Analysis

  • max time kernel
    84s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 04:17

General

  • Target

    3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe

  • Size

    175KB

  • MD5

    3dbe4af13a97c545addeb6157d8e52c7

  • SHA1

    84c6254e624f4ced75cc565fefffdf6a99f192ab

  • SHA256

    aaf09f50cc905edc7215d9dff4039537b8fbf65f003a62be7221babbf074c099

  • SHA512

    1515ac38ff594deac6d9e3a0149f28ea631f98a9887eaa26135c8bd33daa68ce01945d8d903ec4442a37a2616996f13be8b05c7b0847f61d7ac561e977ed97b0

  • SSDEEP

    3072:di63LBbFIoloOH7bXxMbNB7QiFpjEAHklov+ITwgkBnfbq6Tw7DvacHRDU3y:HVPPbhiNBLXjEh+DP6I/P

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\Temp\3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3dbe4af13a97c545addeb6157d8e52c7_JaffaCakes118.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2968
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          96b440f5f6baf4b4abf44bb585e9701f

          SHA1

          a7024a9aa390bfd5b77f9a6bf83b50a5af0cee01

          SHA256

          fe4fe478afbef31ea3261e2363145e447d269c33585645386567048940529163

          SHA512

          8558c34cfb658942e04adbe40e06e607701fef121a617545ded2088d5cf520bbf5d1915e55beafed8e143a193cf8b14b0276569395927805779917596fb0f6fe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a2c3215d27f515c19872a22295e7847d

          SHA1

          004dfacb74857f219c5ba66cdf7d516f530f504b

          SHA256

          0c8425448bd361888d768a44644206f02055a9a32bbaa36ca8086e213cf019a2

          SHA512

          49a5c5a3c6542917d5db7ce3c32dd06935c116100258f7fe29db94733b641f1965776080736c69c84f7e8ebd3af650bf48deddbe8f60f026d1c4a16af346e4bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9b6375687a969b19b933319563107ff0

          SHA1

          09e42113df1bccdb2c16a34ef2b91eb6bd211347

          SHA256

          712d2978dd6cee8174f577ea2fbc3acce0861e014585c6989fefc67d00db0aeb

          SHA512

          9bd96160ce5d87e814613d02601b5979bb7127ecd900d7e491866223e8e100ec657221071cf724c163b955e79244dea9d28085e84b67315738a4b5d0a28978c8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          da7a3af34caa74f881ff1f418b02a78e

          SHA1

          4a883199f2b7a949034aa7c7951e60d57a5b48ec

          SHA256

          5d1bbbeae33e4aa2d377ab1a0890d4a943aa1a59fec62099066c9d7e870344ef

          SHA512

          e07dc776a82ff4e2a4dad4e9f0169cb036705d55d5694efa998f1c71faf689d69961e121da7e98076868e632f6da46547d3dc2e3c18ef3e260d62fa77b29b7df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          11f194fcca6e8449391c663729116b8e

          SHA1

          dcf8c7f1a7f2262f75e21fb19a519fdf4e0d1f1c

          SHA256

          15d4a687e9da285919fbcadf3a85fc0f612e3c3c82a71dcabfc87aee201423a4

          SHA512

          3021c36d389fbee7aa21391fbae04220709289c41532349f9e8300071ef0fdeafa553dff2be7de3f37612a29736d5e604dc72c4b63216f4e77f7bb6d7b538c3d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          46993be28d77f83494fbf1bbebc835b4

          SHA1

          567e6c41cfcef40d21fd0f375a0f94b6b703036f

          SHA256

          c1dcba648eecb1757942ff937bf984c9b1013304ce66e661f47467956503fd0f

          SHA512

          78412d9f5c19ec78d92c4f150f2178d92ff60b798d6a26def62de19d18d3223207cb08b31e9b75c0504d3ebf1ce8c4891ce08e8944807cbd648fc42e0559a4ca

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          171c57109254f330ba23cb4012de5a4c

          SHA1

          dc86201e6285e2f72b2ceeea29b72bec43d78a06

          SHA256

          1c185661139aa9369f17813740cf46b29b1d3e3170b15e9ebdcec0d757a10c48

          SHA512

          2b35f6f9ac8fb0a4f44c6acc09fc6c0b49448183130032a1aa0d9253ac877bd68403e781fee2e35ab1d660703672c80cdbba457f5b2d25549bb95c4cfc2f4054

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          51680a6310b9a942511ce8f25ec1c1fa

          SHA1

          149d24b2b218b22b44b911278403a581f3f4dee1

          SHA256

          c15f0bd9f843991cac6d2871eafdc2d635e1f78548d3e751d6b6e85111da260f

          SHA512

          579da272fc0d3a2226b7f6ef33785b9a135471a04207d79068abc9dcb7ca5ae01df4badaeafb8abddd69292407d84795d237e0ea6700db91d7968422f4cc7d7e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e9b7c90b028ff7ed302dd35093540b1b

          SHA1

          62f1d1d1fc84f4c0313516a87382a676401be41e

          SHA256

          54d9d402d7ee8205ac19675693e52ba76912ca8fb0a8cf8f60bbc46931f8c44a

          SHA512

          d91eee1a9d31c86c9c22d867fac0dbc39ed7a230ec8dab4caf720d0c285125e6b22b1cf7f2f5127a53faee0a38d43418563db4babb1f8c43dae029b257a224cc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c14c74ecc29f079f243f39c8eec42a66

          SHA1

          c972057f0e2cf075583a0184b58b9c5ebbb0ce57

          SHA256

          beec1fd594bfb9764bf331a19d503f107a1db42ccfb408ed1cb25fada839716e

          SHA512

          2a5afbe125b658b7426f98026cb5f73164cdcdd28171f267eb4e84e63d6ee0073adcb24988de3afa2767fc5029db5ce14d5bdbd676d02aa2b6884dc8573dbee9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9176bb8c5c436cc3a92a00f79e864109

          SHA1

          a7cd02dabed2a49d8857104f6771456f7ccf0ccf

          SHA256

          bcfcd1d27ab4b68850b2f519d4d1890d2d3b272e33ed014882a1d83e456eea6c

          SHA512

          d6ac9b8241bbadee02b048e8e7cab07a89b7e86fc5e4ec92db32faf5f0c1211bae08a9046daf4367da06c5ad16842fdc682d7089321c9e2b43f01d113c736fe2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fecddb5632e32e08462a7d5c14e153c3

          SHA1

          41a86bf39b5ff09dfb64080558137da50ed18f52

          SHA256

          5d6adf35497b7bf145148c85496055ee8146abe37cf2a980d5f38f734282fd5f

          SHA512

          3d25df8a43d9557e5844ebbdb45025bca8391968d3dd7de1d46e6dfbbdb44c746d46d4be9a1fe9029263037c5f1eeab0ad9d09f041addd6333a29d2b9eef552b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1d51ab079429d11e5f90e785242ec1cd

          SHA1

          a82c7dc3a7acd2939625503dec149841e3ed5513

          SHA256

          71e5ac4db4950cb5c14a8f94dfebd3fb1925bc0bf5385cbafc7ad290f839452a

          SHA512

          24d31fb928760584cef8e5feb439faf897fa607edd6af9275023119fb769521505d2f453c68be995a21d441774fdb4cecb572e3e1b2fa2c91203c66176dce59e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          002d2bd8fd691b9eb2202745fa6b8843

          SHA1

          71d4286320971713a14997a86282b6de5e72c2d3

          SHA256

          0fb570f1c90f362a1f71636b60fd0168e11c4ebbc26c9b3c2cc8955396ed2ea7

          SHA512

          bc1a1ed091cbb27f5aa1664379f760a249093e93f84f9453949c64de1ba126df5cbbcf494318f1eb48dcacce58e169a563fa413d742c691ae40964df4f223c93

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          fe5f70f3a8f98546f2cacc03bbafe9b5

          SHA1

          d17b836cf7111573c20c86c52bc1aee471e469b0

          SHA256

          35a532df9944a8d9a6d0d28aef88de5e9dc2adb8dffde90ae2e6af1712771211

          SHA512

          f12c8c6763255b59cbd55daef06bae9804316a2cc56216710795921d3e68bdbbea108377b6e7c15445a7c8dd5fc14501116e305b1242ddf58053753cd653d418

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bdeadf19f1f00917546a52aa0887d8ec

          SHA1

          460c3fdb8b0a49b271223f710a3ed400344c53dc

          SHA256

          02a5b355b756b885374cdb26a78c042a73a4b47ed83785914c449a9d66056fcf

          SHA512

          7bca601769f12d6818fbbf33d95b809440b770a50ad106f41b338e8b3ba6cfd62c2850a19ad6b0f493358d070377f68ca25e93c42970859d1e26050859222567

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e5daf33ea512ff4c11b2f08382b05c15

          SHA1

          b59fc4048760595d00779f2d5f73a5c471e7a7f7

          SHA256

          8b1342428f1cf58776e751e01267300aeb2abb97d2cf8cfbe2cbd8cc31599aba

          SHA512

          f4b04e52b0c20e1d862eb2f1130aa2bb6b6869191a7827f465ca288beeb4be53743374b893dcb8c8ab102e2757c503ee4b97c75d07f70b2e0711b7227c9b9892

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e1ba2d21b9138050c502dabf0b1264e1

          SHA1

          81806608621c58224163dcf862c326887119e6be

          SHA256

          b9a521452a4483718593f133b0767d905532b6cb9973f632077a9f7ea68c1a2c

          SHA512

          20d830b74af3e70aaa61763f4f24a14d08ed62ac6f0085c280bbb0be77bc40fc791cc0baca3b42cd105c5c7ffce639b65e827b6ebcb4dcbb7a4fa166e272b62f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          713e9f3bd3143b3b81369e5e937c1764

          SHA1

          6e1bff2f60ec3d56357c85a7a3cc09b08da0f89e

          SHA256

          d8a6cfa47ec1a7f39a31ee69fa41e8c13b43f06189361d00d24e3f8049c1fccd

          SHA512

          ac7d6324ac59aa04e0dfc5c545b3475f6c78d2810b9faf952897de53bf9205c129e66c4fb7a1d57d12efc7bd4fdd060940b13f85c67895c5dee87ea68ce1deef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1335164ebc7354ded6b7c7b33232332a

          SHA1

          75a5a5c85db6f25ac4b627e6f6eed9518361836c

          SHA256

          b43974c941291aa5c77f2e029c862d88a2ae1ad1de12353b56e044b111d35207

          SHA512

          a319bb6fa9972697f7c1efa698e3750e127bf553cf0dbd8e25cba988a8ff3b0e88744d27a942912fcde286e63bcef6030f9cf9347746c23d2581a3759662f3d1

        • C:\Users\Admin\AppData\Local\Temp\Cab2D99.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar2DF9.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • \Users\Admin\AppData\Local\Temp\Loedae34egh9igeff756Ng.tmp

          Filesize

          3KB

          MD5

          b479624d46d05a4a83425d05cd289087

          SHA1

          e7861c42035e43c5f544c8aeb8fc2caae052eb8a

          SHA256

          dab85fe6d45dc6a03fcacce8e007e46d670e68c67b9d971dd489920081e48dfa

          SHA512

          173bff76d4857f0157b3d37517bab24d2ed2ea7aef59eea58ad97dce06e2f9278316adfd2e23ad0eedac80c4162d82b1d0d684d7f9af14d886d12bc4c0bd3e60

        • memory/1308-17-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1308-0-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2860-45-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-21-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-40-0x0000000000260000-0x0000000000261000-memory.dmp

          Filesize

          4KB

        • memory/2860-36-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-25-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-28-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-29-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-33-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-35-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2860-44-0x0000000000490000-0x00000000004DF000-memory.dmp

          Filesize

          316KB

        • memory/2860-23-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/2992-30-0x0000000000220000-0x0000000000263000-memory.dmp

          Filesize

          268KB

        • memory/2992-20-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-7-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-8-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-10-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-14-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2992-16-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-19-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-12-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2992-4-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB