Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 02:16

General

  • Target

    0402fbe5c7576d000dae4b5bbdeff0bd_JaffaCakes118.exe

  • Size

    12.1MB

  • MD5

    0402fbe5c7576d000dae4b5bbdeff0bd

  • SHA1

    8421a1844baf6d42769aa2b77fc73bb212ee1c43

  • SHA256

    faac788b1e22160b5516b6756e95868364350b8e7effff7f6ec3d765ceecd89e

  • SHA512

    f7c8365a52ea268e7326b1ef5febaa8c18aabcf39eb049ad209b07e45a52abaee7e734456c70aff5b8f468401ad711962f13b2388a1e81b10fcc57a4db61ba7d

  • SSDEEP

    98304:EcKeAteADaRDWaRWeAteALWeAteAVWeAteA7WaRWeAteALWeAteDRDl:EA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0402fbe5c7576d000dae4b5bbdeff0bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0402fbe5c7576d000dae4b5bbdeff0bd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\ie.exe
      C:\Users\Admin\AppData\Local\Temp\ie.exe -run C:\Users\Admin\AppData\Local\Temp\0402fbe5c7576d000dae4b5bbdeff0bd_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2528

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\ie.exe

          Filesize

          12.1MB

          MD5

          8a232f4301076f229e823465eab6ccab

          SHA1

          a3bb7c2936f075c2864321739e9d4edaac3a622c

          SHA256

          a2a051a01de006bcc74b71e65e3e92e7eafeccba8b91bb93532fb35dece41440

          SHA512

          4592fdadca99997bcf05fc7649f3b49e0a720fd0894cf5fa18b15f06cae163ebe35345121eaa8743b36bafc2378ddcb747aa07ade950c48eadab3e8455949166

        • memory/2528-60-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2528-72-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2672-0-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2672-1-0x0000000000320000-0x0000000000370000-memory.dmp

          Filesize

          320KB

        • memory/2672-2-0x0000000000370000-0x0000000000371000-memory.dmp

          Filesize

          4KB

        • memory/2672-3-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2672-4-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2672-5-0x0000000000280000-0x0000000000281000-memory.dmp

          Filesize

          4KB

        • memory/2672-6-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2672-7-0x0000000000270000-0x0000000000271000-memory.dmp

          Filesize

          4KB

        • memory/2672-8-0x0000000000380000-0x0000000000381000-memory.dmp

          Filesize

          4KB

        • memory/2672-9-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-10-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-11-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/2672-12-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-13-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-14-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-15-0x0000000002B00000-0x0000000002B01000-memory.dmp

          Filesize

          4KB

        • memory/2672-16-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-17-0x0000000002B00000-0x0000000002B01000-memory.dmp

          Filesize

          4KB

        • memory/2672-18-0x0000000002B00000-0x0000000002B01000-memory.dmp

          Filesize

          4KB

        • memory/2672-40-0x00000000008E0000-0x00000000008E1000-memory.dmp

          Filesize

          4KB

        • memory/2672-45-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2672-44-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2672-43-0x0000000002AF0000-0x0000000002AF6000-memory.dmp

          Filesize

          24KB

        • memory/2672-42-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-41-0x0000000000320000-0x0000000000370000-memory.dmp

          Filesize

          320KB

        • memory/2672-39-0x0000000002020000-0x0000000002021000-memory.dmp

          Filesize

          4KB

        • memory/2672-38-0x0000000002040000-0x0000000002041000-memory.dmp

          Filesize

          4KB

        • memory/2672-37-0x0000000002000000-0x0000000002001000-memory.dmp

          Filesize

          4KB

        • memory/2672-36-0x0000000001FD0000-0x0000000001FD1000-memory.dmp

          Filesize

          4KB

        • memory/2672-35-0x0000000002010000-0x0000000002011000-memory.dmp

          Filesize

          4KB

        • memory/2672-34-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

          Filesize

          4KB

        • memory/2672-33-0x0000000001FF0000-0x0000000001FF1000-memory.dmp

          Filesize

          4KB

        • memory/2672-32-0x0000000002030000-0x0000000002031000-memory.dmp

          Filesize

          4KB

        • memory/2672-31-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-30-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-29-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-28-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-27-0x0000000002B00000-0x0000000002B01000-memory.dmp

          Filesize

          4KB

        • memory/2672-26-0x0000000000900000-0x0000000000901000-memory.dmp

          Filesize

          4KB

        • memory/2672-25-0x00000000008F0000-0x00000000008F1000-memory.dmp

          Filesize

          4KB

        • memory/2672-24-0x0000000000620000-0x0000000000621000-memory.dmp

          Filesize

          4KB

        • memory/2672-23-0x00000000003D0000-0x00000000003D1000-memory.dmp

          Filesize

          4KB

        • memory/2672-22-0x00000000008C0000-0x00000000008C1000-memory.dmp

          Filesize

          4KB

        • memory/2672-21-0x00000000003E0000-0x00000000003E1000-memory.dmp

          Filesize

          4KB

        • memory/2672-20-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/2672-19-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2672-58-0x00000000032D0000-0x0000000003406000-memory.dmp

          Filesize

          1.2MB

        • memory/2672-57-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/2672-56-0x00000000032D0000-0x0000000003406000-memory.dmp

          Filesize

          1.2MB

        • memory/2672-55-0x0000000000320000-0x0000000000370000-memory.dmp

          Filesize

          320KB

        • memory/2672-53-0x0000000002B10000-0x0000000002B11000-memory.dmp

          Filesize

          4KB

        • memory/2672-71-0x00000000032D0000-0x0000000003406000-memory.dmp

          Filesize

          1.2MB