Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 10:13

General

  • Target

    3f445befe3d85e7e22388ec20fcef20b_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    3f445befe3d85e7e22388ec20fcef20b

  • SHA1

    2361e1e5576e0e05698f1a08a5b288becc5324b0

  • SHA256

    d26981ed85b48d9492428fb6df11cb5a737b9fda52007699032f7778d15a7a5f

  • SHA512

    414ab17777ed926f7b6a7d031e2eeec33e6f9c23f35c4ba8e9dea7de473b315d7ab1cc72e1a7e1c2cfbc7d097da0225d7a4f040b872f3f8368458c961451cfb6

  • SSDEEP

    6144:mM/in98C/WvBJIzvGO8QC2Vu8nVG2CPRgLXM+1mq7kycl8dk3LNr6XoRDae8N5Yn:3C98CQnmGl2l+gL8+13gyc6EZou+AsI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f445befe3d85e7e22388ec20fcef20b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3f445befe3d85e7e22388ec20fcef20b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe
      C:\Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe -t:"C:\Users\Admin\AppData\Local\Temp\Low\O2GNVV7A.exe" -d:"C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe" -i:"C:\Users\Admin\AppData\Local\Temp\Low\U5F1BN6H.tmp"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1956
    • C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe
      "C:\Program Files (x86)\SelectRebates\SelectRebatesDownload.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2764
    • C:\Program Files (x86)\internet explorer\iexplore.exe
      "C:\Program Files (x86)\internet explorer\iexplore.exe" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%00%01%01%00cIh8TWZadr7iiDTOi6Utcg07tcavA3WcY3TV323eREHrpox731DkC6GTN1xrnL_jQ0Jwu0PDV0dEgdOxhhaEdp_xj61f6W-P6bbaBonQD8GOBu8oZwQeYlly1WbVydWFwXY-pXoHVPQ4Nguu2A3IRDiilTVrvMEuW6R1sJaOhhXbAxu7GMsc9ClAiyz3dRgH_NYc9lHQBYlKYkbQgsmvHWUqv-6qj0vNo235HUnf8M3NaKYS9b_Kt5zn3MBFLpTYJ0xjWSJbFUzjxiqILjiSVBqF9HypC24Uj-gTXUklO9OcklmT9QC1XCZkib41rjySIetuz7DcTxAdjhmKzZK0iG"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%00%01%01%00cIh8TWZadr7iiDTOi6Utcg07tcavA3WcY3TV323eREHrpox731DkC6GTN1xrnL_jQ0Jwu0PDV0dEgdOxhhaEdp_xj61f6W-P6bbaBonQD8GOBu8oZwQeYlly1WbVydWFwXY-pXoHVPQ4Nguu2A3IRDiilTVrvMEuW6R1sJaOhhXbAxu7GMsc9ClAiyz3dRgH_NYc9lHQBYlKYkbQgsmvHWUqv-6qj0vNo235HUnf8M3NaKYS9b_Kt5zn3MBFLpTYJ0xjWSJbFUzjxiqILjiSVBqF9HypC24Uj-gTXUklO9OcklmT9QC1XCZkib41rjySIetuz7DcTxAdjhmKzZK0iG"
        3⤵
          PID:764
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -noframemerging http://www.shopathome.com/ToolbarPostInstall.aspx?oldsessionid=95044c84-733a-4b2d-ad48-d54c11f2f142&A=ErrorPI&owner=nonbundle&ErrorInfo=&ErrorLevel=-12&GUID={39B31869-10E7-4A42-96CE-858BE9CA9AE2}&ae=no&source=78571&setupguid={73ad194b-6e05-4f54-88d1-183653e6f4ad}&setupcid=37490957&cid=37490957&refer=0000&disabler=-1&tbstatus=3
        2⤵
        • Network Service Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          3⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      14bfae069a6df95465a0f8def11c82a7

      SHA1

      ae222f008798ac357f001cff04a00b9d0d047f12

      SHA256

      ef4579a8882e4011eed0c525c834581240675120cc4b4aab26b775d804830f8f

      SHA512

      5f3d9f24e3e5a87c9856625cf25beb1d1efa523114b94ad418d155fec993709cf9a5f3739e817fcb2bf5b39a5f04ac9b3893eea37736907cbd41140c58531881

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f39534ed584887cd984b2f8b8330cc1b

      SHA1

      51a6806b9c8e80e514c93d2bd21cdff38198256e

      SHA256

      e219d976fb5ec48ce22ae9ae28e365b09dc7e065b86fd84302e5d69dd20d33fe

      SHA512

      5418feadaddddeae6b3a71e7f2f7e4cac5a0d3b69377c20c2b08c74bfa0a15fd9686f7f0a6ee18046de5d20e9013d854e43552e070fd059f6748a5973e8dc978

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c4eb923046eb6476c22c39dbe1f689b5

      SHA1

      159a683ccddcf440e247a39d255b3511b543c30d

      SHA256

      23247e46fca86ba77372313d109b5a059c4e8dbd4b4b1b0d435c8d9e58f03aff

      SHA512

      12c41dfe61ff459b1538eba36e33e8099aedab1397ec35645b43389bbf33207c98873179dce17d120d27065a24b65d64b28c76e0a7f9bf0186918c4e50ee05fb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef835ac11f91fb90f794ba9b3350061e

      SHA1

      122cdb29d22f14de4b06c9938b753521586b04ea

      SHA256

      c150f2ffcd5ab3c429591eb746c282d590251d71d27581cb7b3358d19b05f5e7

      SHA512

      8edd94d7bd7b3476d460c67f4dcfe5382dbacd019cf49d708b0824900189bfba1efad9e5d4dbbfe4a40bbd6d6ba845c25c15bd267b150a3445825ca23feed721

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f9fa5286dd4e48fe587e0e79d6ffbdf7

      SHA1

      16cf5bca7816779bef5fbbc48e694bc5dcc2950c

      SHA256

      108762586c3ea65e90a91d175705290f4e6fb2e6f139788cf06df87e6a63277d

      SHA512

      83ffde4809de9f576a8c9dc1cb1a35605e461441cf48de2c9ca67c15012fec245cbca42009d5e34e96c7aabae2ff5693afc48c83015f8669e3739754284dd193

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e21535cfb0cea7d725db69597e3ab99c

      SHA1

      2a67f6497924c80e14f97364dfeb6f2eb3c0a8e5

      SHA256

      a6382b29a841da043b6fa0051b6bbbb96bffb23da9f4be34e1c8a9e4ebd0b443

      SHA512

      b88ef432cc93f4e185c89aa760b55544439264d48ba284db7aac0cc5a08a4981f2441c31faca1aa489f432ed972d0afaad5b2e22f4dca8e3c1df0670a3cbc5ef

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f5aebd5db054126da15e6c7f57c62d83

      SHA1

      59cc6efcad25eec967d44765dd61147218e4ac69

      SHA256

      44d6ccca28625ca8adc4cff8bdd68c41d94699b355f50e135a13d15ca4af214e

      SHA512

      6eaa6b4313ca862f1256219d813434376000e759e0ccf0d0781bbd18db3ee3f7ff8b06490446ab23273893eb6f85df6b7218df1e924e88928deccdbb55ed1dc1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d8bf2c949df6fee21428c5af9c537f4c

      SHA1

      63bc2d6450cb26307e228f62bce3edf3b90cf6d3

      SHA256

      6d4e6394c88a669fd025b413ef00cc9776161c7d72d919066e4b1987476674fa

      SHA512

      5e8c2054213617f08a9603cd77bdf649011c7147ea4288cfb6e52b1bee17abcd527690d65e879047322790519a1acb3465cca75b2ace067b040bc76ef75c8cdf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e0dc5f905233e1adc2b4eaf0e3c6f103

      SHA1

      0cedbba86e1c7ae4ce9a19a02f6f612aab163fd2

      SHA256

      beb0987aeb6e6d557ba2cb3182b7536c3f5337ef23c46f63fe22efc12425814c

      SHA512

      253c0f1b5822847f17b3d285344c07deca8003bad7ae864e7466f0c856e9b07ded4fccc1087398fafb7718b5f14cf0d9da1756d8be53c0094f899db47ba258c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      982124528eb21e1c00e27aaa891114fa

      SHA1

      8e546301ec6cd54710fb7e703a4815ab86415e1e

      SHA256

      0b2a7d7154285c8cbc58402b1a2ea8181ca0796a08f9a97d65940d798543e17d

      SHA512

      95ff331d3b91981d60384295b5e4f89d53eefcd5c2072e8fef08675ddea580bbb6c517534a5823c961b451b70e8ed57a1b2a391cbd547824afd4e6d8945230c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a41ee484617480ccf246638b94c214dc

      SHA1

      093961f936a59f02ce0d15e756ae71a8146989ba

      SHA256

      4922b89052f72bda57ca4cd91712778fe451c0c9b18b46388143f19c035a69db

      SHA512

      575cf3445b001fcfa39ba6b9cdd8ffdf7ff4b4d8afa7c37f75caa7e1f0bbe894aae1a9af9babac220c974a398150d2ac98e2bdb666737f9e02a7695f7a21a8be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ce76777e292f0949cbd9f1cbd677cdfb

      SHA1

      78dd05c0c5f469cf219fd91d556a5e980f0e2cfa

      SHA256

      94c95bb4235db6ef69cadb3f32ebe780ec5dd63b26eb1b48363471314d40705a

      SHA512

      3b751fc89e5b3e8d9fd6e06424247cfeade81a0b75ec9b438c3fba4eca68b5d228f0df1d38ac340573d0c67470b3b8e3b10803626d5505825aea01b2a9bc74c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f9f66f85f0e480e4203c5e558ff28dd2

      SHA1

      ce489ea36045257843b464e76bb58f2ecdbb31bb

      SHA256

      edda34c8e37d55b519d53d65db15f540e2fe39bfaf1f829188a365110c60582e

      SHA512

      273e51f658c795fabf44236bb7767099b652f009932d177e84b1c887c363c1a209ea4534314f6b7283a3245dfbbb90934617aa90e67b51eef1681363cc73290e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1e34c8542855ab4da60f91cac15cb27e

      SHA1

      87730a8ed5c9d4000609043465c3607147996dc9

      SHA256

      90839bece3e6a6177e621a3eb230122873eedfe4cda04d9a693e9bf84fc450af

      SHA512

      257b920f3ff0d377b0bbb51fe1e03ec4e2e7c340f3e0fa082bece04d7f0a266847652a97d1db9ef88112e49f04bbf915992a76bc3c35ee4b456d24e47330e933

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2289cd4bf18251f7d46597ca24a7e99e

      SHA1

      b136a2521ff45c4ba5c2cbe525f12081bf04be1c

      SHA256

      c07da27c4c112f8de3dbf249c0b7ac529aa98430692e0f84167a50abead63800

      SHA512

      8d9895314a441b9eb1c5a37eddd8dacce4b3f92e1219ea5620ffb498ef83babe192a1a14229fea2ca0d89da4daec0e203dd6f50c606b701ffe67e53e68a266f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      beddc3a6cade739897b3f611c1ae2392

      SHA1

      f21cd82603c6a568a4bfbc25300a51d810e6d388

      SHA256

      ab6c700327005b5b21214fb87c6c0bba3cc08492d14684b9d52e821ce31dc0e7

      SHA512

      d27675b85887ff1df262b73e3fb6bc163e3315cfe7fb47875cdb893aa5879195b12507f09f217dbfb0685bd87e534712f22db3c8b59e23e59fbdd775e00ca1d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5e8fa10ca6a5ba464d07da4ccf206936

      SHA1

      c682f0c0f30202b15f5c52248274c854a7395f49

      SHA256

      1cd56b215f0b2c1ce5db075f37fe30d83daea38259255a447699a107d1668c6f

      SHA512

      bb5a449c0247f2584e85f160ddd6a50b762c144673cc8827e0cb1dc33b9df6a66ff079395e9ce8e3d775a5db5c438291acfad070e92f707f0d1e832acf4d7db7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      af36758d087a7c99c6a23b9b1e2d07f0

      SHA1

      48ddfa7c2e614c973b3e4480e2cf6ff8e0ec3093

      SHA256

      b622512bb800e7281d6a9b29d364b4b944bfb7a9eb66fee1f8f0ee69250e2930

      SHA512

      8c991469e785b39c9c0f427deef4a805f0e4676c81644a304abfb64c8e232ccc7cec6719976653255827311de0493ba8ae390331e6fa02272c201d5791b86662

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9c93a50cd5b1e758981713ee14a538db

      SHA1

      9d3f953df6920accb2fa04b1457f376c047750dd

      SHA256

      dd236fcba18ad1cc515351e13afd29f5afb9291ea8c037ec1ee922fd9c4fb4e5

      SHA512

      f4eff4fb685f84ceab46675ed5a705e1862f8861556b1e3f04cd5d26f34f829c2a143f1cd657854c6c55cb7216e01d04a63ef27523f20dbace2769135084ceea

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      42cd72d02b74b44447afbf7de721ea6b

      SHA1

      92289ef155fc7d7ac9ef2130a6c75c385995d185

      SHA256

      95dc5387f0147011f702ea88838d0ed7a11d210d7377a4e780e80a0eedb85faa

      SHA512

      646f2b26df153c36cdb058d42c2e0a011f03f4e2eb3e332fdd13caa1894624ee98baa5c6d6c7fcade1b294d1f394ef3986a75128a138e552d7b369046d1f6e4f

    • C:\Users\Admin\AppData\Local\Temp\Cab77D2.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Low\O2GNVV7A.exe

      Filesize

      169KB

      MD5

      589c85ad4b3fd73456f32eb9d58e2f9c

      SHA1

      95ce6284d38c8948ce30c4abf9b4b6ff60c9efe6

      SHA256

      dfe385206e3ba737636463b22501b801b88169af789424e8a33c3cf07a8b2235

      SHA512

      eefa14b37c7ecdfe95f9951a09d0c876a2c1bfd8b029869f8928bae2266ebb0a90e64e10e0781ec71638042eb5e88806a252e55176578e96de44ab5c17f25782

    • C:\Users\Admin\AppData\Local\Temp\Low\U5F1BN6H.tmp

      Filesize

      56B

      MD5

      d32cede39e8b41ffb8f4a30b6006f5f0

      SHA1

      e4ce679afab2abf9e586f5fc938685354b592eb1

      SHA256

      eb8e6cab79e6781b58f83a3fff33b520195eab2b2eeb748eec69e14e5a83c64b

      SHA512

      e2d1c360e077d2b1dbe100869b347967c132036210994ebfcccc7cfda6b894344df89622dbd8ea6e6fab7746f836817425c3920dffe67dabcd70ca05ff50ccd1

    • C:\Users\Admin\AppData\Local\Temp\Low\U5F1BN6H.tmp

      Filesize

      73B

      MD5

      1c1c50eb4f1f6b881054f3fadcebefdb

      SHA1

      19dfa7ddd3ba46f7ff55e08ee76e3b49030ac5eb

      SHA256

      020eb4c5f6b8d78b3739b7c3265d5d437e9353f19d0e727f31aa3edf88674c54

      SHA512

      87bb21b9cef8acd34cacef64931af222cc6afa3d2eeeef29628d131c90556d9a06df6c5b524a1a4c8d106c9004b5c553d8007578888b24e82097ab22b4297920

    • C:\Users\Admin\AppData\Local\Temp\Tar7861.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\ShopAtHome_Toolbar_Installer.exe

      Filesize

      185KB

      MD5

      6f859cb344a13169bfa611274ca70bd7

      SHA1

      f9109b10ceb1f248b59828a465098f96897bfe4b

      SHA256

      ac4f3c6d4484706c3a9f30739c4ad0165ee5ac17ea2ec5fbd59690ce758d60da

      SHA512

      3a8b0e62bf4c2ff15137119416ca90b4ffd0487991c88ee343fd9c5040b685ec6000b4c8c5a940c790a1a3927cfb3d4635876775b2086faadfb416dfa89ca5e7