Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 01:27

General

  • Target

    9f0ac14623924c65b5c3cf70040a1110_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    9f0ac14623924c65b5c3cf70040a1110

  • SHA1

    6bc62092d5f2779a3803c0a62326398eff052fc9

  • SHA256

    a64a4f5384668fb7bd5de7f5224f09e3a75b4c6f7ef3f2320666e1e59af54f60

  • SHA512

    ca5930f68737971bbc485f1dd98513ccf3d62e9cc319c212b1386494f62a5f5a75b19e771369bd8583555a9295e04eb36371db6a5e7c7d8d195925f0c4af1ecc

  • SSDEEP

    24576:+zSqSkX9nbpWDA5QM9VGrRa0BVDLs4yKhzx6BOTUvbqDof:YSjkX5NlXwaaVDLF/oBOTUvbC

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f0ac14623924c65b5c3cf70040a1110_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9f0ac14623924c65b5c3cf70040a1110_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://thundercheats.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3a83e2d16d2a3650c87b7356ed53441

    SHA1

    498ff5429c093b927ce0d6e284b2bef246860db2

    SHA256

    ce5cb8b6c84eb17939cab6da585dd487afd6330716c4fd7f8a537f31a930f850

    SHA512

    44bc7a465140aa9bf14cf5cb209fe7c133231e4aff7340f9b13f41e9241f424033caa61b71b0772082f4683210372d8514ae56781d06c33840bc109fc95a16d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ee924d0caf249c4da19a9f450eacfbc

    SHA1

    059cd8b617dae41c4d953aa66ac0c77efdbb9707

    SHA256

    21f1a023daa25008effb3ac96785438298552041ba0a2fdc353afb0ae73d6910

    SHA512

    df3a34b6cd8a77a139abd590572f307faa89c1b9da0bab454bd800720f1babe676f040291ef81bf8a13eb3bb36c8dcd5e1c9a28e6aa14bc51f3614a566daff7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e29bacd2da47ae3e3593881b068ac218

    SHA1

    b296a27b4fa3ae048f0327ad600cae67e4e02052

    SHA256

    2a1780a2b6a0f56f7dcd9af99ce47a6e399d9ad63542116734d96e49fa27eaea

    SHA512

    e3789dc817a1b595390122079064acbf41890f88594ff6423bdef70fce1bec9c68eacfb449c684e842110bbfa93f575e70e3c6320d989f80c08b919307c6bd3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    627d618f12fb8b720b6501e5c9771d4e

    SHA1

    145295e6380bf251bef7c569dd61f975d2bcdee9

    SHA256

    618cfa347f158c7174e084aa86bca397ab91cb0682564c8277230d900722e1c9

    SHA512

    194c872bf9f1b0c45aa266f4e6dbe23de2965f74ac54aa5fab10c4fbb47e60e379de13d3b7965f725bacc370dcc1e2a9671af1f374a838f5c08b231a0584930d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    184f95f7b563ccd8165e19308a87baf8

    SHA1

    f824d094bb3e40bf925d5e93949d3cccf9e47d51

    SHA256

    2ab5b1027b245dd8657b3471c254e89cbc37ae0931e4d7b52e63c035d8f43385

    SHA512

    b760292e21c236eddc6fe5541c68e8cf7e437c5ec0c6f8650e8510446180d87cf73d03f08590c6fd057dcea3a0027763ebe44a10ee339481cf2ce14f7331771c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2feae0eda74e6f5a1363f9e7b4ae8a5

    SHA1

    6c022d5b4354db6128e73e09757caccd9fb1bbe3

    SHA256

    dd5ab028d147c33965ebd9b3206c4957826234730e4c17f2b7faa063cb5b5654

    SHA512

    673774c42761004cc11f9b7d3c429c8815b294d44768ce0c804582acc558e6880df10ee4086356cf65072b6bfa730df0082f4afaa10323870242f323ccd2e3ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b9f961c1742b2fbaed3b03accda48986

    SHA1

    53624f2a339e506d4e621784b3853421dddc8754

    SHA256

    75575381a9ef262245b9c7b7a51b3a51310568358b54ee1280a08cf86c85e77a

    SHA512

    87d07bf8dca84bde4520d280c3c9e9b294aedc2fa9da939559b618e0339838d465932f727e6924210cc1181e5f8e9fcedacbbd44cdcb2d9610425a4106bb0ead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9922129c3d9e78d56ccf1667c42abac1

    SHA1

    aa63c5e449cecac14fb9f69a221eee1b4a41959f

    SHA256

    245d9aeb9b46addfc2de87dbc8203ca9fc4bcf76cfa520a0ae2c32cb68224fbc

    SHA512

    95db2b36dd1eb0130d7b1c9f5572e30e678ae17a480624e1369a15221917a2a06f8b1e8c75e1c55755520b70d4922270e95a7403990d21a1784246874a5ef430

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2beac5ddbff207e826d802977db5771

    SHA1

    7d50ae9e4d3a3f999a2ba4fddd2a31276e369c7c

    SHA256

    652ac7eaf9c52f2623d0c283ffc975d0d1ca09ab8a1d347051c788f2a957747a

    SHA512

    65f772e033821b1aac089b848ad2598789ac6f619e8252e97650ed730aff7b41004e97d2e4bcd260103f458a5686a16acaa718bc6150aefb087dcce5420cfb16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbcaf7f4d1623fc4cb0ad108200f023d

    SHA1

    79e3534ae87494dcbaf510f1194102790d3e2df6

    SHA256

    a18337db20db72dfa1216571f521546c11e5307759db5ea2e1390db401d3ff3b

    SHA512

    9db24ea4363d05f37dad56df67fc3a5ace37956eaef308578708c20328f826f57ce1e90816b75a73459d5563e9972cda039b6d8581b602bfb5335929cbf357b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcdc65be16ef338706047daa1374c74c

    SHA1

    348bb39a0017dc8fddef18fe21e3f2dcbe915cf7

    SHA256

    31a9b02ca063e31bd009c8e1bcac9c5b00a8f85614eef8870dd8316723a8cc93

    SHA512

    3c40a0ac04a6b21a8207bb4d32d5c581733820763e236a70c01d5186a620e547ca757da75edb735c34abda7a6c30e9fe237bc90902e50b14ee4914163f056931

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f0a0045a1a356eee108980238f014ca

    SHA1

    4ebb93600b8ca3a0000d9d44a00b8d4207a05f09

    SHA256

    6aeda61ca94829dae538520db00c2544daf427990e971d19ef8ec422b6b31927

    SHA512

    248d80e96bdf1a2dbec7cb814da996f86f45ddb1cffd789dfcca6b4cb6e3c24ecfd2a04db4a69f90fa7ddcd62132ba8d8ae571cff3152319bf8e209d9d1920a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d322b01e81302979bf7f5018df6c366

    SHA1

    3e25c66249fd3cbe4d75c85988f49801ffb0fe7e

    SHA256

    f4157866f75d2db1a3145b6b72dd0fb32221bf7d43276c3096640f4e36fe3c8f

    SHA512

    fe9a510d6a502577e9223e60f16b0ef1a6d485c53b69ec9455836abc59e8e83d89de3dca28f6d011b87f27df7258a24651cc892bb731057d95a9efd5f638bf17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ccdc956c431419d15055a7154437833

    SHA1

    dc0a669f37a473cf9906968e065ed901ebeeae8b

    SHA256

    18d1d776e6cb49bd78aad850295bf6bce0885a1bd45e0e9c68a1960040f1a7c9

    SHA512

    50c623f6e9d9fbad369034882caa8a47f198fd95f91668f00c9b24f84f09e9621e059d370cc03ab64f57ecc08bbdfd507097aa2d3b1c93f3e509218bd05b6de7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4f233459c8a708a010b72f459d4ed32

    SHA1

    87070665a61e09f6bd0b8bdf460fc28be6365af2

    SHA256

    30546431318a61c204f79f4c50ba64721061c5d81ac04ea6972209df14ad96b7

    SHA512

    4f067f79690f5c3d99abd837fb50da9a785e108a9190fb63745598a907f51d6de33cf3833ab1b3fa6123cf9cd2504f1438222c662285f834ce8e16a1a6564636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee39d5990fff1ea74d94f117f9bd499d

    SHA1

    c8823ddef6e6678adf1ae03d43d5e2bb6231147a

    SHA256

    83ad56d4c3a9427ddb5ad445ba9ee751637b13d4318798bbd53013b361f9149d

    SHA512

    226a4ce32bb66a786eec26f5a2db4db50a4480c6aac8ff02fc39229f262a6a146bdc4c320c8057d71872097bd5a93752f1a67a253cf6e4ded3f50f0b481e833e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d80f172774d6faa8cc891937ae1697e2

    SHA1

    622706f2dad8f52047ac777e386160c6015a7859

    SHA256

    6ab11fd637dba8da3084fa8e064cee3621ccda67f90751489465a28283a64c13

    SHA512

    21b5058357cda605284b9199a7ff199a5bd7416503f60103173b01f30fd19fb3fcaa7b676877c343302ca18edeab605f0fc0d65ad017f538283e49058fe0a4c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa7bdae4a81d882a2c2b0e356b791aca

    SHA1

    4f556b0324c9ad0e62a546f399817db0a4e2f8ad

    SHA256

    bf16dd8b43d0cfe8cc0aeb42b4acf742b257dac37d33ef2d1451fc5e91fc8e42

    SHA512

    166b82f6024615c975269453be5de7704b981f9db744741dbbd37b5eb878e611690d9b3c6f8fc73aa872f9622f4cee8378e40c1887f8a31fd9ec587b28b30ffc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    366d3794be6af5fb6b92ad698730adef

    SHA1

    c1f548dbadf7233f39ab7a48c3e8d3fcf75616c1

    SHA256

    a227db332e95105d8fa713a8f1f02b85c64cf007b37f4871387c45fd9ec361aa

    SHA512

    5c521cc7c1f1a68097de5cfc3a32e1fd8fc2b0f31adee00abdd5ae4933683410438ef12541e5facf02bdbe62599fbb1091967d26b350ba674563187ca0b32b79

  • C:\Users\Admin\AppData\Local\Temp\Cab9A40.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9AFE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2096-236-0x0000000000400000-0x0000000000534000-memory.dmp

    Filesize

    1.2MB

  • memory/2096-436-0x0000000000400000-0x0000000000534000-memory.dmp

    Filesize

    1.2MB

  • memory/2096-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2096-237-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB