Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2024 21:08

General

  • Target

    6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe

  • Size

    11KB

  • MD5

    6be9b7a11e15248d1dae8306c3f4c8f3

  • SHA1

    a9dd76e01ec5cacd0fb281de3daab4f8b5d597f7

  • SHA256

    cf42f97feae2129977efe81edc18a5b36e0dace94d043df687b68aba2b73c3b2

  • SHA512

    24524417fc651caa6be05498b88c5ccf21f3153eaf809bbe888cfe366c5e0bc75617dc5663c3b24ee87247cdcd093fd2c278391f784c70c8adc504325d617ab5

  • SSDEEP

    192:F5Zfq/Q05JMCENlnwtDdHh/EzpPLX4/prjQGFLNEfTRWoFqRJhvugebhziAVjB5m:Tpq/Q05JMrNlwtDdHKz14dQGF2f38RJv

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6be9b7a11e15248d1dae8306c3f4c8f3_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc6ff403a3e378261db6bcea3cb16a10

    SHA1

    ecce120ba2405b3efa2d31b79ce352b00dfbe432

    SHA256

    6a601cc32392657ee1eda95ebc096270342cf1f6919dbbea8d23916a78844091

    SHA512

    92b8c77f96381c04f3752e88215f9206bd7bfa86a2560c7d436b43e43735fb55c7829ce1f704a03fd04a114eb70aaac43f4fb73f40daa19615fa7d5f44878868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37de506e9c17a7ba1bb4a2f341a35140

    SHA1

    86f9edeca05543119fae4099c8c9b83e9eeae4ac

    SHA256

    ce5f2b54923cf1ea9a237460e95bdf794c4ab61499827d21f34675396a9b7411

    SHA512

    eec6c3b7860995beaf0797436db1a80804082651dd30361942047c38c1d975e26038de9ec361833bfee6a4bf818a8ae6f88246802f8a839fc38b2988dd1c5a80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    189abcbe906ad80a0e7a3784bb42283d

    SHA1

    e2a0dbb09eb1455fb7ad57ac74c739d991af497b

    SHA256

    54cb6c067a8bf0fa2214b20eb0c129a2bd2e8cfc76aad7bc691c03d845d190c5

    SHA512

    20e23f9844475b0dc491ff600761ebcaaefcbc40433e2535c0dcc9ffcbc26e286c5c3a068d54862dcdaa6a683e065f924fa4714ec51fbcc10b5c3704e555168b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe7b52e7dd6399972239b7add2c6ff4a

    SHA1

    ae39e41e1f29f9db06b8b92ed32caa36489450c7

    SHA256

    62e88a8f9d54af1e9d2494e12d41b11b5cfc67b148db1267023d4e07ee3d7d49

    SHA512

    39a702a5848efa4506cd33dd96c51c44478286fad8601602aa80620a7b4576bcd96297b790564b3a353d9cd99f4b786ec2fae6b28efebc706b46461651b3dfab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1712dc77bf7287720c1523f990fd0427

    SHA1

    bee7a22c6d0bf7d93a3481f16269fe0b22832e4a

    SHA256

    0423cd4a8fab339c4d9cd6f3ce99289e32faea7fc88d6abe972926a38ab23658

    SHA512

    843f8936d60fd060ef8e194085d095a263594d0957de90f54b01d68970b72a3656792a917171328226e9de60e2e23936c1f966f88d62062f295d0604845b73a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc6b21a6ada7da225189e8d749fb94e4

    SHA1

    e7b75db6ab0761bcb77b4169cbf0de76a98f4301

    SHA256

    aa6887174584fd60fd3c566dc32ffc215944ef2a883146cd785c4f8b1d0caa55

    SHA512

    497a57757c73394de4b05d1ce6e18f173b7ce77382a390c66078f6ba8f76507fd916cd71851f7026228d1d19da6227e22d29817aac9b29b128dc849192497642

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7792725b898f119f47962a38e6177af0

    SHA1

    54cc143d889e8c1ce6e3434b047c425bf4b30493

    SHA256

    0b5a7f56866781f2d009550b64f295fc037f525143b59066b235d0e504a9f650

    SHA512

    db3e636c1aad5746465b371492e0b94d0a0adaf51ea0174f6cccc1988bb69e86d4f19c07405818eae8c6ce249fea70ad5890ef1c38af48caccc8aa1df6192267

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    812945a2d37185eeed9e0ac25e2a8037

    SHA1

    eeaea41f002f6c750dc2496db948f293c841d45f

    SHA256

    4102b77dae285647e3c0bd36f3873a2fd291d508bf473d95c835a9c56607e3de

    SHA512

    2eb94236f72cbb13b9ba0148068705424f438d41a93470ee8e7c121c74796dcb773d94581043ebcf0a394ab0c6257078d360134b997132ecca73b200e23556cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65c0384d7606fd920270325f41738111

    SHA1

    13cd8e6c9ff38f5646b962e379340369d8eea1f5

    SHA256

    26c873413b5a45596688db5211be33bae17b355c739692f24ae1f544f3d0f65c

    SHA512

    bce6eb6a2f4ae3cf60e73b7428647bf46a4fce0d33ec84997b8326270187a98483ba09f39ec0ab5f9ac9d95b6f1396de7bdcec8d1eb5a49215d7115e865c6285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    050652f81080698d6d24ce225545d793

    SHA1

    f57dc21e8465e8c701d1737b3d71cbfd9716b2ca

    SHA256

    5ebf23a8ac9db10d8d3240c3404e0f50252c33bc570736480608e5f5e695615e

    SHA512

    12a7cf773a75ffcbb6f50fea034de811beeec53089d1297fec700ac98af6dc0d46ed2eade56b433677af471a548b4881af70455403f73858b6a29c219184acec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8e10f757c49ac43783120db3c074cfd

    SHA1

    ab843b3cf812c45b8a5c20e806287cc53c034ade

    SHA256

    e95d29e764a0fbba07d45bfd96a6b9b856f542bf303943b207a4520e86dbc6ff

    SHA512

    9025dddce519b727e068294765b3adfbe4099f1affdb4dcc8b748261a8ab6620c806cc47752badb7b9f02285cf22bea9284c367175e39b6424bb32adbeb74dd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bcdb3d8cb4362d2a7d964555e641dab

    SHA1

    bf007417e74b84214a5ab70502c538512269bd08

    SHA256

    c461d5fff97a1d27f9c42796684554d6aa1a4d97b772d7310f6d055155645450

    SHA512

    0702b9ce002b32bd1e057cb8f8d7e2a9736e55060c883bed87e80a47b69a6b7dffd189d39b8b01422a78cb0aa24bec6ad1418793cef390b2f3e2a6958ba42481

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4548f8d8b197485eb952f0a28b4b655f

    SHA1

    f74dff3cd578a882a940ce5837d848bab5e13758

    SHA256

    8e779ece2f6caf8bf5d448e6d3037fa654eaddeced20010a052b065400d23725

    SHA512

    4de7b45ee84131d7defb6da64a242b3f9f380527793c57e8ac85533fa1d9dd3b5603d68b3f991b62a801c2baab313641de47fe6265bbe054c80169736f4bc6b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e17e92d184fe8bc48fadaf07ae2cd6cb

    SHA1

    f51448046b7985ccf1d42802aabf92c391cd6dc6

    SHA256

    e86f289e4921c463d6098da9179b6a364b3db3df098c0a4aea946f556313eccc

    SHA512

    0fd0d6c3a1400dd06cec8572a16561613925f7505a87876f430ac670c2f2f580c6717d8590d44cdfff036a564c296880cb071612655b222dcb8e079bb51f4307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a051b3301bd89b01f2928b3267a72be

    SHA1

    71ff74e915193acbc327c6b79c1204f64b1a3454

    SHA256

    575edbec628072ad6b8a3377acb76edaa9a7edfb281d30b4e0170b107ffa9002

    SHA512

    74179c71123ed8c0fd4c76e03efd276ea98ed24c9e0aea31315a8f5518c906eb9e01c7ff13f539e9f24804bc94c960da5ba3af3f1812463cc112481fc865d02d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02b97d6909bb1f3ca7db48fab1526798

    SHA1

    99e37f05c4e02db9fa34aebad5c07c76820d9771

    SHA256

    891d8ba7442e9f752e927a6d8fdcb2af97d3d8ef63ab4bd5279bc5a9949e6f84

    SHA512

    a27760c82f2c211a32279db02facd965de4e756711b150a8cf349ede708ab2d7fbfa99d4e04b2217a59ae700a899bb9b479d6b4bf975fbd865dfd569535239ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93db73f8b637bc41bfab8c343b98c208

    SHA1

    d915b7689cddcb6fd7a7c13072411f6ec1d656e5

    SHA256

    4db0dac0a97c6bfe9398b2644e73a7bc8998228255c2a0d6b27586436bb19bef

    SHA512

    af5e9a3cfd3633b3751d6cb8842a3c6ab08774fff8df6f5b281f74013064faf9a440931b38275738c7e3b83a77aa3148b1a028affaa8ba803dbafda82c6422cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    901c4103b1fedefd0ab4b6b50735c1fb

    SHA1

    1cf70acb8c441098ab1a8264069091e898c8ae2e

    SHA256

    eb24b99c7b8604bc010f81d79a1720bbc34bccc6161dd1ede4a683bf02acd24f

    SHA512

    c0d836596ee4f4ea7535aa61991e331137cf96190b40ad7d7218206cbd935cdd1959b0af6464692b831ee046daed1702efb9ae81d1633dc39343aebf0f7898c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eae5d749a740984a993e2e896cdf4d7

    SHA1

    2b51ee69a5ea5de6729f0c128995671849545d0f

    SHA256

    10eaea109c27cee03eac3afeaa2ea13afaaddf320ead833d49e6a767b74e10d6

    SHA512

    7b499a86adb2b324c99a3e502fd3025a969e58f4b93447cf304d7841ff2f71fd210a41c655fdf2233da88ddc089f4ca84acd51829fa651abfeef8cf97a898813

  • C:\Users\Admin\AppData\Local\Temp\CabAE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar16E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2528-1-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB