Analysis

  • max time kernel
    140s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:32

General

  • Target

    0843e5fa028f288b352774242e62fa20_JaffaCakes118.exe

  • Size

    203KB

  • MD5

    0843e5fa028f288b352774242e62fa20

  • SHA1

    1386076c25438215c6ab12542d0d3aa731e4125f

  • SHA256

    0ab36dc2ffc4580bcff850c5dcca9df6673d89afc231f9b1e297096d80e8dc0a

  • SHA512

    3b62e1dd4572d4d97f2703f99f46b7cfa25e48e52971772d00615c9c3285ec4fb8ba5cec2a669edaede1116147278abd40f431f4c068b4e62cd27b26304c3906

  • SSDEEP

    3072:KgXdZt9P6D3XJpQvh/UkIHzgmjXMU7Q2pzFmaO7y+z3IAwpF5Z2+A:Ke34Ep/4H8mu2ppmaaEPE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0843e5fa028f288b352774242e62fa20_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0843e5fa028f288b352774242e62fa20_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\windows\SysWOW64\cscript.exe
      "C:\windows\system32\cscript.exe" //NoLogo "C:\Users\Admin\AppData\Roaming\Online Video Accelerator\av.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2664
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.online-video-accelerator.com/thankyou.html?dyn=51d862b9140ba0154c0008a6
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b879a7e4d772d6f52bafeac8f6296e5e

    SHA1

    070d65460a895b68d5bc38e01f7ba6f1f0095b34

    SHA256

    98f1583de469aacd043b4c8d6612ea6fadfb4740ce7e2ea447c77ee903390672

    SHA512

    7f39e810eaab0858ba54974c6f715e1e64d3af86807e6cb8d110309725823934b197b538fe7b84a1c1800882828eeac4b5b32c820b38e2214249190c681ff915

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9781bc220bfac7c9c93eeb659bba0e3d

    SHA1

    4166e8aafd518c10c8b4dbc67bacf5ccac4e6dd9

    SHA256

    34d8771ee658130d2f3038856325a4637fac3dc8ca50427f3d133ea6ce9268f2

    SHA512

    17edec0b2506ec171746af30d8d3a26c139b9754192ff025ffb67276165e2e70beba1f38e179b1e8cd0d7fa6ea7e1d3a2d3146cd0a7d3f67809065016277e2c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc5350ef5acd980111572ce4b30cc804

    SHA1

    9c88e08e29649744c5d2e1f6eea23c61eb994297

    SHA256

    a08b62d7f4b7b6cefc3c42a25c4f2c8b3bb6a2144f593b524494d586242d201f

    SHA512

    e701bcf7a30a6a1ffaef70aa93a7434d423c12f043fbcf66e07d83b1d500bc72ac455aee42e729d290f6f053e80f0f31db92314e67f103696a8d3e23ef1ec766

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe7c83868e3426238b1309d614f95f96

    SHA1

    5bf687b8ca03dbcfc3f0405e5c271479f2608737

    SHA256

    0d447c8059d18c50a842b198b0021d3c0281cce637ca3c392e02005e1336d0bd

    SHA512

    1c969819c557d55c806df60dc3f8385379c803acdc5fb82c2b81736a0a152f3b568f2a656b4b40235a1bfc4c9b6ff7c07937f19fa83e3278843e2229ae7c8b4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59ee14ff34d87d525a9f264f08017078

    SHA1

    3e0ffe3def9024829978845c757a48d8f4110265

    SHA256

    25a4d674813f001cee357d927e3d5780e4576aec606a37081f9ee8f576fa3271

    SHA512

    94363597dd7d7fb246651a708e3cdc0eb14d0b923131a523c84bf7e6a2ab260cd56bac0e993a1502fcbd686267ef3794da78342e0bcf6cc149aa487081f9cd95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91d34b61523160a18c7eadbf6c473f8a

    SHA1

    a8f12386d9f641335cb97d6abcb17d962a228f32

    SHA256

    d467151f311eee21714101530d8382d157fb71de0c6d49096af3150a6d38e949

    SHA512

    7d5eac831d50ca1fa7423fb1fc0362b065bfb5b0041ef5090d172bc223bb5c4e62ae2e8fca45ca6ef022e29a6c4e5d04c7e16f4b64e2b21c8483dd742d1eb70d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd546969e7dfd095b915b7e2e1f43f91

    SHA1

    af86ddba521349775a1b8434827b24142b2293e7

    SHA256

    65bfba1821ecf4322611003817cd2bea6728987d9c404d2b7ac37533d707d411

    SHA512

    a9560e6fb0b8d9a28328bea97e4c983baa96c56adb4db9535fbef6dd1d1baea09ca719c33926ea26bb2686d98b3373289ffd8e532110a7d058a5e30a1626f9fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a567ba3d0889ee4aab92265781fb8b6

    SHA1

    d40b3931e92b794e7a72ab3a1edcb4289304c9a6

    SHA256

    37d49717833fd369f827de4057758740abb44109de046026eff35df550d323f2

    SHA512

    26f83b783457b88f27426ab11332b9afc07f0de59c2da58f74ebabdd4322475eddd6c0d3aa8bef81c19a8765ea1d298291dfa6e0e1139f9b59f4fd9fa435d84e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00fca072074c177747dbe130da21a718

    SHA1

    a499520e2f16b152530d9adc3f0c6fd66f44145f

    SHA256

    0677381b5f9064fc8284bbeb75bebad21fc732180503d3feab66bacc5c31d53a

    SHA512

    f7823e8d9a83273491055f55e5fef78ae3daa4a8c6dfcd4a4e0da84869019f2278f3955dfbce3d28b4e5de2523a3765cc331940d06d7e55e0a136cc237355ab1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1ae79f48d6fcea48203c297fed4d529

    SHA1

    220fd4f5e2a0ce6d4821ab1e6cfe038e8058a440

    SHA256

    c5ff6090afb45bfee91228f15362615138f20e3fa75d4c74d28d4b5b0f68ce55

    SHA512

    a252cbba41032900b423b34345ac44634dc8432243112269c2b67b43a2e6ad0faaa18202e2195288b2e40e4c01ae6de902f242005010b28562bb665932400b1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ced8c7b53d4f264a03a84a6562e7f521

    SHA1

    5ba6d6e5be193f2e6525bf9fc48298ceef665ba0

    SHA256

    dde4ab600cbb2314707c84755cc1d970ba7b4602bab350100e0a2fabbd3af896

    SHA512

    fbbc712c1fb6e7881500888c9ba13fea15eef3a91ffe16591133079df16502fdaa5763c16ba923c9d3910e57ef0e4ced5b50c814e1a13d2c25c2fa8d18c5197e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb97f5fcfbe3620efd6c41cd02318a29

    SHA1

    9ea843611205c7414e4e3468a923b738f41fe482

    SHA256

    e6c323bcd5a0fe2ca7d1718d8ee2a64e78e7c0581e98397c443aa539f873c3c8

    SHA512

    c96a556d8f7891798ca829bf5d2be20b07e6f92387f1576093cc21c6940b54278052cb0f781b2b3010bb64a88e6271a21f4dddc263cfdbb3faf04d08a87b738e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9855e871ae8de863c03e5ba01f5b4850

    SHA1

    7f1f5bf5f70548d8dbd96820ac263d19956c3b73

    SHA256

    153768d563e3b52b8ea031f2ec0f8114f425756fddf2fac7b2abaabb8825d303

    SHA512

    a4fa0e6fde40662c19d82dc68e78128a0b3468ce0177a9173dd932a7afa547a0448715f206c0c87ebf3c248f3c2b7da19fb6c391582d016e1ca819695aba6cc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    131db89a98a758ceffbf88290b4cb241

    SHA1

    bfac11a1f7d226620ca08cb268ca025ad86bc938

    SHA256

    5ceccd571b484f826061eea8c44d1f6adf374bfe410133eb344e88ef2583569f

    SHA512

    bf6486d039b9663178c3819084ee676197537750800cc71b024ae3ab0105d80f0369723964e25a7d6007156f4274228a28b7d8d8e98a881026a9ae58d11abec2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17a734d6aada86bf3eb76adb99ad7afd

    SHA1

    44749329eb77fac843e5e5958a3a4ffda9bddf65

    SHA256

    044a6f0fd4244ae6191aa43931cba45ed4a1db3e2a05074a8359c8eaf29d8b71

    SHA512

    3f8f4f970d5fa19c5a64fbd29b6436204845e2eb7058654627789bc0458e2cbd5c9943e550a69982e77f4c80efcad0d42f97ea480559217e1a7050cf919ff908

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f85ba944b45e5123f4ccd1a8b3ba61d

    SHA1

    6ddca943ce7b443a414d24c1e44c8dd1df2d4983

    SHA256

    49b53a0b7863d032bc21aee0734393554f00740d0bcfa2aec9631225ff18b0bf

    SHA512

    826362428a1f9e475cdc2488dd86785dbbffb31bdfd873897b31fad9aec1456c9ca76d6703bcf5156b5d8dfac05bbe4b422f9d7cee243c60e6a6a7a939f7633f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    631e20616bf78eb8b4e6fef98aefbb59

    SHA1

    ad13989f98fe873eef457544d09ac3431e2ac6e3

    SHA256

    91a0aec3d18c207ad70a5dd8981921b200aca8256312fde5abcf2180355912a9

    SHA512

    cb14ecb72e4112cb947895d61e6944fe1eeb3fe75b954350e51858a439e5001a12487fdecd369b954ca0650f9a6621c5de9492b03d32e99cfcf23f1ce76571f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9566814b112128dc9bab2bd9ac9aa57

    SHA1

    956c3d095000c2314557dc12d2ce7fb689583194

    SHA256

    597c96c1839631e76ca49060df0559724e35bd5e344b7c8982d0ade46ee5aa2a

    SHA512

    bff8829cc40fedaeb6ca1526605c40b0a8b568a1d0a509f6de3736897119cc55ff0924c2f7e36f93df275d278cc2c9a56de6b4af2b4c83b4955a94a6bdd4f093

  • C:\Users\Admin\AppData\Local\Temp\CabAE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar15E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Online Video Accelerator\av.vbs

    Filesize

    567B

    MD5

    a00fdb5ca818a76a95a75a57b55e889f

    SHA1

    ae517559e6bf86d5439c9b3d4449857a96bf211f

    SHA256

    d8018fd3a4b338bd5dcd54f71034c9ba11cf72fd45c0210786ced5d164750462

    SHA512

    f1f052f8c4a5a4f97648dffc4db1675fd5575445d355e9095b9cbb47424156e4cb5eb0b011d9b5b1d3037f4631aad58c7e96951a13b0b55a833c44f70d3d031c

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\IpConfig.dll

    Filesize

    114KB

    MD5

    a3ed6f7ea493b9644125d494fbf9a1e6

    SHA1

    ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8

    SHA256

    ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08

    SHA512

    7099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\inetc.dll

    Filesize

    20KB

    MD5

    e541458cfe66ef95ffbea40eaaa07289

    SHA1

    caec1233f841ee72004231a3027b13cdeb13274c

    SHA256

    3bce87b66d9272c82421920c34b0216e12c57a437d1955c36f23c74c1a01d420

    SHA512

    0bf6313e4cb7bbdcfba828fb791540b630adc58c43aa4b5ba77790367d0f34f76077cd84cc62e2a2c98c788a88547f32a11e549873d172c5aa2753124847cd0c

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\nsWeb.dll

    Filesize

    11KB

    MD5

    12f7a0063463f269b816176e1a54447e

    SHA1

    e9963b6e0237ceb9d7a8fe6c73d8196068a59dae

    SHA256

    d72bf4fd8cbbdb61653c5e9da946d1c42e4daf2b1060da814ef0599a65a65c9c

    SHA512

    03ed4495c682537a72a3379243a95199dac4bcb72d8c8e96d6d088cf7a3c208b654fc50065c6a4650703ec8e20b6d24fb2bc038b4f33a2fd700efc8e4c4d1900

  • \Users\Admin\AppData\Local\Temp\nsjCEF4.tmp\registry.dll

    Filesize

    24KB

    MD5

    2b7007ed0262ca02ef69d8990815cbeb

    SHA1

    2eabe4f755213666dbbbde024a5235ddde02b47f

    SHA256

    0b25b20f26de5d5bd795f934c70447112b4981343fcb2dfab3374a4018d28c2d

    SHA512

    aa75ee59ca0b8530eb7298b74e5f334ae9d14129f603b285a3170b82103cfdcc175af8185317e6207142517769e69a24b34fcdf0f58ed50a4960cbe8c22a0aca

  • memory/2308-41-0x00000000034A0000-0x00000000034F9000-memory.dmp

    Filesize

    356KB