c30b2fdd3a8a57a5

    SHA256

    11c7ac632887875d1d8d1340a3824c2c4b3925ea3a56cf0338a4e3bfa2a128dc

    SHA512

    b1ce600964dbdd6ae8c996ff7383cfc8ab3d595ad370030f2e1c3b2e454368935cd5f3cd60bcdc6a424bb130e9092f11b1248834c15d7b845f81a432db6faf9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d68d9cfe6bdab47f1b6dee56fbf045f1

    SHA1

    abbbce2462778ada75876fbcd553031717074deb

    SHA256

    75406b5d1c0ba9ab9b0ebb61e4c79518b8a87200e81dc0e15ca0f93553e42a37

    SHA512

    5b0af6ca3c4dbe2ea371ae827df361a9450a9558304c4776cb5a3a905aa218ea4c47d55b3a1e131b82fee84e6b8ac2dc611a7d271bef4d0d54498b2a311e2061

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2007d3601f13b75a2f239ee6b816772

    SHA1

    66269093e5147e04509cbfe2ef3d8a83068ae174

    SHA256

    fb446c2845fefe1c0546c31cf0e26b34c40f3dbcff19a8261dfc6d3d7c00954b

    SHA512

    742d988895885030c9665a5fb07ef4cb0b765a9f8f35fe1a94a72c5e395c2d98a8a341924933aa45f89f7c3a10c3ada243e29384eda953be0c9c0ecbaa7b686e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d434ccb1e262d04e950f514af277e53

    SHA1

    8ed813fd4f9ea6c435eecd952342fe3080512935

    SHA256

    e2c4b29e6307d03ce98a0d0a6661418d09e34f1b052e2f1034683459ae2e136a

    SHA512

    d6eb9e7ac77541bb9468f3dd072fe9a4b654541a4a561310420f2c035f2727d910c03bf89f72b2b0cefd598059e22f887e60c92e84de2408b5d930211b30eb1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93f75efaed741e5d825788ca2fe23869

    SHA1

    66c3721969b716e98dfa971fe6e87dac7d9ef3fd

    SHA256

    1e8b71bbd308f49c2421942b568e46bec4afef57804225748f18c8f2963c4f0c

    SHA512

    0d432ee6164a06ce5a9b44c470ed5133d3039d010c16151fd17c3c06a1fc35915645c9eb67a773d760ba9fe19aa6041378e61fccb87e0bf84658bc3ec000d21b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb1a5ec83c9bdd1a85624228b0892371

    SHA1

    3b84a88987f12818256f332be3bbe898d71b4b45

    SHA256

    cc2150c20882835333ef9b4f7a3f1e6ab851145228949b0b2f1d8424af0fe572

    SHA512

    e3d3226b0413826176eb5ca99b11b6470fd8fc99c2e161942635cc1ff421cebc7a9f226513d5547aca45a9a4908718b4691125824f4057b6b95a3202ecb0cbe5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e536b444d246cd7c895a43f3568b722

    SHA1

    63858292febd77ccd9baeab0e2be8aa7b4bf962e

    SHA256

    fb989c18a96a2733a43c0757fd326f1f123b634edc54b26df74b22e830468c27

    SHA512

    3b7b75145f0ab60ca1d296830e828990b1f7040b4f680dd3813fad1a94df949f747b400d2698322016a4589ee8ea0c33d7789d8817a14eb2573922eb5153b978

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a025624a68e77ecbc31cad8968efcdd

    SHA1

    e7004658abd460e56649686965da797eb67f3d6f

    SHA256

    483c004cebb292b511b7e848471bac7a5e18725a08a449c1105a314ac50e2bf7

    SHA512

    ab04e6ed9d4b1d2933a50442fb610c58475ed6af76a981d561baa3fd0cae772a58260a856e2c1b646d7106b6b535c5bed300f8a412454f540224751bda4535e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cfeaa165cd3494627d5bbf19efc2c26

    SHA1

    19e1c6f289eaa9e2d41e1eac2be05a9c2f348c0c

    SHA256

    9baea5bdaa333572cc3fb6bf2ecaca830c49105d626fff5a68e50c1c1bc1cf02

    SHA512

    b7c2fa1049feb9b7874825e33feb383e51e3391629eebda4a073186b364c3ff3ab93893378efa2b0f5d0b582ba6bd925dcad295ddec477a809e272a3f51f0575

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbda4896cea8f3752a8bd712fa93682c

    SHA1

    42b206e2b0c56face45d1212775671465e492782

    SHA256

    1afb7fe6fd0b179492cafe8a7a5fd5d8c03a462a0c3fcb592946230036bd0e95

    SHA512

    4b8142b71fa2a9dc44474fee4e06096ad80563fe85dc2ff8e6cd34d7af04dac2ecacace53cafe1e0c5ab020de27dffbe13c9587f6da81e20aa9e9279a3714d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f28b5d00c8d77cd8f2b45a89357ff5e

    SHA1

    e35bc82deedac62c3cb238c53c83017e7fb1691c

    SHA256

    4db46229412b416e7124a3f185e7e78fb2aab53430d3cb31868b208060fc75da

    SHA512

    366e52ff8e73c8723b4c0dcd6657d3295f94da3e233ffcca8c904ac0b8f378d3f63cf3a47999992f0bcc7c7d3500dafb97b19f9888a877f3c4ec8c5cfacd159c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e4e4091e42b3c71e4ef5e34ba690f18

    SHA1

    eeff0f0d4f20a6d96b4de7be53b8e645fa7e404d

    SHA256

    c448df710d17b9bc0c896ccb7b6f1f1095090d688bb9a1c373e0c5c8a2f9001b

    SHA512

    3a874cdc032f23b319ba6d4c68085d0bcc967353c1ce75850cfa0335d49e129d00af6fa24353caa99b03b4c6feae301fcd35d9339dfd1bf6c24306c50c18f540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ce8462f9f85bac4c13fbb7054bd3249

    SHA1

    8397971a993ceb6631886b16452a617d0db39287

    SHA256

    2bcc12e84407ee24d446d5c52e214690d2046a643520de91424d5c94ae435c07

    SHA512

    191f9b57e7c70ca1da3722e618ddf1f7a6a539aa93ba4fa3a3f4a929cfc9f235b51f023de12ec8afd90a4f0a38bf1b447d0a35673921e6cff8f2b1204f710a91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0076a25b9593e8deb51e11e7a16f6a71

    SHA1

    fa95d14609f6d09558f727290a450129840c9f60

    SHA256

    f4751cce88b54c690cff8b19667c7ef97b8091c1f9c6852a1f318542e9684ccf

    SHA512

    b59f993c0f0f1acc377e7f0dc9904144ac892d41515e5e372d8a94ef8407e39a8257b240e19f844458c1bcb9f3939d48ee6e18f6fe2eb4d9d8677fc569b0921f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d0bfc431e02d189983a79f81de8742b

    SHA1

    ef746c061b1afd41cf943209c0e289ebaea818f5

    SHA256

    d2b0bb32b796b6f3c7e0cb42a4d74ed790514628f4190bf0fba6e0ddbf8e83d1

    SHA512

    90677865f2a54468671fcfd544b260f0eeeb7c16fcc851477a05eaaf33dc180583bfab32a1d556a2d6edf3a453e2cbeea7c81e3321e84ec7586905afd3de8bce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a170765e995c7ff087271e95ac935b67

    SHA1

    63dfaa1aa9dfba4702440fd5363be9af58904e6e

    SHA256

    e9f967eae2773037c7512e62c8576a7b2c03524e0429e314bcea6fd547a49639

    SHA512

    bd4ee2ac2ffa0bc4a844ed414ad59f62f17b4d43f88d80daa5edc048db719590cfc463eff5baa4bcb21877f8ea842375d01f845c795a7a57c284871bb5469143

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a7e3b8c2246caddbc75cdae7c22e682

    SHA1

    6ac3f1a6b1b178b723ac6da6ad8d1c0a1b7be937

    SHA256

    87a882062b64fb43797c4a7bd6a3992d341db8f5d38c131b5b65f0e2c4e52bbd

    SHA512

    c756d338db185e732e16ab27f7496aac4f4eea49d8e5a3cd8d0b6f341280ec395c38db1378d8ca480d99cc220ab1afb78c60bfe14739c1143a9a0d6f1306058f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0a15ec5bbf34c2e9f068b27fe8f07ab

    SHA1

    19ab686bf7a39d89586a0bb35f45a454d73aa927

    SHA256

    3c24268bb684e4cdb06c8c2bc58ad1f01366d05472d712fe71cea1b425caa7f6

    SHA512

    9e9cff96708d0ea6626c09b5c095140c116821dc0f49a6ca7722ff239ea4dbb89634ac8be52bbf8a77d6fe074917affa591012138bbaa6c2f574c107feb0f200

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f0d8ce9dd2c979e8f3e1ca94aa1515c

    SHA1

    ae4ce8b8822d48077dd982a574af5e53ecef5337

    SHA256

    950d8a9aaee1df35af035d00fecc9886d2cd50a23e83b7dcaeb0ad0ef022ed8a

    SHA512

    ecb93f4e4336825209084b2741bec10e147bb042623d3d8b3d7befeef5b1d6137f7aaf3a6ed0cb061e753c9b37131a0fa811672761569f7f807f857fd1d7a5f6

  • C:\Users\Admin\AppData\Local\Temp\CabF03B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF0DA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nszA1DC.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    ebb9c5ff18a29e11c1051aeb06f5ae50

    SHA1

    c5204b5eb9f58651390315940bc5cae0184243d4

    SHA256

    c95e19cfef9cca8a00d37c31efaf16e8e53ff6530800cc3f18b712b58d738e0e

    SHA512

    4a59086f409a96626fdafac503f1cd12dd48e27a0a6b9f0b4b7757802aec4212492bb54eb1edae2798b590fd6c5c51f417fb78b418a905ebf357bca21ddc66df

  • C:\Users\Admin\AppData\Local\Temp\nszA1DC.tmp\show_page_toolbar

    Filesize

    820B

    MD5

    15c70a60db44e88597d80f47e2737cbc

    SHA1

    3dbb85874e46bc2dfc8cb7673771ffb3f3447ce8

    SHA256

    c1500657c22097893902b3b260278e6306174c2ca977bb17532a4b524753f7c9

    SHA512

    e2bf670150d1c1ecd1fbfedd75ca93bb3be75b6c26c443e80759725fb97c9f4ec8020a6d18a5cd2586425d579d33965b00d855bdace1518f632c4ca8c6646791

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nszA1DC.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8