Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 06:05

General

  • Target

    69fab0fe3c28cef0ac3be3e1554fe980_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    69fab0fe3c28cef0ac3be3e1554fe980

  • SHA1

    809621f7651be4b115d1c89ef42a5001293223f1

  • SHA256

    b3024ac81e9cf25e75fa15da666924bff11445895f7f1b46c4a2c21f2a9908ae

  • SHA512

    431e540bc59287ab6b784c3beae913650bbc43774f75919c2ee281ccb46d1f37587926997010d74ef0f7a40ce3f3a2b1492f4b7c9fb23765056db1da1291cbfb

  • SSDEEP

    12288:msM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQr:dV4W8hqBYgnBLfVqx1WjkG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69fab0fe3c28cef0ac3be3e1554fe980_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69fab0fe3c28cef0ac3be3e1554fe980_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -noframemerging
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:408
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4176 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1796

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      471B

      MD5

      01409a92b179c99711ea8c28d307d0c4

      SHA1

      a9cc2b0c5727e2af14819f3908c4693f8e891392

      SHA256

      3034962a4c308ef5e66a2de7faf1ed2439b7e59086a8c07ad59ce3669b8ee01c

      SHA512

      8e86173a54d253f3e05443c603222b9018d63a3fb8e3a26b2b5602c083c07b117d5c53ede08056b6aa4503380562444c6704de32b2cce76f146478616b7278c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      404B

      MD5

      4f10c2e221200c64424fb46bb72ef69a

      SHA1

      ea66caf80cb06d0495292ad45e262fb1ae2a385d

      SHA256

      811f6e75ee83a355f2c3d13ed2884822ac1370f741397ecfb72e7d845c1cff3c

      SHA512

      84924d6e1654c885d71ff9940f249f302220c0df0ff40016236c5ee1237de4bdd98b607873af2328a7747b1121fc5baa611b1a97288182fc2e0c9ffd440ad5fa