Analysis

  • max time kernel
    131s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 22:20

General

  • Target

    264ce5a59935a44002307c7ae0661dc7_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    264ce5a59935a44002307c7ae0661dc7

  • SHA1

    6ce1b1b4044418be23c26fda9a5bd5dba9d1810e

  • SHA256

    e91f024ffa7604299d65f77d0adb8ec1c2be2ad57cfa7b028e9054e63da922d8

  • SHA512

    09b621b3a566511bcb5e9721211063afe9ead27d8fd90ca8b3bb56e1355146b1d4c1bf3941f2c3a943c469415fa5b727d78484c7045ee8723a7054712b4ecc4d

  • SSDEEP

    6144:MM/in98C/WvBJIzvGO8QC2VN8nVG2CPRgLXM+1mq7kycl8dk3LNr6XoRDae8N5Yq:1C98CQnmGl2k+gL8+13gyc6EZou+AR+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\264ce5a59935a44002307c7ae0661dc7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\264ce5a59935a44002307c7ae0661dc7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe
      C:\Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe -t:"C:\Users\Admin\AppData\Local\Temp\Low\9JE407FA.exe" -d:"C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe" -i:"C:\Users\Admin\AppData\Local\Temp\Low\GLB763G6.tmp"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2916
    • C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe
      "C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2100
    • C:\Program Files (x86)\internet explorer\iexplore.exe
      "C:\Program Files (x86)\internet explorer\iexplore.exe" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%00%01%01%00cIh8TWZadr7iiDTOi6Utcg07tcavA3WcY3TV323eREHrpox731DkC0Rk5A-M_E8DOYqhaSVsDVAm1QvxfVmRhXsC_ldOryQqPTLMuSeFfoGOBu8oZwQeYfVYWwxKEdcVWr-xUzBvceHUEm3Mn3wBoReRjJIeKnI09bW1Q_p0V5vbeHhwfOFvMW_uWecnnIbVj_LjcLMVmcIVjAgRNPKuTPPcR9-KiW_3_KBYgtokA8b_FE5-zVzscbzn3MBFLpTYJ0xjWSJbFUzjxiqILjiSVBqF9HypC24Uj-gTXUklO9OcklmT9QC1XCZkib41rjySIetuz7DcTxAdjhmKzZK0iG"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%00%01%01%00cIh8TWZadr7iiDTOi6Utcg07tcavA3WcY3TV323eREHrpox731DkC0Rk5A-M_E8DOYqhaSVsDVAm1QvxfVmRhXsC_ldOryQqPTLMuSeFfoGOBu8oZwQeYfVYWwxKEdcVWr-xUzBvceHUEm3Mn3wBoReRjJIeKnI09bW1Q_p0V5vbeHhwfOFvMW_uWecnnIbVj_LjcLMVmcIVjAgRNPKuTPPcR9-KiW_3_KBYgtokA8b_FE5-zVzscbzn3MBFLpTYJ0xjWSJbFUzjxiqILjiSVBqF9HypC24Uj-gTXUklO9OcklmT9QC1XCZkib41rjySIetuz7DcTxAdjhmKzZK0iG"
        3⤵
          PID:1476
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -noframemerging http://www.shopathome.com/ToolbarPostInstall.aspx?oldsessionid=632fe5aa-87af-44c7-af3c-5d99c1a15a8a&A=ErrorPI&owner=nonbundle&ErrorInfo=&ErrorLevel=-12&GUID={7D997381-6A77-4332-BFFF-C31EA6A871F6}&ae=no&source=64387&setupguid={cc581421-f977-411c-a331-a7176839365e}&setupcid=80894060&cid=80894060&refer=0000&disabler=-1&tbstatus=3
        2⤵
        • Network Service Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1328

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            929f61c9f9d521c4a270c6a1ceb2b2c0

            SHA1

            58e32a036b21f1a35ff421afc23cc476cec312dd

            SHA256

            659082db1ae4311907f6ef0f9068d5262b3153189f5eae789b7852a919bba8c0

            SHA512

            c4825ae5721c205699ed7eae2023a034bfee8fe4bb07731e32e84d5aae377c1ff9836af541574ac2baf5e7237c124f552f8af527bc6027f0d1d7a76521af13e4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            a80d6482b414d0ae314148936dab1bd7

            SHA1

            fbb0498b85621e4cf0aa3b529089d59d48347912

            SHA256

            823fcdfa0198c0398b1d56682f21d01817e0ffae243e5de6a9d761a4d2009490

            SHA512

            10fbe38505b98304febd2836b4be7c18c8d35737230172188eedc0deeb8412d834dd1513e414aa042364e161ab527237a850d3e05448295528dda17aee33f4d4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8ad850951a6afd2abdeeb8ce9326e7c9

            SHA1

            e74def5a45d51c569f6e2f7a03b12f013833946b

            SHA256

            bd9eac7ad143031ace438fb8d71b43083e2bccd5237cc7c1c04ae48d61ffdf12

            SHA512

            c6fa8f9d9a148fcfd461737eb29cf974e974607a24bf5fbbf93cb532422ea65102faae3ee85589e0bc4f77b54f7ba8c89927dcd144ccb9908cb0fa577aa3fa5f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f9e1a48c7809a80e4efbef045d661ef7

            SHA1

            74b95a5ff65d18ad5a365469967aacee537db949

            SHA256

            f09c4727ab9d4d257895bd647c0c83b2aa633be4389da9201695b54bb6a27b7b

            SHA512

            5ebde8bfd7830e950282124873727840f234a8ff381641625d96c8ffe616946c2812a0844596f750b170dbfd73a10866226f35517c554b66aeacdba2ab549b6c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            63b27a094a9a7e73c9d94786d95bb9d0

            SHA1

            ed10548cde18e72466fcd66c729237ad553ae6e2

            SHA256

            995d188a63e15ffda5a64ecfa67cb3354f6716952a3b0c184f810d6d8b679c7a

            SHA512

            3d5e49e4c4e4d8c86f349a9452a627c20be682a771678dfb04abb88aac56adaf6ef98b0727f28cd26b387b3c8adae54626166715f7ab9b04f600818b8242d9f5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            4f80a95f79835a709f04cd644fd11dde

            SHA1

            d5485a66c194e14f792feee7bcf59bb22f4a2dc4

            SHA256

            8c006689766c011aff55c605c2b8356dfa88f8e8d6e21dd5b181957bf8831d46

            SHA512

            634ba30ea40873ef970f3b203e473c03b06007728639c2707156c9dc5cc4fe0a64c3517bf6bdb8de1e44d6211bb1d31966d998ab2181f8cc9cd96b3340afdd37

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            453fdd3a92e476796a446f022cb99169

            SHA1

            b5d9be8a05121270dfbee6087f48ad5eabd7778c

            SHA256

            a3bdd5ee6d2a4d2b1d52ba37b7252362190c2cf377f8b954ce22a39abdf80b9e

            SHA512

            bb453ccb3a2a51f195091e0334b46665a62d75b7c0f5228a8fadaa60375e145dabba31915849eac933aff8e2ebf243a55247a2a5e09ee47e9c8cd215cb6188ed

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            7b300858a97d383967f238087569acfb

            SHA1

            976a2a61224ee3a0251de119a3bfc457f169de19

            SHA256

            d735e336e78d3c751c97ff5c938580d57f965b8341b859e44dd8b1ac34dccea8

            SHA512

            2e3a8d622bc13aa9de33bd6450ba538b86e8730137e0485f39eb65ee181b0dcc0bedb5d34aa3c0270e092ea483f0d289e735992283e410344a08928f22ac8ce5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6db32c3020f37603d80a6b977ac7d3f1

            SHA1

            507c1116d4869aafe89e68d6a7e6d361f1833a97

            SHA256

            bfc83b45ef892b5cc02fd6e91843bcf995aeadc3eaff5886c5281eb8a8a6b79c

            SHA512

            8a03d27bb3699e7c9ad959b299e4314ad3e0f1d0e26623988098cf72151d1c452761e9f0d94c583ea2ea0ba84a1ac6f408ddbef55212a28049f2c82e4ca2864f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            af3abf84c2b993760d7dc9362aca49e3

            SHA1

            64b0bbe0685743705683805087b3c2f9f9770ec7

            SHA256

            0fd1d0ecb048bd329037f2ea06dfdacedde85b6fecca492bb1e99c9101a38fd4

            SHA512

            519dce60801608810265d09bc8b7b5507d6718c0df252dec8e5b5ff6c81e819452981ae12ac9a81f1cd8b6df31bc02765fa794571126b298733ffb1507afa914

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3d4a774f32767ab2e2f493c0bfc37c6e

            SHA1

            ef264b3d6e08426e3a94b331092fc48a8718f885

            SHA256

            11ec5e8c4ff1de7abcd1ed696ffdd385849f208ac537c9277062c99bf7a9b065

            SHA512

            230011da20f25e3009aaa880945958c217029835f54a60b4bf83d8cc862169e335e406afc3413bba0fb021135f3f70a56176463faf3ffcc3a3e3ae2463347915

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f69e9e6d14d9614cf42d6d359a3ea4ea

            SHA1

            8b97e3a981ff9b2877d967e9d27c0dcbfa1910a7

            SHA256

            78db9d1859bf60deccdf6d20b5976e44a6212c67fa474c26eb3c1cbfd9230fef

            SHA512

            deb427ad94a9dae5d51190d261ff839aa6f0d6032db80c94730341a75b1dc732a905c87b1db1d51486fae26cdbba3187245d015d7592d7e178f8cf55c1c5509f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            43525fe366ef3f5faa7e864091e24b14

            SHA1

            0812e18a69c02bfb8fb015d06530a125889b1680

            SHA256

            40a7b973504d644f8e77dbc677f96ff0286b728358a352c985326855ce060fc9

            SHA512

            0f4ef9f212851d9cac59e936cfd7346d2fe58934438f919eb59507c562f9dbfedf3f4e215b59786fa123a581183b40aa0443973350feeb62d7b5091fff69ad9b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8e389eba9bb1c6bb23b5af8b0ef8c6c0

            SHA1

            25fc2d73908d4d5944bad69523a2d4f163412e05

            SHA256

            5abee38fd27434e179dd32ded6a36608b057c2e94b429755acf370c63feeb1c8

            SHA512

            4e574cf44d3fcd9d724dbee319f9085a392c16829ec735799bb6a842155a0c2ece16174d6602a27136d363b5b3f54174d80b9bea5cfe3b997f229f8b0765e2c6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            328ea3f0dc59beb336baf9f46bc796ff

            SHA1

            b965cf4d3605388fb16fdf60ea9a57b13f3a03f0

            SHA256

            a6df6ab9b52667c836a8bca2854867b84287539359fb908a5ac6e3ec9c61a9cf

            SHA512

            41f4fe5501b5daa916af3659f3d781834d4fe2d57b4ccb923d47239885b57e9e7933307b6122378d72244e9de1f307d99aa0890deb7b24d85fb3843adba75f3e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            7e4d6df2726701c60b906daaee05bcb9

            SHA1

            d613e72f55e4e1eaf2fae2a1d87b42d8a106ae84

            SHA256

            0825876ee22801c9c25b6cebf1d50f325d651fa031be8ebec47bbee58e0e3ca3

            SHA512

            c5a16a79469dcbcaff11c8cba86123cc17193bda80625abfc067b1a03ab670086a7a0a448b7a96a650b059bdbfcb23962addae68b75ea71eecdbceb0b430a059

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            9347c4410dd4f4fede0aaec629287de5

            SHA1

            a8e649dae6c20519bde6cf2fba20b91f68465dce

            SHA256

            e4b529cc6f8edafd446f02cfe3a179c3ea1ee78b2ed0e7c89d1ba6b4fcf2dc51

            SHA512

            6247a83da991d2f963aa71e22d16f653fac78a14f42433b41628542ed60b74cca33e41b36fa5ee56cf65d986bfad75e7e45d4e9a71980cd4bd0c595dc12cbcba

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            10873095762ff1accf47b8ae345888f0

            SHA1

            266cb9d424491e24933db72cb858c7471946d2d2

            SHA256

            94aa69f4e2ab673a1b76f58e615f0e0265e19d796eac345520eacaff757badde

            SHA512

            13a27df4702090acfdd9025f8305df9ea0ca3c4f5b1e23c941c3bdf7fc80bf774b0ae820fbec58d89067e69dae3575460d75e351052a2fb5540afee2e02ce657

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            40086e6fa3d5556a6b024d1b67ad8a03

            SHA1

            1cf07c48e95cd19e075e4dc6b485680c7e9338b7

            SHA256

            c9211f5847dc212aaca2819daa826207b9cfc223fcb04f48a145d6efd3c17257

            SHA512

            425662bf845a19f2880c6a7897c9d8fdb9ebf9685f48ce911afd1710bafb6303d31246612834fd08afc5b2db958227c2549ef47ef1f55aca387985122edf7e4d

          • C:\Users\Admin\AppData\Local\Temp\Cab7BE7.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Low\9JE407FA.exe

            Filesize

            169KB

            MD5

            589c85ad4b3fd73456f32eb9d58e2f9c

            SHA1

            95ce6284d38c8948ce30c4abf9b4b6ff60c9efe6

            SHA256

            dfe385206e3ba737636463b22501b801b88169af789424e8a33c3cf07a8b2235

            SHA512

            eefa14b37c7ecdfe95f9951a09d0c876a2c1bfd8b029869f8928bae2266ebb0a90e64e10e0781ec71638042eb5e88806a252e55176578e96de44ab5c17f25782

          • C:\Users\Admin\AppData\Local\Temp\Low\GLB763G6.tmp

            Filesize

            56B

            MD5

            d32cede39e8b41ffb8f4a30b6006f5f0

            SHA1

            e4ce679afab2abf9e586f5fc938685354b592eb1

            SHA256

            eb8e6cab79e6781b58f83a3fff33b520195eab2b2eeb748eec69e14e5a83c64b

            SHA512

            e2d1c360e077d2b1dbe100869b347967c132036210994ebfcccc7cfda6b894344df89622dbd8ea6e6fab7746f836817425c3920dffe67dabcd70ca05ff50ccd1

          • C:\Users\Admin\AppData\Local\Temp\Low\GLB763G6.tmp

            Filesize

            73B

            MD5

            1c1c50eb4f1f6b881054f3fadcebefdb

            SHA1

            19dfa7ddd3ba46f7ff55e08ee76e3b49030ac5eb

            SHA256

            020eb4c5f6b8d78b3739b7c3265d5d437e9353f19d0e727f31aa3edf88674c54

            SHA512

            87bb21b9cef8acd34cacef64931af222cc6afa3d2eeeef29628d131c90556d9a06df6c5b524a1a4c8d106c9004b5c553d8007578888b24e82097ab22b4297920

          • C:\Users\Admin\AppData\Local\Temp\Tar7C86.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • \Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe

            Filesize

            185KB

            MD5

            6f859cb344a13169bfa611274ca70bd7

            SHA1

            f9109b10ceb1f248b59828a465098f96897bfe4b

            SHA256

            ac4f3c6d4484706c3a9f30739c4ad0165ee5ac17ea2ec5fbd59690ce758d60da

            SHA512

            3a8b0e62bf4c2ff15137119416ca90b4ffd0487991c88ee343fd9c5040b685ec6000b4c8c5a940c790a1a3927cfb3d4635876775b2086faadfb416dfa89ca5e7