Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 23:18

General

  • Target

    473643f2081777b42f59f9dc71c24dbf_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    473643f2081777b42f59f9dc71c24dbf

  • SHA1

    5ae407baa2027cab62d2696d040d2392897e7ce5

  • SHA256

    eb86a1c8c3cdadca587d843dccc8555ca38af9f330babf4ef6563f7c5dc87d69

  • SHA512

    b3ad6d0b9c5bac62b2d9d7095cbd06a75ff732279b8e92629178901351351e15634780a1a6cfd75a01babdce3c2174917a7870fad9f1f05f39c1a0036e778001

  • SSDEEP

    6144:cdYwYnARrVid3pr9oj1mazmJDDJDyIYnARrVid3pr9oj1macf1:UJVZ0MIazmJHJWIVZ0MIaa

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\473643f2081777b42f59f9dc71c24dbf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\473643f2081777b42f59f9dc71c24dbf_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3180
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:4512
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3292
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x518 0x328
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\U0N5XCCD\www.4tube[1].xml

      Filesize

      336B

      MD5

      93fa5a292fdc94e3cacec27050bf30fd

      SHA1

      7a13718f067877f0e7d6b70bd817a8ee3a3e3f5e

      SHA256

      924f05a542d24ed14aa54eed077834c187d208964c8b03f053823970ed4f22d2

      SHA512

      17cd08e843fd2851ee45bffdf35d5943a7406112ae7a7634837383bf5aded5a4dfac1ac40f6695e6c6bd694bdc6043c21be976f797226e82c4066499865cfc85

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\U0N5XCCD\www.4tube[1].xml

      Filesize

      324B

      MD5

      2ffbd395c3ac3f6848b88bd61da10369

      SHA1

      8781ecd1b3725e0786116eeb8b9ad47d74cd4e74

      SHA256

      4d0a6751ef3e839938d83999ad8b880f3392e84af1a927650a6b8b885e516cc1

      SHA512

      4bd5dd56c83e9ec5a15ae59af159b223d16055439f183cd2ee84f06fcbc31f7e4d53d0f773ec718e6499ef2887191d1e554dece2b767a7aa9e5d62afd192bf28

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2zzfwt8\imagestore.dat

      Filesize

      3KB

      MD5

      37fccb853c6ce13324e95025c486c2de

      SHA1

      4c3408d45dd9c0cad50820c6b1e30e3da1bd4eb9

      SHA256

      ffa9e7ca290a73b8a195592a512eb93d26c8d21c44a0fff9361a4482b1a00088

      SHA512

      c2645bf8bb4b8710ed2e23caca2554f01634cc14b0b9427b7c2c3087682cf1015f7d20def59c4ccaf804ab883abbcc951fa11d99145d192fa76546d0f4710709

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LIDWBKOU\favicon-06b7221b58[1].gif

      Filesize

      3KB

      MD5

      06b7221b583655a4b7e7659118428298

      SHA1

      2ca646b8b27e5c1743c6924c69c43de4bc5413aa

      SHA256

      907ad1ebbd2992e37c7ed51cc1e26d6f5a9e48039de03bd1e8d46b46101977e4

      SHA512

      c3a28f8f6e6898c559a3fd94fa9dda27725d77ef8bdbad63cd0c220ef08eec5afdc626a9ee829937513c406595be92078cf0e7f60be49a7b1281b6c13a92a93f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LIDWBKOU\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QOWVUGSW\ad-provider[1].js

      Filesize

      162KB

      MD5

      710721b64ea5e3867ccff5f3de8ef294

      SHA1

      18483d80947e14cf49f8c9ebbe3391e1f48fd0bc

      SHA256

      bc0563abe13d7d9aa2d4b78a528f19ab616341e43dbf486aabca10559ae58e64

      SHA512

      c17a8c9e51c14d5f0fdf283f2049ec128753630f1a41e5a9f89007c2c0f973bd8cf4213091469ca494387912a3a6374af21756b35716b0dcf04b9c36e9fcd92e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QQL8WXAG\ad_detail[2].htm

      Filesize

      3KB

      MD5

      54e3bbd40379c4688aea34601db2701d

      SHA1

      868da5810ad26f56c5281a5e8ef8d360d0ad89e3

      SHA256

      09524e8022ef6a6aea469d327550df91b74186f157f64b60703368eaf6df8937

      SHA512

      fadb63ec1d7a8e4401285e2e129b6af5b06605b274afc84d74de46657dbf55e7b4a770d55c1c7ca7462f32ff496b6bdbddd93f684b5f99e1091709b5cedd2d58