Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 08:58

General

  • Target

    JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.exe

  • Size

    1.0MB

  • MD5

    e250588bb9c3d9ec7cd589d1415aaa73

  • SHA1

    677022f630dc7eba1588b423d97206028729e5cf

  • SHA256

    4ff1bac601b3a78118f7e29ecddee31b85039963de9aaac48aec54f984fc161c

  • SHA512

    0ad698ad3aadbd3e72cc2f830bbb761358e1ed4a16f0cd764f9340caabcfd41e6a51dff4edf3fca689757d5c277386710c40e9cb2d2dfbc706ec7787f36df45b

  • SSDEEP

    24576:L20NIw+U6YfSUfC+mAmx2me6v8WYkg4XA+ueYogY7rmvZf5/I:L2MayXC22v8Ug4XA+udECvTI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\is-1K7JU.tmp\JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-1K7JU.tmp\JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.tmp" /SL5="$4010C,853475,54272,C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.feeplay.com/cbonline/instv.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2328
      • C:\Program Files (x86)\Free Online TV\Free Online TV.exe
        "C:\Program Files (x86)\Free Online TV\Free Online TV.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Free Online TV\data\fullpage_600x500_1.jpg

    Filesize

    59KB

    MD5

    433ae5b0607cb0ad0ed0b5de289b0311

    SHA1

    411d83aeb8d20133e54f34af3476a3db5aaf6779

    SHA256

    6d1ff027f3c621b7ced01fdbf97761339e83dbca4f06c2f2598f5ba05b0c553c

    SHA512

    121293adad015e7ed329c172a4ea177155b2572efc6c34fcb38ea98bb81c9b04a79166305e1087dbe2f34b8cd62020e2e7d1713ae6e64a310bc001282f3e7676

  • C:\Program Files (x86)\Free Online TV\data\fullpage_600x500_2.jpg

    Filesize

    77KB

    MD5

    c667ea12bed967e410ba6b2eefc53766

    SHA1

    b60d2594cd2606c2fa6061f19569f2d54ecc871d

    SHA256

    ec61efc82030f31845d318affcc4ef535c4af08f88b9647a6a0dffbd5c111d9f

    SHA512

    44ef2d13259894cee1dc86f5308e02e70c4dfd626b30880c2c93a9a97dc5c77c3a836aae554d48a3d6d85ba94c55bf8aeb41a1388eb4751952a25c27325dce79

  • C:\Program Files (x86)\Free Online TV\data\fullpage_600x500_3.jpg

    Filesize

    117KB

    MD5

    a5a2ac948d8c9be91c1cffa01a4a6ae8

    SHA1

    c94807b1764d92ae91e57a531ea520f8e454ffe9

    SHA256

    85866dc6081782789ac36b0fe8d52c59ef858e505313d41cfe3e5cce67e2aa70

    SHA512

    fc53251f363527e2f0405235ada0b9843bb5655b913227b78d12d81348b2fac06832b9084952c0b961fb9d82076c74353d2f8114fc2295802bd10db0ba69fd3f

  • C:\Program Files (x86)\Free Online TV\data\index.htm

    Filesize

    2KB

    MD5

    8c2d628830924dc0bd11a446c0432b14

    SHA1

    d1573a0c115f6cbe906256f8dd3e79cdd06caacb

    SHA256

    00ec7ce03978bb82a6b888f6e001e9af0bbb7d5cd86a3e0bbbb39bf5208df125

    SHA512

    b93187c7a358d1dd9314c035fbf2c786d7f1f7c15f27cd0497180baeae5d79e478374d49c88e28c4ac2f6d351012cddd39b91775af5b3982a02ff8ec7d2558a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3715b53e9303eac54177fe1910b0d350

    SHA1

    7dd5f0f95bcc7b1d3e85ab85daa314ea48432719

    SHA256

    691a3ae631e9c893f8de89509685c3ccdfdc24fb32486220729b202b8fd5f2ec

    SHA512

    635a19baa18cb3559a6ef00893a28887a11b2d3744d302a984583d65c4d1842e69eba1d06357ff78b9b110a9786b0b666a8c0c3a29df1cefe74f906452985ba8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bf1ecb85cff4b74452278f3d7749aa6

    SHA1

    c4fc6076bb31c0db031350464023a53bde2228e2

    SHA256

    941957cacce69fd59c6e0e1f9e5b1bad52128de6b4222ae4d44fbade8e6fea38

    SHA512

    c17718d423a5079bbea566504d1abc2fd05e1efbb5e6dd864d706c61f8b380ab0c201e87395e958f37da9eee329eda17051220dc0cda0fe8fdbab0cad96ddaba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    469f5fe3e47e9f8898b14608c7e6e2c5

    SHA1

    4333f8f59a3bf0bf961e6710caa193a499b30f89

    SHA256

    b7f8dacbfbfadce2dc80d8c621e7c2f0054fd7a7ec80f3d0eb808a0edbc5ee5f

    SHA512

    9a82f9873fe1319fa58c2284eb02918dbb6a97f7612c78d97beff027d57c4db73ca5a93f0ca69d2b80d6e7f1d01b0894c222474c02cbc58a0e1ac4ec3aa3b62a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7fcf7206aa6865497b63a95b295ca33

    SHA1

    6d1f0974a04514bcfe22f7e0ccf62a0d98594913

    SHA256

    2845366fd13eec66e313891627bb03fc77bea4c0cd5c58bc07a2f7949f47b36f

    SHA512

    6a56a9beaf0392442b0f2527d47e9b3e60efd51283176a333d40cc18df510973fe09637791d2bde0b3c56d5605f0742924b7808b3f01ae4cb38dfd832d8d46b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    053ef263504a13c0aaea09104bd7f26a

    SHA1

    90e914cd7f859731fddd0723307d35df98121452

    SHA256

    f60b10c66f9d792ed710e306399205e3f7cf13820988d23af9406c3337be6a38

    SHA512

    41dba7b2d085adbe9b8737e98e93a6f908cf0b2d4e3017ea6f1e07081f99eafa973a3de687a6ba8ecbe2f6a9e05af707526f2b6ce71603e5d259bfdf5989724d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c9601ebedeea791fe6974a3ed5fee6c

    SHA1

    e4cb38b0fdb210b1a2c7444a8ac18e070709fca2

    SHA256

    776eb175670aa04d79f9e9941ef089fc92a96c2cfd1e4a23bd5c8ac650e077d7

    SHA512

    e159eb9b3826139165441b9085a453044b891ab29be4d0f964bf604d2817559ec9331c5361b8a3fa7f069e8443ca47d0359086dcb3088e7281e6997c72f82ca7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b51b0b29e969af7e80e7e1e18142e334

    SHA1

    c33e67eb0202ef099c36ffebdbd3a7bc454466f5

    SHA256

    8ea2a2fa9beb8f4e2dd15e9b6138d112b64f8ca6374d829c04742c24e6feb296

    SHA512

    16d87949eb04ea4658923e10d04df3377c5f715929b4d5ff625718f1e72315e196d41dd86fde73ab7283dc8db3619cdc4043593714b7f1c67041e83d9b25ec2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37e0ba5c29e662edda8b631195ecae81

    SHA1

    0eea664f4b3ae5ad6489414fbed1d4c1d48ed801

    SHA256

    8e5e9c7e40b60f7eae5223231e485cc721cb1e66be51049389f62f92ed10adab

    SHA512

    f1016e85e9f6845bd5b14dcbf6805baac70aeebba1cb6333f4786754e84abb871a3455232a77079cdbd4280efedacc18b31d92f9b62871de0a2cef602b39349e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1292c8102ecc7dc5678e16599e8a8276

    SHA1

    a07606f16f521fd000b8b7bd37d42207db1fa72a

    SHA256

    3f44c90e405bcbffb3f480626b16b0266358064e73712190cf95ce7650e9066e

    SHA512

    b6ef7a2347ae016a62827f4c96ec2238f464630a5a3a02bd86d8d0292b101969c6f3713cbc1eee71ef96a1e7f332518595dae958da8a62d13b1e7944ac3f7767

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe686e7d8e9fe26f8e60a0faf0302e52

    SHA1

    b534a40398f0eef0b0e37734b3297f85c471d8be

    SHA256

    a42eb6c4a8798ba00ed0536ea7c79a2556ad295095cbda03fcc8a7c4107a0778

    SHA512

    225a6f38d2204c9693bb66129a633ea808abd7564e0b42f850572e8d6e0c8c5587ebb7146bf2b5fb46258d397bad93d94ab48abc745480c9435ab2e33ee7722d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    380232879e08e49624eb832dd78f7633

    SHA1

    7fddac968499ab86a868f6e2033870cb6dfac011

    SHA256

    9dece40e917f98cf20840968864737a6e8de115db39970f2b2bafa588ff999d0

    SHA512

    132d545465ba40e21eaec83ebf20f50e9a7eb76a064d9b12b2d7404fb5d496411278e217d24922c4fca7fbe39fa9e8527fa7599563a576ce918eea21ba59db57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4233f87ff5dc6bbb4af39e08ef9a4711

    SHA1

    0c3bd563bc566a93232aa53cab8d895587b89576

    SHA256

    cc76bb441fac56fee821f69848418ec0f9285da4d21f73d4a5ba4287e8ee3a4a

    SHA512

    7aba8f175198dfa4a9ee8bf032cd6ab5d37c45c005478535f13a7cac49a40aa00228c929827f0790c44870e7df86a0c0a3315ae8016b5662a2484af8653b1180

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    928c95226061d57c447ef5df30444da0

    SHA1

    c950816d6899d52384fee0e854a7c94ce2601759

    SHA256

    487a34d11db468525147405e8e0bd8e1b9ca1b641d58a11e169031872beaaeba

    SHA512

    0a653af25fc3c3db26957124fff5bd85444afa6634d62bea0772f0caa05ba413730ca05eb2b51a229a1617daa69ccb5b1b11e6f35189a0a368320859a9126cfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a50f12b6f2f2c224558f1e3f01f74395

    SHA1

    8984872f0efeca4f3e23a06e5c5a51e2c4c66eb6

    SHA256

    7497d8e090f59b9a115bc3cace279e4919bb8f130c9e8e336fb4220298fd98fb

    SHA512

    fad95fe6d075d4249e5c955f4c41684369670bb1dd426b62f8de4a2d62b0991351909cdda1b2e7b29e6bee6ffd4b54dc5ede2a5f162308a30a58f597753d8a80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5b17dde5f86e8417a14532f49b29b30

    SHA1

    2500bd0225caef37892a74768f01b69f8bfd58a4

    SHA256

    7235714ee7b15d4e04e576b40ff0349ec1328b53162a66d42494001690cafbb8

    SHA512

    902133003b751ae1d9912be284440c80194e39db2c3f434769481da24186dd5d1a3e873cd9da5b374840bd5dfcc6a8a07644a04d8de1104357d0abdd323f1711

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4aa768d79863daf6e92f43cdad67e245

    SHA1

    34e0ee58c69b38444414d94f9d2e4dd2b527bf91

    SHA256

    6a43a582619bc683940ac93ad9e403d81a50bcadc411615ce427ba9ddd2e360e

    SHA512

    0bffbd2c8fd035d4dfecfb5a5627b30178b694e080bd7ee4bd97abd9bb5b4dd68e5c8ba4553355d2a20f327fad41cb6e6c1aaf13a6f015d8a7e21632bfbca675

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60dcbefb9bffacad88dfed2475d05265

    SHA1

    5cc6523e2c7c9d7169dc6d3abd2e01d3ae1ec2a4

    SHA256

    13842e80773570120454d4ab63357404c2311bf6e85089fa34775370446667a0

    SHA512

    994262d3e1a0e02a33d6c5fec7b6ac38d47a8e7f9a9f28bc9df946ed06c57dcf50ec9351efd2ac9fd6f33aec7fedcb3741edb392dd84b7afd4a076d6f54a0e85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9625415c3919e7f65640dba221905445

    SHA1

    ea7d5a3c743a6bd3294ad9792912831ba59749dd

    SHA256

    8a6092c38f7fbd2f0fbca97751665b679cdcbb9b6758cab2134267202e5e2e4f

    SHA512

    7c938510430d78dae687a5ece02da976306c6b7e611df0a86d0aab8de66451ef8dc857100f64dbd58071e12d592e5bd1b63ec59b0e6340bef8d5aec893636552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84c3562ee9e3f1d23926b51a3a0595b

    SHA1

    d0cdf2bc561f4c46cac5045b01431c8830c37827

    SHA256

    109152e8d0b04c220b50438deaacb35fa9148c6330699d2b1438a6ba1c4b8206

    SHA512

    aa78870f9f7369f89bc34b1feed1ce22ed3dc6a3187c8c33e4253cde0f5af3724f00e3e41051709c77f27a102eed02c83cfcada07bece5e9e9288f6e1b770e7a

  • C:\Users\Admin\AppData\Local\Temp\Cab6AE6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6B57.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Program Files (x86)\Free Online TV\Free Online TV.exe

    Filesize

    591KB

    MD5

    2b013f731ebd6f938ab1c2e35393c172

    SHA1

    02f55b939cb4cefbfc82e9fe206d0f99dcefff25

    SHA256

    3f1019ea4b7feff2134b6c8dddb1640936f374de3f6829056377416e318b91cb

    SHA512

    0083df21e69c546b8d6aa33103bc4f046f40abe9b29a7204a4975b6c49b8423331fd2111a45bdff31f75c3d6ec0a9460feb062b896547503ac361b9d19aa35d0

  • \Users\Admin\AppData\Local\Temp\is-1K7JU.tmp\JaffaCakes118_e250588bb9c3d9ec7cd589d1415aaa73.tmp

    Filesize

    680KB

    MD5

    e60a74a65005e4c4f61cbe9c09d368df

    SHA1

    1d649b2ab5e08632d64e23f5f9e5675b68e184b4

    SHA256

    78f6692d50d07bd78a97294d196f9ae7d1fc48b058375e5d7bb766970faab758

    SHA512

    a73b84739f4da0827976cf473e63ba3dc7649ab2d37be13c8fb786487d0dc7ef5b2bd446d8c745d75266447357bde4f32f58f1f1c92b156f06f141fea2873856

  • \Users\Admin\AppData\Local\Temp\is-A22E2.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1624-72-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1624-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1624-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1624-3-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2368-517-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/2876-71-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2876-59-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2876-20-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2876-18-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2876-9-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB