Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 23:58

General

  • Target

    07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe

  • Size

    444KB

  • MD5

    07f3f29eeb7728a9f073f42e13cec4ee

  • SHA1

    da7cb0eb9edb5e5506c0ee4c2fe4efbb54e6148b

  • SHA256

    9b894e375e381a4db74bdf50059e435add2901193022767717ec8fcd71bbda56

  • SHA512

    aa95e0df77854735e7d8395ba5eb5e1e7a3a188a92f87e5da039dd79ad363d2f515380a7ef9eb230ed03ad1dd5558467e3fbd101d8b32b3a99dcfdc530352de6

  • SSDEEP

    6144:Qt5rjvFcipzmXQBCgYkkWcS7n6TjE4ukga/lLhYYIB6Rhwq406MQaYDYha6ib3u/:QnXTXYs9KSRZdMUyKqDhrixh8

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exe
      C:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe
        "C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5016
        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe
            "C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:3124
          • C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\hgjavaw.exe
            "C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77703\hgjavaw.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4536
            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4632
          • C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe
            "C:\Program Files (x86)\Windows Media Player\kqsetup_wm.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1008
            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\dge_proxy.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 2460
          4⤵
          • Program crash
          PID:1364
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\oapqw30x.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3180
        • C:\Windows\SysWOW64\attrib.exe
          attrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:4480
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\oapqw30x.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\SysWOW64\attrib.exe
        attrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\07f3f29eeb7728a9f073f42e13cec4ee_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:3636
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5016 -ip 5016
    1⤵
      PID:5080

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      854B

      MD5

      e935bc5762068caf3e24a2683b1b8a88

      SHA1

      82b70eb774c0756837fe8d7acbfeec05ecbf5463

      SHA256

      a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

      SHA512

      bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      1ae64efdecb1ac64917e92bc43289d28

      SHA1

      ca91befcabd6211412d8ab0fb10632217f0ae2a8

      SHA256

      16e5770ca154af6155fe48885a3507151925a2eab3ae9b5742da3dd3ac3d7c48

      SHA512

      63b64a70961d0f00c9c7fcf586338fce78da1cf9bd5a1a5722d0cf1a894ae88584265b87e7a184ac5ba16cad7f74527fd8f2c44f9edd4ad820aedec081cd7f1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_71D00F0D3698C81F2158FA9703C4EFA3

      Filesize

      471B

      MD5

      5bf2137247d2379eff75842658f0d939

      SHA1

      a6958d374a4eab188f1f1334b4a33514d75fdf8e

      SHA256

      fd88b824c176afac0d0410a5839ec76e85de47eedd7fdc3c4a9c06c2ae3a485b

      SHA512

      4f07d3322814910768bc6e1cba7823026be7aaff71b1ec490b7f4f224c795dfe2a381ecb4fbc3c5914a5662bf9a7c0a4dd18cbbae00c473936501c21e7df9c10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

      Filesize

      170B

      MD5

      a5b1c84e03313753d0228602981690ec

      SHA1

      13f56e02590825b737e0bc48e2751a261aa6e82d

      SHA256

      44864e56684c98f86a00c75ffac9668799b4fb13598fb2a1e38a6ca2dcd6d917

      SHA512

      f2c73706a1ebb6d6b95969ab84f660b2844f5eedd8d5953ae39d899c93a9d214484df6611cbea599099c2ba5f06d797c094c973c478b593c6c3b639bbb47375c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      1da559b3ab542e45c268b3b537a03be9

      SHA1

      2faa69ccc06d5c3858d92df879966c9f86423434

      SHA256

      6ed7f380092a6da34822d9995c6051a079e4c1206282e8218fe33e27f578f71d

      SHA512

      06f926b52f25c414f81d72dba301b5f47e2fead954c0e1fbdc5b464b3edf7a5ecb7a0d6c24166c85a152680cd4e0e9c810841c2af3f794e30e57262605541011

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_71D00F0D3698C81F2158FA9703C4EFA3

      Filesize

      406B

      MD5

      ea97b7ce78c3dffe2c167aeb3ce8a375

      SHA1

      b2f8dee7e3f5ba9a36fb40ef0da0fbebd3ca9125

      SHA256

      930dce34f85a3d99eafa1b5c09d7880110ae91359268332fb61100263c71a3a8

      SHA512

      e64abc82c82d2d605c1da0225775a0fc77b4fdf2ed4c90820abdde65a7405b8f997c57e8c2e1e58de956a183c2d07fc54b265aea2a146f33dfd9dfd0541070f0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JSDV0W5M\7EB9XTOF.htm

      Filesize

      20KB

      MD5

      877821ef9254498919831f3c0a4fc49f

      SHA1

      1c3184389b03db2b77f6b8c6e266a7c86d96d483

      SHA256

      6122b32b894a5979983c5c12c9a117cbc656a415b83cb11773fa7384dc80f804

      SHA512

      dd0b4298b0b3627564cab53b2aaf474585ee6af41c8d2ddce7dcd898feec17b83c1ab13349d7bfc322e55e1ee007758d23f71d5d2cc7e7c0caeb95f829c65eb8

    • C:\Users\Admin\AppData\Local\Temp\doe9ez87jlnhz9b.txt

      Filesize

      5KB

      MD5

      4869be8fcbdf86bac0c9487f0de4bc6a

      SHA1

      21c852e6fd4d0100ad13ea631bdb8e05b6fe5078

      SHA256

      7f8cc8ef9e4954d92d497552af9757c35307285a61e56d6d3d496bee7c4fa950

      SHA512

      fbd18dd878a37e2f624f6f4310c6faac05700d95bed4cfca21d73616bf93a37ee2770281d44efd282346ef298ed0fa20cc8ee783c954ecb9984b83e5c67902b0

    • C:\Users\Admin\AppData\Local\Temp\oapqw30x.bat

      Filesize

      262B

      MD5

      b742f8e94e2a87029c4c150bd7d29660

      SHA1

      923eff235b27f6d777401196cdc0c609b058ad29

      SHA256

      d19fcfcb85e74ff70c23a2774465f98b92344a99f723d143ebe5959c13fd2b80

      SHA512

      07ee36be30dda31b17c294ad5b39f5623122e57abf0478030449222042630e13c5a9560cc1cba6f4bd21e182aee69642ec838af63c1229026a2e49b837b76bf1

    • C:\Users\Admin\AppData\Local\Temp\oapqw30x.bat

      Filesize

      340B

      MD5

      0577771ee5abc9565959e6a57bab471a

      SHA1

      a9a8fcb5303fcbeb381ab100c6730d49ff62efef

      SHA256

      e4ea0fd2cf8d0f2c508326296756d9f542108410e53ff16d852a128291b0b57a

      SHA512

      ac376bcbe49909c29d1ab359b68b543a72ddd403e8cba7ca869bcf1653dab4fc696bc818669496824d2f2c4c6a7891e175d012e7e54ad722daa47a78397868b5

    • C:\Users\Admin\AppData\Local\Temp\vojo9rhtvxr9te30s60f.exe

      Filesize

      444KB

      MD5

      07f3f29eeb7728a9f073f42e13cec4ee

      SHA1

      da7cb0eb9edb5e5506c0ee4c2fe4efbb54e6148b

      SHA256

      9b894e375e381a4db74bdf50059e435add2901193022767717ec8fcd71bbda56

      SHA512

      aa95e0df77854735e7d8395ba5eb5e1e7a3a188a92f87e5da039dd79ad363d2f515380a7ef9eb230ed03ad1dd5558467e3fbd101d8b32b3a99dcfdc530352de6

    • memory/1008-69-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/2984-68-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/3020-48-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/3124-36-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/3740-25-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/4536-49-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/4632-46-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/4800-0-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/4800-11-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/5016-61-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB

    • memory/5016-47-0x0000000000400000-0x0000000000475000-memory.dmp

      Filesize

      468KB