Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:27

General

  • Target

    084055e694552ed6c6228a691ffb5252_JaffaCakes118.exe

  • Size

    495KB

  • MD5

    084055e694552ed6c6228a691ffb5252

  • SHA1

    76b912ee4fef9da546f06ee3ec2e0f5523aed6b6

  • SHA256

    92206196e2de85ed6050c1e6a60e2cc3b199c048cc19cf626bfb6524e34744e0

  • SHA512

    58d7599b693d6f1c44b76191e58d055e09a7bc88ccc4292ab367dad977c245575062bb22bb90ba1917251e60c1096a70409cc05313f6bf0a3c6401957effe12e

  • SSDEEP

    6144:We34R2kK6zh36dqXEVTrnCRZG/t7FTBqTzP7n7O7L6K2Bfo7pA:I2czh36VVTGf0ZTsnz7O7L6ju7pA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\084055e694552ed6c6228a691ffb5252_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\084055e694552ed6c6228a691ffb5252_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.phpnuke.org/s/5/8/58492-296530-hot-potatoes.exe?iv=2012101812&t=1727832463
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2d34dcf75057b418f043402585bc3ac

    SHA1

    37208cbe483eee6077f684ccc27904c5372c9117

    SHA256

    3fbdc49a84b4732be43d9e19e90cf91b0d2d25130c7117973ec1011821bfa2b4

    SHA512

    ef3b5991fa79487bd60596928ee1b6e389c2e7698810d15fc8f51386bd860142fc8cb35039d76908848397659624a8448a15ebfd7a9af890b5c83b488767837b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78094e7cbf236ca0314732cf955bb47b

    SHA1

    8a23c2820b08cddf19e582087061e92a99fd1653

    SHA256

    220206a1f1b6f5e151f29dee2950690587ece8fa6bd181cf9c03c2eb822f0141

    SHA512

    d84cbfb2a838ee6d7e86b6b6b2fe2f991ea893cd9910e3fce9703cc61a08fbc52581ec214e7d08a9c6ec7ffcff32224492cbff514dd5adc57be78516e6e327cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    213db0d1b788fb564aa44b45fca018fc

    SHA1

    6aaf2fe2cbe04d78eb699ce6968a7368af1043ed

    SHA256

    58d88efc72793a00a879a1b06683771dc2a6f8c5299a0dab76c22e1fa2d9dd5e

    SHA512

    96ba363dadd72948bbdd4f82a8faa08083091896dc2192604d34f97ca3c9742a3c35537c939077858418dbe81f4801e258ff5c43e48279b36f707a5d76044bb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9ec6633521c1f875831a56c76a430bc

    SHA1

    db87d7857185056769237f6e88a50d2d18710401

    SHA256

    99b793f4c83ae95da2df4b510c606094091d997b72bf8d793762924c4db5c587

    SHA512

    28e32ba34f3792aa66099134e759e7aef9a682b169305eacd75dd2dc21c43dce11ea654917c71ed03bf6f6c1ef2ce08fe80b897201ba103ab0f81f66d5957790

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fcf3ffb6c6f702daabcb8d2e6084119

    SHA1

    d2bf6f873e45b106cdce64e12728c2678146bfbe

    SHA256

    819124c919338735961879bb92ca20f3b8b2a0d115e465a0b3d1604ab81b5518

    SHA512

    33d3e5db266432cdf049fd9c03a4646f14c7ba79bf3c70add6a7aaaba97870ff2550f2cc8f819f37ba57293a2db0225cdad6b43865ba8c15c40fb2e40cc97458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03b1223566713b015329cc8ced6dbd6f

    SHA1

    00ec49e2a58297018c36eafad4816a78469870a0

    SHA256

    a04aa9cedfdcf840a264fca0cca06b74781a67aa5f683b1716e7c6ea9b6eb570

    SHA512

    ee9fb30813865e599bf87b73950207ba3f92c2863661cd0e0ba837d1c1ef45353841b1e1575247fcca14fb74e45b3d24d5e8235f275ac98c74baae6f9f13fa83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    424d4e28b9911cb89587031034074860

    SHA1

    775c0a7d4681da0624edfc2a37952502f061074e

    SHA256

    3b67771588f80734b9f59c7345bcbb3a7b14a5089bcd1bff88e9156a0c33859e

    SHA512

    41cf766e0bba8ce7b068818811a6c13832b2a7232a930104dbc27bfcbc9ceb5e736ebb0b3789c263105161264f0409cbf616cbc3f62cbd569dcbd18dd6a81a85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e15707fe10da90bebdd7ea10a26dcd5a

    SHA1

    a7b7ed59f608d2bf3c24d8f9b3184103d59fd468

    SHA256

    d891cb640015c07828280d5298e45c7b4c9b19b2d730b99dcf20fe2ad33bfd27

    SHA512

    8283e9f73cdf09126c34c4689a393500eb6d47d6bff7304101f8fb000a53086cce49535acade45bb5e2abe55f7e3aebf1c306e03149228c589cf1dfa2ff1c17d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de718625ca22505953c645c745e81647

    SHA1

    3660a8b08bb066bde592bc963bbb77bd3525f2cc

    SHA256

    5290ee8b8237abcf105e6192472d437afa0c71ea9790ada3a64ad5eed6c1b423

    SHA512

    f0832defe889cc0655d70138e619680351cc43085bd6a950ddcf0670ab34bc2eee44e764b3b1e2987ef476627449833c52a19fc8ff8e9363d43643809cc58071

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2fbd53acbb6c74a8da31fd1189779d2

    SHA1

    017b96eb6b2f2049cd21ddb14586c88a7e2e7660

    SHA256

    c468e319ef48f2a7cd42f67f7cfeafbfb1632776d6146bec4d7575a483cfb213

    SHA512

    9fa5d1215437264657be519327586dff0a31554e3681101042ad2cf4ce85bba24be9cfb65492b4d0a2dbaf694e99f9907443fc54d94076d6468cbdd0456f6a24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d38a7bec95b2ec184eff0e277a9c0a6

    SHA1

    e5ef33e84d5e5550cc0827d0ef70e524bd9b8a7a

    SHA256

    8e8ad0c4843f60663d82f0e2215a977f0d50ebb166807ebd5f5f786acef993aa

    SHA512

    39db79d9f1888db420d6e4e6a259d849c31a7253fdc140e2bdb44538e6d120f3fb22ea11f35129c569ac3b13400f125a461db2f7080ddeefe891caeede617ad6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5b50e9421aedc2394f7ab29317e8918

    SHA1

    14f1cd9742607ab81fab751175ee25068abe7daf

    SHA256

    eb86c46c82682c3af5033cc5b918fb90d71a567517cceaaf065d61be5d1bbf49

    SHA512

    1c764d7a9d4740aa61b2d2b1edd1691907b8bb8c759a7603111bac9ab1b5ee1ba8d33e633cc047550693a0ef228f3b0a8652051db86e70bfe3e44c506beabd48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed3e56e03ed474066c80f03dde331dc4

    SHA1

    1e8509d4b7059e6e78661427466abf5d31ca4e57

    SHA256

    276278d2664247864769ce8bedcad60d17a6afd77bbaefa68593e7d175d1c8ab

    SHA512

    c9f6e1f142833ed84ef1c979e4c189960c96deb1c26499739100611208126ded7c962164fdf45a1372a5eeb8f8a1f4100c4735077426f2f7e76fbfe6fc638ffe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    347a9df4e73cef01d30b01a5464f5991

    SHA1

    0a1bc9b4028210d85c00982b03bb23d1e3695952

    SHA256

    2f4bac531e6414d09729bdd4b3c3a85c33117fca1a36ac400fd86ee2a110c6a9

    SHA512

    fdeab111628effe8529b81c1a0e1afeb2654cc366ffaa4b8c4b8a923c5e63107ce9ea294f5ec22940e158367bbbde671b1947dd969e015afdd4818620a96b3c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42edf3a2bb353217ca92def09a66382b

    SHA1

    ab390e2b82474cecb229c30010d1a5eb7ccfaf46

    SHA256

    1bce2a5bf7128ebaf6408b1184de98a00a5b0389f8ac922166bea4a6ad7e7269

    SHA512

    04d16ac586b70f58a53c4ec37c61c5c1a1c18035155ff3daac8cd264ad53b7d04fb5d8020adbb6f2fbca3af289f53a99735affa5a3eb980c55e6a457e591caf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3f5d48673ad1cf4cb1d25231978ad0a

    SHA1

    2aad288fc5c44a584dbd8b06b4a919aa1a679d73

    SHA256

    26dd0f886c418e6fa58936911001de33771755f54a85c60f3e3cce60438e5cba

    SHA512

    77382061a210c7755b7a2e109f98d3203e122836405d93071e7c81c98b3afcf2f689ba86724a1a6017e53f8da1199deeca40697a1987e92e5f4a2449dc81e00b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1650447ca52325ece60c5cc674d66ec

    SHA1

    e0b14be636b7a568d7d44a73c3b35583c9198696

    SHA256

    90034f5fb9a9c55364cb46e1888578d42ee4a779105a8a1e1f193823f5a90e18

    SHA512

    4b9ebf73cefaa3121d3c48b19cf220b2c7d64c72b38912991d7175b7eecbd2aadffbf2aba506abbf3d46fca7f99a762023340d63af9a9693334d1f66dcf3092b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f621201580cec8ba109bf5397e41bcf5

    SHA1

    5fb2b2c2119e6067ece23047e75edbb1efd6e8da

    SHA256

    2fd9b99d07d0a4c0ccf210d2b5aa4719c91a0de50f58f3aa769333e6c8f0cac1

    SHA512

    0d2467093c1aafca1df82f6287169de9160ef43d048cdd920579e08a964d1d2d608e1da4a0399512c03e297636d39bbf17c481821b0eb1937e0a3a9613777f64

  • C:\Users\Admin\AppData\Local\Temp\CabD06C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD10B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nst83A2.tmp\ioSpecial.ini

    Filesize

    1024B

    MD5

    b88bbe3723930b96924e696d23e4107f

    SHA1

    cc15ee95fec0847c366771af6538ddcf93d6d3cd

    SHA256

    7a63b12af61cd555581b8d890e4d62bb5df85873afbeeabee0f310a0f3587ee7

    SHA512

    a289c3fdd16ca8217760c9d61627abd291ccacd5850332d01604f3becf1458f872164cf3dcd5f17b8d8f46168b38ab044886c028f6868bf2f4c84f3dd7b3862c

  • C:\Users\Admin\AppData\Local\Temp\nst83A2.tmp\show_page_toolbar

    Filesize

    1016B

    MD5

    de86f93cee23f29c4146d0490847826f

    SHA1

    cd01e4525e6b2cb3e6ced0589af4be9c2d0a0826

    SHA256

    b7b742ad61715e695a56cd0d1735d969bc7fc2c68899d823fb3ccc677a966ceb

    SHA512

    3b00c9aa5f3286e963c0ab8e3a827d7382d847ec68313f1a40088d68d0f6eeee61d6a56edc8c45f0a963c80afc9233acaa6fe75123887647ea88ba1aa9222565

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nst83A2.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8