Analysis

  • max time kernel
    120s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 00:55

General

  • Target

    03d28f4c03441f12bc2dcd183652779b_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    03d28f4c03441f12bc2dcd183652779b

  • SHA1

    c87ebc340ceaa1de9b32d901037889fe05f80b05

  • SHA256

    6db47a99fb23ba1a3972870d8cc74a2799fc4dbd3ff68a8579ca351350fed070

  • SHA512

    9d75dda43f3a761e3aa31c612ba0ff20e76341e333d74fd7a778bca73b7c047a53a21a1edeaaf27019c3c27421a8948d1fc40582b20a0eaa0b59ea5f22733978

  • SSDEEP

    1536:Xgp2ZUpdi3qWBaai1BcVW8hmuYcTLnp4L9YFnudxzY0peOOidQZCR3Cgc0mWj9no:XgQWiamTABcfmYLWYFurY1YnRgglV/+f

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d28f4c03441f12bc2dcd183652779b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03d28f4c03441f12bc2dcd183652779b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://bbs.pc2.cc/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9716346280c92d7bf090ab6250e80cc1

    SHA1

    fe53d5853daf81782b5d0a8eb46e15f44f484a3e

    SHA256

    604988ad59c8efbf490e6a4b54df6fb4c842e17be441d1fca2b5aba9d8204719

    SHA512

    99b493fba0af84545560b16dbe698c113fc82f8d60d3db8057e17b684e6a4647a65e6787feb8a57e4b6f34832ed23797065478ff5f29864fc9ed765074aa21c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8293842966d54ff9ee884de11564755f

    SHA1

    663a725a74bc1f5290f44db44ea80252b035c16a

    SHA256

    485d1dd9545953b6bf787ba62278ac435beafc9d3fa2ac8423dbfff38f023fde

    SHA512

    f73535954849b0df781c1f6e53411633ecdc71ff74c91ef933bbf9a0e33ae1bf5dfbf082674bfe909b80036c21fdc0855b66bfe08e9a9018b2ac6c145fc55107

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0db1b137dfe69a56a4ec6379bb96e68d

    SHA1

    46365108633073b8b4dffc17b09e9c5cfa7bad11

    SHA256

    c5c26b7900a88062274be235301798d8951acf8359637d575f49145c0d0f53dd

    SHA512

    432cf046b865b666233f22aa6a47b325d777cad9a776fff0c29e5579b24ca86412191de8e2ab009ca5984b8f919f9ca271fe20ac8348823fefe62703e4c8b0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b1bfcf19a0a38f5efd88c25fb5a50cd

    SHA1

    3d12428e8b5b36bce33d605c8c6bbaa05d2e80a6

    SHA256

    377aea459e2ebbc88a83f3f3adb3de9340bd9703d1405356e5a1dc80a3bb35a3

    SHA512

    c00c842108c178dbc2b48d5ad4ddc4ff8159bf69e8c03097f27ddb13e1a8052da9846e1e69f70e564489fad9bebd3a1e545fba366e7538e7b4968434a7ddcc96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ec4175559602e8bed1e98abde2af38b

    SHA1

    a73d4615ead954bd8aaa71689393d4f446499b11

    SHA256

    98061b1125811b155861594152fde4b32bba381a6f20679b764398fa286e0edc

    SHA512

    de74535bcd508e1011ff5af387443f3d0fa741b676f005c690488b986b142b7052e93916654c64a68cd20fe131e752c669ccab46d51d8facea995d7db58f111a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b3f0afd4e261554317ea365e0b1ef60

    SHA1

    d271b1dfaef8aa483687af504b7e4ffb0628e5c7

    SHA256

    5b12040ca361dfeb829ae7648e6984fbca871e6ca54f24942cd2ffedff26e446

    SHA512

    f25fa28bd9edcce29e58780c4219ef5055d96bd6a1849a3a7c55c832d356b13bb926454d86938692eb8c55ac7d636ecdf287f27c23e1c375145b04a0d281d691

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c67ba023bd22ab8b2e0a8041bad928dc

    SHA1

    aec240a51134f9fffdfa1bb9108ac4f4a6d8f7bc

    SHA256

    90f1c8361c9922bd3e85321de8a3bad8d9205038b7e7c733c8baffa8fab13119

    SHA512

    5d323e1a4d20f63ad110607b2bc47c9d72228c6351a713cf041ca0e4f4c3e31ce0195f18fc8ff835557917f59bc930c8eeaa8b5d1af14a744b612df271957ed2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23925d514f67548743501993a5f077b7

    SHA1

    cb134c376eae07225f16ea8267172320b995675a

    SHA256

    a9908a8e71a4bf3df26586b4d52e6ca51bd0847276258a7dadcc3ca929d71683

    SHA512

    d6bf91cd6b8303d0099c2b1ce8b683a0153465a02efda158440abc233f1c5c3c2b1396f01986dab683e0344134aed7555022ded452c97c26abeab371653358e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7769b1892c5a8d5dc555f1a27771188b

    SHA1

    d893cdbb7e17d96e9113e596591786e0314b7a9b

    SHA256

    92352a36ec0749ca51ffb27acd63b37931401be365a5df429ecd695e1e01fd7e

    SHA512

    da79442019d42a75609110ce9f8db524f3d16607823e664101369d9216ab2dfcd0e232e03df2c14c20b7900f66d190f195d291848a6a9be5fb92af54fe251313

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f401c3484a49cdcfa9bfd30b5e6e333

    SHA1

    fde55219094dcc9f6435ef62f23b09ff76fd51fa

    SHA256

    fc5464f4ebdf0d6ed7a32ab8c97124c15e599e0716367f21e52913f5b63b72ee

    SHA512

    d8342b39c805eba0bc2f4c2511fc35724bb39691f94e12704b200d81ac4a0227a382dd521badc8454141f74ce88255ba33100a69fce862f5e1979551d0e89b82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd0bbd7768add1427d2329a967987c67

    SHA1

    a4e54ba4cdee0cb583cc2eb91966ad6e61505290

    SHA256

    98f62c4cf362bd156b846bb8b4eedc6141304cdac1c3a08ad89ff42be60d1cff

    SHA512

    44279df5bdf98d9bee2567386adb0c260bdb15a776323923096a7c1873279db693b9ae4c7173eb4e17e4afdd5cb907261c101f5f1d1b064aee862924ba934097

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bca7bae84f55667e98093dd3f7b97ae

    SHA1

    63b5605796985ca03231a842948ed9c99ec17ce0

    SHA256

    938afc2cf5ca35ce7f3787518713770e5bd4dc74d095a8d98fb96cc781cbc9b0

    SHA512

    f441124ffda7caa3b1ad3d33180ab459c3d8b1530c58623153b4e075e8a6fcfd6fc1a212fce8a03a038ffbfc76e521ea3593992ae9ecbbe79ec4cd1033db369d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cde9dfad24e3486ed2d0fb4925929ea

    SHA1

    971295e6eb38a2d1cdaaf32d8cf7c97e751c48b8

    SHA256

    d877026068bf517abb2636a7fb668f664596e3764556c18fdeed540d0c30d0a1

    SHA512

    dfac4ad21c5bd68a8777b939ef8e4337f767fe10599d640d50f9a1a30b0d9101ca00aa904807653f13994cd776393e6154ff34a33441a221dd9f596322ba56c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2cbb98c26e09c065b47bd3f41cbb106

    SHA1

    abdf458976ced3faa57b47136ff6417d3a1eb80b

    SHA256

    f7fd0636ff133054560172a77278fe0f723f0164baa5a7e64a36dffcc3cbb9b4

    SHA512

    02e2da361b31b5bee93127b219d0f88b455d12d064bd0aa66ca0dd3e7bd0134ff0e230ed2f0c5fbe2ae07085f5474498c651b5fe5f6199e43d2af55d9c3ae9ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4781189e04fafc26cc4ebed900f134de

    SHA1

    98faf1683bbba3321a332f7c048f93b085850501

    SHA256

    110c1abbf96790382de99b90c94fe66d65e3d11f4722416d25e12447f969a001

    SHA512

    9af7c914e20ec9eb35695e1885855a55053bd201ff386ad3625562ab9c2cd7b3f3bf669c828525d5c0bb574e23f332b75715bd7d2840d8ed9e6cd0145e865031

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54e668c1a723b970e3a8fdd20204406f

    SHA1

    0735bf60ef56a7c80e580207174e3f07007edc04

    SHA256

    5e0453bf2b4162b43431e696eb7cfce72f596f5c716cbbb22c872c892dfd8e8a

    SHA512

    4325d5ead9a6679914017d2afc0880da2012cb7335753e705a55d1994a20b4f19c65cf99e9a7f91c1f3326cc6dca3f6748e17ac3240a51c0aa6bb7c25fa97cb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    353f8e069253157ba17ef70f7e00446d

    SHA1

    0a74b59aabdddc3e4b385530aa1eefb007221786

    SHA256

    c68b61f53f55b436aff1784ae18c03f7b18569e0ac5d500cf3675cd4a7f95e50

    SHA512

    d81d9595d8b3c9a6660b7d1050b6024d6ba85fe0730a87be2ecf21150cc50b85d1cabd13786b28073c4ea97679ab82c736723ae397ef1b81729c1ff9f6719a74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cf23319050501c9d1036be7315011cf

    SHA1

    087ae909d21c85171d05f30730ab9c0a53138a56

    SHA256

    b6e70fd79278813eb4d377b86f7cdef0457025124233b7b9c080539e58db5cad

    SHA512

    61adc529f94d9adbc18073eff1f27bf45335b386b22d237a067fed37673fb17a0577d0200b4965afaa19e4bc68c84a96a8e4c15c2624dd4209f0bd4cf2fe2e5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e120029dd03f952cfc85c6202ab82365

    SHA1

    5357fb397dee01567735d63eaa4a215af34b45b5

    SHA256

    77e066a5fc9a5c948af6ee7179957dcfd8f7d7d2f5f05c53bf8c593af55b141f

    SHA512

    0a31ff5e6bf0e59b24c111ee60876ab099a424a18e8f0cf55836c1ccc223b4032db61856d2716cda7f04612b0d4707dd0bbd5dc635b93b2f9701f18457f35ed7

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bl977i7\imagestore.dat

    Filesize

    147B

    MD5

    ff739a9e240f926747207b37bfdbec95

    SHA1

    cd3a7cdd1072de9db44e896b96c40384ad5d8876

    SHA256

    c8c4ef676fedc6b875b64397c820be05debacc1fc810be0932fabf10e2ea8da9

    SHA512

    2a34ba01b629ac482d8aa34dd5c7e4733c9a94ed3002725d0fee70f1e0f68b89e47544db28cd77f7b48b095675d299880828c7c08cee83756316aea820136d7f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\favicon[1].gif

    Filesize

    43B

    MD5

    ad4b0f606e0f8465bc4c4c170b37e1a3

    SHA1

    50b30fd5f87c85fe5cba2635cb83316ca71250d7

    SHA256

    cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda

    SHA512

    ebfe0c0df4bcc167d5cb6ebdd379f9083df62bef63a23818e1c6adf0f64b65467ea58b7cd4d03cf0a1b1a2b07fb7b969bf35f25f1f8538cc65cf3eebdf8a0910

  • C:\Users\Admin\AppData\Local\Temp\Cab2CFC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2D6C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsjF7C9.tmp\FindProcDLL.dll

    Filesize

    31KB

    MD5

    83cd62eab980e3d64c131799608c8371

    SHA1

    5b57a6842a154997e31fab573c5754b358f5dd1c

    SHA256

    a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

    SHA512

    91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

  • \Users\Admin\AppData\Local\Temp\nsjF7C9.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    132KB

    MD5

    03d28f4c03441f12bc2dcd183652779b

    SHA1

    c87ebc340ceaa1de9b32d901037889fe05f80b05

    SHA256

    6db47a99fb23ba1a3972870d8cc74a2799fc4dbd3ff68a8579ca351350fed070

    SHA512

    9d75dda43f3a761e3aa31c612ba0ff20e76341e333d74fd7a778bca73b7c047a53a21a1edeaaf27019c3c27421a8948d1fc40582b20a0eaa0b59ea5f22733978

  • memory/2164-35-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2164-11-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2164-20-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2164-22-0x0000000000550000-0x0000000000560000-memory.dmp

    Filesize

    64KB

  • memory/2452-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2452-5-0x0000000002750000-0x00000000027B0000-memory.dmp

    Filesize

    384KB

  • memory/2452-9-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB