Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 03:50

General

  • Target

    2a4f49374441748d4439c7e715cf5fb7_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    2a4f49374441748d4439c7e715cf5fb7

  • SHA1

    3918cf300567538a8fab6ebfa40f182c67f25ef4

  • SHA256

    3d336111927a3ff2a9e8d8b5b6ad7a0aa8df412127850b96aeabbe8a22cd721d

  • SHA512

    23e4127722056dc8c805b70f83bf400c798b29285157a9eee36bd9599c9edc16f1911b7cb273d6f0fa47016fdec68b397131e5462fc3368c8ee7e48254124a8e

  • SSDEEP

    49152:HvJJ7z7QrZ5lNLDh3JaU4VubE/n0/RohcP:Pf7z7kZ5LnaBVu4/ndO

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a4f49374441748d4439c7e715cf5fb7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a4f49374441748d4439c7e715cf5fb7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\2a4f49374441748d4439c7e715cf5fb7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2a4f49374441748d4439c7e715cf5fb7_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.downloaddino.com/Go/FreeTVOnline?source=thankyou_matomy_mplayer-US-direct&offer=mplayer&subid1=49647&userid=24b3f067-a6b4-45e0-90c3-0d5af09fbaff&et=0&adm=1
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efff9dbacd1a7c5b73b10c692ab02ade

    SHA1

    29512f9691a024715be0d7bc674800fb7260f5e0

    SHA256

    864ac09733402351f40ed09625d7b6116e1ff9536c332c982c4778ea6b3a7f9d

    SHA512

    469fca76f04d05ad920bd4f90029e5e60d53381f6ebbcc0785496f67cbfef8c720d82cb3ca8d4fc991f4bbf559a1431f37fda81d1626ed8dddd91baa92bc97d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d4bd7761632d38b316dcfe2ce801620

    SHA1

    b2a5cf6c0c2ed6560960bb0892d9e65a59647dd9

    SHA256

    88fd5bc827abd21299abe8043d3676464ee328b35e928e3e6a3c45d4af3eac8c

    SHA512

    259761ae18c4a63d7669867795b5b30cafafb679aa46af95b781b6ad878cdfc5c2e75ffba5dac6c2f637cc37f259e5e65325caea3f822521cecfb768aa23772c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a0380d53c857ecf363cd4da12c0119e

    SHA1

    53adb3a1e843260f58f40903ff17bb6fc314df35

    SHA256

    424e51e5b244319742a6dd281a258e65b98e5e3c0c096a6724a5cd462ef14831

    SHA512

    9463f27ec6480902bcd6573c915d0eb4958f0cc44d39c86297761ee996269afc2a1f9e1fcef344a6d8a5a39d5ea8dc11659d9d4c2a4e36559aa85f0fa0929c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03fe6fab330b858668e2ce4be1a8e21f

    SHA1

    af5bfbe8a9a048cca494499e1b80ddd017cd9671

    SHA256

    4f768f5261de3317c0dd274b18723c49ff4e1fa6bc74779c05f09dffa6419e4b

    SHA512

    4964fbd878f19caec69f4781e27fd059870880eda70c23781f61474051f8363cf6e0877293f5e079905ed4911c09ac349f3f9333800a9b8e2699448a2b3ada8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f64dd33626f7f6275fdcd8a734bbc2aa

    SHA1

    ecdecd619be4e522fa30e8a5e2165eac079c217f

    SHA256

    af4c8405edc514a3b597bc9f39371bdf07851cfcceb1e72050734981bc4caf4f

    SHA512

    0d1cb67eaed67fe70dd1edb39ee082e14c61797dd14b0be8f5efb3d2d09a9c81058895728ee06a176920ea5010706f54c0a58b392c94b6cf67fe42553c1a0729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f042d10140e9c859424aadc425b67635

    SHA1

    7ef17a419cc546c92e5f801e93084259e166c034

    SHA256

    7de67712663b3df969360e178d0e3536627f4d68ecd85d8ec633153d4434a4cb

    SHA512

    6f217f2bd2ce867e2e1585c73158384a3bdb9e794ce8212fbb6d11abef6739fa5eefdeb66d32045e96d40b6e349897dd29c4f44c792c73807d42bbc045672073

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f2f57090591dc9ed8a0d94c0a37148e

    SHA1

    91f1ebcb69cdd7c96be648f02bc3aa1d6e232d27

    SHA256

    86ffeff82421ec60a602a6117a70ca15f0e64a0689c71b958ec84d5559164f78

    SHA512

    8929263da1f596e87ee5ac8de69bf30c5f293a41283e188879b1d2ab09f025f915baaca85e0aebfe77c624be9c7cca23b0b3c9a5788d709432636adcb137c668

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9752a64c61f63ded461f29b36df34605

    SHA1

    0a8779291d5a33ced4b30b3d7265a5973f73b9f5

    SHA256

    00d282c25b284ff5b0f19f7afd90aed74cf68bc346d18bd6859be35afb884444

    SHA512

    d8269f292b3cb0cb49880fea3150d39300c51e00452ab4448431fdaae019e953faccc585cfb95a907f43eab284f7fd527f1d59d7d2d5b40006a2cb88f789826c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed87cf814eb6235dfb237b3825e5e5f1

    SHA1

    7be82b22abbf83f146382cff7bc956072e15e373

    SHA256

    714914f28f4e223c0ba41565343babc7a78eecb9ea0d2dd5634da962743d18db

    SHA512

    4fc03e7df6499580b63882179b7db47951497d5432ea9955835152074214bae2e6b942f714005c482c16fba18e43a81eaaba1355e76f0ff3b8cfe2da4f43b07f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be2141d18892276b2a34498fc2648017

    SHA1

    ebb7f753c727cb7309eebc429e2fd345aa9d51b5

    SHA256

    b3eafc03fef1ec8a5ff71a885de302bd4ff7d5e37171270d567a73ac0d4b9791

    SHA512

    a20e1104ca09b6dcc910437552adf59ca517ee5a3134a30105b010d80b89ade851edb6320d084a11761118d50d3288b886705740bb11baeec41e6abdd30ebd20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3642c1d1ab633c107397c3264abc185d

    SHA1

    0c7e93dd69342c6c9b91ccafb11db61e2a6bd420

    SHA256

    6ca7e0f4d6f121febbc53d550904c590dc4ac94fab033dcca67f8e8490b971a8

    SHA512

    389c87b9b94c73cbf4fc629fe90617deaa525360df3a8d2c2dcdc59c7c011ab2e7e74e03766b240b302dc989c60e311b3418fa2c6aa78b6ddca017f682a277a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31269f6807fb6cc942f3c4f8df744566

    SHA1

    912349b42fa900c51124ad988f6b36ddf73b646e

    SHA256

    417b6a6461f346756d591350a25db33c639fc79322dff543261192eaa6008b8b

    SHA512

    21e400c6f0104e28fd31a4ee7489f2f0982d5ea86132bfa65192a803036a3744281900a3c26369e2930a65d5ec8f1eb3b875a7a29db0a106afaaab2d2fa88888

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a65a83dc7efea271c5031d8fa512ce42

    SHA1

    673d199f11a6fd7cbcaefb7c5f4074ac0ced2f96

    SHA256

    3fba7f748bd5d98fbb7da4a01f1df39afc6a4d4ac34ae318065ae4ff0f39bdb1

    SHA512

    07e91469c9206659ab6e805ed9de25e9cac500a65b0fba99fcace67ef1ad6aba1e7f7dbc1ffa427536603ef185d29f68bbd610ef1c9a6e8dd62cb2fe12ddfa77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2bdcdbaf0def9d007b8a5da598323abd

    SHA1

    5ca3f02e1d22de37fc9e5a1ebd1c2d7e0198c858

    SHA256

    86a2e5c09b99be0783679802b01ee61c67bcfabc57ce65015d84d45b5b164678

    SHA512

    dd72d63093d149342daa9ef4f468aec5641175833984dacd6ef8919f35412cfe07c1a7256838dbf022949794cc95f77fed653aa3d93c7e5f70150091a8684de1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aaf0b7e1c3712245a3d7fc787ed8f1c7

    SHA1

    3a4dfa61d9afcffb618f8a36c35bb104ab2846d9

    SHA256

    2205bc396a7d1143049bd0d66c01b14ba8b7c4a8d6d74bd6f8e8f68c0bc44870

    SHA512

    d3414dff8b8ffc77ecd87faff99bf093e514fe1cf9d8b83beb03bb2d4e78aa7cbc4800f3619897ce0c2db5f996d6df4116eddb3c2b50e4156151e0b7f4cfe60a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a65f6de4fd85bd1379a39a9109a65a47

    SHA1

    2839bed263efab8e8f2c07017e7b5c007fc1f5d6

    SHA256

    d4e2ec6bd22a29aa675552ab64de651ee44e8229fbb050b7b171810513c3941f

    SHA512

    e3c3be1895537edd3c35e2c1fbbcf1531ef8c1247b49bcf7e4239e3c483fc8617680bd7255e55fbed3e94e8301f04c85bfd5cd0bed81482980daba69c9f9219c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7ce89a7b818d6eb3fb67ccdacaad419

    SHA1

    9981e35a2e9c0039a78f5c1671f6d1b4cf321157

    SHA256

    9a7ac88819be5df2388e199c30bc3956cd7a16e94b8c24253e569b0c4d86e8ff

    SHA512

    ce9eb4b1fe85fcadf364d666a43f860aca0142305102fb2ef7a5719463c645f740d5c7ee87248339694e335d13477e0ccd99afaa609e523624b3daf4fad26830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a53c6365cc1519ceee9dd1048d6b913

    SHA1

    85211eafff6e1b4d49c218a23608f2bcae219ce6

    SHA256

    5c20c0fe822301fb6feb3dce70ebaf01b0b9ae27464c5994adb1452958cfa350

    SHA512

    c45d325812cb842708bdb686cf139a4b29267cb9d6cf371d04eabcd39ef47691ac2fb3590fead0e08c4af3ca79c83d024cb1ed5ac8b1ec94ec0c17c1705adcd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    804483ba055c9554faf4c7d1c0ccfe40

    SHA1

    f69c5dd28bafa929fe92962ef3ee07e3f6f8ebad

    SHA256

    46ae395d09b8e4420530717295acc0ba9cc83b6d438a9cec7c5eae1f1022f80c

    SHA512

    230e3ce40adba2c53109a17eae55df7f1b20a3cc1e5dbf0e04565f147d34e9c90fe17b906c5c7a6e4fd7387de63d28a80f69ae8b075e7debe7d7f28178223214

  • C:\Users\Admin\AppData\Local\Temp\CabAAD2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAB43.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2684-0-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-6-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-18-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-19-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-16-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-14-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2684-8-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-10-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-5-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-2-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-33-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-22-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-21-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB

  • memory/2684-20-0x0000000000400000-0x00000000004FA000-memory.dmp

    Filesize

    1000KB