Analysis

  • max time kernel
    145s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:17

General

  • Target

    687d26d390893bb6429bebe908179a83_JaffaCakes118.exe

  • Size

    95KB

  • MD5

    687d26d390893bb6429bebe908179a83

  • SHA1

    f21edd2af388ba8b8bcb3c71b5868565f8de98fc

  • SHA256

    123cd5ddd32b4af1895cfd438b460b05c824b25c4705ffba54638f03e0c815b1

  • SHA512

    25e10c3583d1f0f788294e2ad7a8b8a411cf1b53cade35bd6c21bdd86752dbcd6589648612577ac7ef88da5f6e2d2a4c9e2ee0b05af922c4beda890599797435

  • SSDEEP

    1536:fCPsWjh/+90uvEfGIWjh/+90uvEfGbWjh/+90uvEfGYiZ4B27++5/G+VriJ:fCPsWjh290uvEfGIWjh290uvEfGbWjhX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\687d26d390893bb6429bebe908179a83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\687d26d390893bb6429bebe908179a83_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://search.myweatherxp.com?uid=2e50614f-2440-4320-8576-0472c48994fc&uc=20150629&source=pd_gs_weather_weather_e&i_id=Weather_xp_0.0.0.5&page=newtab
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4540 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3424
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3852,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=4108 /prefetch:8
    1⤵
      PID:1308

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\hbgcal3\imagestore.dat

      Filesize

      110KB

      MD5

      cb202d32f7becf01911598a7f1e2b18e

      SHA1

      4e5c0b5064ee04d9bdf37d7961573513036dc68c

      SHA256

      49d7d91730311ffe56d755f3088cc92e2c69856efc41b11b5ed942a390b3041b

      SHA512

      0b154e8fdbd326265750a8b59680e4fc52c0c520bd7b90a436e9955f470ced6eb048a3d498de065b93747d766649fd11104b66c47ccd6cdc68b5b14848ccc6ae

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\44ZGVQ6R\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VVOFDIUO\analytics[1].js

      Filesize

      51KB

      MD5

      575b5480531da4d14e7453e2016fe0bc

      SHA1

      e5c5f3134fe29e60b591c87ea85951f0aea36ee1

      SHA256

      de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd

      SHA512

      174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VVOFDIUO\favicon[2].ico

      Filesize

      109KB

      MD5

      504432c83a7a355782213f5aa620b13f

      SHA1

      faba34469d9f116310c066caf098ecf9441147f1

      SHA256

      df4276e18285a076a1a8060047fbb08e1066db2b9180863ec14a055a0c8e33f1

      SHA512

      314bb976aea202324fcb2769fdd12711501423170d4c19cd9e45a1d12ccb20e5d288bb19e2d9e8fd876916e799839d0bd51df9955d40a0ca07a2b47c2dbefa9c

    • memory/1300-0-0x00007FFBF94C5000-0x00007FFBF94C6000-memory.dmp

      Filesize

      4KB

    • memory/1300-1-0x00007FFBF9210000-0x00007FFBF9BB1000-memory.dmp

      Filesize

      9.6MB

    • memory/1300-14-0x00007FFBF9210000-0x00007FFBF9BB1000-memory.dmp

      Filesize

      9.6MB