Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 13:16

General

  • Target

    3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe

  • Size

    43KB

  • MD5

    3946d82a5bdf452cc353a76d56237ceb

  • SHA1

    65530b998defc8efa8dc27d699f01e82727a612e

  • SHA256

    22a454a6952affcff03b4dfeab6a36424411279f43fe436e0106355c2967ca6f

  • SHA512

    016e423223b9deeb8687e2f15fc629fdab39f8ac70ffca626cb82373011d61664c1e2d5db93e8e6cabaa60465bbb1541a9d431867828d4e752cd80baa3dce643

  • SSDEEP

    768:svMVvp3w/MrDy8VQxGIJYwHWLSxsFCKNgcog1B/9Ad4q+LO3Ez0lf3HPTQ9G2NJS:mMVvp3w/MrvYY+WLBzNgdg1B/9dq+Lqy

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3448
      • C:\Users\Admin\AppData\Local\Temp\3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\program files\internet explorer\iexplore.exe
          "C:\program files\internet explorer\iexplore.exe" "http://www.qqqc8.cn/bw/install.asp?ver=000001&tgid=wy1&address=CE-C5-5C-81-05-19&regk=1&flag=9acb877f8c05b4764977052c46af2c8a&frandom=3993"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5988
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5988 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:5972
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x150 0x304
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~DF46EF949DC91D9871.TMP

      Filesize

      16KB

      MD5

      2d215944686f353b7de219ad3fc7e251

      SHA1

      18c638857ff451f1930e76e569834bb3febe1dd1

      SHA256

      b230a08e053aab74b6a95f7cd4af2d5cae253bfd8b06d3f67865fc9a48d8c19c

      SHA512

      75d290ba6c964dc63e95fc0294dc374818b3bdafae6c544ccce3385de5a091dd00763067e4caced752545512359adff2fc8ca800714831e31a3b99228e775fd5