Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 04:37

General

  • Target

    e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe

  • Size

    61KB

  • MD5

    e93c38c107a6bbc06ef10acf04366aca

  • SHA1

    5649eab95ca67bd709db9f9bf9eb5857617d14b4

  • SHA256

    cb547f21e903e686c56f0e5df567ccc65462e85b3802adce66bc9c081d818a3f

  • SHA512

    aed050ca9e7fa0b957463de4c6d2123a5aca020cf7a45415914863ceb9497b7a16b43c08bd8da89ad3049dffdb968e07951ad1a4a6ea49211149b36871662db2

  • SSDEEP

    768:iM7O0GTipbBNcJ1wjHQwUPdKAZbyAD4ZVAuEPTeWq6umT/9O3x+DUYh3zXp2F5ke:iDVBwviKAJyAD4ZVAHPTc6uSo82Iot

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e93c38c107a6bbc06ef10acf04366aca_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start iexplore -embedding
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1952
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fig5BCC.bat"
      2⤵
        PID:1388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 492
        2⤵
        • Program crash
        PID:4192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5092 -ip 5092
      1⤵
        PID:2052
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1420 --field-trial-handle=3136,i,3192284747741020952,1225278682167953346,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4488

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                39dd625b01652b616f218d3ddd2cf208

                SHA1

                d743d761bbfcb8cfc9b197bf3e903154f0255113

                SHA256

                885889906cf0a34f41de313074d706b129d988dc1d8b944dbdcf4e1d4e460b77

                SHA512

                b9f61ef3bbf3f7324ac0852c1c49a7a1c576b9168238eb16a15023916cbf1370d49787e8d05e58dbcc6ee8b23427f12a50d203de0ab3226eb6e1a80ee9637f80

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                9b7bf61200f3ff1cc462c09eeffa7362

                SHA1

                a13aadaa87ca4d62d78810f8a03488646d752ec3

                SHA256

                a376c414cef69243ad87a455dae5d5579320a0c2dd6f0fc67250905c560c62c2

                SHA512

                a79cd27594353955aa904631966da45e865f4580e49def86da042237232bcd97e5b09f96c26f70e1557aeca8a154ad993863d453d155a064d8dfa08e951c97db

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R2H8ZEZE\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Users\Admin\AppData\Local\Temp\fig5BCC.bat

                Filesize

                188B

                MD5

                6c8bbc41c21d495ae9fbb12eacc83f40

                SHA1

                44ef01de7fd48dc0cd7be7f66eb8a10676935cd0

                SHA256

                d7e5a65badf6ff490c87cd4912550db8223165b3361ddb3e068a185a9d2b02b7

                SHA512

                6367c21820ff2b27ffdf9ff5fc700021afdae879050585a3a1f8600f2e7f7c1b33bea85210fc9a0c2b1f6c12fdee8f00635e5010a932d453f045840d71ebb865

              • C:\Users\Admin\AppData\Local\Temp\fig5BCC.tmp

                Filesize

                37KB

                MD5

                f6393fd79b14d643dbd422cf5a3bf414

                SHA1

                73fe444cad30d51eba92fc3ed0c1ba2b90b768c5

                SHA256

                ddf5e708f09784dcb0ff00a4db400e552dee8b44bdc0a28c0f88a522b340b893

                SHA512

                7b069a772734ee9e7943686bde8b207f3d5a21b673954d64835c82baebc3d56ae956587c3c0b80a64c387dded2c4fd06bc38daa790bb6dc01687eb6199801f57