Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 08:48

General

  • Target

    ed071c3c5767410ccaae85dc18bc0e4e_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    ed071c3c5767410ccaae85dc18bc0e4e

  • SHA1

    16becb2885da3af1fbcaa03d1c6860b405244cda

  • SHA256

    2411e9fdd346a1d390e245bd8e227f7d97b4638a0a7a6490236f90bac686dfa8

  • SHA512

    9f205b5a64c499ee4dfb380aff0cb78ac20718bbc46b59bf1c8b56ab76d922338b9a3b157893d8da7e395459153be2ced6ca9b388045a0e19de7827f5d304636

  • SSDEEP

    24576:b3nr/4p6qO4pDlPJsZtZQk5p8hulbEwfDpBzjRvdsxlTShiVCkI:Tr/4Qf4pxPctqG8IllnxvdsxZ4UQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed071c3c5767410ccaae85dc18bc0e4e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed071c3c5767410ccaae85dc18bc0e4e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/i0dpw
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4376
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/i0dpw
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4556
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
        3⤵
        • Modifies Internet Explorer settings
        PID:3112
    • C:\Windows\SysWOW64\Wscript.exe
      "C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft163004\b_1604.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\soft163004\300.bat" "
        3⤵
          PID:2544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\jishu_163004\jishu_163004.exe

            Filesize

            1.0MB

            MD5

            e2590fb7bac27dbfa512820e9139f28b

            SHA1

            209d8d0b77c7a8863a3c68464ce47f6a3f00d454

            SHA256

            4369c213390dd318aaf57b841e338f0b781b16e61713c39e3d961d6065de1821

            SHA512

            a6b8cdac512c2d05eb2270f8b4f64248cc177785acbd8d4f0ad725acdd2c894f639e7e7259066a8014a79d69f213812dc09793a2bad7a3d6bd9a511f3ee57223

          • C:\Program Files (x86)\soft163004\300.bat

            Filesize

            3KB

            MD5

            6131837339d425e352a7dea45ae2fe46

            SHA1

            8d42257ccca54d9c76ac54fc5e4cce2b454673c0

            SHA256

            b84d1bec327e717656eab08140f7b8abf2cd3153e58b973a98ffe8f39cd36739

            SHA512

            e1ce60f8654decc701a109bdecc027cb24c0f9cdc80527ef83ad94b853d9bcf4f1d23482385c611acd5919965b2377353e1df63097770125b00914aa8d5f2c42

          • C:\Program Files (x86)\soft163004\b_1604.vbs

            Filesize

            247B

            MD5

            72710dfc62d9f8dfa2cee1842df4c55b

            SHA1

            539d6884dd08b9204e8d4763f8cae0c77c5181a9

            SHA256

            c74b0695fa73b33cea44cbaf76ef896e53f9190c386ef39a1b2a1015e58511fb

            SHA512

            d50832d47e6990f9127084d65775b664fa7d9d6eaff895389dc29dd247ee252e21064ecd63d80fedd5c550b87166949460a80be23af184e93aa11bed898b3aa6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            471B

            MD5

            2d2887752c9c5a173ffb659c987ac49f

            SHA1

            eeaf9320a377a2c040e4b84cd53b2ccb8e6e0726

            SHA256

            b35e4fd0344d352e06b1377781ba325f7c85a461d12a02d0f4b692a22418869c

            SHA512

            db897836fab72d96bd7cba442d05fea6188e30f6b164f0cd3fc23c9c42b2dad5e187948cfea10a9b03bc5a5e12fe0109d1fb571c8051339d2e1aabbe39ddaa71

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

            Filesize

            404B

            MD5

            d1ecd39d568517f93df9560bf8668dd4

            SHA1

            9ac7799be14c9d9f8157ff908476acbdc263317e

            SHA256

            ede623a664360208db56d3cfe1046da014ba8b23008655151fe0871d7f2e66bc

            SHA512

            565b8a646eb1c2a9710c4c4d328ed3c4de47ee465b2d09df61de4088e648cf1e256dd6f00eea55918a0e631f9fc74234996bd2da212fd36a8e3c311410515cf5

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verB2F4.tmp

            Filesize

            15KB

            MD5

            1a545d0052b581fbb2ab4c52133846bc

            SHA1

            62f3266a9b9925cd6d98658b92adec673cbe3dd3

            SHA256

            557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

            SHA512

            bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1YRVVION\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Temp\nsf3B06.tmp\FindProcDLL.dll

            Filesize

            31KB

            MD5

            83cd62eab980e3d64c131799608c8371

            SHA1

            5b57a6842a154997e31fab573c5754b358f5dd1c

            SHA256

            a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

            SHA512

            91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

          • C:\Users\Admin\AppData\Local\Temp\nsf3B06.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\ Intornot Exploror .lnk

            Filesize

            2KB

            MD5

            3707c08a9c82c475c202da801e147e79

            SHA1

            0b1aea8fd786d56bdaf56a0f58f7e50dd745bdd8

            SHA256

            2cdbb3ebd3b63340de4e47dbf61310d368b92650ebf739fb7e11abaf72ffd6ff

            SHA512

            5e204a94b7290c072962858d9a8bd907049e9383fd91655e1a22d05813bda9586411939f574e044ddc9a95d19a8fe719d74a269051008415ede20a460023c3ac