Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 07:57

General

  • Target

    48e5b43d70edf0cfdac13f8108f60f0e_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    48e5b43d70edf0cfdac13f8108f60f0e

  • SHA1

    beccf5e2e08420aae5bc21b85a4dad8df16e3d0b

  • SHA256

    2aebc52e5dd5b3a1667c92539fd654729c52466a9168130c5cd8f96a345078b4

  • SHA512

    ab611659eafe205e762b8093e78ae9071c1c1255d4a63f6a50d4ed875d5dafd368b6f28da9b52dcc30f10ea30097044851276e6ef9da075c6335e76513e93644

  • SSDEEP

    24576:lTlr/4p6qO4pDlPJsZtZQk5p8hulbEwfDpBzjRvdsxlTShiVCZFRi:JF/4Qf4pxPctqG8IllnxvdsxZ4Uag

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 8 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48e5b43d70edf0cfdac13f8108f60f0e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\48e5b43d70edf0cfdac13f8108f60f0e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://taourl.com/i0dpw
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://taourl.com/i0dpw
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1268 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2624
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.178gg.com/lianjie/10608.htm
        3⤵
        • Modifies Internet Explorer settings
        PID:3868
    • C:\Windows\SysWOW64\Wscript.exe
      "C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft142321\b_1421.vbs"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\soft142321\300.bat" "
        3⤵
          PID:3980

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\jishu_142321\jishu_142321.exe

            Filesize

            1.0MB

            MD5

            e2590fb7bac27dbfa512820e9139f28b

            SHA1

            209d8d0b77c7a8863a3c68464ce47f6a3f00d454

            SHA256

            4369c213390dd318aaf57b841e338f0b781b16e61713c39e3d961d6065de1821

            SHA512

            a6b8cdac512c2d05eb2270f8b4f64248cc177785acbd8d4f0ad725acdd2c894f639e7e7259066a8014a79d69f213812dc09793a2bad7a3d6bd9a511f3ee57223

          • C:\Program Files (x86)\soft142321\300.bat

            Filesize

            3KB

            MD5

            610287004ed9ded3f0a170b54bfe780b

            SHA1

            af45001590132e2899d49cfee762eafbe8782c56

            SHA256

            e7c3f062d72c2bdc49e32af9e210a83d16bff6ef0fe966cf5bceabaa87aaec31

            SHA512

            8d9314ec8448515a0967302a9ce5a04e0a01537fde9b881d8314e461b4025ba651af66c929463707ba9a9be3510f3a186c7233d8a9a4340b80e2f3d3d583bfb6

          • C:\Program Files (x86)\soft142321\b_1421.vbs

            Filesize

            247B

            MD5

            d0b2473140927d4b20cb3c1cf8e0f2cf

            SHA1

            d1f085508f0ec72d39e1396a923e87bda7e50c34

            SHA256

            ba453c6dfb3b37cb7fa513379eaf81057726b2904caefb3dd29d15c186212977

            SHA512

            4aca9312b8da74ddc065df315e76989efd0202e5e9bfd8a199963560e9684c95f4437c773bb46cddffdd29b8c31e272d0f3dce0910d5207700c63c978cbe15c1

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PE7M7D0W\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Temp\nso83C7.tmp\FindProcDLL.dll

            Filesize

            31KB

            MD5

            83cd62eab980e3d64c131799608c8371

            SHA1

            5b57a6842a154997e31fab573c5754b358f5dd1c

            SHA256

            a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

            SHA512

            91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

          • C:\Users\Admin\AppData\Local\Temp\nso83C7.tmp\NSISdl.dll

            Filesize

            14KB

            MD5

            254f13dfd61c5b7d2119eb2550491e1d

            SHA1

            5083f6804ee3475f3698ab9e68611b0128e22fd6

            SHA256

            fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

            SHA512

            fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

          • C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\ Intornot Exploror .lnk

            Filesize

            2KB

            MD5

            a8c262eb38e3944b436f56b08e064c2e

            SHA1

            0e514470aa0ebbcdc074dca8f4e7d31a5443c833

            SHA256

            ae7f8c3b84381e63a0cd27cb0b293cf849be0ad82660f5351125ff69a0f96c9b

            SHA512

            1a8850d36aa1e503b21877bcdcff2b7f08aa74b771cb56192b4f3cbbe80b687c135b56d5593104da847128c9ddf07d4d9702d02118cf28c369e60948212a7e9c