Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 09:13

General

  • Target

    JaffaCakes118_e2a38e6c1ee6945731f37fe8b7ea3caa.exe

  • Size

    2.0MB

  • MD5

    e2a38e6c1ee6945731f37fe8b7ea3caa

  • SHA1

    7e4de077a0c752c23aba3f6cb60364bd7ba7fcb4

  • SHA256

    4f6067cb92cc122f1dfbc5ee187643437b5fc30a866498f13113bc351d3f2408

  • SHA512

    84df99857865b50c53cb26792fe46e34b5fe98b4c3f87fb25b662a62ecfa5f179b2035cee707f0890011d3cefea719b14a17395c90f5caca22687bd9635b3816

  • SSDEEP

    49152:JrTiuX1rT6tCnEVpd4zywTyAgPLZUr/qbqOpvSH:JrTic3EVpdZOybqOpvi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2a38e6c1ee6945731f37fe8b7ea3caa.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2a38e6c1ee6945731f37fe8b7ea3caa.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.456xz.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53379996a4920c1bb9f52934fb427099

    SHA1

    a2609829df03ca12e68ef318714709b93b36f288

    SHA256

    8e9bb4954076dca94b3481f99295978897c016fbcd3dbd9626e930de01bec5bb

    SHA512

    8dc5ffd3cb430d46dfad08baad4730839022d642194c89c2d4807d3b33675c73765469b3bf1f97014c56004b96f289c22bb57b607e7b1d23e468efd91958c219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8932a43f655509fe85395ed20590971

    SHA1

    9c2c56fa64a8fac8e89ee3018bd3b3f96f73ca4a

    SHA256

    a0a231d6d37ca14b691420eb50ad62c41c53b609e24ecc2017110fc0a8953769

    SHA512

    761f9646826a17962e371d8f338808d6878709ed7e64584d59a9f0c119e803089bdef1b6016f1d8ae51c05cf24ea7e071b5b6efb8e2cc5b732d14c8e34ef5856

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4054e2433514a693e4ee0fb65267ae76

    SHA1

    a9a92d66a2f9d77012fab0ee3bc3ffe8d91fdf49

    SHA256

    8189b4945f6e660442765ccb84e9e9f29bd5da893570f0e14cda12d8c31eeedb

    SHA512

    d3f8d426a734c910d8c46b88235c9e350002ec430bdd97493a78dcb777aeeda78edd224bcfc35ed4b7d2ceefaf9c50fa6e9c9bc95bd720f0cf84b7fb001bfb56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c38c7bd2ed63acbbc24936d20fc7035

    SHA1

    801fc7763755cab040683ac7ef428528086acadc

    SHA256

    8fdbff5dcef2942a49c54da5e0a7c6c6926029c2fd820840590e4d2a2e6810b7

    SHA512

    53f3070a63aab66a6f70fc21f0b5fa5d66c8dc12eeb0956e3ce513e3f0a20e838b21987f593d131931ad8bac4664da3563c8e9e8523d9d1dede1f9cfb9eee542

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b10c2c40f0d1f5fc71ab5ad94e5030a

    SHA1

    39dd8ab0b80d66c55cbb06a9c4c11eb4502f7ca4

    SHA256

    a9c9c5686e2e6fc847502add64e3a8401dd7f0032a7719ef7a0f07163c21ecd0

    SHA512

    c49a0a2511a70301a4fe67e3c5a1a2bd275f20093e142b93c831cc263f16eb0377b6bef9d97190e05a5db02fe1f3ef04ce0219fc44e031852569877152aac982

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e9e2aa6f42ae2d6eea7771eccc8df76

    SHA1

    4bf7eac6185fff65d185955902f38e5292182ba2

    SHA256

    24b2c5d5f32f9cf3bc75cb77bffe7ee8e809badf9e37f60c40f76c70d74bb6b2

    SHA512

    ffe7e9d0f228da4286f3cc88de78615d438389e6b84934ecabd4d80e226de9fed9a0c5efed2e417b5be044694b10fba995b998849d49fb82c19f80a1c1cadff2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57bbacc767023a6c9b0be2a788212e79

    SHA1

    70083aeca108969b97a10684a9039f7324f5e7cc

    SHA256

    f2edbc9ece48828abacb87f8c8ff2c321b21a9ce0c20f8748931964211411f16

    SHA512

    4072d52ccf8956bb3201ee09519007e86c24d4533b9698dbbfafe78251a4deba7f72003d85cba3b27d4dd1ed62512e2cececf6efb098e17eb33e6ed20cf66ad7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a6e57a71014f98bdd297f4c1c589d38

    SHA1

    ebbd22ad8e2dc69bb51f13f2dda712d0f6e27a1f

    SHA256

    12ea41be04c65b8db9aef56cd25d706d8ad38fdcdd081bf292b2bed566e78f0c

    SHA512

    c416760f135a3fd01e8ed8d6c68ed230816dd685c38c8189cf8867851589510f9af88a3c8fbc369f0ca43879c0967a27a177eeecef5418c58a764080d57bec70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b97f9d54839a1be4180e76a5bbb794d

    SHA1

    c973e0f7ee1b0cd0e2935807c4c9b126d8c1e204

    SHA256

    d32c3cda891c57d2fc44fbb44eaa1579ad4658180b72631fd7680d6e2d8de9fc

    SHA512

    c9b1139130ab4ff0ed7ced909b988cf5df9bcf0a9dc5a8d19abc1da386054fa2b8cd80e4ba2955f4cf60aafc497f84af9f9604be73c96b827ae6f8d44897973e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca6929953ce0a71840b287305f6d90d0

    SHA1

    8ed08d4836c55a5086e52069bfb5c6d1f17e7b03

    SHA256

    c4eb1d9b4920a7551228203964d2ed2ce372d94d8590fc3a5e628bb8c84abf66

    SHA512

    656dfe92ffc1942616917de491c8277e9e4a5fd87f16ddcbcdbb51dd0d38da2921c182993f338cfef7979942e317907431dfab2ceca4812c72ad99891dc38d4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fa0e24f99473c054b8ca57089e145ea

    SHA1

    cad8b56fa5370a471c42fcabf86f43a6b750931a

    SHA256

    58c97a41af62fea186146d01b520249535743f6e266efa34104e947b6da9c325

    SHA512

    caf9c57b683219bb53ab29f55d32efd3d647aa05aa02048fc6b5cc2a8de8f299a83c3ac881a24975b40ab1a3b42ec0e0f14f0b1576dace2594386a6eee8bad50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffdbd43ad90aabb3572999d7e537b330

    SHA1

    6f1c85c68415240fbd6eb8708cb06819bc029949

    SHA256

    3db700b96eab74bae4a1ab387bf36d5db3cce6b5a4954dc313ced24e2a22cdd4

    SHA512

    e217f8e90e4b2d2614e5e9e1531ea0c833903fba58a2a41cd4d6ed203592b26579c4d453ac7a5ed49a31d65427ef7b734d95a7faee01b9dc2972e0b38927f1d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ec85209787c15f1cbc674a0697adc68

    SHA1

    29602aa94d1add0117ce65c2d87cd72814c7dc40

    SHA256

    2576b6e526272caeb2d5bf21a4eb9337a114964b08ae91a3f518b26a3155904e

    SHA512

    a1827bd4dfcd49e0952ced9e5cebde8ab25b8dafee18c320f2aabd1e0324659572cf3944f4bfd3c93e969b24a7715a92473fe21302bb07bff8ea986d3e3e6878

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35599d4950e5a9c652b4b6b29e488689

    SHA1

    35c699e3f08f5f907b63b8a4c2b7741c33eba2c2

    SHA256

    1ce35430a20a54e6664f56c364903a90fa22677d7bcb259d06f23c20f5469959

    SHA512

    4c049e09c683d9c17216077c415c710d51ac9a09b737fce83f12f0e4242a1569dadca4f3ed9b29c6ef44801419c121061c00c58641a5f3d4560c383f72934651

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e228934224e074c9559e98616309e218

    SHA1

    53987fe8b7ceee344f0f1858ea989882d1099fad

    SHA256

    43046243355ca4953e799c0351f2d549365d29e459fae54979d0a9b55406f66c

    SHA512

    45dba50fd1551c7f656dc5aa0415607e5a549934c1fb076e62b2505c7aed682c1fabb16eb1035f78f22c6e1c61e7516c829f911764a03ea441da0912ae55c31b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da52ff7ebf5ee4d0499d4b5739230b2c

    SHA1

    f7f8f50080d955c26a4128691000f17d15501f86

    SHA256

    114f1f5216e7ed53c9bfbab40b10964e045ef14ac2e4d61f8bd811e52392c178

    SHA512

    1da93984a92da75a47183570b907835b35a3263e2232d1f805525c9bec35e4cf4f88c49cf240acd15d47f2de2c222b3d2966151bab47e8926cc20d27ea384868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d25645b407592e7e1f91d6a074bea0e

    SHA1

    e204d71cb46f353888c31749f76b4258d0b08db1

    SHA256

    fca073ce1b6478f73c457a62198c495e21008ac429019070d1247612c179e5e7

    SHA512

    e178a8aa1ab276dd233d8288711f944d1b02534fa99861cc77205b516e2720249ddc670d19a731d5ebd24905ed58cfb17b6bcbdbebf21335281c861159119681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8a889477169347ca51bb55d006cc5ff

    SHA1

    4c0821f3b19ece5a9473dee12d39e8d65b741949

    SHA256

    3a1dfe22492c12418a8c66c26dc4563be0e47da1847f3c977807678c79a58e86

    SHA512

    3576a436e01f1fc6d920311a2b0fb541b128bb85a1485c0a31f2c9b193dedeacdbcb16ef34f0b5526fa284a67e8ca900317cbb1c959f59754e0c80aa5d293da8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d42a562ae94e1b5bc1434b66b226ca38

    SHA1

    0016369e87050ce3f82bca23e2ab3a8a41aaf59c

    SHA256

    c9e132ce33a7e0e864ffd7933ad3c7303e32d31cc5ba335a72a5d702470c5e7e

    SHA512

    e15cadbc054967a625dfdce28a9ebd3066b24dc55d5ad16594767115bedd8d522e7c3a53bd5ca1dc3f52a3d9603b00a64ef64e03c4b04fa6e1df5d0263ad6f0f

  • C:\Users\Admin\AppData\Local\Temp\Cab210A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar21F8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1576-0-0x0000000000400000-0x0000000000621000-memory.dmp

    Filesize

    2.1MB

  • memory/1576-20-0x0000000000400000-0x0000000000621000-memory.dmp

    Filesize

    2.1MB