Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 19:13

General

  • Target

    0c1ee967e781e16f5ad2115c65dfdaf0_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    0c1ee967e781e16f5ad2115c65dfdaf0

  • SHA1

    20be02ed7d6cc87a0a413af79714fc59811e2d0a

  • SHA256

    79933142da9dd96f5880ed36ed3fea44fe5aa721087a47c158a2e05bf72b0874

  • SHA512

    12dab7053606242e7a5b671ec670dd067fe78260c73cb31cf0dcf7e16c8ae7c8727854b6df65ab210e0b3a9f183ff83054dc7ce1b78b2394768b24dc7362a604

  • SSDEEP

    12288:Q2pDzh36xV2GC0+K9KoP0G2FIz7O7L6ju70K:Q2pDzh36fK0+K9uUz7O7nT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c1ee967e781e16f5ad2115c65dfdaf0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0c1ee967e781e16f5ad2115c65dfdaf0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.phpnuke.org/s/3/7/37361-91965-video-editor.exe?t=1727896401
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acfe460e18af2451eca63d017f36161e

    SHA1

    cdb383ef2897c9fd32b3082a8e469b3786465909

    SHA256

    a26cfe4b6879889d193c46e2c819183ff23c870c7d0d37bf1ac2655a5725de4b

    SHA512

    315e81b58c8493475f425ff3dab2c091f7973baf865af590400286dc184cc5823e8626bd07f0b7039624b3fdae569752a415ebf46715c1f172d3d6b1e8f5b032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be8870c6ae20279c5936c1b64e0e178f

    SHA1

    8959cd80f155ad9bfe304ad0de6d8a6fdd2c8b15

    SHA256

    b8f6a21ed3744763719fc1a7021cb080056adb975b436a3e4ba64efde2b282dc

    SHA512

    65eb5eeb13238ecbfc82d38250263564d80f5fce9769d7dea95d54a7d92c8b0b31bc55674e5e4e913412f752171c2379de9ae7ad9c13dcdfa51cd5a70a585e83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    196a5292c21dbb6bc4784743e35f17f2

    SHA1

    c73afedfed2d805e593b16bc094e7c16e3344ae5

    SHA256

    bee7df09d54709617b3ed481ab3d9d548a072d686debc2295b6eb1f09f698f6b

    SHA512

    7b7b0cc1efa648f6715896e1a92ddd190cdf1932941ea415a1980963d7b9e17fef326e9accb7f1666939730738313ef3242940d11618269cf6f964006e4734d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24a676dd2b652214296c75a341393cc3

    SHA1

    26e1c67610db91379e314cd5c4bdd8f8d33641c0

    SHA256

    f9e88572bb8c05c1da0b4159ef72599a1a07c3cbf214a5ab4d95a4e20a60c38b

    SHA512

    91149863435a38c2a15a7842f9747b11fa3f7a6b208b1a3664854626d312d9dbf507d8bb1aaa115b693416a56745a6d4b6d74dfdbde9b32f0cdb3b09b6f177e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    311460d2540be3ed469a4e533cdf2a7e

    SHA1

    a37ad55a74bce389095e6b93a0219a7fc2367d66

    SHA256

    93ce775b41e1bbb09e4a0c66c3ff921a496fa7aa7930dac95beca68274292c32

    SHA512

    1fc12d70d48bbf0008f34c5e2cc53792b10cfd11a06514d40c2c00e476f992b3d045d69b9467613724b28e7bf9b4da53d3259d2c6441893dc2e00873d6792f4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fa6501c6407aadda389874146e7e57c

    SHA1

    b4eff1600a161ddf49aa3b7d4395e624e1ea8102

    SHA256

    4301fc4f592d4ca496d669aa21db331dfa556a5f1342f7a2f2f673fb0e268cea

    SHA512

    bc3450e398d920215f21966ba38ea670f088a0258604431010ffda0161573606f8fbefd8509fb72bd11dceb613ff62406a5b43e218ddb39f5ea28d022a075ab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19cf905c0ea4f51b304cacffe0f96341

    SHA1

    e143dfcedb31e96d9b04f7ca2b3402b9ebcff226

    SHA256

    be57938ac7af4334369d22b94c81e345b3ab54792c42cf2905d499bd7db10a05

    SHA512

    e61fdce77d659d108e1e7ed4a3f331b6f93dc856a872af72b9b09e80a039f8bb327fd4612da1925c8a57077dc3598ac03d8fadfc2bccc4c460ce69d5c6a7af53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd13ea1627d771a4bbea233126373467

    SHA1

    239f309266dd86b56acaa38fa9ba005b883b115a

    SHA256

    1450e16d4bf55341e9a8b552bdd5fb04184b8fab063019e207a5b349df96f42b

    SHA512

    f0011e39aa5bd9c3fa087dcb54abfaeec50553bea650926643a26b0e5e29ba7aff20f5df9b1577bfa8f740286f101819e311caf7260854994478eb1b864a05cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d384317b40aaae349aadd793f608087

    SHA1

    2d967f63c404ef404f8229367ff8fd59ac6b3599

    SHA256

    15b82f0e52da8965e015f7ff9dbf527f2ae325d3d536f9353a81acd4730ebc1e

    SHA512

    f19911cf454784913a901e2b39a55f64559aeb929edcc78abeccd4d5f65fd309c6808c55dea94330f211b47b26d95e108fa98b2fc5a0f86fe7ea48d3684900a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6be712abdea8a78fd63afc1f891f215

    SHA1

    b496657a32879017c484089016a6134073071467

    SHA256

    e6ac57ba96244b140428923ae87ac5c385c1f5cca8d3dc2e3146f3d80d362fae

    SHA512

    98667fca18418aecfe3fce5657fba3547934394f9f3b3da5baf2e9f41f3200c7ea04b3292c9bf263153c1c09026bb44de59ade1e349d4d147b7efac69cdf1384

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77ab8c4dd54429f94cc7125937080330

    SHA1

    afe749876895e69a517d6ecd14c96bb0cc9cbbc1

    SHA256

    3576b85bcb91fca40bc6f35be43d572c776b69bed9d9242cf450afc9a3d8a06f

    SHA512

    dfda1255d17d85a2e95ea5f965f29a5a90443b861b195fb71051a03c0ac70e9297fca5c5d6def5d30810fb2eccf9918348c449c30063ddaa446f87a3de65db2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    319ca2d5f352749370ffdfc065cfa2e1

    SHA1

    0925212b9d80f4b08e424842709be8ac939e805a

    SHA256

    3dd6b2dd53c419740f643c5e12625f786546a518fc8679837c35d47b8621cbed

    SHA512

    1d9f32c8b581bb13bdbea5251b914848fe897bde13ef2781827e4d00bf53387c590ae0460a34a4dcb4fe636165ab5249e6fffe3e7e75dad58a4cab1a24316e7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16671e0218679c6bbc6899a67e03e4d7

    SHA1

    a4756dd2bba4cbcfb042fcbba9034638bba461e4

    SHA256

    b088adf84d74e235306a5a629549daf850e917c05bd1d01ad501c41b5196cdc2

    SHA512

    31cd3e43d6533c301a893fad5b45d72a7453d081cc1e8458d36f1cdf659ab961dcc626ecafdc7795c513fea6889bb095538e36e431ec63da1b394849dacc579d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d79afd906f71ca0554318334a882a24

    SHA1

    404e8231b1f88a5474c7dd432fa2773fcb58bdb8

    SHA256

    723df0547d8538b67fe946a75953189761010ce06c331c5c6d486a7916488679

    SHA512

    4f419ff1f766fa96795d8fff61a7f7f348eb9bfa8efd6a28d416c3b2a098ad86456c8ac9d45f4da24c10e6f6e86812a1fcc2eaea89bad718cac5c773bae0db51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba95310012371c40e521be0f29bcaffe

    SHA1

    cacd3a6ebde5ea2bdb4854c77577a6f9599315f9

    SHA256

    3459a61fa106c13d2b35825a429b231b090d92ff87b64d72e145643969462c2d

    SHA512

    9b02d62f75a3680d6bfdf9a71aaf89897b230c2a4a5110f6727748be7765d0dfb5fb1ae285a9ae5d82e0f4f73a8a18a204c97a73b0ab7addc71859ab305ee35b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9edfa83b22423ca93fd438d59ac8ea2

    SHA1

    b4cc3338769a3423e9234b3de274746b1325d614

    SHA256

    a0ba31adc6bb4d401f44f38dc701db80170a27a4628259572f388f67ac3ab243

    SHA512

    a4354d596a90bb4e7e4690dec747dc13d2cf28320fd9ad73872a2eeef6487af4d07723ae8f6c009be6ff4d78e1b25192e16f8b782d2a0dbe4c44e4af1c30dd88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    661d970d4d138c6fdcfca07226e5164a

    SHA1

    44cb29326483f57a0aea8d5f3416f68d02f747d5

    SHA256

    2f4bcfa7b2125eb67dd404ea8ca5743ecc0112423a1edc7606c2605f08ae1945

    SHA512

    1c87652e2723d22711291913a4bea2e78449db0a39718b2b20d41883d2c8856ae0983eeedbc268a2f22559b6a165bc6c5536b1eed3083db2526e05c82d5cb7e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d26687d59923296ef516aeb4d6a1c594

    SHA1

    fb19bbded7e1e3a194dc815da28ba439958a62f6

    SHA256

    41f7d9a330cc6d56d88e1e5940b26fb19cd3931044e7ae8843182a0aa5e72d7c

    SHA512

    75dfc6725c540db5c4038b20473a97c45d5b8e8f0e996ceac75fc9ea8a2d52ed9be1d1060377893d090cc1a86c206b928f5a41d3ece4c8222d5999be12ac43da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    84bb2cfa01c28126176e6df27860b4e5

    SHA1

    6db840d4962313c3c0b6f92d0fee26c2ca2e46cb

    SHA256

    1b2fababc8f232a40d968525a6e6a8a30ab84f2788af37284dd61db741734a03

    SHA512

    72167a0de736e09017bcaba5cc44d4b1edd5199b2f5d8bdef8af730d006c7df9d770c7aaa1ab4f45c08f5c4cacbdedb2676d692dca864771acbb4310c007a47b

  • C:\Users\Admin\AppData\Local\Temp\Cab40BB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar414A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsyE763.tmp\ioSpecial.ini

    Filesize

    1024B

    MD5

    8a391d26bde6fb3aa9e96aff6ef8336d

    SHA1

    99f3aeea077f7fe8be1ebde6f2754a950592400c

    SHA256

    7dc6d34fc76cba83cb5e69cf4494cd55b32c5bc2236d16e42f32871480201c7d

    SHA512

    2faa2688a9f52299aec28dbf7dc161340cb6d66d00d95919b2d25ff2d64c4a5e47072f0cee50154f419f7d653f155a88b16ee567392703612bb4fcd75cfcd9f1

  • C:\Users\Admin\AppData\Local\Temp\nsyE763.tmp\show_page_toolbar

    Filesize

    848B

    MD5

    4e4fea62860987eabdf85bad6da5ddc4

    SHA1

    ae33877bc0b5f4072e36d2cfe9333064980d813f

    SHA256

    f28dfe2e21d41ec9d71f2b15d71f142251e329868d7cc4f62ae23605813d0b8a

    SHA512

    7be0bbec64aff2db1c1e26ad46e94e0b5e6394c6b8a08175d0125f44e237c4730a61e5bb346bdb64946e208b3f845d4ff1d3bf2eccfcae0bf3da13f30afcfeea

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • \Users\Admin\AppData\Local\Temp\nsyE763.tmp\linker.dll

    Filesize

    7KB

    MD5

    122754bdae09014ed8be78a8dd3618c0

    SHA1

    8a1d4a0b8202d2261a12d97aebfe33144c274444

    SHA256

    67552ebf58e98e841dcd9f4213ad3eb134d595f04839771618f0bb1c48ea2b92

    SHA512

    7b9b5f8b52db793b4833a75bd8f122f28f2df00d43bd35efc831c2b8457009d51fe39874c691389c2fdc87ed411919b59da50199e3f719bd4cfb166367f185d9