Analysis

  • max time kernel
    143s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 05:35

General

  • Target

    3e15e0cf08f72ccdbd83cfa3c15d1218_JaffaCakes118.exe

  • Size

    497KB

  • MD5

    3e15e0cf08f72ccdbd83cfa3c15d1218

  • SHA1

    80cf9cbe02ff444fe4275d19b89a5718408312f8

  • SHA256

    794b9970769e96f91101b488f83c2c2504f296929f2dd5ab4c96eebb09d50b43

  • SHA512

    182b204fbb985367407a10e1e70e6cfaca0c6a6d43751f2ba9fb6926ad62d73737ccd07fb868c968db474a6bd3fd6b9d73956ce58291751111e842eb2a409590

  • SSDEEP

    6144:xe34R2yyAizh36dqXEVTrnCRZG/t7FTBqTzP7n7O7L6K2Bfo7pl:J2yuzh36VVTGf0ZTsnz7O7L6ju7pl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e15e0cf08f72ccdbd83cfa3c15d1218_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e15e0cf08f72ccdbd83cfa3c15d1218_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.toggle.com/s/2/2/227024-658930-adobe-after-effects-cs5.zip?iv=2012101410&t=1728797731
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a310f80c5def3fdce87dd65ebf0a64c

    SHA1

    50dc0ed0f9b10cea32d3af81f032b58997f867de

    SHA256

    a4e4cc78b39f57d9f9834aeb9dd8619308f57f340085f01fd8857e2f077c373c

    SHA512

    64563e4361a5c4690211b80e37ae44669ee22b7838c17cafdcfc24649ca39f040f7f240bfecfbfb73ccb89709fe4b329f7c2491668f9b7d2594e201e2c3457ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    629913528b0c50ed711f9a6733e16a41

    SHA1

    995ae24e252c80bbe94ac5b70ca4ba2205493a30

    SHA256

    7905d1ffe847e88bedba80f9bf9255b435adaa40993741b05eed919c9905e8b8

    SHA512

    598b5338bc0f6d4d6db44a647fc4ef321556572c74acfbc50f222c0dbb22889eedd7f9a0787317d3942879a7d256b07d473dea557892805ad5ca9835992808ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c977b5fe40df3886ee3792928f0078e5

    SHA1

    10e1e97189eef12bb02c4413f97833f192c97476

    SHA256

    077bb43191f97126a22d6cfd535720f304603f61350a7dd5effd4bb9fb9c7a39

    SHA512

    10aeed34f56d715e383a509c8b68490555cbf1af9e2ebf3f38553536d755e4f65cf0172636b25302797c40093501d5179fd09fd50a114228201fab08d37a3cd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91f2ad8d510e0542e4e807435adf8fe9

    SHA1

    b37e2b41100b9e3bfd3e18ced97b22f7335b49ce

    SHA256

    8b80c2adca85a61bfb377efbb16edfaf22d49bd10972d92af5830b4c0991e021

    SHA512

    0993f5ddd75a9e253b05e093637b1a3503867bbeb10f53c022080795bbaca47cbae3f0082af91bd526cf6a126efecf2616505fcf5b1324ca579b70505919cdfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    952e3110b6e3d39e0f02910fd0c3d894

    SHA1

    d354e77a1331a4f06936fd6b37478a9cf9b78c9a

    SHA256

    0557cae0ab9203fa51c402d79e8b1ebdd7f3de0fd49c9a9712d7ea0c0e4be59a

    SHA512

    4c32ae6d692f6ef8ad0bdd808e1923f6fde297f493e81fb17cffe4069dcf1b227954ad3da117f3fdb5148b6614ea3b4ebb9a2cd0166b656f44fe8a609ea819e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7378122e8b13f7b5144fd885cf6348d7

    SHA1

    73ee1a3e95c8ca38c29231e1f9e5684973d05f67

    SHA256

    fc5102d0fabd8d96b8004405211d4bd04762f970f7692dfa65809448a193535e

    SHA512

    2e1710d93f4d0a1bd0243fe2ac6ce2d2dbfef467f41a4508991e394dd544b9a82511e1906090114c6a90cb54a7afd5697050d3f38b04b9f21ed43b5831e31518

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea9f6e29f8c89483a97b70cdb1ea106a

    SHA1

    97e04f33517cb75e126c4fcd3c92f9cd192c505e

    SHA256

    e7df40c1149d425583cbd40acfea77e9d4b18c27d719dff9e2bcda3d3953ad6f

    SHA512

    2979d4ce0862bbf0a8dc2af0385a63bbdb9fae4186c4e3932d8ac1ee6b3a51c4f0bbd1784b15a83e08364e34c0ffe44202e2965c7971386963ed0ee8b9caee88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81bb92856445c6117f845e056e9734c0

    SHA1

    4aab584468750f5faf4af2807aec3b5085f10009

    SHA256

    17dc2e1e185c74fac02e99eef784611a73ed8961f8ca68ce5036a04f3324a746

    SHA512

    2c8588a9c9364fa3669786a18efba16c3a388cf0c3045989908b780e6003e251ae15e1e0c5052e1eb4353cac8bbb08f31dbbfe7361d5af32ae04ea9c8f282c24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b9a93c7d7b6f724f0bad70f58f267ca

    SHA1

    93d8fd76d936d5322f0e3bfac3c7bbacb1a078a7

    SHA256

    da71ee9f5708a78b439712cb332375bd86ead1b72a943608347dd50d08772272

    SHA512

    9da5ada78714e09392683b47f4bfb52d4a530f69cd1f9627dcfc9f05b4f3de57711be3378b4ecb1533b69790526c871e3781ff1cced166a92ad0c8e1e076b61b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f259b72c01faebaac869751061796443

    SHA1

    0ff8a2003f295311240bde152df4d53ed9adb0ae

    SHA256

    6e5b46e7001155a6115a919b1764a637d079581622822ed5ffa488f9eda2a1a0

    SHA512

    68142ae23c7e7c48b4ff8c319b183284595fef855355326f856af344de2fb328994cd33338ea597ac35d632bc0f05158fe7ec1d4d2e93669a48107dc98b529b6

  • C:\Users\Admin\AppData\Local\Temp\CabC6EA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC7F7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsz7428.tmp\ioSpecial.ini

    Filesize

    409B

    MD5

    d5b933bf77d72032b4792ce201da7ddf

    SHA1

    05434e353ee98c42cd444d52bf47816ff3751160

    SHA256

    09dbf494c3c0dae80187fa6b8b4741e5e6996cb07c81ab23445f182b35ae7f45

    SHA512

    9cd570edfe6508f63c184877e24923f6abe939900a779472399de0d0f088083fba86a8d53a117730f075172272b141209d72c38d3744e626ac9428f7a823de87

  • C:\Users\Admin\AppData\Local\Temp\nsz7428.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    462c896155c5686a54a7544b189611b1

    SHA1

    5c415a95c0a1345bb59f7da5cacbe37a8d27e69f

    SHA256

    15b747ac27b6df0358b03e2322ecdadcc730e187134f9475a546af16f9bcb3b5

    SHA512

    a4d87f1409652536866c176bbb1d445f82760b88e2fd2f7fdf736d2960a50bc5f51092c3109006e70bf6ba6deb697ab20ecd630ba837d24207a6777cfd09af77

  • C:\Users\Admin\AppData\Local\Temp\nsz7428.tmp\show_page_toolbar

    Filesize

    1016B

    MD5

    de86f93cee23f29c4146d0490847826f

    SHA1

    cd01e4525e6b2cb3e6ced0589af4be9c2d0a0826

    SHA256

    b7b742ad61715e695a56cd0d1735d969bc7fc2c68899d823fb3ccc677a966ceb

    SHA512

    3b00c9aa5f3286e963c0ab8e3a827d7382d847ec68313f1a40088d68d0f6eeee61d6a56edc8c45f0a963c80afc9233acaa6fe75123887647ea88ba1aa9222565

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nsz7428.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8