Analysis

  • max time kernel
    122s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:08

General

  • Target

    JaffaCakes118_e28812021fab2760786202cb91188efa.exe

  • Size

    493KB

  • MD5

    e28812021fab2760786202cb91188efa

  • SHA1

    9ea7e01f28720b4ce6dec9b98b8d24860ef2559f

  • SHA256

    29b654289763e4a83c671530fb43e460d4e059d481db194458ec24a3995f8b96

  • SHA512

    f531311aa7e294c1051983f21854b328e984c70c581d6a83872b2af5b458127d64195e3538af1427a58801f86d4c3a232886da7a1d1da9150740673471bf6e43

  • SSDEEP

    6144:ue34R2Z5qNzh36dqXEV2rnCUZG/t7FTBqTzP7n7O7L6K2Bfo7ps:A2Lszh36VV2GC0ZTsnz7O7L6ju7ps

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28812021fab2760786202cb91188efa.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28812021fab2760786202cb91188efa.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://premium.software112.com/62230-mcafee-removal-tool-mcprexe.exe?t=1737364091
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5420169cc9b177d73e93f9343351ff3

    SHA1

    fe86d69bb444fe94f3709df90f553f853b7cd23a

    SHA256

    2ae7d19b89ba58096f596e0b5d77a70fefd56276bfb8bcc028c255f45b1a970a

    SHA512

    c87629cb9bfcd219cd2249059a3188c0921d78e82aeab17ddb42dbae3ae5a90a7bf3ec68da68124e45ac674c2fafcbcc3f085d4d2173a6427694ac058a21e52d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d02293c99d4881af00f2bf3945d8027

    SHA1

    dab363842fe32e135ccf333d7237b2f1c43e4ced

    SHA256

    5f88cc496629941a1b07d5ea22da125ddd62cd208693b6ff0138a9073880c6a3

    SHA512

    0078375b2ca1a72e1856c8a3468505f36ab635065402d15c22d94e97e53ced9e50adbfa09385c01c1b8b1d21462cf1fb65260b9b6c3aa499f28784980410d1f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a224b700580e5ea40cd1933a35e560bd

    SHA1

    5fe5d0715c6549fd7bfd7ff5d094d334faaa72ed

    SHA256

    f32b97ea51f0d170d7a5c06b8ed342580fe7a23b315dfd13c0a3928ed8bd8e09

    SHA512

    90111579705eb350be58aa5b2f4d501c23032710ea3d6428cb8261fbb1c2367a5fd5645b8f9b4118c9efea99f03c053b6f5d8934df332be6166bdfc674615f88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    593820d8695ec077946a5cc98c692f55

    SHA1

    772ea39a9e7b70e9cef8dc128b852a1bc73952fa

    SHA256

    7690577f80861bd777ee4ca31c90547c861a7ca036fef28fdd58ec05188eff7b

    SHA512

    bd3dda744a324b42a261ff87e651e9bb49dce9c94f17261bfa9758fe7a7740a6c2faec4e8ece9a065d13e1b3276363a5cb3d1e0759ccdace81987060d20e5e36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1109d0c0e57d8c6714d5ded0c5bb70f5

    SHA1

    d72e3ec668cf46302b18a9673dba62ea142049ea

    SHA256

    a24ae28f08ac858eaeefa305176b0b904eed2c107042c4d1a79b8e8e3a23162a

    SHA512

    18031cd13591f052c45679933f6a1d409d7edd19ec3725bde74fda583f962d580324b29eefc2fcc2332cddd464f9befe6dbfc788d787c886ee4bdbb43404d8c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af7f711a10dc8a5191489eac41bf0741

    SHA1

    5ad2327498e633f6a481b4b011256213c9105f59

    SHA256

    48f22434eac9a7830fac56a8af395a5348bf9280a588dcf6b00cd4ba31f50275

    SHA512

    12e753fe667b13ab07f2c8130ebd494c70160f6814fb73511e3f288be71b5a6bb670b69cd8d74670207a12e6750e719c4964c1b7f9bf5619e3aebabb1fa856fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3cb8c62b8a8ac8aaffd5d3029517c87

    SHA1

    745761d5aa2306f1ab742de4e792543a2039b181

    SHA256

    e95599cb32fa4da87d56bb33544f39171237552229fcf895feb0d3aed41a5e69

    SHA512

    9de69d0659a2269ad30d72afa8be13d7896039e4a1e58c735522f8629391c53beef79c7f26aa16308bd779a5874b977cf7e7c8157616c46991f246694acd0e2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ba07d0ad03e825a2e44da067a478468

    SHA1

    36cb39b516fa1bfbaea14810ba57dc47197a60c0

    SHA256

    fc68f8e5db7a1cad3767fa571387b561a0a56a2bba6e6ab5cb297ad2f5ba2510

    SHA512

    8202ca7bffac7659f1834144dd0997c1ecf1341eb05dbe3c245c046179cefab80aaf6cc1d41aebfb49b6c9004720ac2e89ef4cf0d454ae1bc8dfe03aadb51b2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8760f1f755c57b7338f5e437537da22e

    SHA1

    5d16b14f48a69a0ceec5beba4b9ce0945e97102e

    SHA256

    e68f94da4756c2dc71214623bcb789a8ca109e2db226cae81592042e5f6b3769

    SHA512

    c84f81ecd048ff24817daabd6b9c3cb063ed06f25e7fc2c7d726903df62ca332397ead48eb558d890643ad96fd57838f0980070ae7b5073090b7f43a5103d9e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2e127ca9de20e5a894b1466fd165220

    SHA1

    64e5c239261bd436294f7de3c9a0c5f448340b53

    SHA256

    8318da16eccf0c4f44c8a09261ec82d7f5a6db29049611f30f84ffe682faff3a

    SHA512

    fd5220aff65127e7297ebe628cf50a26d5d0798a30d8ca155051cfc77742ec05adb39de961ade1c2f70a9d8fc91023e22c0ad7f9dbe1510485fa472260590555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2872a1c4ee8eb7e701610d33abfa487

    SHA1

    0a8885696eae5a54e2074e88b2846707acacc4e1

    SHA256

    2484dcfc4428c5da2c18f890cb837e0db73d8d9e3186f620b8e44f06b3372485

    SHA512

    11b341560ff929630f46a8fca6e1df4c74769f06cb2639496e2a6a6767454220b7a45aaefbc271cf01b462c054347f925e218c6a25064fecf983fe0647bd766a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b0cc532d3fc245729ae53bf46ebbe7c

    SHA1

    0fd0d65de4edf5d2a65c36e4226007b3fa502fe3

    SHA256

    8a66d737d0935f9d9301848072cc2ca836b81bf93e6ea4e5f989e774bb110145

    SHA512

    5a9c670d571b250b2f4072f0b838a988cf99244b251a819fd3bc3d8abd1f8550c99a04e999bc416b132700e3dbafec701d84dead5ad1c1cca04955df6ceb0676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b328d56d38f12ac6c9e8b52186837412

    SHA1

    0de625fc1ea7685550c575bd37a85d1a8cc91d8b

    SHA256

    10dac74aca005cbbabbba46719643da650868bc6ae0e30e484ead0c651bb729c

    SHA512

    bf7fa9ca667ea6f588fa1c9e32ff3374ca15684453e2841a0b8136f2630405e25135d0e17b0258ce6c6e72ed901d69da1140269c9498749bbeec8b0978113003

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e24cbaa164b53ecdec7492a6fdd2f64e

    SHA1

    5406eae60d298bbbc4cca44d1f40778cabceaf0e

    SHA256

    fee3117dfb94cd70a21e3fca5f1aa48e24424d6689c435999c2022570c485089

    SHA512

    d9d54b38f56eab65381a54dcfbea15a65f4ac532cca3b500a00b608d9fc1c7cd25afb9c1bd041169958ca55bebcb018259711e72ba538954184b954240c1779e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3cc1c394b70f4c8b3bb59de3666894a8

    SHA1

    60df95a099a74576b6fc98d661755f58b27a0735

    SHA256

    339129a493acdfbcd35814386dd46c8c381c003089de75c52384e4d2e1bf8475

    SHA512

    14d06bb54719224382d83cedb2ab00195908d89b23ed42a6497a27d1a1a845cfc44f38b65a0e0a6db01bb282287f4c7c723c59ef68b13c664144a40d10f3826c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82986ff728323348c0f8f78eca7d93b7

    SHA1

    b6b91a5a109499d6830da49c6b4fa1503dbde94f

    SHA256

    963e8167d7d9eee8a51ace95ba8101f900edee27dbf736f12e396b584def1d48

    SHA512

    64895bf00d16411118dceaee75b0082b1b69d85475cebce143a38b6606a20455f70b044c3fef6ff22220c7ee50f3ab6e93b6bef5f21bb1e09585e89b8447dcd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7c977ceb9b5e8fdfbcf570e6e8c2551

    SHA1

    381eaca224217383131ba8ff5d11544a65184b89

    SHA256

    58748809e3116a92227333fa21c13ee5084a33aa643f53bf4c615cd21954b3e7

    SHA512

    9ebb7335776f928440f6db690e0666f4112b2e11ada8a051c74c2de8bbe4f4048f22d290088ee73025f13c337037d8dfc5a2cd39786c3e571eff556f15aac891

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    594253cdbe3207608e5e1e8130c98282

    SHA1

    e262510bbdeb933eef9c8713c9bf7d2a87525886

    SHA256

    3eef5afa0133f93d66cdfbed52faa1000eb2cacb373b4aafe984e97a020b8350

    SHA512

    01cf52ddd49c3df00af0016ac951745d8b1386be96c8e0d55b9cf76fc5282c42a4e1f0329638b2c19b51185a14bcb96d3a911d586a2c2e20b7b6f58474674f8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8a80da718f7b3f144ce59494073731d

    SHA1

    7e6fe5dbe0218cf6c6d4ed236f52e9f9fe49dad5

    SHA256

    81eb85d5d642bfaa385fb6b61c4de874f9c9e0fa752be4fab8b105e54a37a563

    SHA512

    cf7c9fa1eb5b95daff442cd154001e3dc0ddeba194efd5a2bf3e61c8a6c8ba9f7713adc2131d7e8fcff353813cbd8f73e75e66ca05613b5c84d45f67f9cc7855

  • C:\Users\Admin\AppData\Local\Temp\Cab1E4B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1EFC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    73da2815a78408a8e1ee0bd2a981face

    SHA1

    e0691f56f9d331408e96e422a5cfa4f68cb98e92

    SHA256

    4c48a5b46a3f660450977d0e5c4ad213438af2fcdd5b6b83f1437e283ef506d1

    SHA512

    27580b17954b08e1aa9c7d7a857c19881e0d5a787aa1a2b2d1cc85005ccc3374d34629ea035d33fd1a668987086aadcd4a581f94a17921fe4c2db71e0e760b72

  • C:\Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\show_page_toolbar

    Filesize

    818B

    MD5

    a0eeea13efcc67a83d9fb958a1841288

    SHA1

    b82ec3e603a080284b8064cf113e5f7a63002b5e

    SHA256

    262aeaac624684d8a5bb05ff54e4fd539e4792894063e2246248b6eb1c998b2e

    SHA512

    a74ee91dd8a73c39591981465131ec9ffdb62f255bf2291392925bb1e5c8d56ed8d1fe8f5fd6145006cf459cce9fcad4cff874bba42cfd97cdf11b8b3d8b5b9f

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • \Users\Admin\AppData\Local\Temp\nsjE1D8.tmp\linker.dll

    Filesize

    7KB

    MD5

    122754bdae09014ed8be78a8dd3618c0

    SHA1

    8a1d4a0b8202d2261a12d97aebfe33144c274444

    SHA256

    67552ebf58e98e841dcd9f4213ad3eb134d595f04839771618f0bb1c48ea2b92

    SHA512

    7b9b5f8b52db793b4833a75bd8f122f28f2df00d43bd35efc831c2b8457009d51fe39874c691389c2fdc87ed411919b59da50199e3f719bd4cfb166367f185d9