Analysis

  • max time kernel
    141s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2025, 22:46

General

  • Target

    JaffaCakes118_8a1ef7916a653c6b785b585bfc6c4424.exe

  • Size

    33KB

  • MD5

    8a1ef7916a653c6b785b585bfc6c4424

  • SHA1

    c3c33e9816a9540bc80f34f4b3af75fd999eec90

  • SHA256

    8b461384400e1329c025d692e5c6393a171c8721ede651d5189e7717f684b625

  • SHA512

    793b0dd6dd394c764ab4790c8d7e1c6b2add7a26f23bcc165e37f4105e8a39046728765d2a32a3c33be25244ecfba0a331a83696a63cad70db6f9c79e4c11a09

  • SSDEEP

    768:SuGP6od38fk9O7ZzTCgHIb1nYSs02HjdQqmyeZ4EYNoH///:Sn6odD4oECXCeRtYNoH///

Score
6/10

Malware Config

Signatures

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a1ef7916a653c6b785b585bfc6c4424.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a1ef7916a653c6b785b585bfc6c4424.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • outlook_win_path
    PID:2460
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:799750 /prefetch:2
      2⤵
        PID:1840
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1272
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1600
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2476
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2120
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2584
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:2
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      71KB

      MD5

      83142242e97b8953c386f988aa694e4a

      SHA1

      833ed12fc15b356136dcdd27c61a50f59c5c7d50

      SHA256

      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

      SHA512

      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2e84b8ddc85f9d92f18e2920f980c99d

      SHA1

      b3e2268b9e12c26ce26e519cf8407f6d321b73e9

      SHA256

      99d18850968ca5f9a6983ea49754cd2f4811286875a3af8fee8fb31590088278

      SHA512

      4e9b9695c5b17c56bdc2323e0ebda3596cd2d96e9451b7038cc9d4d6ea7932ebd1e5098dabe74a455ec93e74056ad735074a49cdc6ae19006a3a370917f68f76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      77e9c1ec2ce2dc2d03f384a57843d5a3

      SHA1

      01b4537ee3c12d6f7b2b40ae86b412e4cb1ad140

      SHA256

      2cc684d3e22162e5e2c0761d08532f2d2fe010a494341b65df13c9bdd308427e

      SHA512

      98deeccf8fef4e31fc3c94ef8389e50d58d2d2e195b8af28c34f6313b35174261996e8661c345287b40a4e16ec53b001b58b9d754e08e9f8f23eeab424a5bce4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3c58f39bab22709551ed7d2c55ba1a80

      SHA1

      9333cc5291c422e37acf45127ca3255ff05257e3

      SHA256

      afd5d4adf50adb6fec8b8aece98ea1fbdc404e7f21c0284e4539aa768f94a4a8

      SHA512

      cb6a11c10ede7819bda925ae179426952bb5932216a4ce7f72fb82c65e50432e516e06c3455460036a43677456f385261c677a8c7ebdb85bd601115923af33c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a10284bdd726843646171ad3a45081f7

      SHA1

      0b11a97984498b87b11be2806265860fd0f8d80e

      SHA256

      297885588e6ead129cbf13e617d25f67f38a13d0e4f32bb16f7ab05f6ef27cf3

      SHA512

      175994c0825cbee4c2db5afebe2dbc6cd77dec2f8b32d16438ef3d7b4487b0d88cb5b44d2cad60dc08c5d4e244badb0a318f26d12dd0617072e23651e2861ffa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b82f73b9aab1127bdcf7479a103d676c

      SHA1

      65453727e8432b73a108427ae93bb07c60dd6457

      SHA256

      0fc05f1bae1c7dd450dd7cb4473400f87bc27831d36aadb4d9271a4437ae410c

      SHA512

      1e1798824d1fb791eec629eb5700d56ff104580f56e521eb47f1ef07a43e38d6758292f1892e34d58b78895284b8e30d7dca4af632b1f307717e67ee3b2b63fc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9578d880a8ccb72fd68acdd73a80f882

      SHA1

      90170210fb7f57ab8153a5f0e4fd765885168b09

      SHA256

      22c3217c130219a0abda2c170d48bc1e974e5bafba79d9e0f7e09a32018eeadb

      SHA512

      417208f00eb3b3440c2ed4ba8aea320734cf2b168165cfef297ede408c3e5fe3f06e756d344c6252a2949de07ca1ff32ba5529f9f2aeb17f7b48570372e14295

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0122523227961f21bcf1ed1d69cddc1d

      SHA1

      02cba2655309bf628cdabb26ca95f67570fb4c0e

      SHA256

      2c58318065ed660c1edb8042f4f79848aa722ec955890cb500daeabddc4b29fe

      SHA512

      ef1d3ec76b366901c0208c0683bcb109a2362a61b03457db551a1e75103cbe7906bc68f4981cf81ae77793350fe3cb62520c4ea98843b2fbd480cada42ac2e7e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\dnserror[1]

      Filesize

      1KB

      MD5

      73c70b34b5f8f158d38a94b9d7766515

      SHA1

      e9eaa065bd6585a1b176e13615fd7e6ef96230a9

      SHA256

      3ebd34328a4386b4eba1f3d5f1252e7bd13744a6918720735020b4689c13fcf4

      SHA512

      927dcd4a8cfdeb0f970cb4ee3f059168b37e1e4e04733ed3356f77ca0448d2145e1abdd4f7ce1c6ca23c1e3676056894625b17987cc56c84c78e73f60e08fc0d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\NewErrorPageTemplate[1]

      Filesize

      1KB

      MD5

      cdf81e591d9cbfb47a7f97a2bcdb70b9

      SHA1

      8f12010dfaacdecad77b70a3e781c707cf328496

      SHA256

      204d95c6fb161368c795bb63e538fe0b11f9e406494bb5758b3b0d60c5f651bd

      SHA512

      977dcc2c6488acaf0e5970cef1a7a72c9f9dc6bb82da54f057e0853c8e939e4ab01b163eb7a5058e093a8bc44ecad9d06880fdc883e67e28ac67fee4d070a4cc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\errorPageStrings[1]

      Filesize

      2KB

      MD5

      e3e4a98353f119b80b323302f26b78fa

      SHA1

      20ee35a370cdd3a8a7d04b506410300fd0a6a864

      SHA256

      9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

      SHA512

      d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\httpErrorPagesScripts[2]

      Filesize

      8KB

      MD5

      3f57b781cb3ef114dd0b665151571b7b

      SHA1

      ce6a63f996df3a1cccb81720e21204b825e0238c

      SHA256

      46e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad

      SHA512

      8cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa

    • C:\Users\Admin\AppData\Local\Temp\CabB1B.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC3B.tmp

      Filesize

      183KB

      MD5

      109cab5505f5e065b63d01361467a83b

      SHA1

      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

      SHA256

      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

      SHA512

      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

    • C:\Users\Admin\AppData\Local\Temp\~DFAF981B6008A58EDD.TMP

      Filesize

      16KB

      MD5

      155bf6799a0e506b5160e20a8b037d15

      SHA1

      3447d1f526c90a8891af7228af39f1dacf36f56e

      SHA256

      bbde133bec505d0d0154188b0912fdf2e73a5be984c9d39fd8cb8ce8be803211

      SHA512

      0d887fd9b99434444866edee4d86481117347abc90e48ee6ce87ab1e9236b29e556009174ed120578259e25ad5c6e57bd8487e70e02aee3a752f7ee8fb025031

    • memory/2460-507-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-0-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-526-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-495-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-485-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-2-0x00000000006C0000-0x00000000006C2000-memory.dmp

      Filesize

      8KB

    • memory/2460-9-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-538-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2460-550-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB