Analysis

  • max time kernel
    143s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 11:35

General

  • Target

    6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe

  • Size

    704KB

  • MD5

    6f67e0016cc592fbc2bc35129433f320

  • SHA1

    283db84a80ca8fde448d74daad59fea827f43acd

  • SHA256

    c27646936f519338b5b796aedc458dab1333515f107ce00dcdc7edf392830bb3

  • SHA512

    7ca2bf3481b31f32c916403682945f9bf3319c3342acae0c1077c1a9de7daa86f9bb104443f9466da8a0299e96c7b1c04b485219a0d43b7919134a384b656f96

  • SSDEEP

    12288:ImhcfmetsELrGbIoE+itJPEbvrgqhVpMsSuyroPXJxxUYFEYP47MoFkvrPT+Ueen:ImhOGbXE+8BEbvrXSDroPXJxiYFjSkvd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f67e0016cc592fbc2bc35129433f320_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2676
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1828
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3316 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\27H0LKPZ\www.youtube[1].xml

    Filesize

    14KB

    MD5

    cb8b152c6bad1fee3dc70671d439c534

    SHA1

    1152dd06b75d5a78d6956bcf9fd7e497633351b4

    SHA256

    b85fe8708300fff9f27e58aebf30df685401e6fae8119a1ff55da5995c2934ad

    SHA512

    6effda0d104722cf37b7a8e2f1380e451d10aebb37854911b89a5adee2da3be2af99b557e7693af23ba2b87b62b6f8f2e0e5c89f41d4aca5c6a0843e6a0d0bad

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\27H0LKPZ\www.youtube[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\27H0LKPZ\www.youtube[1].xml

    Filesize

    641B

    MD5

    668e64bf36880f53f8fe65c5f2739d7f

    SHA1

    a5e119fe9621a8ff2baba95f08479aa8d9c3c48c

    SHA256

    7f70228e09bc18a4145cd4f995518a38af4cc61d6a6e8df0c381139f3c221368

    SHA512

    bf4cb1a3f66c66c02944cdcf30811892540c45112a5ade1daaccca256fbb2d4180fee2bd9c1c54b743f2402df1b27e5fac00f13278aab1d120f981cca181bb44

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\fez82rr\imagestore.dat

    Filesize

    4KB

    MD5

    c04a1c01aeeab41e0ccc076eff84dce6

    SHA1

    4a073a131279301b6942f8aa9eaf2e42d7f1c3be

    SHA256

    70ccb9dcf905f7a01b2e8db7963bec6e5f405519665b6cba6998e964e1f67f37

    SHA512

    e0028d492239c3d7393ae5f42620cdb8535f09d4eee677ceac4e2fbfbc008e412cb88b2ff135df06a90111ebd05811dd4df21c27e090137b4548586a9d1437ad

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UEL5ICRL\favicon[1].png

    Filesize

    4KB

    MD5

    341d5c24287a98dcfefc5915cc407a60

    SHA1

    4475380a9c995dfab0746e4c23d2ff39cb55ac14

    SHA256

    54dcd3a0769cdf5738f38f5e35a5963d85ff0e85ec06002582e54f8d3b388cd7

    SHA512

    c276127b7c8966b5d8ef7a5b06cfd74c340a2769d8488f3dcec4c6715033277f7755f648180f556fc90220a5b8a27803760ef276db3079bc0a8e5d3004d13480

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UEL5ICRL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/2676-1-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-0-0x0000000000400000-0x0000000000810000-memory.dmp

    Filesize

    4.1MB

  • memory/2676-5-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-11-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-12-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-13-0x0000000000400000-0x0000000000810000-memory.dmp

    Filesize

    4.1MB

  • memory/2676-8-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-7-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-6-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-3-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-4-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-126-0x0000000000400000-0x0000000000810000-memory.dmp

    Filesize

    4.1MB

  • memory/2676-140-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/2676-2-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB