Analysis Overview
SHA256
ea6c5ec95966438d79e3a27ebc34eafd0fd6489726619dc1c8731bb34bd073c8
Threat Level: Shows suspicious behavior
The file a645aaae5ebbd9bfd131653c39be9887_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
UPX packed file
Enumerates physical storage devices
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Modifies Internet Explorer settings
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-13 15:32
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral4
Detonation Overview
Submitted
2024-06-13 15:32
Reported
2024-06-13 15:34
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe
"C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 17roco.qq.com | udp |
| US | 52.111.229.43:443 | tcp |
Files
memory/3244-0-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-3-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-49-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-48-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-47-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-42-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-40-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-82-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-80-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-120-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-78-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-76-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-74-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-72-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-70-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-69-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-68-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-67-0x0000000002650000-0x000000000268D000-memory.dmp
memory/3244-65-0x0000000002650000-0x000000000268D000-memory.dmp
C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url
| MD5 | 514d1b59ae8925c5edea3c446ce588dd |
| SHA1 | 60dd675b65c7ffaac6ca731dba265a6f316a6f75 |
| SHA256 | 6bbfe9e113e075b646ae49400657b8bb20cbab06854b38bf007ac6e15cd7b773 |
| SHA512 | 5bf3d0f1715b445852ad184907d2161967d51cb8fe9673330438d8705502bc63e263222c43839140c613a427b0b58b297e522b3953c2543453625e01b8017253 |
C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url
| MD5 | f9fc3e4f710ea6068eccca29ed784970 |
| SHA1 | eb6f961e7102e3aef227b204ff4dd9563f745812 |
| SHA256 | 1c12badabe490d7c3d63bb0187965344ce0ed923eab707e446900a9b98913fcb |
| SHA512 | b2d0db7a2c4b4d4e53a8daf2caff6a0ea826133038380e5dcf8c6493417f2884ecd61f047798189a3cff13cca3b9dbe99e5a501ce5de10488b2a337389b019ed |
memory/3244-38-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-36-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-34-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-32-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-30-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-26-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-22-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-16-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-14-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-13-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-11-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-9-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-7-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-5-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-2-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-44-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-28-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-24-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-20-0x0000000010000000-0x000000001003D000-memory.dmp
memory/3244-128-0x0000000010000000-0x000000001003D000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-13 15:32
Reported
2024-06-13 15:34
Platform
win7-20240221-en
Max time kernel
120s
Max time network
121s
Command Line
Signatures
Processes
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\ucbug软件下载站-www.ucbug.cc.url
Network
Files
memory/2924-0-0x0000000000320000-0x0000000000321000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-13 15:32
Reported
2024-06-13 15:34
Platform
win10v2004-20240611-en
Max time kernel
148s
Max time network
150s
Command Line
Signatures
Processes
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\ucbug软件下载站-www.ucbug.cc.url
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| BE | 23.41.178.90:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 90.178.41.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral3
Detonation Overview
Submitted
2024-06-13 15:32
Reported
2024-06-13 15:34
Platform
win7-20240508-en
Max time kernel
122s
Max time network
122s
Command Line
Signatures
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe
"C:\Users\Admin\AppData\Local\Temp\扣扣助手の傻瓜带练 最终版SP3.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 17roco.qq.com | udp |
Files
memory/1936-0-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-2-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-5-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-4-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-3-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-6-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-9-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-11-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-14-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-15-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-27-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-23-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-25-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-49-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-48-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-45-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-43-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-41-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-39-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-37-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-35-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-33-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-31-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-29-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-21-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-19-0x0000000010000000-0x000000001003D000-memory.dmp
memory/1936-17-0x0000000010000000-0x000000001003D000-memory.dmp
C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url
| MD5 | 7c8c531ff6a158742da186b1fad6e00e |
| SHA1 | 98d4551e0d6ac034838a17437640f3335edfaa86 |
| SHA256 | 00ddbc71282fdbf74b8a02cc75b2c3d66529fe7664c148cc0ca79576a883c501 |
| SHA512 | 1788173da6e9cf7e5421c02854ca9122d0825927f33fc64bafb76377ee80c0e1a8112c36ee40b1cbce86e121f864777e8ddf9aecd282f3cc82b70e12cc904805 |
memory/1936-65-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-72-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-74-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-120-0x0000000002E70000-0x0000000002EAD000-memory.dmp
C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url
| MD5 | 3c12b619f5b9575ba2944b7ca4678929 |
| SHA1 | fa6792387198c2d93de2619059efc5206341198d |
| SHA256 | add35880f84004b1422166fe432267249036168ddcf0185481769021980b300a |
| SHA512 | d1e370e03affc9acfa770edc5959bc8009d15d026e4f4cd45314c8e213e371b765828f7a4921169c62c6848dcdbda38311620f4b7af922479b923a6ef12a355d |
memory/1936-82-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-80-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-78-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-76-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-70-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-69-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-68-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-67-0x0000000002E70000-0x0000000002EAD000-memory.dmp
memory/1936-132-0x0000000010000000-0x000000001003D000-memory.dmp