Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 14:52

General

  • Target

    fd026935438be605c338ee345f8a09f5_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    fd026935438be605c338ee345f8a09f5

  • SHA1

    a53de4e33385343ec10fd8d7c5bdfcdc22eb40aa

  • SHA256

    0825ba1eb7e8d23c2e2b4a6e65da8421e723c27d999e6f7a2b7c5882eacc7abe

  • SHA512

    7ad3922edbc00611f119129ffd3016a1a9b6973529dcfd396f612eddf89f23e76cf19c850bb7a1478836cae5ad35904ede47c0dea196e2ff8396bd482be70b4e

  • SSDEEP

    24576:bVo0r/4p6qO4pDlPJsZtZQk5p8hulbEwfuBpBzjRvdsxlTShiVq:h/4Qf4pxPctqG8Il+nxvdsxZ4Uq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd026935438be605c338ee345f8a09f5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd026935438be605c338ee345f8a09f5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/6jb4v
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3980 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4956 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4660
    • C:\Windows\SysWOW64\Wscript.exe
      "C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft102907\b_1007.vbs"
      2⤵
        PID:1976
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1040 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4596

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\jishu_102907\jishu_102907.exe

              Filesize

              1.0MB

              MD5

              e2590fb7bac27dbfa512820e9139f28b

              SHA1

              209d8d0b77c7a8863a3c68464ce47f6a3f00d454

              SHA256

              4369c213390dd318aaf57b841e338f0b781b16e61713c39e3d961d6065de1821

              SHA512

              a6b8cdac512c2d05eb2270f8b4f64248cc177785acbd8d4f0ad725acdd2c894f639e7e7259066a8014a79d69f213812dc09793a2bad7a3d6bd9a511f3ee57223

            • C:\Program Files (x86)\soft102907\b_1007.vbs

              Filesize

              226B

              MD5

              a792260afcdb0fe28ec391dd5634c0bf

              SHA1

              99d9404d3c6351ab435763a85da14c614081b6a0

              SHA256

              ed667b88626912ad54113395b7b6172c20a65756b9b7527cb554f19705156c62

              SHA512

              ee8d68a45cb1a4cb5073eb5713865e44b34000631137d54d5fed4061e5a0e6912f3b7a9c6baf9a28d1e4a1734f06884aa289c06e3b913495d6b7b0928be8faf4

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              b1537a27ac0200c7fc0b7a857fabd617

              SHA1

              aabe8a42992e616fa04c8921a5d0fb05c935bd75

              SHA256

              4c9ee2fbaee2cb91b53a8d85cee47899ea2ff8b1523d31fd1d16a4d56c911205

              SHA512

              870979838bcd45fa7e4ad827e9019f61b1c608c61f7c28fdd7d7ee55b53d6d953385e27ada6cc8950071060d65de803a2f5905a98bc785b4884b70dd7ce59075

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              404B

              MD5

              4a9565ccc00fb3e79cb3570e54f4b857

              SHA1

              0296077254ad7449f0114edd411835dd0642acda

              SHA256

              3035db6e719903d60539c7ee3857399a5b115e64d82133da98b48d8b9372bb12

              SHA512

              33392ee864201b1254e0ddfdc897404dc8da3172883ad6e662bf067d2b39b9156a447afdfdc666c8be723932c1f731dfdf454c60219e09983fb6fcb62db1e4fb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              404B

              MD5

              c3698873af5ca61ce4a22caeab97f130

              SHA1

              8e61e7e9f2ad95625d44b322a2c04002071bf4a0

              SHA256

              37c5ea1443e6ab7d2910c3fa80eead6d3e4265c5f26bfdc92af79c1e6bcbdef2

              SHA512

              d8651d5ee5288b3d2cb139e47a77042a4edd69b0ee59c6f71378e70ec9ad2e29093e0a8de8afba8f1630bf0ab7ea3cda2b324358a7a02ce348bbd050b6691c40

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9EB33A87-FF25-11EE-B9F7-4A65E849A069}.dat

              Filesize

              5KB

              MD5

              7e8ddf3c41a7c42a18c36190c00521b0

              SHA1

              6b84d2aa81371399761c1871a2d433c495dfd27d

              SHA256

              b0e37a060192ef5c2e6877e93f19bdf9249d50708b3e7ee847c3500bf654dbd0

              SHA512

              10f038962e805cf02374e7cb38522be479334bbc2590826c4e069ab97840d7610c1d7ef61c3e320d49a3067aad79fea29e2b65bf80db4acd395cb78d65b91aa1

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9EE562E0-FF25-11EE-B9F7-4A65E849A069}.dat

              Filesize

              3KB

              MD5

              60e49d58d1cbb5b8b1e2e02b6915fd68

              SHA1

              f8ce9e9051f176f719dc997a180a847c3f890b86

              SHA256

              c0fd79fbc02692c9a5cc12a6d25bd0f1f41dc47622bb74aa760dd721000d2708

              SHA512

              c865ca898f1d63ccea5b5e292b44b28fffe572fb6f61460ffea10c38da126267c9129058a3295e00525f8f3e1d705ff5572f58ef50f55f97dff88c7aba349d95

            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver9304.tmp

              Filesize

              15KB

              MD5

              1a545d0052b581fbb2ab4c52133846bc

              SHA1

              62f3266a9b9925cd6d98658b92adec673cbe3dd3

              SHA256

              557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

              SHA512

              bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BHC2O5WS\suggestions[1].en-US

              Filesize

              17KB

              MD5

              5a34cb996293fde2cb7a4ac89587393a

              SHA1

              3c96c993500690d1a77873cd62bc639b3a10653f

              SHA256

              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

              SHA512

              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

            • C:\Users\Admin\AppData\Local\Temp\nso1E0.tmp\FindProcDLL.dll

              Filesize

              31KB

              MD5

              83cd62eab980e3d64c131799608c8371

              SHA1

              5b57a6842a154997e31fab573c5754b358f5dd1c

              SHA256

              a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

              SHA512

              91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

            • C:\Users\Admin\AppData\Local\Temp\nso1E0.tmp\NSISdl.dll

              Filesize

              14KB

              MD5

              254f13dfd61c5b7d2119eb2550491e1d

              SHA1

              5083f6804ee3475f3698ab9e68611b0128e22fd6

              SHA256

              fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

              SHA512

              fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7