Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 14:46

General

  • Target

    3a95c935608a87b628d0d2a5b2b9688f_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    3a95c935608a87b628d0d2a5b2b9688f

  • SHA1

    bbd2babf3954dd1a2db23359294ecdaae9a8cafb

  • SHA256

    f5a53e1405b35aa5af9554a25b5cb84c9c8670b66d06e5a677a8d37058e4ddc0

  • SHA512

    e276859c68bb0b4d40ea9009d8eaa2d1163f8d2e78bb7972076203bb88c18184c20628c4b1400d4887cc4fbd2f69b3c13b8eff032f8be63f1ef6fd32e781fcd0

  • SSDEEP

    6144:CM/in98C/WvBJIzvGO8QC2VQ8nVG2CPRgLXM+1mq7kycl8dk3LNr6XoRDae8N5YW:TC98CQnmGl2P+gL8+13gyc6EZou+Apu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a95c935608a87b628d0d2a5b2b9688f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a95c935608a87b628d0d2a5b2b9688f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe
      C:\Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe -t:"C:\Users\Admin\AppData\Local\Temp\Low\CPISFMHT.exe" -d:"C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe" -i:"C:\Users\Admin\AppData\Local\Temp\Low\SJ6NRQ96.tmp"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2564
    • C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe
      "C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2988
    • C:\Program Files (x86)\internet explorer\iexplore.exe
      "C:\Program Files (x86)\internet explorer\iexplore.exe" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%00%01%01%00cIh8TWZadr7iiDTOi6Utcg07tcavA3WcY3TV323eREHrpox731DkC0E4X1W_EUX3YZc7Yxteb4cDG5rgGfHaGjyVskYlvLT55bC1p8ss1zOOBu8oZwQeYd_YO7VkKzr4X3uOBzJNEq5oSTvYxM_zEPEgP8MhCvxAvpHzPlbSxNEpjuSObL9wiy_Rgu20zD_DsBSsAAtl2zAlOCvt6ZS6xH7n7L-l7-tGvCgxYqLnd1mpBOmAsPkBEbs_YMmmtqbau9OFhjR9LRsGGu9nT4bRcyh7dW-DDbfcUSQXptZQka0LqdXscIps57T8A0bkbSuNLRY1vq9D1dROhQXy_UVpq0"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%00%01%01%00cIh8TWZadr7iiDTOi6Utcg07tcavA3WcY3TV323eREHrpox731DkC0E4X1W_EUX3YZc7Yxteb4cDG5rgGfHaGjyVskYlvLT55bC1p8ss1zOOBu8oZwQeYd_YO7VkKzr4X3uOBzJNEq5oSTvYxM_zEPEgP8MhCvxAvpHzPlbSxNEpjuSObL9wiy_Rgu20zD_DsBSsAAtl2zAlOCvt6ZS6xH7n7L-l7-tGvCgxYqLnd1mpBOmAsPkBEbs_YMmmtqbau9OFhjR9LRsGGu9nT4bRcyh7dW-DDbfcUSQXptZQka0LqdXscIps57T8A0bkbSuNLRY1vq9D1dROhQXy_UVpq0"
        3⤵
          PID:2020
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -noframemerging http://www.shopathome.com/ToolbarPostInstall.aspx?oldsessionid=613792fd-9d97-4712-ba7f-620654f3b295&A=ErrorPI&owner=nonbundle&ErrorInfo=&ErrorLevel=-12&GUID={8B771194-8FE2-431C-BC96-32B5F63CC3F8}&ae=no&source=none&setupguid={2c0f81bf-4ea1-4514-b71e-f8932aeb7b3a}&setupcid=80894060&cid=80894060&refer=0000&disabler=-1&tbstatus=3
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2120

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3d5c83e651164c698ec3999b76958768

      SHA1

      7ba2dcf12ae3942744d656c5a6866503218281bd

      SHA256

      c8fa0c92bca7710b50e76f9d370bd5575b74d7936f1ee160ea9cec87b1510011

      SHA512

      c9c14e6548de9e07eec0215459ec82270aef67cea7a95e2f8038251b95980b5534d7a97256a5fcf657ed7ef891815ebbc3130aac76e5d4f3eeb57f19af4c6511

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d7b1a2f5037964aba5d9834ff5883bb7

      SHA1

      c9936017893d50540fdff0c7f62d211a74863d59

      SHA256

      c5139a8b43a4eedd035a5559286574a4564f2a076f0489f93b1092d1af434a81

      SHA512

      1a50ad6e634e25b6126f783875090ae78bce239a4c38b180852e87c71efab819038baf21bcaa5c8389aeb54f5fa1b1e0ee950db5bb921c49c2294e2cd9170e12

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      77fa85f3114f84907c28f8eb0c0b9c9a

      SHA1

      0907c5699941d343719e4b7f656a661aa470f5dc

      SHA256

      3a9d850cb31e4c64916c0282abef131e5d03f491ccbc1725c9c7c11e201010fb

      SHA512

      2001a666955c2e1ba5a8d25e609e3b436f7d6654fcf7e1d3f366cde635ae9736f458b2f3861c9c019f5585e5f7eb2b7c91174aa3a8e3f759cbccd7c973bb843b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      17cbca3f45b4b225ad3dae0b6ae2d9ba

      SHA1

      db4873eb0ee5c60245bf04a9aec443e096ea2c71

      SHA256

      8a4520270f1d4dbfa385223c3d82dec5a99d100f4e3890ff4f761ee03c25670a

      SHA512

      e887a5c75b835a87372e0972c45aef21cfc1597f756c38f5af6dd3279b550c5c63916ec22a75c2e00d23d138e13b0148fc7dd76766c300c91d057bdf39f1095b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5631d85e1b5e65c1d55298f20b47dd5f

      SHA1

      7fd41894f8c1c233e221c296fec9fd88664fc816

      SHA256

      200fd501fb2ae11ee918cc16eefc62d3b58262a1f343c5257012e92c8fcecff8

      SHA512

      0770a0c0da1090eae6f44942b604f1b35f9e6bee70304e00381d552b2baf1cf932d93e36ba1aedecc3dbfa1265d75fcdccb1bcc9e96c0ce57281870af18ffb9d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0ef4762b8c7fc24fa02b8b0ad724139f

      SHA1

      74dcb7f2676cee010520c51669f8398eca84bd79

      SHA256

      ac2933111a26760b2c264c77eb2326548412c13c20a4cee8a93ca9eae25f6f06

      SHA512

      5703af85ed3cbefd57244ebc3e05dcf41ed4a8e168afa67fd10974a236fb6ef540b0f7c57ff36f7adc546cd0c1ec2d5a28224c1c851ca0ddc16e9d623dcba333

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ad239b741533b5969fa106bdd7d500cd

      SHA1

      3808fbd0b50427255039dd99f336e9fbf25382a6

      SHA256

      add96dfaa5ff8f4bb15358e0492af788ec4274592628895c4980f66350d074fb

      SHA512

      4ef5893e41447dc7a795b532db37a7d1d6f4f48bea80d1226dea0ea8abff85e06e5d3487abeadc9dade54fec7c3cdf8b4c89400d217d8fc648b117de028c1ffc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d5458370544b29bf1f65a95dcc56c688

      SHA1

      9794f2e2d2edb40546f15bb40dade21408252ff2

      SHA256

      4c12f57acdf1ee9b26e957ceea2ae6224376af65bcdb5fc9af29cbd72316946d

      SHA512

      d59af9e9fa6173e31628b75f95be4009cf2b3f5ba58359ac182840267973ae4aad959b760bf1ae1b28756f78bffe50db593006535602425864c644ee35bb9310

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bce683eddc9b1771d248bd205f4849d2

      SHA1

      02d995a57622aab59995554cdd2a16ec08c2ea15

      SHA256

      592ecbe774eee8b72b72f850204dd12c37df840b31ec694b0190e8bd73be807b

      SHA512

      22d4b1f159bed0cc0cb69cafe6bf92b3da20f6a9d2307fc30f90b28748dc5f704e9bf609276eabe0574a30f01dce45803b21e17f0bda22c98b40ece758332ad8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9b50c07e86c1f017c2abd936940f4d50

      SHA1

      daecda3036b541c8c7fbfec6b48228af0c1047bc

      SHA256

      815f8efd991065a4fcd13581f265d766d937e8890ab36203da35a747aa271ac8

      SHA512

      9854cf06d3e1544f36d1725a2e64f1bc85d637a90bb599d2798839ab3da77ee6c349cb160af4300380602843559e8fce5f3283e3632344cf98b6eaa776e13b90

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      007390b50886f2e629a4de0f654a8fcf

      SHA1

      0ce8a25fa979c4221848f51368795be7391255fe

      SHA256

      5036bc07d6d101989907cac0cbfbe5bb16498bd3a691815812b4b97d48b80204

      SHA512

      bde18d96987be733b61a424004dfc4a56a1c853ffeeb3bdd61a31a99497dcc14726ca9f2f9a41813c0437df0135809b0c582d79213c679d57b56b0d2cb63409d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f67a18a52799c91aa59693f1cc992388

      SHA1

      73b72d6e6fb6407941f3edcfd517eadb25560e75

      SHA256

      85083d91e9e78f826ef8d177ae5e2ea08c92fe87a1fcd8a356ebc61a4fab7680

      SHA512

      95e70c1401ae396f57779eeca38d13004d1633b70c3473fa3a00f4a1eb3939912e34a755bf098c1c45ea39e4785952e42b95e9428c432c9586d12b9c896e6e55

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6a912ae6a6ae184b9545afada488d794

      SHA1

      d12b2d2518d536a58f471090eac864bb5483cbd6

      SHA256

      7ee7bbec5d119b83b67e3fb2b95b73cf42eeff5673500269cc9ed589ac5fe60e

      SHA512

      629984827d2cd66dc9eaa8c90b0d1655784fda810b37a742ecac5101b88b3e3e585d3a0c11d5f0b56fc210c70aa12cfbebd5b2ed1dfc25edc834ba945a2124ea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c467f1b8a18feea7dffa6ba007cf2c6d

      SHA1

      b88c527ca2052666b5278a6de0c89618cfde48be

      SHA256

      46f7460e641cca06eb43cae0f4d5d74e6ce397cdc17a71dd6bb700d86742ac66

      SHA512

      44e55dedec6fa0c213721b896a683902e9171b042a6b75a7c911ec6a4cab5e84faadd5f556b7dbda35b44eebbdaf63f12daa6066e75eb73de52b301a379a6bd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      594752b6060689d53be26456d76cd896

      SHA1

      1c3892b7d737f0fbb4cb789a892b6e169329efc4

      SHA256

      13918c4be7691e529c0584813ed974d5122fd418e42d975a98020159abf93afb

      SHA512

      bb3a2e26fa753482ae0b4b9d8644dd64967b4107ed053d3b7f89e6fae88d4b0b1d5c1f3eeb3035ab20a091119c34114a7f664983e2a2f6634803953f6b62ac21

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3e9af537aa6eed5f9f98886662b9a4d8

      SHA1

      a7dc98bef83c060cfd3ccdc774b6efe46fd0abb0

      SHA256

      6d6970b3f288d87930182264a243448b05896731c7ed04859632b2c820c81e10

      SHA512

      c9654880596b53e7eecec000f20e7fdf5157b080525e1ac972f4289b075c5a094d5418e1297cc6b5911f3e3ec7c2f8e240fc4fce32f5e6be983773bc97c0dda3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f82b8363cfc3c5607968b27e6fea3ac4

      SHA1

      d3b5175a94b9d8b8cffba1aec33a679af7bb787d

      SHA256

      1b30c065f756524c5e28d2d4622fe418c8c8f0496e546cafc99855b5d57b1fad

      SHA512

      4afd4d321eceddc8b5397aadbf08d47a8d5b9ffd80cc834ab863c9f891b64e49dd683f8ba24b30451677000b75040dde3f817be59dc605408921c28aecaf7e9f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ed53aa2f8b42c49e38089ddff6aaeeb

      SHA1

      082142f4be49112d9ee9bee4536505ef991d2d2e

      SHA256

      aae29787a1291108e51730ae579a896740eb9897645f70d2b5134497b75e4910

      SHA512

      cba50aaaf43e2387f7890c9a01f3e3a97678bc06dc476b12bcc27eb64ff46d8ff1d8d30e29b4d83612ccbdbff2283f03fe1949b588985ae8344967120acdb989

    • C:\Users\Admin\AppData\Local\Temp\Cab826C.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Low\CPISFMHT.exe

      Filesize

      169KB

      MD5

      589c85ad4b3fd73456f32eb9d58e2f9c

      SHA1

      95ce6284d38c8948ce30c4abf9b4b6ff60c9efe6

      SHA256

      dfe385206e3ba737636463b22501b801b88169af789424e8a33c3cf07a8b2235

      SHA512

      eefa14b37c7ecdfe95f9951a09d0c876a2c1bfd8b029869f8928bae2266ebb0a90e64e10e0781ec71638042eb5e88806a252e55176578e96de44ab5c17f25782

    • C:\Users\Admin\AppData\Local\Temp\Low\SJ6NRQ96.tmp

      Filesize

      56B

      MD5

      d32cede39e8b41ffb8f4a30b6006f5f0

      SHA1

      e4ce679afab2abf9e586f5fc938685354b592eb1

      SHA256

      eb8e6cab79e6781b58f83a3fff33b520195eab2b2eeb748eec69e14e5a83c64b

      SHA512

      e2d1c360e077d2b1dbe100869b347967c132036210994ebfcccc7cfda6b894344df89622dbd8ea6e6fab7746f836817425c3920dffe67dabcd70ca05ff50ccd1

    • C:\Users\Admin\AppData\Local\Temp\Low\SJ6NRQ96.tmp

      Filesize

      70B

      MD5

      2a08b26be68a8bc3a053789d2d3965a4

      SHA1

      fb72fd1159eed1126371926143f5f27dc3cd206e

      SHA256

      c35b105a0effc944da5b69628f53ae5d06d226f1100d9ee6016926a15d64ca58

      SHA512

      3ecac916e3efe3e1f19dc5dfb93e35f6531432340a7b298f59a0779e0f9665190bd13f15297e955cb8d87ee373495a1b2a82e466f31e562121b104aaf1f47caa

    • C:\Users\Admin\AppData\Local\Temp\Tar831B.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe

      Filesize

      185KB

      MD5

      6f859cb344a13169bfa611274ca70bd7

      SHA1

      f9109b10ceb1f248b59828a465098f96897bfe4b

      SHA256

      ac4f3c6d4484706c3a9f30739c4ad0165ee5ac17ea2ec5fbd59690ce758d60da

      SHA512

      3a8b0e62bf4c2ff15137119416ca90b4ffd0487991c88ee343fd9c5040b685ec6000b4c8c5a940c790a1a3927cfb3d4635876775b2086faadfb416dfa89ca5e7