Analysis

  • max time kernel
    120s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 20:47

General

  • Target

    41fcff694cc9bbb15613df9936ef4694_JaffaCakes118.exe

  • Size

    47KB

  • MD5

    41fcff694cc9bbb15613df9936ef4694

  • SHA1

    5360d4b22ae6d6f15aa008db2bb95261ed6c9492

  • SHA256

    6fe73da6b83cdae741cf3ff8d2f4e520a6f0449d1acaaa9e89be4f3753cb7abf

  • SHA512

    9db5caa20256d56fb9397101a45867c21bc36a7c27c99b372b154d5e750e833a8b60d65937955ab2a4a425db4df72999527181b098f8fdbf2134ec3cd95fb98e

  • SSDEEP

    768:x1cVhpQI2EQK0iPDh84nScF15GYbWjXO3XJ0V33rUKimChnyV7Pe4pcYd:fQpQ5EP0ijnRTXJ0VHrEmCpyVF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41fcff694cc9bbb15613df9936ef4694_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\41fcff694cc9bbb15613df9936ef4694_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://cpa.loadcode.meibu.com/down.asp?users=ok&°²×°Í³¼Æ
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://cpa.loadcode.meibu.com/down.asp?users=ok&°²×°Í³¼Æ
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2368
    • C:\Users\Admin\AppData\Local\Temp\uninst.exe
      "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
        "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d014fa21e7fdf67ee4b0eace37a5e3b1

    SHA1

    a604bc35cbbd83bc2f54038d90a3c0103d46e2ee

    SHA256

    1a0267eebe1b15e041f924aa56a46b2db57b85deac9501b495ce34028e7ba1aa

    SHA512

    32e43956c9890d6b8c4af27e9c2a6ac58aa1232c4f5ef9459f0077db900416fdd291620da0d3707bd8bd60d634ced5194d8634391044dafa5792abedd9684cb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd3c456f9d3af3f4511294a06ee24d6f

    SHA1

    57b69a987dc922bfae7d418c69f8abd3eb4ad471

    SHA256

    579727fa1ca49d5ece06627ce7a08764b7274435e7d33cededac1c2f6ee82d31

    SHA512

    021880d634f5066d7a6184d97e8c315a41f179d6c1e77ac67a0b1e421c09179f4b9ba3c081598b7ffd9b239b145527ad5f60f1f0b22702c2ce79c2263f259497

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2390e4fb9780effa8a307fcacb1f62f9

    SHA1

    51730769729c0061065866cf3f1e47599026f723

    SHA256

    f599fd322a0ffcf60dcde067a8ea1cee3717ccce87aad3fb5aa1c35f6ed968cb

    SHA512

    d743ca8f1a494447b42fbc7098de095d0cd4d149cba9a2b261918ac602be1f773223aab24cc7e8633ad52f988a414807d7464a55d1dfe1a20341ef448fc278bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b83f629a2a0d549b22b865b779b82ca9

    SHA1

    89301967096c7e6cebf366c9297a6def7f829baa

    SHA256

    9a7ca41fc401f8e7a05ae5f5e66d4c85049de8e3443c2a2d18d5eea6f0c9c188

    SHA512

    ada8558b7a8768ee3b59d7239673137f0d6b4ea3197aad7652ec9e38fb12d522a0eabb4e22feeb4db4cdab5c5650320ab1259c18348d0b9ca7a8339787d02bf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15baf8151cd5f060ca38088a89393a22

    SHA1

    e703fa1f3e25e2c6d836cb3d4769589bb98c40fc

    SHA256

    807a6d353413d50f79fceec062f0d7302a8f107244299465736a0094a1b3782e

    SHA512

    1ef5184368ba7b3793716a4c7de2bd8ffb3222768ff3bb62bb29caf032a9e7bddffb6a830923b6e5df8f1d2b0d101a839e3edcbd7bad7a06daff9a9449b1866b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    907236d8a718cd614189e84ffbf758a3

    SHA1

    d1f8d70523812d579222d32c5b15d23de6586621

    SHA256

    f88158347aceebb18021509490f593c87893ff409e362fa530535df29d2d97ae

    SHA512

    c585249711b7733b63e2ccf4d71dd37780c3c79875df8d2dba48483074d07f612680abefaac9a3baa1fac03aca2af5db07309b3fe651f17619f0777e69bd1b7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c31b07bb02773d11e8de384d6538ce6

    SHA1

    9969757b591d60431ebf5f44d719959a7e4f1a59

    SHA256

    3e2b15ac6cc036e6b49e0708b9cd7c6e63339dc1eae329e2817b94da18a59ab7

    SHA512

    bf2a3be8417977fa007441886c2f302a138ec5545e293169b5d1ffe02421e896944d6568794bd6bb309a7bdac5880a3696544c6c9cf2548950f2d86fd97ea345

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6920a244762b42645867cffb07a8062d

    SHA1

    2b5477352e6230b292da2d14c1e8fff4b366eebb

    SHA256

    58e64c9f998022481630cc8fbc099b40ad85dd7b31995e2d69d2b2f73bd8236b

    SHA512

    13213f1e5f79bda05ef43d273f029c2b5921ed7129032c56a8d6f697a8571b1ee9f894ae104b0403e62faaf010ceaa8bc1f6e5b446955ef64a21b4a679ed656d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    463dd3a4a9055da90ffb9de3aa47b923

    SHA1

    be871e4aed4defd7194c35d5a34165635e30dd1b

    SHA256

    b29b27a8d1c844f1b5827e976ff96cc082cebb0f609b136a7f31eea8346c9db8

    SHA512

    a2e74cb81d26b65e3e3c5bf6767d6a1b59fa4041febaf7524599c4ab671f0cfb97db048c396c4c72ab49d03f57345892aa68fe77924b23facdbb439f4193672a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7c59bf16213c0ea68d00e470d502941

    SHA1

    c8417c4be1d591c67180de0c174b1b6ff3b3963c

    SHA256

    fb1799c8ae754253384c6297130a1c8e440a9a13a79d4cf0bb4e017a6605f8de

    SHA512

    99f94d6d7000e203b7264471abd55f2caa03f8e4c290cd926c881765516c9155e2e50ed3cae22e141990832925e75895aa9e6722d63a6073fd7704fa49093687

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a5c80cb3a389774ae0ff52b16ed2144

    SHA1

    353efac248cb3c0dff36f335520b8b6590e81635

    SHA256

    96a11a888814374854bd49daa3cb0f1211dba88b242c9108125057d456f98a9b

    SHA512

    e865cb068ac16ef0c9bcbd0c0c9b9f6887ca50ec3850b8365b8b89e6561d4a7390012c39ebf7885c92192ac79cd631afa230563a6cc042ae45c872ff01c73c6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20dbb602c6da10c3760c439360eebe66

    SHA1

    11ab7fe6eaf6b67abb6b084fda2d0fbcf7f60430

    SHA256

    faf9ab436adeaf00c92a10487555e071ca231b0104b21fb8a1aab9ab5443bb45

    SHA512

    6be506743668ca6acfa4361ec156db6df97c0089e2b6e96a8271cd5ef25619a115e450a233ee7e7641ed23ed4842eb91f6a86d2668f908d1400438be24a3f8ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f549a4ee8e80e94c74ce7a397fcabf75

    SHA1

    2e0fba5bbc7b2fae54dac117a25289e1fbf42d0f

    SHA256

    ec017f37f9fec7fae513b607aff07e61169b2de62687b9fadba1205b40821426

    SHA512

    bdf509df14030333d81548e8d16be8a34781f700dfd612a0d44046c7a43f36ad9a2d9e152d40c697c0619531593547f16ed38704a6ec77c448397d7de7088b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25f691e502c71e5f6e143f4fe804c1b9

    SHA1

    93bef763596b1cd975cbbed6174f59885ac8dd06

    SHA256

    fb86f69361c39892065387e70c26663e013d9bfc8a14486176cd4ddabb03d711

    SHA512

    89e7c8502f2d3bfaa8620eee5f2b4eaccc2bbee078a59a187fd746f324896ac8a4c996caba99cd3bbd5065ab9961bab7439c8b2d1142428d98d45f004c98f1c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7164ada43d5814afbd08f8dafbf7807

    SHA1

    ab16d526448fb55341f0f47f05d675d7a6d800f1

    SHA256

    5ee975ce02cb0012ee0ab24a2d28bbc698c18d12e15a6b08ff19bf7430b7c200

    SHA512

    fd837832bb7a6d4b7a2e69eeed115e4558aff5923e3f20073cd74e4b7081e44ef5974f5099781b42feaa74e3a039ad27336dbdde0bbdb21c5bbe3f70278cc7f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4234f6f0b3a6785378fcda1496adec5

    SHA1

    5bfaa3d1d595bf9a3b757000df25520c35ab5222

    SHA256

    0f69b21c714d6fe7aed461be2b7b4b537debab2509f5c7dbe6570cb071d3061d

    SHA512

    d3e998c096388edf35d9432a79af9a8b1a71d136f884229102af1e41f6ef57d8329ccef0204f5a370fc7940d04ebd719b9b3300ef003d752b1aabcefd3935eaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baa3c729983664cd94b5b22720ba7410

    SHA1

    f2e6118c45957b2f35365d1193665e3eabd829cb

    SHA256

    76caf1f02ff678e424a1ba6108e1c2f17f367401cc388e321d2598d442770185

    SHA512

    9bf13e5e3a189f7ca5466636fbc32164a6f74a1c48a7a15772ecf3d0680c39cf3e715c177dfd160d00058b8239197022cb841334c26e1e67b752f67dd8b09a1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fed8eabf4a4ad4bcdd51e080913b892

    SHA1

    9cc677302123a9a66bfee9087d66365e0ba929e6

    SHA256

    cfaf5ea54ca943c8e54792705c32c76c9d115c4cc3472131e751230fdd7a8a2d

    SHA512

    dd0513cbfa04b45f757622fc722173b99349cccb7514138a6f844d001cc64a8db7d10b852d1311f7ad6d7e320014b6621e9b5235869b1c2b958920c213f2ec08

  • C:\Users\Admin\AppData\Local\Temp\Cab70C0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar718E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\temp.ini

    Filesize

    102B

    MD5

    547edaa55569d603da9b9f4b67fdb74e

    SHA1

    3c5c161afaa85cc5e68225eea88abb15a1928932

    SHA256

    89b5979ad0a627785563de6915ec8ca9f0be957f99264f27a37361bb32c1d64d

    SHA512

    edeef7af8f3d3091280ccf96d970f08a7d1c61e5efbd548c0b8d68930082093ab26bfba8eb4a8e377ebf300a89c530d389d90b9271ae625713c23b5ee1c422aa

  • \Users\Admin\AppData\Local\Temp\nsz9427.tmp\InetLoad.dll

    Filesize

    18KB

    MD5

    994669c5737b25c26642c94180e92fa2

    SHA1

    d8a1836914a446b0e06881ce1be8631554adafde

    SHA256

    bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

    SHA512

    d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

  • \Users\Admin\AppData\Local\Temp\nsz9427.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\uninst.exe

    Filesize

    32KB

    MD5

    11cc266b171797fee29484a788869fe5

    SHA1

    cdf477b7e5806489770171facf5cfb1f398edc71

    SHA256

    f58ea93b8ae34346580e011388efdc4e0175d5104455a4d963ff4359e53b81ec

    SHA512

    cebcb323108eca0ff28ecae978b5eae1654d42a8ec30f824a18cb151200d32e2d9b7dbc6a1977e30f0994c669567865501a5312aa34f1a26f11a19d0eb995ac4