Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 17:09

General

  • Target

    1bd0b2857c5ca1d309b200fcc047b88d_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    1bd0b2857c5ca1d309b200fcc047b88d

  • SHA1

    d32748049534bb0dcbdff75538a1f7a2467b72b9

  • SHA256

    0d738830fb6666fa2d199e7bd3e9fd6b8dcbb13d474867a746fb97ca2ce15e02

  • SHA512

    6f74139e136434ce64af1e091b21c16687acbbf88d8ab574d43b9a65e94480e6f8c0beb649e6ae27033e103537f7ec742e9cb8ba08baa9091eb198b9d3783c1f

  • SSDEEP

    24576:xMTIkEmC0Dhrr8ckM2DD4J1NiD29BhLTi/bGP6h5FbnjIwnBeF7K+emesnedr:xlkDPRrSsT5TLu/SPe55kuAUmvG

Score
9/10

Malware Config

Signatures

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • Nirsoft 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\1bd0b2857c5ca1d309b200fcc047b88d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\1bd0b2857c5ca1d309b200fcc047b88d_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Users\Admin\AppData\Local\Temp\mpw.exe
          C:\Users\Admin\AppData\Local\Temp\mpw.exe /stext C:/mpw.txt
          3⤵
          • Executes dropped EXE
          PID:2732
        • C:\Users\Admin\AppData\Local\Temp\epw.exe
          C:\Users\Admin\AppData\Local\Temp\epw.exe /stext C:/epw.txt
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook accounts
          PID:2284
        • C:\Users\Admin\AppData\Local\Temp\pspv.exe
          C:\Users\Admin\AppData\Local\Temp\pspv.exe /stext C:/pspv.txt
          3⤵
          • Executes dropped EXE
          PID:2604
        • C:\Users\Admin\AppData\Local\Temp\steam.exe
          C:\Users\Admin\AppData\Local\Temp\steam.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\steam.exe
            C:\Users\Admin\AppData\Local\Temp\steam.exe
            4⤵
            • Executes dropped EXE
            PID:2564
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" %1
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:264

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    1
    T1112

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e65a729a922d0c15966eee571f19c335

      SHA1

      da2e58c45ca34b4f309ae805121fccc168c53f37

      SHA256

      dc3e9bad0e12384e16674cf57d7790f72715a31238dbe76a9d8ff8646d420fd4

      SHA512

      843cb923f74d5637038152bc357cc6e2cd1646229cb42c991db3c586ace6645ffbfff3a7318fb1e05eeaab304e92d24be5e5af315722645ac48869556c72fb5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      d3c2bd03081f198acaac931e5008ae73

      SHA1

      eb04bca5a66f717a2450ba222cf70a7f0bbcc286

      SHA256

      0c398f3a7b4dc3cee6db7d87553310622dc28d7609dcd9396a882d9c340a59c6

      SHA512

      35a74cdf2b0c3e9505bccf3e0c5101bdbf5564b4b4daec6adfb25058e63eaab11217745f6c6df9383e422b8037dfb25b9afe83f3dd96ad88d7f0f22f114a8ae8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      47fa81fae91709dc1a31c6df0c18d6fc

      SHA1

      3d5553c524d5534b5bfc98967a5f176a80a8a334

      SHA256

      f348aaa7a8b30f01577d1e5cd1993fa6f5c617acdecf6da7cd9f0afb66643db7

      SHA512

      88e28a69e577f283d0777bdf8283380ff4e585906742fd64281272473156e4324d92b2b9613f3cd4f0b876b025d8701e4e78c30b7a351691341086aa81333bcb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      097677307ceba71aa73e4b762ec793c0

      SHA1

      a8ad050cd7ae5723e235d7e4b3bcfd3537c48345

      SHA256

      978d5dacd9cb28c324b35033989be57df6e8718daeedc7a251f80909743d79dc

      SHA512

      38dff7b7b8b5b0c2536e1648280c5d2d1694723fdb143ddaad40ec2de1b16abab89f616c7b24aef5eefd50e21ed8bd93be9fa5224e62bf3128fa5299c7a7bd5a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      255343912fa34ec3602236596576da05

      SHA1

      48cc6d9fc50e89eb3b2b0fe403f08e3784e40a53

      SHA256

      6dca9d26704259500f14ba6d98611da74cab9e8c83d0980f01716bead70d9c78

      SHA512

      7472a338513aef81cd7a58aa3c3acbbf4ed345e39613fd9df56695a7e64e9f1d10dd6a648a96068cba29bd946fa446ac47b2cb99122e106645514b81cbec7943

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      20c95126fce82900bbc23f20c04a7772

      SHA1

      56fdfb13f0300062c2a8d3dd35bf9b28f48dac13

      SHA256

      96b835230bad023e3e78efc728b98a5853e9040d9ddbceeeda37b3f1d451814c

      SHA512

      1ef1c0034ea00e5a7b8fae79b0033d76201ef5167d37987600fed6063b61e40a99a3466828cc28fa88bfa2ac0b172313f24b45aa7f3a8ada61877e9d13a66d7c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c7d89b69b45d75febc49208ca5f19583

      SHA1

      8071a569a25976fc433e69913397f1429ccd1894

      SHA256

      492e30479dcd890e6b98ee8608dc38ce390f48ec5d138f4224e570fa89d1989c

      SHA512

      13458e9072dbe32cb7e97dc7d42adcea432428a826b1b3fc358c44c3c1d04468b99ca8275cd0f08c83f5368c3f2fc9b72053dd311fd8a6d178994dcd0769ed00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      400bb32e70c31bc9cd7c1544b5507ec6

      SHA1

      f7754e0020f9733752892e3c088b46a1f9e15618

      SHA256

      f9c73ae7b2f3e7f1cf309637a33154e058250ebcc5bb2f2af9339717f23405f5

      SHA512

      c8869e19b28ff40168fca39722b267ff36713168d3bcece01f1f30465c4a33c9e3998d5162abd3f7d5266eb25dd28e3025e8831894b541b4f6f2e5ba8b29b9b5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7ab31066b16ff668745cce78270993f2

      SHA1

      ac0bf268959530bfd06bf7d8eb644bd593653c6a

      SHA256

      e1a086491832ac3b31620b26c93eba2314e94425661276442747fd130afecf9f

      SHA512

      ddd467e3612e92b0de97553c0838448278773851553131d70b0b207fc1d6e67862ff723d79436186c42c26e9084ccfa03da955f9987cacaa26c5472f7279ea07

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      b5155fdee0a1407f47f4e39d7023f4a5

      SHA1

      f8c501f561627722405f5d7244c29298b5fd4d53

      SHA256

      158d173681aa70ae458fae0180e8c9e8fe2587597e035b0fa598784e26ab7577

      SHA512

      b86f9f887fffa7ae9b03d9539acf4204a3822ad36fe41946cacd5da8fb97e6d60dcfe487aa6fae61789d34710657cddb500a58bd4b25d25129fd2b5e55d6f9a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      0b4321a1cba2ecc20d82d769ba9443a7

      SHA1

      02be4c31adee1d0f3769c33cb02cd19a63e14bab

      SHA256

      8031449bb762e9468551edcc1b7c7f87b802fb102b6ea6aab03711a63259bf67

      SHA512

      63a4df8ba7a5585073a902b8d1a544f2d8042a27839a84bcf634563c3745da7f86d9b58001a98f781928b2803eeb7f135299a03b8556cf2ea882c42f8435f7af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9c381b8db6922a63de216752441fabbd

      SHA1

      6fe4a434be2662fbb4c1645fe90a2bc7ea6e3017

      SHA256

      448cf31a1df458bef8dc3461cc785d85aaa5506172df999326cb3320678647f0

      SHA512

      2f011d3de127f242601cdd31ff3cd5fa2634e29e1b25862fc94a0bcedd149ccaae4c540d46ad166bb8e7b19342ee74ea980e97372cf3012cf9ddf5732bf5c810

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ccca8a5e92ab2f1cdd22cd399e4019fc

      SHA1

      edb2a7c0fb10947c9372d61993c4e9ec8681b093

      SHA256

      f8261095ee79817309f53022af048f0b31a35db3e01fcb045d605d99b748808e

      SHA512

      53272851b36de6ecc66765901ec2c8f89292eeb0a7c879f795c83142fb7352b05ab80355efcb2066f8764058fffdcb12b47b8ec9a10416b3cd44fedb71d9c98c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      bd84c6e9c219e8ac6fb7f0285e6726db

      SHA1

      a266377c2ec28a267c733b78686cc02826c0dba6

      SHA256

      88553779b262cffec129117a26857b0ef878f5c113847a4b83f05b394b1f2022

      SHA512

      05056158c6bae9082fef8361dca9ca188a039b9addeb8a87cc791d673521ecd7ead4603815e49548952eda52c44a8813b5286698f6087647dc6dd61f69fecbdf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9d1108b41909df069b8a3c61b206b46a

      SHA1

      0c7068d018c0784f3b0bba4fff8a8a1b8dd9d2fb

      SHA256

      a52e86ec2ff1605ec22485b3e2b16c0398b69347e56d2599de8ce1f6dd9e22b6

      SHA512

      378cf60de635718073ead24efbf24e94033d921a7e99a03f21a91ce4e0abd0a1ec16ffb3422f9142aadb4ed4d9a7da891c8510bb2082e44ad7bd7686497668b3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      ea7093f15e2d66c7d5ea30d4e0556fb3

      SHA1

      be8c1a1fe5d3d9c313f01069f5c6b41a673dd4a2

      SHA256

      f9ee96b629517fdfa4a03482b7ebcf22d9c88dfa69e9ae05b5af0d54b6a22b1c

      SHA512

      2b6b7d5ce41e0e5cdd2a15ebf78eeb52c4c8e530441d79df06785ee0f015c2ea5af0f6cc4b4419d88d2ad414ed9374f75a95e730ba0be3b4332a74157e0e553a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      e98b5742f3cf0265453dfdeb371e9783

      SHA1

      554bb2839a8605c0da262924227731bd32fb0b5c

      SHA256

      a95ded15340f9575c73cf160b41ebc79a8f57fe6987852fc9ecec733754130f1

      SHA512

      ce324438e1604002d97931d2af29ab8592f4639a485e08721ffc70a723c2aa2d5d88d6ea7d4d68e0fe24ab18408c448a237fc2381cc212f226f6132b0aab2ac3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      42e89128282e74234583bfb18929e98e

      SHA1

      05141ff18333368135069a38583d71654276bdff

      SHA256

      50a6f4da1baae1760685a369fdf62ab825205ff6a720589c987694bfb1ef74dc

      SHA512

      aa0fdb0fa06c1cf56c22f6cacd564b1d45811b17c09afe343a0921432eed1513063fc648f12a570b9786bb51929b7ef9f5a2a35333801cbd71025197905e8023

    • C:\Users\Admin\AppData\Local\Temp\CabAC86.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarAD36.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\mpw.exe
      Filesize

      53KB

      MD5

      0b7c78fc847b9a3031887ccc884626b6

      SHA1

      2e93cbe26f7b2ee71df0c3d2daa9397cc0bd436d

      SHA256

      37c315f995a71e15a87b2c93c38c0cf51b32a44babe046e97830ad134dc2c3ad

      SHA512

      9ab315bbf6d3365246b498b7bd58bf9f45d25617294431ad59eb8205d180dbc171109d256382f2516416c6623e5d25c94713e30ae0384376ed4927520b52fded

    • C:\Users\Admin\AppData\Local\Temp\pspv.exe
      Filesize

      27KB

      MD5

      ab0e8fe58837e664b56af7a9f4fe684e

      SHA1

      8d1902e96eca93807ec0af8f80e0a7c18227e65c

      SHA256

      7b71cb8f637cf5c32abf359cafe5f0bd20c91a8c777c813f7a0192e4ef0ef7bf

      SHA512

      1a9d7cb083f62b69f9611012c91d7290268e150a7b08fbe9928232cde626c45785716c3065b0212fc6038940f2befbd85ae5f773034364a35add63690b13b32d

    • C:\Users\Admin\AppData\Local\Temp\steam.exe
      Filesize

      1.1MB

      MD5

      7d1f8b983b73c5d9b2291b939e97ab17

      SHA1

      d7184251fd4d7587c5b9af8f706914ffc416b43e

      SHA256

      3fd3d59f5f0175eb6907515c95c07108d303bf0464a2fb33f8cac7e29980ddbe

      SHA512

      3752d93c433fdf16d67a5ecc37e480101b9c525ae42e993dfa89d722d6545b67f14968f50c90826accb5fb7ea38d3c0b1416e24fa51622f4f59625efaeb49ddb

    • C:\err_log.txt
      Filesize

      52B

      MD5

      6b3037dce73d1bd5b0c40dbc5f652249

      SHA1

      208a5e00829f9edcc6795f55b3bc1b2eb8941ab6

      SHA256

      8d039fe1dfda015aeb0c328dd04daddcc5c2f1b057cb16ad40d1e37a107da311

      SHA512

      eac0b7c94fae647e7e201d5ea99dba9805a51a477624ec704917eeea95ebc7d39bd36953bf08b9185393683cd5c3f1267b7cead0b3b3fbfc48ec88fbb3b4256e

    • \Users\Admin\AppData\Local\Temp\epw.exe
      Filesize

      52KB

      MD5

      faad2bbb5c307cde28f0dfecf59aba7d

      SHA1

      b64a0185ec9b63382d109489e120b58a91d02707

      SHA256

      927184a03322373a1d7b331bb07ecc9c7e788d8b5f94170dcd315f954b3b5d59

      SHA512

      129186c6b75044e428e92283b9e9fe165c1cf03b9bd3a061127d98bbf5308b974618649dcdfada68198b83ebf98779dde4aef16702b43f58e35e03fd4d390bec

    • memory/1236-68-0x0000000002A80000-0x0000000002A81000-memory.dmp
      Filesize

      4KB

    • memory/2268-73-0x0000000000400000-0x0000000000562000-memory.dmp
      Filesize

      1.4MB

    • memory/2268-36-0x00000000001B0000-0x00000000001C6000-memory.dmp
      Filesize

      88KB

    • memory/2268-35-0x00000000001B0000-0x00000000001C6000-memory.dmp
      Filesize

      88KB

    • memory/2268-8-0x00000000001B0000-0x00000000001CC000-memory.dmp
      Filesize

      112KB

    • memory/2268-9-0x00000000001B0000-0x00000000001CC000-memory.dmp
      Filesize

      112KB

    • memory/2268-17-0x00000000001B0000-0x00000000001CD000-memory.dmp
      Filesize

      116KB

    • memory/2268-23-0x00000000001B0000-0x00000000001CD000-memory.dmp
      Filesize

      116KB

    • memory/2284-27-0x0000000000400000-0x000000000041D000-memory.dmp
      Filesize

      116KB

    • memory/2564-53-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2564-55-0x0000000000400000-0x0000000000790000-memory.dmp
      Filesize

      3.6MB

    • memory/2564-60-0x0000000000400000-0x0000000000790000-memory.dmp
      Filesize

      3.6MB

    • memory/2564-63-0x0000000000400000-0x0000000000790000-memory.dmp
      Filesize

      3.6MB

    • memory/2564-61-0x0000000000400000-0x0000000000790000-memory.dmp
      Filesize

      3.6MB

    • memory/2564-59-0x0000000000400000-0x0000000000790000-memory.dmp
      Filesize

      3.6MB

    • memory/2564-52-0x0000000000400000-0x0000000000790000-memory.dmp
      Filesize

      3.6MB

    • memory/2604-41-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2604-37-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2728-56-0x0000000010000000-0x000000001000B000-memory.dmp
      Filesize

      44KB

    • memory/2732-11-0x0000000000400000-0x000000000041C000-memory.dmp
      Filesize

      112KB

    • memory/2732-12-0x0000000000400000-0x000000000041C000-memory.dmp
      Filesize

      112KB