Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 22:04

General

  • Target

    3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe

  • Size

    640KB

  • MD5

    3c4163008f0b7465fa28f06262df4f76

  • SHA1

    d8f71ae43bd923c85ac8fe57e8d529bc888b3b16

  • SHA256

    fc2159ba3961c7366dee99f7b7f828d4ffb74b3aa3367c895acc7bc6ddb47f9d

  • SHA512

    c632d110d9a23ae77dd65260eb67c9994595ea2f88cdf7df0d233ca4bc0cd96e6d87cd05a5ef39ef858b4568e0fe340eeba8a0b720d4577a100615526ff900b6

  • SSDEEP

    12288:5kkOyMJfsGVmv3Ug5hyoWojk839BU8XQkPGRTCKE+5BQDCMEBGHpNA2exauqGIt/:zOyMJfsg63Zhy4z9RQBC9+zWE0pNEc9R

Score
5/10

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3c4163008f0b7465fa28f06262df4f76_JaffaCakes118.exe" /_ShowProgress
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2968

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\bootstrap_42511.html

          Filesize

          156B

          MD5

          1ea9e5b417811379e874ad4870d5c51a

          SHA1

          a4bd01f828454f3619a815dbe5423b181ec4051c

          SHA256

          f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a

          SHA512

          965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\css\main.css

          Filesize

          6KB

          MD5

          fe3a2f18579c4086a1c395c0d326ae8e

          SHA1

          17e1338550629fbb731891131de8ed141e3978b4

          SHA256

          96a9567d356bafd8fca64a93c8d4abd4a14fc2632900bb1e4bf93500cff20bbb

          SHA512

          fab9dd86125ddff0b097faeee339363874cefff10690460850332d38478dcd3c1188ad57de44755a3643562bfecd6c95518abe95a9dcdb048c3518f2bf3bff74

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\css\sdk-ui\progress-bar.css

          Filesize

          506B

          MD5

          5335f1c12201b5f7cf5f8b4f5692e3d1

          SHA1

          13807a10369f7ff9ab3f9aba18135bccb98bec2d

          SHA256

          974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda

          SHA512

          0d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\BG.png

          Filesize

          21KB

          MD5

          34e0f024634f5e1eeef62b279354595a

          SHA1

          9416098e5603ce4482231e01b9fce4339ea3a53c

          SHA256

          491615f8300e559c1ec77208a7abfb0a240f18163e4a7fef4909842a469fff88

          SHA512

          9b0a3b4ac30b6f03f9c42bda32621a1014cb222785677ad1157fe95fd51d1c0972ae24ed888c114c0c580b73bfbd15b23a5e5059903b272092bddcb78c7f46c5

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\Close.png

          Filesize

          326B

          MD5

          16727ed332d2b2f5e4b0a7421fb1ae84

          SHA1

          53409cf8c1ac9bc8a9dc33913ebe2bdcb3dfb508

          SHA256

          f1a2dbb445ce06c5d8f75d315ce4ae900cbbd895f956eeb23f834891413469ce

          SHA512

          e3785d4fa040eaa8eacbc968f05de0db26a0d5564121ac83882625341973a7498da43c7e471dfb894aaaff7242fa263f22c1af2d7c9e2b7e6f39ec3b5b8799db

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\Close_Hover.png

          Filesize

          286B

          MD5

          cac469bcffdf7b8e7787521171cbcffa

          SHA1

          aee9d687ff8bea0ab5d8c80ba54daafa0c1d8e93

          SHA256

          d22c63f556cab861dbbb993737a6da85241fa80765dcdcc0d70160b1e676a0bd

          SHA512

          4253633f907c680dcd07cf79520fec91d3bf18c21f6c2363899e0649796edb837fcc511ceb542bd8440d2d7324c835dcb93089fa225ce11492499299570d0a97

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\Color_Button.png

          Filesize

          2KB

          MD5

          74e2fdcc7a0e8161c160c2614a67801c

          SHA1

          43a3ccee7e8e9f1448982662e567d1311e21b5fd

          SHA256

          6608965b76e3c0f43eb9ca66c75f5b916ae7348ef7250de5413dad735cde9398

          SHA512

          a7da8a7330a7beab2fd5e04ca3efc917c933cf8e4dadad531a8ac11e8add814890b4693ec9393408230e61e3a934075334953bd1ebadc6938bedf6a11c93f8c3

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\Color_Button_Hover.png

          Filesize

          2KB

          MD5

          74900169442a73b94a452a43bde17248

          SHA1

          b211e593a3bc6559482ddb707399d7b7cf08d331

          SHA256

          c2e7c5e031b4e7bcefa800de4659c8c1ca072ad074d15860583588962beea9b5

          SHA512

          e0a24cf32e8865e9021e161f66f9c275f777ab592e3bb365dd568963aa998612e1dfe9eefdd71e3239ffb43657ef1f86367410192c7769968e9ecfcb6b6ef4c8

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\Grey_Button.png

          Filesize

          1KB

          MD5

          aa1424f218bf3befbcca3c4c0e42a365

          SHA1

          c91d5dce4ebd543d905026577f8a05dff1d8357e

          SHA256

          e1a823582add59d1406fd36d3f7f86f98873e3201168e542cb49239d6c525ab0

          SHA512

          8ef2ea9613ff50bf028c9ef4611326d61b1cd07d01b89631faa2053449fab9a746e06e59a176dd5cda4f02f77fca8eedbb6e46ae4a78afa416ae8adb7ef0d93b

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\Grey_Button_Hover.png

          Filesize

          1KB

          MD5

          61b27f16ef13d3ad95833dd3a932f307

          SHA1

          9e0866a07c8309b8f5fb3fbec98531f2ebfbce6f

          SHA256

          be3dee9b5d9f2893607ff916b3c3313987a16092230650dbaeec6e9e36c63ad2

          SHA512

          c3d6a15a826c990bd77c4d2581fe8791fb71346477ee360af50f96a7521e83f5ae89c520af221a737787684eb2b6a714afe9e6d770d9103de4fcc18f767283a0

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\browsers.png

          Filesize

          6KB

          MD5

          94cc832ec3a494140750e5de1feb671b

          SHA1

          7be57c13dda3badbba8eede215665ccad5f49ffc

          SHA256

          6926902101ccb6dfe5d0759810b3e0d979971bc5ede6207f9b598c55358e483b

          SHA512

          9f557d04b939ecb7d962e9b48f1525a637f53a0804fefd5e3f25a9bdda05b52412575161618a45675159523a768a0677c0659689bcb1e5a6021c7a6a8f06ab71

        • C:\Users\Admin\AppData\Local\Temp\ish259434561\images\console.jpg

          Filesize

          14KB

          MD5

          f3b1d247b28fe64cbc568fbe8102f911

          SHA1

          f3b3dc197cee8500b800e977e7a10b514bfca3e4

          SHA256

          6fe65dfb7c9a1675ada8c39ab352fa50a252a33f8a5e254bf041319fedabecb8

          SHA512

          0a7867a76fa7717e1d1b3d84145783e911275ea313b5c286d89e40372196380ecabaaa0bc1bc20ad5d88fe25d56906842042f508de585f19923647f28812ac98

        • memory/2364-6-0x0000000000400000-0x0000000000419000-memory.dmp

          Filesize

          100KB

        • memory/2364-160-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-91-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-89-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-88-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-5-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-0-0x0000000000401000-0x000000000040A000-memory.dmp

          Filesize

          36KB

        • memory/2364-197-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-166-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-1-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-4-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-138-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-90-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-164-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-132-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-147-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-156-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-154-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-159-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-92-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-155-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-161-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-162-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2364-163-0x0000000001CC0000-0x0000000001E02000-memory.dmp

          Filesize

          1.3MB

        • memory/2968-130-0x0000000001C70000-0x0000000001DB2000-memory.dmp

          Filesize

          1.3MB

        • memory/2968-129-0x0000000001C70000-0x0000000001DB2000-memory.dmp

          Filesize

          1.3MB

        • memory/2968-126-0x0000000001C70000-0x0000000001DB2000-memory.dmp

          Filesize

          1.3MB