Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 01:43

General

  • Target

    65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    65a8ebd2f8ecfd6c708f5ca10088916e

  • SHA1

    7d6ec83d2748033fadb6ce4d6217a94796a6fa31

  • SHA256

    f799a6cfb79f9fde7c6689aff3ae41ac7cb0f51995ff6a5acd24db62df5a527a

  • SHA512

    566ed17fe1c824627336e3a7629672a579b98f025bd0619aad48fe41f1611ec00d68c5a8df47217244a7c0ccf7f8d5e198407992beb52f924f309d576c13c6bb

  • SSDEEP

    768:0i+GMBFeEFcsrYg9KJmZHB/w82KDWVeJ/ZIcHUeOmCe07GO:0i+GMBFpcqf9KwZHTyVeJZa

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start iexplore -embedding
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3880
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2348
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\tweA325.bat"
      2⤵
        PID:1416
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.bat"
        2⤵
          PID:4492

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        5fe1d5be97aa5a4b444680410010b626

        SHA1

        0b747d5b13d5745fcc81a5819b2db8e11543ab42

        SHA256

        018bb27ecbb368115c6dc85539b5d24b0f7d548a3cc81ace6f7fbdc2a5aa55d4

        SHA512

        b3baa42206a9866e37dbe747a04d82d49e51e8219a8ac51170498cbdb98430a6b3f591151d3dfb133b1734f6fefc62b90efbbb907c800f45e93eae998c009fbe

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        2979f8871d162698b3c2f204760d1d2d

        SHA1

        549def60d1bd0c5faf3c2cb0354c39d8221754a9

        SHA256

        09cc8e1e395f86a0dd0bdb144cfa1aa376cfa2ae779f6790c3cb8d6f4fcef306

        SHA512

        3c0c8d5f4a945699487842e79ecfa38ff8c132cc810c740712b280866451e4e6943e14ff689d32e62806565e4171374bd73d712af926da15a6484e5394fb1375

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver244C.tmp

        Filesize

        15KB

        MD5

        1a545d0052b581fbb2ab4c52133846bc

        SHA1

        62f3266a9b9925cd6d98658b92adec673cbe3dd3

        SHA256

        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

        SHA512

        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\AF6HG05X\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Temp\65a8ebd2f8ecfd6c708f5ca10088916e_JaffaCakes118.bat

        Filesize

        305B

        MD5

        5db8b5ae784d2e5b8f2c1baadb1712f1

        SHA1

        e719b674d3c1d7210894dc43a70aa3d4f9aedff2

        SHA256

        2779de7f00e0a064a4648b337a6271b3abaa394b51ec4407c099fdf1bb7b1d0b

        SHA512

        1c6c554181f119550f597f8731ab45cc45b1b82432fa3dd1f7816f3ba6e777c6d9f1a824c1695242c43e6886bcf8f147764b7b51a564352c972bf926a6dad09f

      • C:\Users\Admin\AppData\Local\Temp\tweA325.bat

        Filesize

        188B

        MD5

        83123e574a671339d1dc7226ff7b2c6b

        SHA1

        5d78e434d9c9aaf7551e40133247926d25be4733

        SHA256

        31ad825fa2023168056317428c76c32d86ad0b7200518e016729589328ecb683

        SHA512

        7717f9c3faed795cca82b93ed1fb69bc40c36fed50edda1a4071c927d3e213448ca5a18d3ee42b712b14630b60f7e1689412b64e5920e17a2706073579fd604e

      • C:\Users\Admin\AppData\Local\Temp\tweA325.tmp

        Filesize

        31KB

        MD5

        660f17720f49d2d2fd6c70cc5a1f0fc5

        SHA1

        bd4187f3c1d2f3aec9ecddba81b225133d874164

        SHA256

        8eaa6726a4873e22097cf1d7b2bc583778f3afc9d20bebbd7e470b23d3e610d5

        SHA512

        14cbc458817f494f1af7bf448511c2df350f53dca6eb6448217a9ac37d9f0d601f75eca153b6ed8d24b3e0a85cf41459fce66f8c878a8e2b3723d13529812ced