Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 04:52

General

  • Target

    3de5f1261de6ed5975d0781bb821966a_JaffaCakes118.exe

  • Size

    12KB

  • MD5

    3de5f1261de6ed5975d0781bb821966a

  • SHA1

    30ece965e7b53ff09e7748668502bc11904ddd0f

  • SHA256

    a4264af73fac8429b9bcd0768784a5c0fc5467e9528239504afc6f288346c64c

  • SHA512

    71c908ec2142f74be42440cb6b0dd4026f12903999570fd4a2c631371187026ad9f7b52360519f2a2fe01e4a0150914a7e00f11aff9b8d661dcb3833699cfbbe

  • SSDEEP

    192:dYWO4UvnWat5wmL3ZvikIvh9939ke3buHtt1RNKcnPohm91JKyggkgBT:CJxWS5woYbr939kAbuHtt1RxgEJKygp

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 28 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3de5f1261de6ed5975d0781bb821966a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3de5f1261de6ed5975d0781bb821966a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\CScript.exe
      CScript /nologo C:\\Users\\Admin\\AppData\\Local\\Temp\\updates.js
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2292
  • C:\Windows\system32\wbem\scrcons.exe
    C:\Windows\system32\wbem\scrcons.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    PID:2640
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\System32\ie4uinit.exe
      "C:\Windows\System32\ie4uinit.exe" -ShowQLIcon
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:2788
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:2
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1656
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:603140 /prefetch:2
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\updates.js

    Filesize

    6KB

    MD5

    ce733a342ef775a4426c771c68a2d06b

    SHA1

    beb4c0240595cc6ba43151ffb4390cfc5eaa0c20

    SHA256

    1da424b65bf85771646ccceb84489f77888fb7df9f5b8e38b2b9c7cc1656958c

    SHA512

    58e988ed201c1bb562df1fe5ce09977232ec59b05d5bc409c0aa5ccdb7ac63fa838a076c9eae42cfa777ee2f43f7ad34843fbd44ddfd8a26a1b763d4304e1c09

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    3cd831b174ad12d7621cec5a4ac39ed3

    SHA1

    49964a2f5a6aea1463495973a4e1e1514af9dcfb

    SHA256

    369a7190e258241468a803f19af61b5b9c499a49d463c164d81caa272b714c44

    SHA512

    321eac48f49ff4979109ec95b023deec3386aa80867ccd563e192d53280faaeb2f736e1c91dcd9e6d8b7957d0414b7f77c4132de2db716a26c493fa7f4ab78b3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    673d2d79da94d2042e0faa977c04337c

    SHA1

    83761f98549f603e3ed2044500632632d0952970

    SHA256

    a469457cff159da442d337b65a1db4da459d31759a1abda47fa57d32eb3c47a5

    SHA512

    13d501c76a7ac7806f3dee0766d994810d664762848cc107d0e0772ae106daa3d5e1a02b5ee112c67f96402de5ca2486eeddf0904ffcdf3c5e3822daf3024f41

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8763cbfcc612f5b2809349c8f3dd85d

    SHA1

    fed30c42557a8458f828a0c876c1e45459252c25

    SHA256

    a074c0632fa499ecdec621728ebbf4137f432af1c155f399042c09239be3b733

    SHA512

    943e6e3970a65b4999837aa69949b9bff5e60fea07db8f5c3ed6b7cce4e9c5319a565c22cd4e8ea0e9f217aadab9a5bf3fd30fc9004a93ac56e4761599525df4

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32e6f173a066ad394f7c15332d14a8ec

    SHA1

    b3b66d63dd9df2ba5ff53b0a21e9a7d336015468

    SHA256

    fbb43763a6cefb99893798e3111946a198a162577ff7d1e4561e4d6ffe086d4b

    SHA512

    eaf87648d0724b1dbf88653df80a00d793c38371ce2eb6db29e363e67ea9264a67a8f70e4376171185b7b17e6354eb5661a2eee5d728b7407efc968279280efc

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c4f98908c828dad3be36d10031fd6c4

    SHA1

    70604360548cf1d850168a53f0ce5a7cc374c7ac

    SHA256

    9e6c0dc34daa37eec64b100fc1c4899cf8cd3045e5d6a0d462b33380ef9951c7

    SHA512

    b739e0bcb947ab77323dde8776fc6d6e39abcab544b4603e24514b305b52e69d59032eb4a203dbdcebdf21a1adc3f127e4e3b82803a747db7f7cbe563089dfb0

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df419fb27a51bd61092e64ae12862af7

    SHA1

    b1a7b2206adfabae3e76b5c85bddf03f9316a6bd

    SHA256

    abfd02a8eb3c1d5ba75c583ddbe3982dd200a3fdee7e2477b0abde7c7c6ffff5

    SHA512

    8e024bfa424814aeafe431d952887d059a29d66ed05ba27954a911e1aede0aaefbf267fa67c772ef0be9d10bd19bb40a04ef0f38639af8b4f11a594972540911

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a9f3c4a61b2d6bbc6ef586a04ef6749

    SHA1

    2357fd6a2faf67922786270885516a3fc5796556

    SHA256

    935ed399ef16a1199e810b36ae1632db98e40f38b5e8e02047a706a0287a283d

    SHA512

    436c2765cd245410241241f8072293007b84fc60778053695f2bf2046538f9542cad27571d13fecf395ea8e729ccb8e22857831d7f15ae379a28e2dbdfb06eb3

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a0ec7edb91ab5e441ea97f8bd8f88fd

    SHA1

    9c3d79b146c1c926807ffc86647d92641d4b2d82

    SHA256

    9f4fff845f79298ea4ea8e5ccde1f0cc61bdbe1172049d1b67bf0ffafd46a81f

    SHA512

    f19c13faf86f1771a16dc4b4431dd5295ca7120f6bd758bd7d81a05182bab798f02c1872d8a11f061b6db070a0e40b4f2b43ce2a5e306a924892a244b50e23fa

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8081f52d74b67e25cbff666ea6202730

    SHA1

    b4781204907e917c75995da07fc579ab7772b974

    SHA256

    95b9c9d58fbe37f84ddee59b1f2cdba27a4374632d062543a299cc3c2459ce89

    SHA512

    0d06f56619ade3b6b77e6a0b75f250113889530e5231d5bfc6075fe1813306c0cce2ea6298fb279ffd39ea0dea4edcc44cf217ccfb9695a9e9052d4e302b10fd

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    83764a57a3fc96a32e0a328d3baafd8a

    SHA1

    0bdc3c7832c8456e1afd8ea75251cc594320e21f

    SHA256

    f451974974ae43151570ce491817279e1e0ce9cde9c5963870e2d1a785e4ab79

    SHA512

    7bda4fef81ef5d12d1c1331b87a5f914fa55a93fdb6e834b34f0174eb753627d06635a141d506f45b3ee0938cb26e8b256d554a2cd62c5e6bc436c5fdc6fda7b

  • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5bb1e6d82effafd09e8048d61c5f5003

    SHA1

    200ac9cd3d3f1a823bdd73dec5bf2b23b1fa7a02

    SHA256

    1918550d80b29372fb3142cf055839f4f440787c6e555afb21e3330e61b61249

    SHA512

    e582601a1f671a007e0863b2c40cb0651ca2714b4cc878fc3db9377526b82280fb2e92316264b7655a1e49fd2c6181ef4b99bd00a2e577b806f7b5a14a73ea0c

  • C:\Windows\System32\config\systemprofile\Favorites\desktop.ini

    Filesize

    174B

    MD5

    1971d71c62ea75c4f433476600caa4f9

    SHA1

    428e9b5498ba9746c123ebf3ffd86a14f73878f3

    SHA256

    3f7e7774532126e2c175de962ce9d620471f4ac75463457e1b93ab615abd4de4

    SHA512

    88667b670c3ffc78b442e0767ca0ea2c1409b8a2c5f18e69496831f7bfa7496e54843819fe725eda06de6deca9ba9dd769d4b5f3ade4126905ed3b1bb6f94422

  • C:\Windows\Temp\CabB434.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\TarB65D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1680-1-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB