Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 11:20

General

  • Target

    17df50fa17785102090f8fdc74be5ae4_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    17df50fa17785102090f8fdc74be5ae4

  • SHA1

    9a7c2f8491b401cfd25bf26f682f74bb1c635017

  • SHA256

    13de260822f6b5fcb1fe5e6271b03b04898bd188c2295f2159ef6a0dd9502317

  • SHA512

    60d6283f3084b5e04c944ddaee50b0f35dfba3134d0c04c24427a691da11b5704b7ab53f8cbdbe014e68f757ad60907143aa7483f0c46bfdca4125d742037749

  • SSDEEP

    49152:MvJJ7z7QrZ5lNLDh3JaU4VubE/n0/RohcP:kf7z7kZ5LnaBVu4/ndO

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17df50fa17785102090f8fdc74be5ae4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17df50fa17785102090f8fdc74be5ae4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\17df50fa17785102090f8fdc74be5ae4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\17df50fa17785102090f8fdc74be5ae4_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://captdownload.com/ThankYou/browsersafeguard?source=google_bsg-display-au-728x90-captdownload-31793874264&et=0&adm=1
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fae8d8a817a93a8b20120ea0a868a00

    SHA1

    7717949f23d94dbcb2b5ed4c9a3d4cbc1af33136

    SHA256

    41a71987c8e9438d00bdb86c89633ac8a0be33c5add0a8cff857c393c36e8b99

    SHA512

    a0c62b40de7cea55d3917cdcaeceff4455fafe2de02033bb51110623ddb117ee7b7e5ccfe7fdaa5de5b749ac181a44ba0b2a3875f4fa56dfb9d64bff7f56cd76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb56e5a8724b94b4522c79f787984149

    SHA1

    731122f8214e36b84020b93adb0e70abd2b1e18d

    SHA256

    f6e218c82676505d31446e8aa35c2876d483e6d120ad8140d1e42acf789b6ba8

    SHA512

    a305ada520ef2d332e53d602beed93fb05522b0a18afb2e5d9fc86e6bbc56220d9737a6443886a8a2cef00c7a35018213ac2b7b1e14b35d3a9b4b24d1efc6da8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70f5a76abf773dc63ec12fbe1687b1b2

    SHA1

    396cc25e0fb8e88524bea458314cd41b440e485a

    SHA256

    8ef7d0da74d7958dbe5194c07c4790eac9b42e32471d44e6415745ab4ae12f5d

    SHA512

    80ec0859521a6ff37128e25b5e9ed6e63b6fa318f937869368c6d8faaae7a1f974bc20acf69264e7f035bf572cab535d5b297509c3f17b9b7cd769be2ef3d968

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb62dc655ba5b028879109f05497f359

    SHA1

    e50e2ec43a35ea94e8e90b2772a14bb5697bc5a4

    SHA256

    a6e9ac55c79a44d2043397ff649a3e6c77664d48460911f4ac19de574ad1f0a5

    SHA512

    de4ddfc353d3554f3547a9db74b4442bc53318ad7d49114f2cb49ac85c929ab89edf49c948c6a21e57a3f769aea37e66566d74eefb434af42da692ef3cbe7a8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c2d0728772958f5c0556cbd04cce24f

    SHA1

    3fafe55462433b7e2afa69820ac3a3b9608e3aed

    SHA256

    be06bd69c9d303ff3eda92a7d7bece340d3cdf11b18da569bf6291790971bdaa

    SHA512

    6a31aafafd0fd944e970aea9f15b1c56ff0183148955efba4d3dd3cb3ce0ec564cf77fe07f61af9c1891e3dd28579e5e4e85ad211f59bcd5ba8770393979746c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04dd937793cf2cbe737d5a83d3f6c3bb

    SHA1

    d8988a32fa303366912e2f3aef2b6d9b8825bf02

    SHA256

    14ee0335f572e126fa1b6d7a7e0e911c6aed3386a851677cfdf376bd23615a61

    SHA512

    c7100cad8df9dc5a5bf45d76c1ea7b97adaf217087f3b86b59fab3cfc9042e08cbddd174cda33ddc92ca21347f91a27cade591f14e38d383b91f77023432269a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce68d3a291f3c6ff8786185338a10e49

    SHA1

    66506fd2b3fe9afaf14baec96c20412eed851599

    SHA256

    d40696bba2b621cc451957c1611ce8a2f44d942c4348cd4d27154a882196b44d

    SHA512

    2c370b21dcd6f95f1654495208fa4530c47fbf287f955c70f5d23e2b4b3a94a883a3ef4a8bde670ce133bc53e1470df1a914c22613ae61d4b499167abb15c0f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4667895497f35c34e79135f1c845ffc

    SHA1

    b7a28543b33ab66abd78a147340fe7a7c5dfff06

    SHA256

    d6bc7bfa001e37c5d3c4ed6c9e2ad2fb67f429f0a5abe92a3e052d8b1c97953c

    SHA512

    81ad972dd03c91b5ecf86a1892e9b0e6c9339a202d5921d5cf884a7edc868e0feca51aef319c4eda65ed1188e189384e36f947f6590ef9522887860b1f35c1da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7453724b2b511ea4df873848c16cfa22

    SHA1

    b9944de31b509d7e204a00cbad71b9f9dc02168a

    SHA256

    5a50c5ee525ead971d88be4a11d0bbb50ede8dbd052aea3c254b480246255e4b

    SHA512

    674fcac2935bb064897640795d457183da983a6ca63c6f74ad7ee180cf63c974403fd13adfd211621b5ab68e3594c09a3e34e0eea36dfe238e8e93e5af8670a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be183668cd538a7cf70c21521ae9d451

    SHA1

    67107d540e9b51d0ee335c365945654192f85521

    SHA256

    e4215df6ad8f019739fd91e9fff8b656d08a1c04659571669acc8f1f7087adda

    SHA512

    b0f9120bf23769a1d1399853808de2b12be31a68e1593c950e8ac544cab1b790bf73da3c21a1dfeae8ae4a8e693453e99bad09b74734ea96a20ab033d514682d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7509cf2c7b6f3e7eb2adbdd753996ed2

    SHA1

    9e9a35a87947a368b3a57caeb6db91d082c26d4a

    SHA256

    622ad346277010378afefcbbf2cda5981250a4db613ccdc20f14cc4da9136d42

    SHA512

    eec8d840ff0a011539b5fe690e497c8c67a136f3f89e98dca6633abd67a8c33e6df4aed863bf251d4d9179e3c8987f1714c3ac20e3db1ab0245d1b34136a7111

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47221ada1af8426cc708ede2c68a691a

    SHA1

    34e94200f33a4223e16d50302bf3b7f3e838bd46

    SHA256

    727b5c65fb44af3fb8e146fafcfe925d757a5e3315fc0825a25653764c118d33

    SHA512

    9987e2c276315cba58dafb980475248876df0c804c9a2e7288987155e1fe82fafbc11d4a556904b55b6726e3e021ced631a1f9ef172a0eecc09f7a4d0e551a83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    741ad4a636507db7e2f2330c0ab29929

    SHA1

    ac853642087ddeb6559f8ac807fae702fdca58e8

    SHA256

    b535c5fb07533bf28982d2712955fe17f04ebb38696add9cb576eb2e6b1cfdcd

    SHA512

    d75d704adf08019b5c1aa0ab257a3ed91b86cdc076f035ada19b28a13e0df12c86b5f61d07567f3c1daa8fea42227d27c74265021cb029b2ca5147ffbed18fd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03671859d33a9b26e63a975dfa8ac5ae

    SHA1

    d9e1a42e43c651ba93971e3019dcfcc1dbd49d3f

    SHA256

    255845eaa1cd7ad1cfd74f96f3894c6461a0ecabd83a8090859245ec05d4997c

    SHA512

    508bb8ca204a8dd1921d827c155b303ae8cf8358c43ea851bb53376d41569367a2ed6c5076f7f22007c70a82155d4892ca071251f25ff7efdf6d505213dfc882

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a115f3a3a19f7e948d0685aaeda9c45a

    SHA1

    84e355c355e923b3eaab1d2bd6a504024b429b53

    SHA256

    b57e94e855ec5a10ce5030726f1c17abeda87acb73ab9f6b3b977c99c1699df7

    SHA512

    3ba20f520abf9652cf84550b70f3b59556095a4fb67922bc1b4ace2733636af1fad5e515476a111b46633b8f3839cb41e7a0c4b458eb61212ea887f35bcfb351

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df4cf29dcc1280d33d08d0c491514634

    SHA1

    6dab2bbb59b9a7a941a5ea45a485417171af337f

    SHA256

    41355b359e812268bbd68a8efd059df851ae8a615351db2ae1fd12c02f638b1c

    SHA512

    0a354c4df7401b6fa02cfdd416e18f76d0695db3551b871e08249a45b28aa5728d52ba36d11f1ead9e57a00c4068301d2de82250f993023e0560217a061e09bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a049048b529e5541c7661369d5c74212

    SHA1

    7d536fc9ad6ca03643d1576b374c3972257f778c

    SHA256

    e34552c37bea2669290bd2dde48f6fffc365026b3474aad0ca93890b15c4459a

    SHA512

    05f1f3adf255f101f83b0554ac34ec1d31dd461eda33f8db9c4e2da6d129648d486964933d2febb52be2ab838834f9d63ceeeb24d4cbad9ea4aa875beaa78545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d72b48a57b3122b1637bf36f435f1d24

    SHA1

    29db8f323dea2aa0775a9576be4f2f532076b0fa

    SHA256

    340a9334728ccfc3733b1ac77a689ed97bb1a2a1defc3779dd742896b13928c8

    SHA512

    19e63cba4e52e58dfbc28cd8f2878725d023b90c6157b312c188adfaae6e04288dca5d859c06d342fb793a96ed5feaf497898111c52e97ff98c7e340d04ad124

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e7ecc6a5d568e95e137e8b358feea85

    SHA1

    983c10d8869b11f079d4306100213ad49a957700

    SHA256

    10d5ebb8deeaee67a5b68d5276e71dff6c15a13799e6a4cb89917b646ba9c766

    SHA512

    d4e47797b8e62ed860fbba16eafe51c98e433559f35c907a7d7512db1356cccef40619de5017863e9bc9be24900340e7905e388aad3d6409b2107d9d86cd208d

  • C:\Users\Admin\AppData\Local\Temp\Cab5248.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar52A8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\bottom.jpg

    Filesize

    12KB

    MD5

    083f5ef69c3961f96ccb353b127b78b7

    SHA1

    28022c7530ba79b542795e02a9320f3f104a6d72

    SHA256

    d6a08079a92b93c13746f8c1032523eade303d349ff8c3c58268f59f7877c965

    SHA512

    62574891d46cc6cf8c5f428d1ffc72a6c4c51b04c17df8d7464964083346b34f26b0b26c82215bbe5eb20ce76e881a38a89a3401816c5e0f6e6017b2e3ae7a25

  • C:\Users\Admin\AppData\Local\Temp\header.jpg

    Filesize

    16KB

    MD5

    87966b3dd5c840e8beeecc4ed60bad11

    SHA1

    c8f5d6883b2fca404d1f7e8c14640ab54e6faf08

    SHA256

    a0035e4a8165456f4ed0fb23cdce000ce0982c1cf43a807274b8503e92615dca

    SHA512

    29a534dde6b2fe7bca855c49ae749da51cea88fc638fb75a56a2245bbf44f25dc5d394371bf056fd104f69966f64357d9bb3bc900263da8fcda5e2c2e804774e

  • C:\Users\Admin\AppData\Local\Temp\side.jpg

    Filesize

    4KB

    MD5

    8567a4e41569b63f532c0c42c94dda4c

    SHA1

    88932204373ecd214b9182be52398ae27cd44b5f

    SHA256

    0f025ec348d3be3c65b0573b9480cc8bcfaa41797283d71d1c156a19bfd3b5e5

    SHA512

    0d2a005b3e325910d8562ced08c65903ec991d3335bedeef4c574094b8bba4ca76b45d2fdd9f35d562bf578d527bfb87bec663b62066fa0686ec9c13faf9aea9

  • memory/1868-20-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-17-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-47-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-21-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-0-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-19-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1868-40-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-16-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-14-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-10-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-2-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-4-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-6-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/1868-8-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB