Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 07:33

General

  • Target

    2d492b3bf2516f20a3b3c188321451d7_JaffaCakes118.exe

  • Size

    489KB

  • MD5

    2d492b3bf2516f20a3b3c188321451d7

  • SHA1

    30f6207400abfa8e6dc2ffdb2a31ec73e5f13c87

  • SHA256

    abf8bf380e330a2f4a5f6977a76eb6d394bc73a77471a93f563f4941d8fdc2a2

  • SHA512

    a5bc36895e9a2d85d857bd294ab98782c66b8dfcc3e685315df7bced79f489eae13ca87c88ad36b3ffb4628eed54d9b1904006c314f87529943413eedf531880

  • SSDEEP

    6144:je34R2ucFzh36dqXEVTrnCRZG/t7FTBqTzP7n7O7L6K2Bfo7p6:n2tzh36VVTGf0ZTsnz7O7L6ju7p6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d492b3bf2516f20a3b3c188321451d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d492b3bf2516f20a3b3c188321451d7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.toggle.com/s/2/8/28260-662782-adobe-flash-player-ie-aol.exe?iv=2012100410&t=1728500825
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c068eb2f5a05afa8be922b28da27a6f2

    SHA1

    84f2f385c340b5938f96e012213644fb494cea76

    SHA256

    920b8accd3af263e711f850df969c4237d05e497d06f900f6b5e06886bb0d63e

    SHA512

    867e7d1ba6e3868e7c7d4f6389a647646f499c77fca975d0aa320aa07cda0304231b5f2aef6c24d5e981db345a89849b8633b6e641ab95ce5866db1020538b9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e80acbba1a259e055bd1ba3f9bb1013

    SHA1

    9b9237df220611b9b9fd17d6ef32e14871e099f8

    SHA256

    fa345290d55bc0dee3800df5b72a5d8f9acdd09de0b9a71edcaccefcb3a23906

    SHA512

    cc8fe1c030b396bb4fc64ae948ec5b028bb8d0b1790a8aaa87f9118debf852eb143bbd9189947b3691444160263187b63bbc8e47142d9f9826195078c3930df6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0f39ffe1c7246002b9ea98bcb64b99f

    SHA1

    35c8998dbe79053bdb479a85f0113fe3f40fe7ff

    SHA256

    c3349db0d76d19600c811cc2d66f5eb25930bb03d299bc371396d6a59b775134

    SHA512

    7388b5a1057a6074b251334d932c04faf05f822cfecc442c13d22dbc8d18a3e28ad675620baa3f954a4d8495dfab7bf177a3ede0dfaabdac6fb539ef2a425c3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    481257fcea3b26f2ae0e0f73d4a4d28a

    SHA1

    5504b37b0be0d58e2585d5be4e042c28811af002

    SHA256

    19745344402a15b80e4e2f683718ff9b721eb6d12450a5d9b825e8ae955f940d

    SHA512

    0de3b22a44e73a8db0fb77eb514fac840c91794d8f790825182a6e5b232b80d34e3860679de9d31fb71fc86a6ce85824e23e3783d6b235c3553a04e649d7f579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b4e511cb4225e95c3fa6510f7e99838

    SHA1

    00c9303216225bfd3f868807ec98f516efbe7caa

    SHA256

    c624afa563dfd0a99f28ab289f0667b3a4d8c54794ad4b21d6e480cfcedda2d1

    SHA512

    c439ab750648ccccf5f751867265b7835369768f679d897b017b87244997cdbaa41632de96ddaf62c07a25046ac49f49dae14c17aa96a5e89bb40b5a63ccf6a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6818376ca21f1c9889ee703ff13cc0c5

    SHA1

    3db0229fabaaabf3d7d0f07c72a98075899178d6

    SHA256

    2a30d55864c99a2efb92acc773052b211838b56480d77e11a12d8b8d6c79871d

    SHA512

    75d5ede21a2f18ad4494edcadf8ab55bc4c61e2950517d362a583db3adb86f896bf6889bfebd5fe085ddde9f915f6a21e2c37d51feba7df78f9df06746ffffcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80c3a7059d01d230a7579d55b0ed95bb

    SHA1

    19af463a87cdba20d3dbec6561b11b710c52f07d

    SHA256

    98658517899915ec2c0b1f7f822b4b984564ab844a5f24fafa8c5a396d55e4b9

    SHA512

    e5445359ce6978a0c27ca8979a5fd7d50cb13ce7aa264e94e54ee3b226ea7be6c6d910e72a9338e65822b7cbf263e852f8f2e2f779f68878a927f66f980d5793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ec2672aa51dfae1c6923e3ecb477765

    SHA1

    30351f88c944986badb6a8490271a2ba76f32172

    SHA256

    9bc7a3dd04b5a35ab38284e551cbec17a19bc30acf3182b2308c55e8e4fe077c

    SHA512

    55ec2e1fbefd3a87cf990cc3d09b1919220933b4a99b05987c362fe953b8a95d5775aca9201d7961462344ce55bb43705bbead70bff3132da055011c5a36fa25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cee5a35f11fb464cdf611d3f12c5e044

    SHA1

    005aeeabd0f39e94b495006a0f782c2c2f888ed4

    SHA256

    b44dfbfbdd7ff06c0d0c3dafe94105ba235878943853cb7d9af3c5264891e78b

    SHA512

    f798029fefef20cf428fb7713f6e64fd8174c9585c179b0b5b085e1de95683d44b13e9949186378f5ac34e59222a7d2182bdab4287f920dc7ef18113e2f59d4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eed70af495596e74ea16079a2ad48df2

    SHA1

    03ddd7845d0d45d9675c6bba0185ef8e271daed3

    SHA256

    a77ef6b77a11705ea9fa7909ba6ba32c1563051f8d3d2871c5ac3ead54b78599

    SHA512

    e705099a1f16f8c4143379d20cf13e8dcc813c8cf7654bbf18178548b543e63bddb7f38096908db1523ea66a7ef8d999f20a0294f1ea2fb5688f1fd27bd7317d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a520d37967d89c3c8ccff6317595d4d3

    SHA1

    19f00eaeb1782c320081315ba93f3edb3dbcf0d1

    SHA256

    85478f5a912863e7846a57c4b9d31fa050e016686bfa64a7facb0ac0669b5057

    SHA512

    46a1703bd7bf856bab6786680c5023a77ee5633df0f0ee4814493d43e095a6d1024ea96212fc4d9396bc0b59fccd9e2d73216e4aadf732afaf99a3bf1a563276

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dc65060b7be57bfb5d4d13ca97fbf06

    SHA1

    5a9d4c71859d6f89d00db4fd1f70598ae63eabcc

    SHA256

    9846fea7258e3f3da585bf52305430e5f8360972d6579091dc6321f0f8f2d3e0

    SHA512

    fb8f977b67b132d917f5f703218f8721495aa00c62f078ef4166b253365669cd56af3cc6097e53c4614cb0a0c683e72d4891c525a1ceb02d7855c8cbe70a1107

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e680e25706ca196360958c926a9b8341

    SHA1

    8b53e4012696ac00f4357a03fedfcd1c07056e99

    SHA256

    e08466615cf275b21410afa5823a1bd918b9ef05e83af71eae2df3ac690740f7

    SHA512

    86ebd6394101e3eb8ad9763bad98380b760fee5c6ddca3b6b6b92d6eda8039bed2525c4e04e11b39c3531358f2fd1369aae39e5d4c924577731ce40b52faf962

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69be24ce307c92b444751fd75c695dd4

    SHA1

    9920a2cc0dda518a2285c2b32d9c634005f918b2

    SHA256

    f8378b48e35c30cf8968b84a2e2fc84177b19b38387a2db52a275e247439961d

    SHA512

    e54349838b723fde4767e36ac76d790a4ae0ef8112eddfed84d12a05363b83f98d071ff62b953b755b9a4b3bbacc771c5550c104aafe403855d6d70cf5a14078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e68e1dea9c4df87a19537212c823a51

    SHA1

    54a097851cfae3f2ecf1351b045a67d621739357

    SHA256

    b7aa4a57ac4dc0c6a4e48809197f8dffa0e287a1b8ab67f85b261c72539ed63d

    SHA512

    4c6b24719fa7a6cfdd89b8c4da09c90333cedaf83ca51e6310f88a33bc99d83a69c6ee8dcc9ca4e3623062ccfec2834573a9654f5d77bbfda5dd224e25f6e28f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78ee5905aa043144b58662686791f01b

    SHA1

    407bcabf09c2850576bd313be59de0c0e552f3c5

    SHA256

    040d63fb652954e328eabb34a10241f5592a4016a71241775dd50522d4b9ebc8

    SHA512

    9de47e7995f298857665e76b065734a62e092d2e33452fea9551bfbbaaa3226b66422c3d7ae14fcbe1cebeee3a7f327223d46725e232b9b531fdd22af8ccd8b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95e7468f0696392224facce5232dd26f

    SHA1

    96a0317f770b38b192dc8f5e1a046003b626d46f

    SHA256

    49ab6b5b54f15fcc43ecd6fb463dfb6b3c018827c74d362fd07fa499fd50dd4f

    SHA512

    da3254712b873d42634f3e5cbd9fda5d3c00bca304619a773a65013409b233f48e53305685ebdc678937c907237d747dfd008bf89c3902d43b7ffa46ef0901a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed3ee18567bf92196d069e8cc7e3127d

    SHA1

    701aac2be47709f0537b0ae1196e575abb678598

    SHA256

    215b7a8c888a6eb98fa1d1a6ac7a2d2900b855b6dffe51efe993127c0eceb2e5

    SHA512

    debad61e984028a8106e95968b1eb1d2c9635b57fdbc9be74a30adaf359bbe9b3db43a282a755491f6cd344e2365c9d561a9d81d9223279d34f3a726fd1b23a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8444c244827319879fc0effe5d2f28b

    SHA1

    14d00be6fe61b064b09dad77b63fb584320a7ad7

    SHA256

    f227a23d5bdfdd9fbce0ded36d566d8c0c23598c30ec9cfdadae4e6d74e60875

    SHA512

    20d30412ad1321864dd8b3129958eaf6fc530d211d5a6983d5411ec4939a280d4c5676bc8757b74572fc5650fe779d56f5f75bd471f0930d255c5529f98a8be9

  • C:\Users\Admin\AppData\Local\Temp\Cab5D50.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5DA1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nstB86.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    533d3d618ef0fbcd24cddd9208582eb6

    SHA1

    6851ef8135db24ee654628e3777ae7f4bfa153e7

    SHA256

    af3ef59ecfe481b81b29c5cda166ec66f48d0a1e659f5901be71ccc8bcbb8879

    SHA512

    0044306271bd68366c1cdee785bda3546e67b77add5226ad6305d9279ddeead973c1c6bd743714d362727d63588c024bff2c8f40848fe56dc8abac0b502b7389

  • C:\Users\Admin\AppData\Local\Temp\nstB86.tmp\show_page_toolbar

    Filesize

    940B

    MD5

    b66e7fdd84c4e2db3580a9602ae8ddc7

    SHA1

    e037728865af4babe5cf45e227ba5c89b644f963

    SHA256

    01378dfc6a99d4341a56d597ab584eb13d46629c73c6cec1e4f02ff449f5823a

    SHA512

    994d65cb43e3b02b00cfbf3050307f9462ef6011cd97dc660defec97de6a22846ca91ebe3df9f71c5735f105eaf7686988f6ec761fde131816aaa4aaf883bcb2

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nstB86.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8