Analysis

  • max time kernel
    147s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 14:36

General

  • Target

    JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe

  • Size

    244KB

  • MD5

    8ac23acbc2511e0b4d46648faebbb7a8

  • SHA1

    1dee5f2bc0073d83b329fbd3961c0f7b0174ac49

  • SHA256

    f56407bc63e47ab020c06bd7f6de96dc60590a4fd274ec060d4283b471add83a

  • SHA512

    48ddb6a9a03b245c06b8bd6be2d86f0833b2c335ba8321b54d1e154e9d774f70db08ef41a939152fd03a537fb19b0457943ad540b8b3879d0d0abce7174edb46

  • SSDEEP

    6144:z3P2nGsTc9fNtHynneSaGBGu7Bj5bennnnnnnnnnn:TPWGfVSnneEBJFjB

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b9ea04d53e5debc5f1de140d4617de1

    SHA1

    8bbebaafa70cd5d9c1155378afca016d362b33ea

    SHA256

    4a0ae3f8b6b07e3386566d24b2f3991980987f045562f7d3bd66b0688f794009

    SHA512

    d25ff7c19cfc2c517ea9bf2089f59f6f4dca4a2bcdcfd75ad6accf4d7711b6bb8113f97da9ade148e8eeefdaa5f39aa6705d589cf9f2a138e8926a7298a561af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc197f74306838c7e5bc7a07b2ab6229

    SHA1

    fd9ec573728334b61ae88ecc7009211589291a42

    SHA256

    f45c9fc365a2d51fb67347ddf769a5d3f62a0c14620bd7faa273e0e88e63fdb8

    SHA512

    4faffa6026e8a9bf5cd3d6f934c9e758cee3a8a044e5a8635ac70bd0f44abac3aa4f638e3f344290fed863d2e59c08e500173e7e0b6ab6650f1a8048a063f0ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9bf2801de3d46243c85d24283bcfdf7a

    SHA1

    a6553f20ca2d2a966c3bfc42d703f4dc457bc320

    SHA256

    776d69e62ce0248c72761f8e436f586ab93520a49a96af78ba861b6696fbd9cf

    SHA512

    8d6aaedba6ac9592a2f1c6902b363c09a388c196ad4e73d600c98e3e3aefc76af60b48d021c8ee702de543624c389a5ced1e0f4e4c97fd1146a27fbbde591ba5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e65d1a6ce20297a18c7d064d11c4f0aa

    SHA1

    e444798e4a0cf099240fc313c0c6aca3b75972da

    SHA256

    0101cb99141139f8899f1b0c2842770a36ac3ec8caee11c83cd717fec59207bf

    SHA512

    2451ad1067410573e9d572e0589083da4efc63eb2093b83af6469b9cff9615d29c5850d741909e9cdd9d65bc4d8c3d5953a184c9e158d41c4dfec3872c99c1af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a038637cc948cef0615da1a68b254dfc

    SHA1

    1243dbc5e64e3b31a6004ddeeae9a4ee3dc234b9

    SHA256

    84e1a86aef572188050d39a19ca158dd1956fa4382ddfb5f2d9b7fcbe96b774f

    SHA512

    32fa8c77309a5d75b26e2f08cae499b99fce9ddb6fdb813e4645d791d2acdec0339c141bae4deb89f239f9e53d73281a45330acf23a12183e13afadf8258b6b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aed1bd92026ee179d22fa720b8dcfc1e

    SHA1

    d55839fba85c86eaac95e12d77db306491171fd2

    SHA256

    ab0441a021df9483b10f55046b6ffb25a77dd07b8dd96773bdedb846a49c86bc

    SHA512

    a87a26bbab5e1a834ee3cc7e4abd1f542051af46965ccc61627bf8b7337de534d8beb4d154a3747dec236514c9c6839fc2dbf6611b27ccb7b96180c22466be7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12a503f0ab278818380575be0cab2a89

    SHA1

    b34797bfd3618f780329d94851c8479f5fc79f42

    SHA256

    0af1063b82e50bdbb299a02f0adeac40878daa777e29c6eb330f3ac4e20fa35d

    SHA512

    37516c74cc22b1432d3851e458c8fa1a1d2e4bf9d08162234e310177c60fa8e121ebe7e6c9deada49fedba56d3c829638ae5160584cbf7481906a8c518f40012

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96078886280e1bcb5a55efe00de530d5

    SHA1

    4f5647da10bad0b7ada020c607e0d0e6a897d7dc

    SHA256

    2ade49cd66ca9c979e24d3e3cce8a25210a46487b378cfca0bb966bcb8658c8d

    SHA512

    e928890ea1438f241790e96565a1d5dc19ec0148004b1de2058426417c1a7169062c4bac61f3975b4d19aed2130322c8e65745e2981adf1de16e416097b03a3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4765af1a1227ba856d5514b7617c2e91

    SHA1

    31748fd80e369ecd0163abd08fc3510724fd9b43

    SHA256

    8c4cf175a96400a6f62cdfae03a20f0e56e93428c67c613a330e609802958bb7

    SHA512

    5a55bdd2732f0aa5879b85c41cb3a8118cf17b7d36f387019453d2f6d9356b299dfb95986be324e467294ec34412921dfb55890d060ea23b63d941a464f68ce5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    982e7373dfd1cb366e77ee74395c0eb4

    SHA1

    4b80963d7a48fb822f9eb2923de941f420a90ac3

    SHA256

    080964b503136942292e4a0a5aaa73708cdc35d5ef0f1722176c28b8e24e4cea

    SHA512

    eea7dbaf01423b1379615cb95ba692e37081a3cfb31a70bc11576278ce2c2d8522d4e4b48bbca0c3db8c1d2ec25467bfd481cc4f9cd40a0802e8415e8c539e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b0a41d78905413fe88322212615ce86

    SHA1

    a080522739039b70345d74bb25ce57783a5272b9

    SHA256

    f53e77f2c2a89a8ee57d7cd37bdf203b039ce1717b381171e43213f9bead54b8

    SHA512

    7dd3862f5ac86ff0ec35bb750d28e93f871d49370e88107c41a10b27ae2fde8bcace80d301648f89e1be6e5866627b2fa722ff9d5e0d282a5ccdacf0a19ae563

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b96b3354769fb80e7b0acff6e8f1a9fb

    SHA1

    c4c8cbdc19fbee471c5c86f09cacda36cb2209a7

    SHA256

    457ebc712de5e413e60110a655c1f038c0e632e9b908a17fd0816c5b1d6cd1a9

    SHA512

    091c598e443bd186748728718d5c10932df7949869002605d689bbbffa10d592471e02e0270f562b9e9949f696fffb7b10c5ec473e08b10fc6ffb6c543b115af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b937ece81fd3ae7c2c257e1c10db9b51

    SHA1

    50c23f6cfe3d4877736fa99cc99ecfb8f9c11ee1

    SHA256

    e38ff0de3a2d26cdec52e200cc1fdceb97bca49b02fc8f3b6ace47204dca115b

    SHA512

    c4bb3934f8413f932f5df743d5b8b8c59e20ae4176a2eb3e3f5d645742b77e38abd29a9b5cb2347dfd129d6cb425082c28c86d0481a64ac4be112874258f45d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10191eee41cf6509052891a7c7e9a293

    SHA1

    b95cd1a772675c750b4e81fcf6b70c1e7082ec06

    SHA256

    ab67cd3bf82555c19cda2204a66ee18a0dfa6587d09cf9604b452d8141689a16

    SHA512

    bcbe3b83dcbc1efe518c8930f4ba6aef4f8bbb8c8c9fd48a9f8b75c3271a7fdd815425e85e0ed23cbd1ab200101a49ef4134e51e0c69597398f6877439d1ea74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5559dfc2d20aeb5d316e023b9a9fadc3

    SHA1

    008c2b0af09b141cbe10e7336e11e6b196e9465d

    SHA256

    f6af5176667713f7e0a7a28c2e1e01f61c96eccdf53071dba17e89fe9cb977c7

    SHA512

    365ce308b92509783052377dc1bd29f8526280ec100984bba8ff57ddbafb57a237757d2b8913242f067eeda879229a96cd0d2fa5a67a759e4dcabc6de67abf6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f7ec2e16491857309c9a6ec88a0f753

    SHA1

    23a0b19ea53dbfd46925b8720ae83cb5f1c6bc6b

    SHA256

    81f0d341920b93558e48fc1d905be0253c23d5042a54174f89d14f1df9c15fa7

    SHA512

    b07f7fe6fd9aed837c1983a2d30399536d419ca9e46e91a780e8b16657a0047a2a248ea25431f1ec8b834a698ef28fc54e439d7fd0646cd0995bb1546b3c8215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f21ba0253ebd067e7b5e1c96f669755

    SHA1

    74245007620330276076e102ead08c68f9301ec0

    SHA256

    7556c6a2887ed09b7432e80143fa86b45ccaaae5a8ff66e66f400238993fc266

    SHA512

    22a8de1acd818964a655db4f100bb84a0e6db2f64ef075bc1b6ba0635815c893bc9c8cf821a220ec2449291aa2dbffc2fff45577b51544e4f84d52c7b46835da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24083e3b6ac12404ed4b1f86c58ac1a4

    SHA1

    408c4d1f398cfab42b8f02376d376ddb0f3900ba

    SHA256

    e27a0007ae7786b28059492d6437076d362eedd8e9f41d915c3feb9a146aafd9

    SHA512

    f028cc5d870816f4ba145d6205e879fbf6d4f1d7281944860746283cea080a56959bd9e4a8d7820fef563b17da72c3db0056c700a6bdb85634b9554cbf86a8fc

  • C:\Users\Admin\AppData\Local\Temp\CabCF43.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD035.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/1912-23-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-32-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-34-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-28-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-26-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-21-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-35-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1912-43-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/1912-47-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1924-69-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-13-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1924-53-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-52-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-59-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-49-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-61-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-63-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-36-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1924-65-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-67-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-1079-0x00000000002D0000-0x000000000031F000-memory.dmp

    Filesize

    316KB

  • memory/1924-55-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-57-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-3-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1924-48-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1924-38-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-24-0x00000000002D0000-0x000000000031F000-memory.dmp

    Filesize

    316KB

  • memory/1924-73-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-5-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1924-7-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1924-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1924-71-0x00000000002D0000-0x000000000031E000-memory.dmp

    Filesize

    312KB

  • memory/1924-15-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2848-16-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2848-0-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB