Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:29

General

  • Target

    08418cc53d47b626a734682e4bbfd0ff_JaffaCakes118.dll

  • Size

    806KB

  • MD5

    08418cc53d47b626a734682e4bbfd0ff

  • SHA1

    935e01fa9e0bd9a1424ae247b49186167419bcf8

  • SHA256

    b0983d178464f52c2730063987702bf9369b3bb610526a9aaca318ddba9caeab

  • SHA512

    1ba1c6c9778876354fd293ddaf6ee6c88ddced6aaf834b4a82d04f24fe9dc2b3dff8dc08a4b41450512b2c27db3696d09d8cdae92f47e79297541c2d81890eb1

  • SSDEEP

    12288:gSMQqb9x5ieJ1l2ZW/97ErvbqW6bOzV5aIA2ubMPt0igmJPqhGJi+m:zXW5FrlihvqNwz2o0inS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\08418cc53d47b626a734682e4bbfd0ff_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\08418cc53d47b626a734682e4bbfd0ff_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.webcheats.com.br/forum/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 212
        3⤵
        • Program crash
        PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    c780ca8b68f88009af9be1826378c999

    SHA1

    f58b19b7b5a6346fa60cca27183a7df11eae7264

    SHA256

    2f93330476e9d073368916d80ac7f59d595abec130d19e02ede3ddfff3bfd60d

    SHA512

    d7c7fe7af5838b215d0072cc75c198035a611cf27991ebc835366d7aa532a749f26f9d14ce9d2ce260af9086b2782a91ddc022222712ac3ce3ca0cafb5cb4854

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0f060c6562bbd74ee14d9bf6a28a013

    SHA1

    9a812d55b4fee05ae80459fbadcafba0b8f21c41

    SHA256

    9817e99d30ee32de00a6f71a26d55ff02d74f28dfe20530bfa616748154e071a

    SHA512

    9d03e97fd63d5f0d87af0014f24177f97039b65099b92743ea50e29b0e8a595caea0ca0dd543c79c84a5493f8702e93773312aea7d78a8084e9b31a60be7f681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    864ee074129fa8617d1e5edaa117ce64

    SHA1

    df70174ce4506e8e910d97e2f55004eedcd607c2

    SHA256

    57fe71eed50424821f42fd63b051bfa7aeee0cb8320ea4a150628be887bdbf82

    SHA512

    e5e13967067d7991a29092a628a7f6dab1c612d6d5b5d55d248a2097b0165e70e47e1bd11498e1fe97fde05c0a83f535d673044936c3b19a20ce96c0e8e1e243

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4117b85b57388383067c11bb9f872202

    SHA1

    cc203bf104f3882dbafb88f1d571958d8b666089

    SHA256

    a68ccf020a0163dd54e5efe53c09dc84a29069687d6fa6aa5e2a0da29b99076c

    SHA512

    0f44ce67d218b8fb792c88bb2c7e9bcf44094dd0f21e04a53b92970ac2fe95dcf852eef613e0bb6bc76a062750f33b13b4aa59ca194b11972c4459ff9f088848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3822dbc1246c9fcb732314acf55c2967

    SHA1

    767d90389afc74bce9324144c8e00609b1bc2656

    SHA256

    07cfccc82e8d78480f831cf7089e5675614fd6c77224747f94e4e7353a7c6440

    SHA512

    5ef14dccfbe87fd93c1d6d1c06772cbdaeadfe6cc39204268491c3784e3b54b2674983f19a04fd9131a5739b9008a741eef9773613fbcd5d28ca9560e7436d5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44dd5ce0cc24d78bd17a817a272a784a

    SHA1

    e771819c95cb5a6fb3e33e3d6b21638bcf311dac

    SHA256

    268fefbe1f757d2fae99f100f729130c77d055c5ddc0b84ea3ad7ff916ffa9fe

    SHA512

    3a521bfd0087d9df3e63800bb255372a0523a74126ebc81863f2fa4b254af2fbd08cbd631d7f4f93b7a57549e936998ba01ba309e1a1ec1615d578c0814f03cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0dd603c0bf717d166de24426bc32c97b

    SHA1

    368e36816d629a736fcb32c767ac6ac903500d9a

    SHA256

    c96f17c6c5e51f56671da1990d78bae3394d419814b7a33f7c7891f7a45316f8

    SHA512

    29617492648a29c0e78cace2b3278399004b13b930618355953032095c19c547bd48d9075d533476111e51f036b61399e3a62d809c7562b49842eb2d175b83e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1e3e8338fcd44c8a6939281394058c4

    SHA1

    33f7a78fe4b844d620d0eab693dc86f4bb2805a0

    SHA256

    a1391517e421469d4b3bfe0e2f758b9858a81ce516c1778878fcd1382a82e566

    SHA512

    b014d9d68cdea7fb7c6f59e99296f958ff20d4ffa515d74a31445c09f21847a659d296938549acc7b973de8e15d224ce003c129a2263facac385ac3d1ec25304

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81e18004d5625e6cc4d744cdc5ba690d

    SHA1

    db566a98a88942108f5f8368e30234b8a85eab5f

    SHA256

    6bba067c65750428ae4e3c4479ddf23af18812404a5b9556ce40f0912386f36b

    SHA512

    2d5809777697a77a807020d21da86fa2db7b2d0e833839bfc43d5eb952bd2ffc492836cdc730d789375ddd1d9b0f6d101a5aa64bf3a9fe22d0ee909a6ae1c9d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a3a363d286019ea176f2816a0386f00

    SHA1

    5738090708a1f8b653795f7ee2677b998c52ba04

    SHA256

    8a642aedb36202e096e85bedfdbc75483725ad27a57ffe8d8411da8310979435

    SHA512

    667f89ec2d33b0211d4ef2d45f8956aa8265dccf6ca189b027213985a45f8a6ed59e1112466f2efc8a27040ac14ac736f97c236c6149e4a5bf7bb051ef04fd66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4c16904e99f7461b302ac24bc33d998

    SHA1

    daba38e1916fcfc49a2606bfd5f0cba3f66946d9

    SHA256

    972ea04ca50f65dccd9908a6786b6fe4cc33e1abdd5544a411d2dc7cf3372034

    SHA512

    cfceb16b38d58b3b4fc2de0be0574efbafe032b8d441aa4e8d3ffec230a9c0f461a0187b83998dec3556a42da790b13ca4aa5170d8f5d4f73768771aaad01ad5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c26e7da96dca51030d7e86dad6b838c7

    SHA1

    9bcd3ee36c14fb1eb5b4c3fdf161a9b787beb07a

    SHA256

    4c430a954ef974d0277ad7ffc692340e3dac7f4f9648f42a901d5546df4925b6

    SHA512

    bc12ac7cf8c4ab847c62422cf44839c0c4792b7432855c064d05ea103caa428056b77ad2a465bdb48292cc11056a64446a7406ef1db3be9f24a8bdc155613652

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c553285beada7de73d15181279b89c3

    SHA1

    df53c8586ef04bee2ada9c767ee4086301c6925f

    SHA256

    a1a5d664e2df1cb0988b6fd56600f8df71826941944a9ce1e374bca77b68a97e

    SHA512

    fc82e723bafbda17955b54ecb7703d44d7c28d461646925ee6b2dbf2cd383036b0d4776479f1b097be13b1dec8b69153525e19a749f64c039149d73f78b3fd20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a58bc158424f56180688cb553718699

    SHA1

    bdd04ac2a8bccd41d3ec764eaf3c90eb28f858e7

    SHA256

    09c39288857fe29046ed57464cc2329932bdde3298c5e254f277d8263433e779

    SHA512

    50fab87f9f0e43b864efa85d06ffcb32a4bcfd3fb859310785fa16e812703f339650ef31a01b27f5e078af0f207912ab5bbaa87a784154519ef62a563032ea10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2884bfb7cc1a59fd20ecdddbf94cb07

    SHA1

    b46faf5bc3875df6eafb580a3e145d98eac5abf0

    SHA256

    1051b4361aea1fba3df5f85ff11e17da43c0ed2785af786388d90f9c08e2d7a6

    SHA512

    2461b5ddc3973aba322dc263fb727262aa65c6b1d29d17c5c2a70a091b37ec0f285ac3e74992f73f8a1cec983098cd73f6d7a662b13a6c62a669e360b6a65566

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2db4bb013e0b046e3cde3e98315a3bd1

    SHA1

    cf2d755d1360e36e8bf9997903e64ef6e6888947

    SHA256

    14ef8eef1553275f926db47af5372d953485a52a5512365762cb861665f5081e

    SHA512

    d380642fc7404ea001d9e45695150edb034b4837906c9e074a23ff3d22a860d3903fd1a9e3b2b4b021ad401fae998c8a87d42cb9fb40fa24672a9bf60f579fce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44ea1a4037c85b3d177240691ad0904f

    SHA1

    8fb65d2e859599d5491c711e1447e9dc8a78e49c

    SHA256

    438206c91e1e938a13816d3f0427eebdcb4e861794b5b827c8765d2bd8acf32b

    SHA512

    00390716be1ab0c6ff13eb19e561b2f1a9f80ffdee369d9918c93669c654dd5e501afad2614d55b3612278adc0a4b7b1ec211e7a8eca2d552477702a4f12adbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3379c42fa03e1b17c09f1cd9f8ad64af

    SHA1

    d49eab956a7e353f64c844495ef0e5da734d0ca4

    SHA256

    d20c016ee5b02234cbf7e9b553da0aaae8f0534fcbb32d6cc3e886bff292c973

    SHA512

    d0a0e7f817d403c31b0d183bc76ddfa03230f62f50efa437e66ae5465f2e8b092aa3fc35ccb4a74b6c12c6d028d5a0137a4177c3db45bbbb4cb9ef232954b540

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    712909025bb7c5ff319a9346a9c79b57

    SHA1

    b8188f4f135a3b226d8d81331fc9ca72cc25a0c4

    SHA256

    e17f57b2582494e9dcc12860e4760d786f1df3d5cb3d65833d67325911dca7b7

    SHA512

    127316491258bc1e0206402f5146a0f07833448a1e4a430208948f7beef6e8924215b131dc26f2599c289ef4a66d9575d09bbce35c19e2730c88272948754866

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49786d47487d56966f4101f611f21b2d

    SHA1

    fcd7db69f85759a14c919ed0f9acac980b533277

    SHA256

    1b6b1cf7e37a92e28f3be7a0ea2433dd9751f1c42442890d2c90d4ba4034d8dc

    SHA512

    96f93c087c4e42c3e83c616a6304cbcc4e8e82fa11706833e08931c132226aaa1a2400ea373aa60474440dc216ea9056e1962ed4868dabd9b90e4662a2b9a675

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    888266ffd06f1a1ea0b91d870538b94e

    SHA1

    5393ecbf528a72894111d1c550a7dbdfb22306af

    SHA256

    929a3a25135be6f1967b6712953917294cc1ebf55acee081c25ebaa49809c2e1

    SHA512

    83d016ff1893cf79ba9043b5bbe83d00a67f916fa55e732075755c6645de002646318be7769fb56b33c68f49ee2f795cb205d6f7d3bc36bc41f910af5b6f7e94

  • C:\Users\Admin\AppData\Local\Temp\Cab407.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar40A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1936-0-0x0000000000AE0000-0x0000000000BAD000-memory.dmp

    Filesize

    820KB

  • memory/1936-444-0x0000000000AE0000-0x0000000000BAD000-memory.dmp

    Filesize

    820KB

  • memory/1936-445-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1936-1-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1936-446-0x0000000000AE0000-0x0000000000BAD000-memory.dmp

    Filesize

    820KB