Analysis

  • max time kernel
    120s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 17:18

General

  • Target

    JaffaCakes118_8adce606997105dbaa155511089e8295.exe

  • Size

    107KB

  • MD5

    8adce606997105dbaa155511089e8295

  • SHA1

    6a47f018514769ad057b83375faa793977e80c05

  • SHA256

    88482442aeddc715fc460c9bdd50bf58a7982f71edd8efe4b03868adef3c6449

  • SHA512

    959733030594de8a7bd86dae3d196242e1455ffc457cb1ec279fa3540e25ec18b66738105c23693368096ff42f9afb9102867287d0d7e9181d8f4dfe7698a62f

  • SSDEEP

    1536:7sOltfMABYPUoE9+7KMVIhwTmUmSAxP6H2l7Hbb45DnLZD4bJaVcdTX3kuJY:7oP/E6tVIKyU1M6e7Gv2Ei9X3kuJY

Malware Config

Signatures

  • Windows security bypass 2 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 60 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8adce606997105dbaa155511089e8295.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8adce606997105dbaa155511089e8295.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s C:\Windows\ieocx.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1744
    • C:\Windows\SysWOW64\net.exe
      C:\Windows\system32\net.exe stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2656
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pornproductions09.com/videosz.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1240
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\bhs.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf622187dd03827d96cb0802c8c317f1

    SHA1

    af5d8edc7109579454b16afec620708e07085ba1

    SHA256

    c82d8a4474f8ea2d2060366fa91d3e31c6f6cf4fbd268f4daa03c0266a78e44b

    SHA512

    971d920cc3b6dafe47537816b39fd255895bcfd8882ec0df9ed72a42dfb5219e96d7932919aa78699b9746d9bf548de824957f1bd7f4ced8cf21a70e7b9786c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5273713183373aaec8998cd33afabbe

    SHA1

    efa79cc184685fe6111a09096bc1dd2d2464409e

    SHA256

    96376027e4514386380b0a73628dfd4f248fea0bef39619071eb97d7f05b1941

    SHA512

    68dfe43fb412911119bcca46123ddc6b4f0fce8e6cf76809972861aef8328ea9819da4627fb08061b28e43a43d3bbae5f592d93c65895aa09adb11c8ba6ec557

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6c4627524b391857a96e4ef48117de5

    SHA1

    ed5957be4847d7e81912be7ab519f05f3f0aa725

    SHA256

    a55536b75fd215f0475004011ffadfbfaea80c9f85f6a2cd4bd97e681d54f38b

    SHA512

    f4e6a02e93f0a1d517794143c6524cc380fe3dc09dfaf24c6c20c951e703cf925e7671c0df842129ec429a030cb23d8a4a4c1bce2edc464011a18d77b28b8aa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1bcf4a11265da67fe235be0237b4ed8

    SHA1

    127c0056e86aa7d71e07dca82fcff263c734078d

    SHA256

    34e8304c129237530e1e25b6b10418e9ac3f5f10ec524598068f0eb843b81bad

    SHA512

    c87143f5f06ab395773d10a0bc3e4a27b750b321ed34d06abdbc5377bbb22f59fe08570c7c4ae13b2df704980a87e5513a6848cf1a627a8ebf0070b83ada3458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f0d6ec4b8127bcd256e938a28f88e894

    SHA1

    57d40b6d655a6f24f74c627bc73ab43ad59ab0fd

    SHA256

    e9ab5d2891b1c7b0e763457fe67ef0366cbe2bbfe7fe1c15c11d97d283b806b1

    SHA512

    35be7a149619b138236a1be4f34f4867c3dda5b7f8d848a5c82a3dec43b1dfaf1bab493a3a518095cb963edf640d951f866857724bef4e9e9ab4441e4f9a3f6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59acda6936d2275438c29e11658966e2

    SHA1

    1eb774ceb78e9e6002ac32e0754f29a96a7e00bd

    SHA256

    df41afb656677f48c6afae1892988bb5bfe61b7af9d1c3b8552b9c91759b82f1

    SHA512

    a3f74c6af7f2062cb29eea5b416a4c08c8ff505973098156c63d899f59a1af0e8ef36aec8527e02f2bbcc22da38a7f4669e3f67e5ebee2df945466c9f1fc41f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f43680253a91953342ba2d5778b4ce7e

    SHA1

    3870abc4a36cac65d7a8e94945c041b4cda3c3fe

    SHA256

    8e868e9b0ae19e20e4950bb6e4af338cf8fc7d689535e5bc7650fdefd8e78406

    SHA512

    5c967535c5c5da971a13b64800e3f41c1f5b709057a62e2fa1b28bd2d478c6f8266ae7a94c694e746d93692812b5484c9e37ef0e66625b0669d9bdcc375fb014

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cff59da6075e1629072af0d523e1b29d

    SHA1

    50834ee239aeaa07d2be12b51def1460988b4bdb

    SHA256

    04c54d2df90f1a24b7a2fbe24dbd7fdfd377c2d4f092a71d1a4f5adae4aac290

    SHA512

    cb4b5c35f7a6bba80965ab5c3672dc1386349be0e00aa5158038599d9867c9aa1fcd192ed56a19cb35d3dea2445c4b78989b6e465c44a3e1254646805d0341ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e01e32d1ac65fd63e70b55a900037a3e

    SHA1

    cbcb1572daa6f948c6f5aa36eccbbc97e4753911

    SHA256

    5875d92f0483d561002584fb52cc197670c8808ae0d9093b54f1c5c2f04b57d0

    SHA512

    7df8bd1606b9559f8618dc71e7dc7feb8d743c3239286b7e1f8e555a38dd684f47031551fb6b940a519ac78693cfc963b30a9e89b260e994a7f980a84eb7b8fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    662b8035b23b681719a04daf316b96a5

    SHA1

    be5c436e45b23b698cf0b1412c0dc59a05ad7423

    SHA256

    c4ed8b71f5d7874a1e89815502f8922160cc26e3c24b8bb45d0ee7e96dd8985f

    SHA512

    e73718e9aa355b56d26f5f279e5aaff288527a9921790b8004f6c808d43b0341e2fde44daac0d82bc2da203866e85b382934fb458e75ee8dd12b92b1ddcdd715

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4aa7f284275e50bf792d8b7034aa98a

    SHA1

    57acfabfbe00131e1db123035e673fc78b565a65

    SHA256

    01041a5139762d8f3af22b1073c764d598dc741958bedf92a448c553fadc70ce

    SHA512

    048b76b783eb8507928943c362d306fa85eeccea4ac79bd98a1dacda53ed16f608cfc2b162324228a377f9bfa94d9bb06f2f401100a9b7bba03c3db8c439ad33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7826b2ec8c4825651d2106b737b6d7d7

    SHA1

    7e341b892e9235914aab01d30d44c47445e77d10

    SHA256

    89ee09c1f82aa7fd0b0e4d63ac017f934e9f2aecc52ebe4b44b1bb6086adf52a

    SHA512

    5e8cbe4fe7af7fa05db19ea0fdc052ce4f77f00e0a7f506d74557595f7a9e94c65b0b20c1bbd00bfd985a11c03f5328905ffd9c077f9ecdc7c52daece15b2fdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25f0f79d5a26144d5f5b0203a54b8d75

    SHA1

    01606e77e3eba561c682aa1da0c14a73b5870d91

    SHA256

    5897ea784caa4ac141975c00eb1ebc380c555f0ec59666bdded9a09ad937c17a

    SHA512

    a7df59e675bde6a5ee401ef40da3bfcac55bd5883706e0672dd2088014b5a39d3555facb223b35e28785cf51895cf8d73ee2c20009a720b5843852fbd8afa673

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3dd60164a5b396245fa22b4b4e13cd11

    SHA1

    f2950d689d37b5f2ec2d62a25eaa2fad677fc3aa

    SHA256

    901e5ff8a5c1bd8b893352015db2d0f7179349c898eea24c89fe14ccd25a767c

    SHA512

    2d461d7169d1149e081b536ded9746ed2a524b97b92ec2eaae955f5eedff7103aa8d35fbd7fe6963bdcb7c41c4e15da4a864cbdfe2e3de6b164acd0f33151793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    caac0ade46929908966d9559f77c1450

    SHA1

    3733b2ffb59afc1ad5bc729ab3963ffc2853413d

    SHA256

    c7575a6d21e57df1163e2803e65379a46b3c2b8ede8e424946e33577025791ba

    SHA512

    e75c4d280c73b243b641adafa4b7b60365e998fa4508931a187e06f8389ffd166c5977ee1458f7c31d17d783ff07874de8871001740cf9b7cdbcc988e81b0abd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c859453a780a3100cdafe166dba25c5

    SHA1

    61749eb39a000043027db271ca82ca3bea6b0f30

    SHA256

    4380fa84ed6b25f3303996b61aeef37336a02620e741092748fb4d5f47b376ef

    SHA512

    7b40904c9ec4bf183698bba0349a258f6e2e25b3d86fe79160f93ad72798285da6f693c1260de93f4fde20f6e3cf5926067b8230f3682a875726b471753093c5

  • C:\Users\Admin\AppData\Local\Temp\CabC101.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC231.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Users\Admin\AppData\Roaming\bhs.bat

    Filesize

    256B

    MD5

    ece606146a56d7e82350d18cfc1f0fc2

    SHA1

    8fc2eac9c5371bfcd741a64862cf25618605f17c

    SHA256

    b5e9be7a18cfb133821a059f13e7729efcfe8fa7099cf1f4974c127a6f09748c

    SHA512

    6c07869865782e58688973fc0dfcccb530b8142ca427a8f031f21726af509c76fb07c529c34ae3dea3c05b3db11c132fd3e1d63d3f5b7238228360ce2fae500b

  • C:\Windows\ieocx.dll

    Filesize

    28KB

    MD5

    a10e6205c62802ad7c472bd5d003cb4a

    SHA1

    2bc0806195ae258cdab3f8f753f624bd07d729fa

    SHA256

    1a04223a5dfc65a5ec55800e770dd0b3138eeace42120559385ae95535d9aa8c

    SHA512

    adc92257e0eee52b61560f6c8d7d6e57b48082cb1abb98ba1cef3846442937a843f0f45c536fa9c85fae40a46d07708a70fd44a47018c360af1fe83873f2e075

  • memory/1744-8-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/1744-5-0x0000000000230000-0x0000000000236000-memory.dmp

    Filesize

    24KB

  • memory/1744-6-0x0000000010000000-0x0000000010002000-memory.dmp

    Filesize

    8KB

  • memory/1744-7-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/1744-4-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/2344-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2344-37-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2344-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2344-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2344-1-0x0000000000401000-0x0000000000405000-memory.dmp

    Filesize

    16KB