Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2024 20:34

General

  • Target

    3a9ffa7d1cc97c1321ec9b4702efee0a_JaffaCakes118.exe

  • Size

    507KB

  • MD5

    3a9ffa7d1cc97c1321ec9b4702efee0a

  • SHA1

    6512998169ea546e9a0040bb45dfdd1a1c4d230c

  • SHA256

    9c2bb804af98433447dd87fded6d8d2366219bc804240b0d47aba4c987dca0d0

  • SHA512

    d7b885d9fa6bd99124dbcc21729cc0bbba449e2d827671199d706aef03af8a8d7b1fa34b0d33010eba796dfc97289ce4ca0c3e18e363a755450d51b78e30c9e2

  • SSDEEP

    12288:B0DGax6LM9oJwyRYtEqENSAAKMMl7M/O/B8bI7wKrv/xTLxg9Rjg:BZF1wyRYEF5Nl7YEhwiv/ng

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a9ffa7d1cc97c1321ec9b4702efee0a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a9ffa7d1cc97c1321ec9b4702efee0a_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:380
    • C:\Users\Admin\AppData\Local\Temp\run.exe
      C:\Users\Admin\AppData\Local\Temp\run.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.baidu.com
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4148 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2876
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4fc 0x45c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\GGDART1A\www.baidu[1].xml

    Filesize

    114B

    MD5

    3808171306a47e67fe31ebce8092cfc2

    SHA1

    29731471cfb1e1d8cab815c3de60f7e7839ed05c

    SHA256

    a41538ab1b5e64d45286e4dbd628239141dae40dc80c070c64d3722ee799a4b6

    SHA512

    61e3990f8a557c88b66dd7c5017ab5944e256ec946c0bda5930538cd8e922bc4b918dc0191f664c1fa6728ab99d07c8f038ddc8bb73bd8c54bde5b90830abb50

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\GGDART1A\www.baidu[1].xml

    Filesize

    271B

    MD5

    cdc1e8729d69a34d490d5517f8395080

    SHA1

    958bafa5bff6c5a6bb5908ff5f8531a143ec2f0e

    SHA256

    95887035c62f0c28cc3040ab71154606894a1707b3824a4a0c39bdb73dfedbf8

    SHA512

    711bd8717be70603425fbdbf0d23cade55acef43c148f06b9fb9c6e91e831666333dc6074b91f01e4b74c18a016a38f2200e051f9c8fb6717f131ec6cf42601e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\wtwvts8\imagestore.dat

    Filesize

    16KB

    MD5

    78b105f27033ee5d2720b6d3aa0ec859

    SHA1

    353f3ebcc9e121d902019400c8f660bbdcfa0de7

    SHA256

    931ce6f9cc10f261db143a9ba024e4830ef9c41127ead2fbaa93e3ad43df1e8a

    SHA512

    9eaec84c03a82914a3f468b0c1c9de9be7b8b630805d530ab5363656a65063159792a8ccfa873931cc4ea8c8fe8e859c95ad75489dea7064a7405a93d1296e6c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R9TFLRJ7\favicon[2].ico

    Filesize

    16KB

    MD5

    717b138033a41361b32b60fc5062ab2a

    SHA1

    af9841b6f0923f890f41feec52c94a0cd68f01d8

    SHA256

    c70088079fe9441a726c66ce0e73ae38315ec80051d3dd542c41b82fa0a1993a

    SHA512

    1985bf59c3ee8289bbe55fbe572371d1f401949e6a0179b35ca89e292173780956161feb257303fe9ff5fd2898ca7fd6105eb1796841ade0e1124eeb89aa70ac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\R9TFLRJ7\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\run.exe

    Filesize

    16KB

    MD5

    db1537795498c6a83203d2cd4b421dfc

    SHA1

    dba3511aa3dc43af1f71d2a69d6fba7998527e1f

    SHA256

    77e6576e2524bc595d3c027d37b68c0668bd8718151809119eb402c20632233d

    SHA512

    c98d960863e8108e2db28fa72129261135d3a8912dd2e7bffffac77a87783fedf8053d64a3400e56e4c112e48be8cf7ede67fd6b07970d959e147ce9f2cd5e2c

  • C:\Users\Admin\AppData\Local\Temp\xp corona.ini

    Filesize

    13KB

    MD5

    7eca282e3eae667721e6561abc1bca9f

    SHA1

    cd8c56da648d3a0332bb52ac4a80dc34083b4878

    SHA256

    cffd8ee1978e4a5b60e8eb70291df1ccf3e92317fb22d3ff24b73688b108a1f3

    SHA512

    8f70e86177fb4fe56288ec90f50f8c3b728ce9eb33127c80a2dcaaa863c3cd2ba22746c91ecd8a03023512939a97bd3ecc2b56674d87324611e50a5ed55d3e98

  • memory/380-344-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-343-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-345-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-0-0x0000000002390000-0x0000000002391000-memory.dmp

    Filesize

    4KB

  • memory/380-342-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-341-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-460-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/380-462-0x0000000002390000-0x0000000002391000-memory.dmp

    Filesize

    4KB

  • memory/380-469-0x0000000000400000-0x00000000004E2000-memory.dmp

    Filesize

    904KB

  • memory/380-340-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-339-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/380-338-0x0000000004540000-0x0000000004550000-memory.dmp

    Filesize

    64KB

  • memory/3540-461-0x0000000013140000-0x000000001314F000-memory.dmp

    Filesize

    60KB