Analysis

  • max time kernel
    126s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 17:00

General

  • Target

    1bca1ff29cd73c0d6daf5710a4b9bcdf_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    1bca1ff29cd73c0d6daf5710a4b9bcdf

  • SHA1

    a65e5236b9c7b82131a7e34a13650cdc205e2927

  • SHA256

    46a5e470d0f05243a9aeb40a8bf5e9805b42957055a8595e6136e5c82ed0f3f6

  • SHA512

    ddcc66ad4b14b34df9573289760dd3f0bc712512b1882ea1fd700a7e8ab6d001d73e16544e778fd0c3e08b4baa1abd5edb741b243f5e9b8bc2891f0464f20722

  • SSDEEP

    3072:lTvL5e50857bo9oPEajI7AYHfQtMjr0pkd:lTvQf57bYOtYHdn0pi

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bca1ff29cd73c0d6daf5710a4b9bcdf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1bca1ff29cd73c0d6daf5710a4b9bcdf_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\1bca1ff29cd73c0d6daf5710a4b9bcdf_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\1bca1ff29cd73c0d6daf5710a4b9bcdf_JaffaCakes118.exe -rc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\program files (x86)\Internet Explorer\iexplore.exe
        "C:\program files (x86)\Internet Explorer\iexplore.exe" ya.ru
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1088
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" ya.ru
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1240
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    df3b51cc5929f3af03350336b1afc568

    SHA1

    48453c44facbbea059f9da8565cf25b1c2cb9ce0

    SHA256

    2375353160c5f8c4cadce5954ff4a7cc5b9c403890f0404791ff85c8ec0dd748

    SHA512

    d8eaa0761def6d74462748aa794198b5f32fa593662bf373c81e1d300f3f76ecc1c723cef52774caa6482527f26524fd2677a5e2253285cb6d0984b044347e8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    04e61db1a961c6c3e61e8fe354b65d69

    SHA1

    462646d44cf37cdab39bbb3b4034dfdf8e5b4213

    SHA256

    627d8acb67515101e292dcad92cf8ff642f7a0c1748f0abc0be04beb2f500986

    SHA512

    6c5a6eaf7fa971d338188e840ef41b5be4644eb914c977c4ff4576e703dda6651ed899aab3794de12f7c6ae8fdce26937f7d32e85477cf2b9d227831a5039c0c

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\BWVQLNQH\ya[1].xml

    Filesize

    86B

    MD5

    c50959f066787e61b27c6fbd368f62e1

    SHA1

    ca7cae391f00b5d189c59ec89b4a6395bc072096

    SHA256

    4ef13bf3b2386c62101ccd58173a33b2ec3a25e3b02fec39431fb1bb6a036c7c

    SHA512

    4603e5f68e8a845d50ec62b58bc135efd294df8bd179b986c6ee4a9776179403332903e3eebc0967563a0f288e74dd4febdfa0a8bbda91d60c03cb7286d56042

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\1m6rheu\imagestore.dat

    Filesize

    597B

    MD5

    684108ac6b08e64d759c6f34d3b576b8

    SHA1

    4f3e2649f62b2f5a0d356220e4befacab79307a3

    SHA256

    f45db9126fbe74c890e5cb69f1f943d8d0a8845190170f672abd090e8cef570c

    SHA512

    09f7ac39fc6ede2dfe732c2f685880e28a5f358f284a1c76a08fb48924d62a285f1da80ec17a96bbbdc37744771c242751d3a9b98b0b92517e6c36b4fc13c3d7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\AKI8W8FH\213b7d745e28ebdb29d654ef909665d3[1].png

    Filesize

    397B

    MD5

    5c336a88c551e6d484b80bfe7d839457

    SHA1

    e777044cf3cb2427f53485015e7009cf00e84dfd

    SHA256

    0c222f4e596fdd2b9e7f04b8076c3697657d6f9bc2d56e74b259a546c88c7a77

    SHA512

    c969ddc9a34a5cae2f3cf3c360d4895d3cbae46dfcfbd35ce08e0d8b41a8d9c0d2259bf02658f79ed597f9d03304cf4f1389e0b3dba0572c6faedd5ded60817c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DL7YY2B9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee