Analysis

  • max time kernel
    142s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 16:15

General

  • Target

    098744e8f6cc61a1d7a311404a1298c1_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    098744e8f6cc61a1d7a311404a1298c1

  • SHA1

    55fbd0ab4a5fb08ec0f39ebe80425eb84f55eaa3

  • SHA256

    99512da888db5472c201e2276b96f7034efb857908759c9f3ca97d4f6c083fe7

  • SHA512

    22cda424a8f537ad8920ea247611ac425e402b33b221e632ae2568fe4ad75a56056b3571b6385279adf28e2cea19c547c5c3cc17e84028e7b7c91a56a585e314

  • SSDEEP

    24576:cJYODL+aEDtcMd+5a/yK0jpzB1vsH7HEwLkEgJGRZ6yHRhJHfe:cbhEV+3K0VzpBJGRPF

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\098744e8f6cc61a1d7a311404a1298c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\098744e8f6cc61a1d7a311404a1298c1_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" www.tt336.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4232 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\ZZCP5PCQ\www.google[1].xml

    Filesize

    95B

    MD5

    5628ee29a297ab739949f4cb0303fb00

    SHA1

    50dbb8be1560b4f80df29fb3212289a28f781efa

    SHA256

    e7245b46c6132c64d04ba9a528c599f2700cb914b44864effa6656bf15194485

    SHA512

    6eba55ab55cd7dc8c72867332400100b4d353708511d68a49c3c702e71c1eb1e51e268ff97a64ad46156d759a25b1f5261c161e043da29a9f7288a2486a46da9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verBAD4.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\7p1qk7k\imagestore.dat

    Filesize

    1KB

    MD5

    d87f15386de48a6e09259883d969fddb

    SHA1

    09851d22f3754cf099d422bd99ad32c4287b8038

    SHA256

    7b45f70a7655897f883565e35bb96948056b86ae35dd7ce54e253747ce0d90f5

    SHA512

    cc6dbef22229a2a8fc8c4496da68c4630e163901ca045faad5e3c650c61780d5940676493dd3f2d6cf9f7b7673dfc40d60ad8512ca44ec6ea8319f28eca653c0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\E9YVC3IR\styles__ltr[1].css

    Filesize

    55KB

    MD5

    4adccf70587477c74e2fcd636e4ec895

    SHA1

    af63034901c98e2d93faa7737f9c8f52e302d88b

    SHA256

    0e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d

    SHA512

    d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G7AAJOBN\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XIQH11PJ\favicon[1].ico

    Filesize

    1KB

    MD5

    0106d4fd24f36c561cf3e33bea3973e4

    SHA1

    84572f2157c0ac8bacc38b563069b223f93cb23c

    SHA256

    5a6c5f7923c7b5ba984f3c4b79b5c3005f3c2f1347a84a6a7b3c16ffbf11777d

    SHA512

    57b77c5d345eca415257e708a52a96e71d3ddf4a781c1f60e8ba175ea0c60b1d74749cd3fa2e33f56642ce42b7221f16491cf666dc4e795ecc6d1fbfdb54ab98

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XIQH11PJ\recaptcha__en[1].js

    Filesize

    516KB

    MD5

    1bb4ebd5a1126f7287c58e242a7188e2

    SHA1

    f06c98f9b76c942631ca4ced196b6ccff5aae339

    SHA256

    4b20abde9f7eb27dc344dbbb35f59aba01e4cc70262c07c260beadef9072f25e

    SHA512

    b51fe40ab04c98c21b1f233cb335f5d1ce2f496a2b07544025e5a89c171413ed1755bd5d9900ea43f0495fce190d4607b6d53c3d8078ebfaaecefa97471c8abe

  • memory/5112-0-0x0000000000400000-0x000000000072F000-memory.dmp

    Filesize

    3.2MB

  • memory/5112-1-0x0000000000400000-0x000000000072F000-memory.dmp

    Filesize

    3.2MB

  • memory/5112-161-0x0000000000400000-0x000000000072F000-memory.dmp

    Filesize

    3.2MB