Analysis

  • max time kernel
    125s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 03:09

General

  • Target

    024d2a7a270856dbf6ccfe70048f2f06_JaffaCakes118.exe

  • Size

    528KB

  • MD5

    024d2a7a270856dbf6ccfe70048f2f06

  • SHA1

    8890e636c369b8a57e6833109106c422b129cb82

  • SHA256

    9fe663c17aed69d7173dc801245c7bf4163d5cc518d05c2ff7b7c58c8a3c793e

  • SHA512

    32ed75c46825da62deaea2b2bc838e79ddb20e34efbd33057e3bc0dabdf4c427cf6f2058701465e9706b0911b6cd8931b0be1700007ef12f8bf28f504f5957e8

  • SSDEEP

    12288:CP6ys+NgzZhkDjhgrpT6rWKdP9k8gz3hy5yz:WBNUfkiNOzG8V

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\024d2a7a270856dbf6ccfe70048f2f06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\024d2a7a270856dbf6ccfe70048f2f06_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://6l.cn/s/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3856 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5092
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4324,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=1324 /prefetch:8
    1⤵
      PID:4848

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      a20dcdd581a69f44e7dcbeeab5084fb4

      SHA1

      61e152b89ab8a04af1843bbfee557d193924ec51

      SHA256

      009768e52ded8da33ac7d96d521e882eef9765278997f2ce47311f637696d9c7

      SHA512

      77de84bf9c5480e704991bc16d8f555dc10891e3a5a7044fe2b133cc49d20ebb78c68bbdd4c9a4acd8e7424bce28a00bd3651f3b852a2a726f3f879a741cc7ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      ea03b70a93f46fee927db16c4f3376bc

      SHA1

      e391acbf873c26b4133dd3b1b767de05e7c9f33f

      SHA256

      ac528bae32112362dab8234c3dae6681ab1c68634080170e348938ba3fcb28f7

      SHA512

      2b76046b6a51eb51dcd693e42ec13d8600ecf1e8aa20acbcdd1c3eb66f3f78538fbc85c84cfec30340e474eba4b9318398c227960b4142a0f49c5028c75bf818

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YOJF4VYG\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • memory/5072-0-0x0000000000400000-0x0000000000484000-memory.dmp

      Filesize

      528KB

    • memory/5072-8-0x0000000000400000-0x0000000000484000-memory.dmp

      Filesize

      528KB