Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 16:09

General

  • Target

    30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    30c193853a6e9f45ed1fe0bff832556c

  • SHA1

    01ed79e0659e66d7a03e4a534c7c0b52599f48d9

  • SHA256

    1be2ae8c73c2cb1b8ba9c894b970ec2ce909bcfa310b7b903636371339a7fced

  • SHA512

    918efa7bcefcaec35892bdf417613cee0ecd81f30b15a234a5200b17c28a6b175d8c797a4a5bc019bbc0fdde5e578007cf338d1d72315a1777ef03d0c0303bf4

  • SSDEEP

    24576:frJKUK/juqkncxnfS//2oYP+ENxuIW/Rjl/lVlP64htKQtsVELVDiicYQRebMyHz:f1Kb/juqgcxfSE+HIuRjl/lVlP64htKB

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\30c193853a6e9f45ed1fe0bff832556c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\crp73CA.exe
      /S /notray
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2656
    • C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe
      -home -home2 -hie -hff -hgc -spff -et -channel 162341
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      PID:2764
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.4shared.com/mp3/eWaW0U82/_-_scrubb.html?ref=downloadhelpererror
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a7bdc41f7c8647063a1cefac4185c8c

    SHA1

    6f46e62d3a24da0ff5ac747dc03d8011cafab593

    SHA256

    a9b593ae95b99713c8b707798f8adbc63e33fbdb34038951cf2f20b037bfbf10

    SHA512

    6366cbe8668e41a7279bf6f16102b5cfc6bbae76e1afc936d788b19af6417bd96c8907b644fb373615ba3d33b3a5d45e63f82ca47c16e1943847c75faf1b8a43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1044a16abc63c09c8082bf663319bae1

    SHA1

    455a8f9aa5f47b82e6d96bee34cd2146bd32d42c

    SHA256

    4d94c96f17a31b7b32b6fadc33ec9e02fb0d75b7ba3ba02a6d739f659f605343

    SHA512

    f8ce93a18c1b0d8e7b61d0e50aaf1375ad80793d4b1d2e63e625ee9bcb2c7e4fb7e3b045615e28fdc0362a330d60361c322873dcf297f793a5c73d236036fca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e63efb910ebe5a7268df03ac98960df4

    SHA1

    96b16c6792051f6e2f338a05fd8169a71fb2b104

    SHA256

    7057e5797b234620aaab4fa9d1b042055c3152f8d08342a72f54659f8f441437

    SHA512

    ef45ffe19666ef1da82160dbc534fa5db65e662fa40f7ee82766a3a94fdd3af9e43f0333863642f73540a1db3f4c700028a49b76848fa2b0ca24081fea9be726

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b11e379dfbe0c28e619b8499e7926fc6

    SHA1

    99f5a0d166789106ccdc3196af669438905103df

    SHA256

    0176c262302cd9ea9b31f378d9b47be302d240bb56de06e391ba34a30a10297e

    SHA512

    56bba7dd7aeb80fe1a59edfe08f2a382dec532eecb1c6fded6c5ad74478e0cc82f649e8d4a97771b215a0bba6ac346faff8172f7551d3727e3196af4945fc4c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f8ff03d943d6c53add4a002080224d5

    SHA1

    edf0a78a5b9265b92700d0c9511b0c56164ae2fb

    SHA256

    2b042fb747ec1c236d4d4e9a5d8fae6a4864ef6bfcd9447780837b625d4cec83

    SHA512

    16c8e054d59715c036ad978d75fcb03863b031dc327b84295df2f1c590e267f7bde41f489b60b9d19ad0a1ac3b4c9c0211d009ee115e957eafa05d55da652854

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09774ad2a1c9a1dbbc21c7537f368044

    SHA1

    0c076526ed97d9b7396081aa6087e78e69d2187f

    SHA256

    22419f7ffe9e4c2d294b50043b0fc6fa1a196da4cc7dd23fe1723cfa1f1396ee

    SHA512

    e9b363d432900ae40cdf2861d722bd1285e4229b030c60d0870fbf1878f5b796115b491cbab0f2e25110e2b738d408ec295ea52ed6ee040a4fb2b9f4619ab0dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8491ea7821a1f40d2542b4e8dd2cf4e9

    SHA1

    3528b61365cacfe69dfa4c1a9b23c5b94600f7e8

    SHA256

    35ddeb4583e4666b07beff271745a580672f7023ec9433fa80a76c9026954f24

    SHA512

    bff4bcbb4ca09ec0d6dae2b6debb3c5026c28f8a4a1349dee333eb0d22a7b1d937e19072410bf45966af78969811683b8ac956cc592f6bb9d504ec5c022c75c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50d5fbc793ba57c4ead6514533ea9599

    SHA1

    35ba04b160141bc546ff17e49cf16605fc60d72b

    SHA256

    fe50c4cceb15f1d28c23190bb0a3e19cc78f34588007749b3ec0c7dbb5d30394

    SHA512

    32697ec49f12b475484cacbb0fc863253f3cce68bc2ce9d9260204df928538279b061f3b4e169eedb59aeb7b539f3eec35f618a5bc37107a351c650f44682484

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f5ebbe2381512b7a7d54617fcc3ec97

    SHA1

    0995b4f975f60052cf6f713547007f1494b9d4f5

    SHA256

    99b1b4a6b0cf99657ad990b5a6825e11fcd7bf970210d496ce123265e9ff23df

    SHA512

    4881c537145b8787f339a08d152e65e8e73d5eda611d73e5fb67eabcbe3f243226dab54476b1d70d1c6bcc3cc3262b4cf57710c848af2af5308dfcc9415ec522

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    139605c0651038d1a6173c3fa29b970b

    SHA1

    da659dbddfe19b8b0e3394b5b07954bd2226f33f

    SHA256

    405363486a6bea56065ea279bd5d05846307177aaee8ba4262e0cc91eb558c65

    SHA512

    911ca437751af0f931c77542e6aaae844dee16d712a0f836278f28ab00c43cd6563f9172e70140dd399795727ac98c11627f19c0b448e75abef3a95f0e37c877

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a44d5c2031b148edbc5317b0c395d069

    SHA1

    8b0e9054b74cd108a471c9e8757564b831117ad9

    SHA256

    3d3f2a1694dbc5b783f6ead81f96f4ebd4254a8aa4e96b87ab802e174707a230

    SHA512

    c83aabdd0e19569a299a37afd9bcdbbfa8748d37e4a4d07753089b7419e78a28de71c3d9d9ba8e4f75a45469b999538d89ae149f0033a0596a6db76699ae261c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdad853d7cadb2f42bbfdef8583c739d

    SHA1

    f61796bc1149e9cd22ee264b69a2551eab1303ea

    SHA256

    7ac4a92bb2bbce2aa68e7fdf36d879654fc5cde7c20ea1c7c8e18e4de6000995

    SHA512

    84a2f50a061173d45bc5f33cab7d6a88556f1efc99bef06f28977c5150a5f2721451d10dfdc5338ed04f06686a147661aec549cf3b0997388133eddcee70ef36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cdf62f16bfe5ecbc0f541bdf2b20f0bf

    SHA1

    c3e80a15d78e11b4e33565e3daf861cb5a1381dc

    SHA256

    b3d1ee7b644d8a6dc1be42cfe9222ca0d7bc7c14549ff69d7be4b6867f01dbe5

    SHA512

    e9d47f3442c9fd14716f5f8e1247504de38f075b396af717ae4cac28a44799d093cc6bdf531f993b11e2854676a1998e60f676f68d487ecb418cade9215ee47c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8732cadf496aa78819fa6d9560a3f972

    SHA1

    553d59b2887161e94b99ed18281a4e67839e4e85

    SHA256

    de7ad2d7c16acc2f95dafb460825dfa0439f5b890042f7935424e15769cdbb62

    SHA512

    2c488dd24d086f876fcd94df0a8f8f2650b2d307d72483d05254831f25dff5932cf9841da4b0be5adf5805d9a9822c20a5de14e26a2e58cf6a9cf1466ebd6880

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d79f1cebe88e725803715ce7b90fc4cd

    SHA1

    e51e0a762ca3626ec80b4ede0317eb659225daac

    SHA256

    7ec50bf9c535ac6bb4327daaefa5e4191d2885f1e8077a9e826b82aed35819b7

    SHA512

    33ccba9047e3ddcb058084ad8ef3728d596a93ecc3bfa6b1b4de664cf7e38b79cb32d63e6ecafd399c298ab481be0f8fd54844f3f5b2c6f84ca3639692529965

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d16de93418dca15a6cf269fb59a48e3

    SHA1

    44f2fe0d8759fea45cffe2b4bbfc48070270da90

    SHA256

    fe3b4016d0497f0ab38d79e7e028c5ca6691c2c81de2c3b267c815cae47df303

    SHA512

    722026c1973280e1ac4edbd2721ba09005e6d40e8707ba0a643be20da1d2fdb6a2c87ac5bc234c089d878ae7b6eea9dca0a3aa5e159048bd29bbfebc50e47769

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46e6ff3101becd34062b4ebc17d15d6e

    SHA1

    99c4ccfb794ce36994e21265f1a9ffbb19620caa

    SHA256

    509d80cc4e2e953d0234af2092c46b45b9ef10e918ab547dbb0af68b6dc92ae6

    SHA512

    60ff827e22a222d012c35f5422713fc591ff05c1346dacd94ab922ab13b6d03b85e5e6334a92cb0aa4e54b75796d367e12a4bbbe7feeb410aaee66c54f886d0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03891f235e9309aa3d327a6a5d21d1e2

    SHA1

    e697aa617385c69758fb05be553afa1af9c08bc6

    SHA256

    e058d8cbb25ce8915166611d5c9012d8c7241bfa4cf27f8dc293e7078588633d

    SHA512

    edd986b1c3e289b45c452313eaefc7393eaec78433a8e1a3e1ed189bd5876bf814e82cab49f41c944cf3d0a13cd451867d8028d2a0c7cb60b7ae967f0145e553

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c9cd4c28329b03e12fbf6de12c33829

    SHA1

    91936e3d2b151daa1c1cdaee333946c4e53c7d1a

    SHA256

    3a93047d0e1517cd56928b79c91fdbba2e68901c80d662b0de5ae13d0bdfee68

    SHA512

    c621744948dc78d5db8142890703fda20f9829e453fb5594059977358774384725285839ede3bd0f7e449fb47236dfdc3c65543e0a4913e92f159046f656dfdf

  • C:\Users\Admin\AppData\Local\Temp\Cab911A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar91BB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe

    Filesize

    331KB

    MD5

    a3e93460c26e27a69594dc44eb58e678

    SHA1

    a615a8a12aa4e01c2197f4f0d78605a75979a048

    SHA256

    3a81cefbc928fe136056257b8b57733164f2d1fa9d944dc02897b31b171335c6

    SHA512

    39d17b7190f3ff5b3bc3170c8e21d7bba5c32c0f55bd372af2e848ff1ef1392083218a562f3361fdc2db95e4133a19c4ec1cab3e982174d76b8276358dac6530

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ENBJS32K.txt

    Filesize

    71B

    MD5

    4c41a6601c4ea610baa5af8a8409d427

    SHA1

    6bdab24df45c2d94aa8ab57cd51f810ef2038722

    SHA256

    914bbee4b681362789f2ef19ef9aaaf6a5c95b33935040277a3e3d05392dcab1

    SHA512

    e1e9687704eb58f54560dd209f6428232ce4aeb44dc21a3a12bd0800e6e6be8fef7eb4c4beef1d728fd524004fd015e91d1adbd82f271a1f574251a1dd7dec8b

  • \Users\Admin\AppData\Local\Temp\crp73CA.exe

    Filesize

    806KB

    MD5

    661cf9c90eb099fb7b6a394dd8cde2e4

    SHA1

    3704e119ea16a3c336f63dc808176a22fbb8582a

    SHA256

    1570e0efe0cb98623913d942cf40f2eb5b10458f49842097125c6d6d8604cd07

    SHA512

    13c26a514c2022a10b42566a527ef98adaaa9932ffd07612ccdeb371888c037be3b429c956ecb7705699a2b6e3463758735332c9e26ea5f4493a91f30dfb4761