Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2024 00:52

General

  • Target

    1588fd08af25ac3c6fea7a3855e5fd80_JaffaCakes118.exe

  • Size

    490KB

  • MD5

    1588fd08af25ac3c6fea7a3855e5fd80

  • SHA1

    6902fdef9faca25e72893ac22da96c66e16fd367

  • SHA256

    383c4bf21c2789b9627f93ebd5079805b53824ff42fa2df6b51712a7726fb608

  • SHA512

    c7d4edfdea11bff33d1cb7dbfda121b52f8691ee9b81ef20381a678c0cb740191b3ce1cae16c3d3132a7939062efc30b07f8a2f20afe7ab5b7b563a7c2c306f5

  • SSDEEP

    6144:te34R2MiSzh36dqXEVTrnCRZG/t7FTBqTzP7n7O7L6K2Bfo7pj:t2Uzh36VVTGf0ZTsnz7O7L6ju7pj

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1588fd08af25ac3c6fea7a3855e5fd80_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1588fd08af25ac3c6fea7a3855e5fd80_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.toggle.com/s/4/6/46601-46610-driver-sony-ericsson-k750i.zip?iv=2012110112&t=1728089586
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ae57594776711815e43ec07adb94aac

    SHA1

    87a437dbb6bec85259e1a23a4f24b33bc499de1f

    SHA256

    d8a2fd52f76cead0d8004d50877d525e39b4193207ee3f7c28e99b3c46675128

    SHA512

    5403041b6e8f2ea3950d5589d9863b08fcfc42e50ea2c4279266af7f5acf35ad50d8c0f61c5224754497b878a17b67516922cadd08702326c85700dad9c0fd7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f458e6f78b0596127b02405085c5c851

    SHA1

    189128f7fd8cc13913769d372ec442f45f01c8c5

    SHA256

    02e35518a4e09d8d97423b76cfff82d0fbe7c5e8c3d5ae3a030e7b688a8737e7

    SHA512

    a6f213c7d3c44daa367c2a5aba5ab657f27906907255485ce9b763cd7248ea2394d38bfb613d5536b725179c6c802b281c6cccfebf0f7fa694cff3e668659c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f3ae410d5d0000faf7d368acefc011a

    SHA1

    4acf0642e2ae083cf597a0359937a4b07a4d1682

    SHA256

    58797fe6ea22ce722f5f80489f20b4dc3efde26a0e2a2a5d08f09056316d7c78

    SHA512

    d4afba6984e50cb4acb484208052d137f25b414cd300f449ec085d5c95b505802fe6f205e716ba3039ab3a5ef97b9ac0777d18fe8d72de0abb3e08419cfd99a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61ab3150ff21ffd9e0b6c8edd725fedb

    SHA1

    57dd8f294d1cb1b661d7ef2d5a387816dd1dbb67

    SHA256

    7c3fecd49dd2eef6a3574db07d98bd9ba2e2c727dc2a79991e4a18bc8fbd79ba

    SHA512

    7c5c0b3464d287bbacf4ab32dc7c33340300c901232b76da40cc6e35542b7ae36b0aaf4ac75e7ff423cb564e3f2bed362e5304955b3a38c35d841c058c14354e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    610ab72ad88360614fe8cdd7541d1c0c

    SHA1

    2c1e3bcd1f04e396304157385e898495c6d4fd1e

    SHA256

    1ed4b970de11d4d36660be17f822d4771ec440db3e3b7b32b956b43b761a5569

    SHA512

    987133027f664737562463e03e9c6d413ead5fab31a101428e40fbe61dc0256f5231f7d20e75df5a54c64055485fc49e1eb468d6f272f63888399492ac30e432

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    113398bbb33742623d6b4fd6deb949af

    SHA1

    44e51e88ee55c313327adc581cff85efdd52fcde

    SHA256

    c907ae72fd73c630aa582bdf6dfcea6997b83e1201eac88fe19b2891494b763f

    SHA512

    613411e4e93098faccabf60a7e292a2ba9eccf2cb34ef87b7eacab9f4849e1d1280e91bbf894fd1ff0b1998d19cc676bae6e34ceea67e2ce6feaf5e3c3c1e5b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d17fd14e36d69e6a8d06ea1652af0b9

    SHA1

    4121efc3ce57cf57facd07c3d6bfa966de144db0

    SHA256

    b28fa01b3cb79c765945946bbfbfaf9adb54fdfb7d8345ea6b1d28603fc09fc5

    SHA512

    6ddeeddd38766a968e8a33a5e226de77362137d7339211e09ebe957769ef10ea6d65e3320e6971ecf230d21cd722ad65745f43c6539974dfa0e981ed2a344eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bda4d3a0c1ae1a852c2fc34200238a36

    SHA1

    fca580895e634ec196fdbb06a2466a3c0a709814

    SHA256

    8cf87c38cfff79ed8e30016f562c16f0f35b0c7fdc3e643bb56030e9636df438

    SHA512

    245f033f5ecb91c0bf87487fd965ddf5232dadfaa0666e167af0f151bfa3255f30bb41d0a1b4c776c35ab1897893652ac96f79d3fe1412f16668d766f4190a2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20c553b172ba67ff455dafa1de36afd7

    SHA1

    a0196cdb33183a25c67480732c98cb6ccba560ff

    SHA256

    14fd463c1bd5a60f2078197677e010b4507ff4e2c1bc4893913d4b505cb248e2

    SHA512

    24fd07835444d3032116b1732303cc15eea556d756b188a57cf3d58c899944aab0c6cc94d952db647e380f0a6b4c7e1495701a4640ffa56b2ad30ceafe50a559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86ed212cb366570900fe47141e8e90e9

    SHA1

    a953f420cd954c831549a762811f7f78cc1d9738

    SHA256

    5c2a32296f58f36378fcb1d644d7b94eb29885087963754ac4ca5a5c106d9b82

    SHA512

    05495ba26d96bfa9bf512aaaa2d6fc40395ca7ee6745f7f678507b5cacffac2666f360056b734a3afa8a67bc771e9d7af855165115d7dd088112ff9ce4ed19fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5344929e191988f90d4f14439d8a500

    SHA1

    681c1c60cadd4522203d6900f738e65a27dc8c68

    SHA256

    74eed07c85635751ef65069de36df0a4937a4b1ff6eb7e7db226a5d86d9a0875

    SHA512

    2a3435bf84cb0a55cb055e362b4f76469e2c32f11a7c667b432d845ce154c2f9e660b1e6eb6c0284085ff5ae8e2c28e6bf942bf59ffd5d937c07e20cbcca171f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6bf42b4b60b74a46938936d2797dc97

    SHA1

    d227de88082eb3c4ba22d2d89b6be96bc4eab15c

    SHA256

    c7be8e6c0ff1bf4a8370345cbc5c885d17d2230657f1502e0006386869f5b157

    SHA512

    588f2b9ea6181306a5c89196aa4ce582bf3afd150e38ba63d5ea4d200bd9959fa28f6077a3e7f209e16b5b594166ba61c8985522a329fd394aa1d0537f44efb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5989b10e84747e5e822e36ffd6195b6

    SHA1

    c1309efc1b2441eddcab3b160f5a9d69bfac776e

    SHA256

    70d78fa961e1dbdf4e1cc3538b5e959651bcdea9bd9fe935fdbc8bacaa2bf053

    SHA512

    c957c6f4ce45be1afd8f9900aab66b034a5018785f2f4fbe20406ce7fbae14a14f96e0e32a6b473e3de4f631b56152ea17a13bfb2906c3f3c95f383d62a4befb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec87133b1a1b95655c3cae67b61a9501

    SHA1

    5c26a3551ffbdaa2dcd2926f9f8e5df757e7c0cf

    SHA256

    8acd02e7c3913ae7d9e8013058ff0ba04a16292c5ae55a79a3178a819d71b80d

    SHA512

    d97ec44741ff9dab80c7844d9f59e3c5770841d91378338d410b6481599a03276d59d3e74eca3dfc406799a33bebed2ee57f9f8fafb763cfbe4f5060295f33bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b7730298d373f40dc5f93b92f32cbca

    SHA1

    f8f0be2ada1493526bc576b2a0621bd074e230a9

    SHA256

    4ab1ea8db1c7e3e6f4b0b4a9ce0d04fa114062771343d5140bb1d1b87db1ea45

    SHA512

    47cba8433319aefc534bd5b7b6c1f3aa59a06893c1c80e90e8d0c88caf962237eac95ce320e50e3eb4265cd5db86e18e8d66b4f3cb796c9923195ee58b23a6d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eac76c7ec70a34ab463e7eb00c0936b0

    SHA1

    1e605bca77b376933be7eafabc853fec1c1ec6a9

    SHA256

    e4a10af2a6d5dcb8771fc4b5ba691e96e42482ba48415af6da2743bcf61b5a64

    SHA512

    ca8b4a499deccc57f2ee4be52aea8feea03a821ad92e79e7612218a1904d42e26a25393d24fbf7f09dcdbb61bd71027bd857727f5fa2bc6d8b78b2dae597eb09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    275a18e019169baceb725aec87046015

    SHA1

    509e0194279d4e64528010703ca412209afbf22a

    SHA256

    224f7f6b93ebd9310db9ca316592b4caeac8f545dae84022dd248f3dcbe8b01a

    SHA512

    0cd372537ce53c3d1cad739c4920e90f2661c34bd6a1de7360f723987bbd7b77448bcba3987174e8a714781ce4522b5c76966086df19d5c695afb388e9a22845

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e8bef954459c183aac5fb4d6149b49f

    SHA1

    cce117027e8ee379b6faa67d9fd78a7b73c385b9

    SHA256

    c19a10d832cee756fe87d5ccaabecb79910a0d6604dafe90bcd2d59814abbe28

    SHA512

    78ac1961aa6620c84169ea3419000d02e62878ba02d44893ee8b22b241e1c68c6dd938f901b024fb66dce00d8ce67f4882f084abde4f5cac626e45a0b557c6b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3acc510a85cb0fa00136330c2d13034c

    SHA1

    1f8033b548564808825ffd485cb76acaf4595550

    SHA256

    a2f55d5f1b6d16bd0def2332af9ff739624105468fbc4e911b74dd4ab7f324bd

    SHA512

    709ca198d4099016420f4d7677f1979a4db70dc4dc3c577df9939c11038094f4c4aff946e277e6d005c73a01d2c9e1bdde387ff357308f669dd9c56d07e38635

  • C:\Users\Admin\AppData\Local\Temp\Cab1C1B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1C6C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsdC478.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    a93b9f288c4ff0e37562968b828f51af

    SHA1

    22f2c6ea15d3906927ad566da2521c00d27c5d5d

    SHA256

    5ca490caa659e5039bf365300a09944f1c1cd03379126bdb5991d96d014f0f8a

    SHA512

    9698d0ece3ce814d4dbc9533ebd6d83511f23f56e78746705458199ac2e7680362c33fe99ce0ef9214122d8bcfa3e7f137839ad6a1675871ecf8025f5fba9e0c

  • C:\Users\Admin\AppData\Local\Temp\nsdC478.tmp\show_page_toolbar

    Filesize

    940B

    MD5

    b66e7fdd84c4e2db3580a9602ae8ddc7

    SHA1

    e037728865af4babe5cf45e227ba5c89b644f963

    SHA256

    01378dfc6a99d4341a56d597ab584eb13d46629c73c6cec1e4f02ff449f5823a

    SHA512

    994d65cb43e3b02b00cfbf3050307f9462ef6011cd97dc660defec97de6a22846ca91ebe3df9f71c5735f105eaf7686988f6ec761fde131816aaa4aaf883bcb2

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nsdC478.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8