Analysis

  • max time kernel
    68s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 04:48

General

  • Target

    2b1eb28cf46b013b9ccb9f35c0d7b445_JaffaCakes118.exe

  • Size

    1KB

  • MD5

    2b1eb28cf46b013b9ccb9f35c0d7b445

  • SHA1

    ebbc3b80b75d7f03f3c2a5bc1e4c69848249412a

  • SHA256

    d22b5d0d56f33ca8a3d28568dcc2db39d30fff2e26b4a6f7ddabccc8e4930f27

  • SHA512

    cebc00079bbb2d02a524fc514150681cd284f167a7d21d0b2f9e8a75bc42a3067dd81ab147ee0b37db9eeca6b92e5ef3756ccc93af94cc927741d8c7d73aed1f

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b1eb28cf46b013b9ccb9f35c0d7b445_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2b1eb28cf46b013b9ccb9f35c0d7b445_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.echemia.sk/foto.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2952
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c.bat C:\Users\Admin\AppData\Local\Temp\2b1eb28cf46b013b9ccb9f35c0d7b445_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:1432
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 52
        3⤵
        • Program crash
        PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff4dd7ba5f47a9597df0712a3a487257

    SHA1

    cf44846a83f0d67ae6a0a64d2ee07ed984eb7cfb

    SHA256

    761f4de8da45c4ae5fd63da9fdf68f95a0bdbd506b628fe9bef9f04729cb683d

    SHA512

    e5a07d9688693fb7bb6d0ab71aaae234dbd45859aba8ed28b54c2e858400f4e49678462a26de13237c6b07742128acbbf38397cd8dd116c4b9cfc9d1f00c95b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2a227a9d7f648cd4df9f4538dc2b7b0

    SHA1

    7d9e481afd35d64f1ab75ac2bf80f382595b98aa

    SHA256

    ac205c4f38c17ad574304ef1f7efbe1d65e8467c677038b87ecb3b4e3bcaa7a2

    SHA512

    b6a81b25792c5082e14873564504cdadfd4646353842f7e930164ff990fe910a4262b2950cd42bbafbc6467f2426c777159a2eb9d75d7a319e800ed153ddb40b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53435a6a1fb7f06f3958f1d86639ee41

    SHA1

    63ec54a70ad2fa44f26511959969becd0dfdf9fc

    SHA256

    c482f50a5746a6140c35dd881242e09418119bfa4d9374aba89a62d5082107f5

    SHA512

    4bbb5f03a139912325ce3d31d543a3fccf5985fe425c8d3d1bbc8db06ab9ccd2374d1368ebd28e9f60f30f539c21d3745b35affa7f2b86344077ddc56646f4c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14293936a7db53883aadc2a9d37b2303

    SHA1

    3a382c121279a95ed060264e9774b1344db46e52

    SHA256

    34120d94a99e284265e76503fd2c1f87f971fac4b374bd9fdca80c984dfb997d

    SHA512

    0d825bc52018a3f672747636b613fb7d2e2db0ba969116610220851bb1aa311954662cdc7ecbd676fc6f6dceadf18b81702868778191d49ceec2bd1643de63b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be2ff8d3bc0d13486097a043ba949426

    SHA1

    a6f411f2c989bef679e80b8312e4151479305d2c

    SHA256

    c22fcfac57b8ae9a86a10c07c91ee606c9b916a15f33a451994d9dee82c515ba

    SHA512

    748670d8345c58314000550f44c86a12839f54f01d2d77e9ad11639c665a9bbca221b086cff40763a810e8d6be9e4b05cb59c3e1eb17ba1a9da0870702c47d41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b37ecc62ae2bb631b23bd8cda26fbeac

    SHA1

    34c4e713c28b5e084881b861d1aa0456472586cf

    SHA256

    d8f456ab0ea66dec493c98c96d3a995a4a02f5d0c66bd7109d274767c2be5dff

    SHA512

    ca6f5cd13bbc350cb7de750f49881fa2439bab903d2719d14be777b7e8b4e037ade9456a844777e96e3a9bf6afacecc7be21ae822d1fb30eb614f6dd43e73f58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e332e53ce7e9126ee55e1062194ad6b

    SHA1

    1232985e6e679eebd58a8362d8eabe632080dfd9

    SHA256

    c406a9013df6ab491ca4479f25707c1042e226fc1d639ef9a12e89abd6b81ce1

    SHA512

    8d3648fa0938c6aca817c7b970516e6186b94e52b8eec073ae62813076ba9c6ab08f507801d625038f861513c8e1590dc22526116f2484855e6d8fd9c9dce44b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3db20bd963c5d8e7f89ec5449bee673c

    SHA1

    ca580e5adb5863cf9787834fcc17c39ab1215023

    SHA256

    51bdc9d395e21fd78b113141400c08aa6444b237d942f78f191eb54ce9d78de7

    SHA512

    8abbf8a0141bf8838746e6a67a71c3268a70694f0c70be0ff0066dc5a344b5f443b5c30e7b393153a6e559bdfc53f08ec875f5ec1c62f10bdae940947c375de4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d22fc5d3ca4780cd450b5fde7d1ca407

    SHA1

    26fe63c2cbc80df399cc581853fb60143cf82076

    SHA256

    f812f6edbb74e1f0dff348e0d4d585bcc474a9a27f96dab0a515465fd1ed1115

    SHA512

    c9d46056549244f158b8306c4ecbf785ae4b28a89d0a6766639df2ef2b14d71af5b266f2c26a14ba1f46fe35d198d80df19d48dde2079a5d487877668f7ccc99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7919525f03062404d32850a436763c2c

    SHA1

    a7c926040d5e8ae58d65dbe3f7d93563ab5cd5c7

    SHA256

    da67132124419ace83bad6f7ede58cf642287ff497b51eee6513da123bf93ca7

    SHA512

    6f4223382e8e415a7864de831eef433ac77f2239992399b4f7d1c4eda83b57ba4739a3a1ec64417c2cd8ab1530322ac38fe5b800ce14546bec6268cc4c25f0b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7e8ea7e248f7ccb9a995c9add4ded85

    SHA1

    085abd7cadbff2b0863c9b991e8d3b7a0e8a06df

    SHA256

    607504015491350493bcf8b3c86b3e50544db0b0e4035932b1727b36bb69f49a

    SHA512

    fa969a0aa2520a114e2fb593cb96ea38bbd111b601b0f6b0129df699ff0a0c4369f8fe334a40847e855cb014846c42c525e43b47d7404a11cd7428070f84481d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d9412b3c6246ac706489956ead86152

    SHA1

    e6e58cb7b55836bb8c7f85f2fe3ce9cbde244118

    SHA256

    eeed0fc1e09d9d2317a2644e522b5e5c42123516811429d164148bb6f25d3e6f

    SHA512

    04e96e72dcbdf2eed278a3e74f00e0b38f1b9b476878b1ed510bdcafa187441591a03da7e6ea50da45d6af3315367c40f858e23cbf4655ea22dffd5a93aeefd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79ffe42072ce6a8b12a356cd1a903650

    SHA1

    a31cfa0504f5d5580f8c8af40c08f1e745d2df4f

    SHA256

    f41e38deb8fd00a7bad167f0e45a816a8a96eb8a06faa0ebc6464d02b069b8b6

    SHA512

    2f322bb2965cebcffa1a1e5d1b12b5ff37ed1d2632a1d66c54a97dfd15ebba129e217dc5d7af43ce6fa81d9705a09275349f320477bf6704ebfb00748ad5cabc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    493a2628c2eec3a49804fd0ac5fab3a9

    SHA1

    04c9eac745d81185ab0b6556e8ea3d88fe1f0f33

    SHA256

    b0669ff2efb3cef8fbd7878f37b359fdb830de772d8881ec41190eeecc6cfb08

    SHA512

    4d49967ad90e9441f73c0be4bdd7f4bb2024517202878a8c4a420917da41c4b126694ac59f29f494e7b4c13ba602339789d4b65ebc12489acc546804472926b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc4d26b2cfb1e617ef77de292302c03d

    SHA1

    4a5de6f6fc85abede8ca952588d4cd11a1405de0

    SHA256

    c512b6b74bcf8b8b4f224923d503f9546e9234894f2bfc4f5f7b5d5d1fc2dd76

    SHA512

    5aa82f9a6f33319deb95ccd5df41e328f8d7dad6b8429c19dea4d81201fc471eafde3631793380a9ef516863bbb2b986f0f851a96f20c490a437ad390b60555b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c4d86e6f7f86e76c3d7e2459c844685

    SHA1

    25083da0062ceffefc16d5ae265e6f9c2599335c

    SHA256

    f36e3415eba646b16b7bb5b45e083c0d786de4e1fc593315b4b2fa764dc0dc63

    SHA512

    74f67a59223eea985c83908286d33f52fe90c0389e4d849d8a233a3013d2511805854e07bd5f664251dae405b65277f734f18171c0277d5f48aae1d0fbaa3e56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dee5606ab9b2916be5626b9c79261be4

    SHA1

    cfdafb9c0c5ee1e8df64d6d9af07dc41099044c0

    SHA256

    d5f211bf153483612e9eed44d66bb6ce63b033b666c7ff4ca5983b7bcccff934

    SHA512

    3eac6cc25551fc57aadd525b75f6840ffd96b4e9a5eba8b87eb5e3731933f318383bcdc4cb8c70105dcbdf259318c655edb71251424a9b00139e16e0ac8693c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    613a083876d8a4932afad681bf9cd92f

    SHA1

    2befb91eeff2f42928ab21aee14f5bc96e39abc7

    SHA256

    169fdc383d9b83757084b38eaccab72799ef2dcd625bfae45d95180780eebc31

    SHA512

    e2c8d3ec4c4bde149620c39a551d83a08e81dd28e36f9715058947d6920d174d5b48bada080b684a341a3509877a1da99ef3f549e96282a79870bc59e92129fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85d81a1a5ab2ebb9212184d78a90a8bd

    SHA1

    49990a2986547c290d668cf6f6f5012c0b4f87da

    SHA256

    538ffa8805eb34ad07d0d70e4d3ad471d00a839db84f7f086466310232d22081

    SHA512

    6f0fb738df3ef9665ac5d4d1ca76d05386df4bb1049edd290eabaa3b8dbf3b2bc59daf5e948fb584b748abfece5fa5d73950bdb15be13ce7b82b992e4d9e5354

  • C:\Users\Admin\AppData\Local\Temp\Cab99F1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9AB0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\c.bat

    Filesize

    404B

    MD5

    6c2f63698a08b310db71328b270a24f7

    SHA1

    dbfc63343722e2b7860b58d64cc89081207ed6d2

    SHA256

    38f8f02665b6dc6653faf8d93bcd98b61af2d8d080f8eb37d14938838b0c220e

    SHA512

    218708d4251186eca1b53d62067d6d2bea2c3dbfc937984cd26172d99f3f6f38a81a7fbc470da2d9df8d1185bc69468a2fcfc7de7cfa6291fa913fb71c2c5e8d

  • memory/2056-12-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB