Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 08:39

General

  • Target

    7790bf073fc826ee9c137c6345baab98_JaffaCakes118.exe

  • Size

    20KB

  • MD5

    7790bf073fc826ee9c137c6345baab98

  • SHA1

    33c2530ef4c99e5b2abc8ff85093263ad5a3226e

  • SHA256

    41c8cc5a288e79a1a9be2875152f8250282755a99841e3fa246b0b45c501a5cc

  • SHA512

    3ead0b9023b5a9fc8390ca62da5d9bf99a47ed268888746d958dec20b138667250af0a1069f72e2d3f67cdca5b550016417ff94726a171b26659db66800c218b

  • SSDEEP

    192:WiemiHfKmrQXzUCzUQjmZBdZDoWC9SgXFtLYNCY8o1oedXq39x:ztOfKcETpmlOro1oedX2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 17 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7790bf073fc826ee9c137c6345baab98_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7790bf073fc826ee9c137c6345baab98_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.phayul.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5104
    • C:\Users\Admin\AppData\Local\Temp\cson.exe
      cson.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3988
    • C:\Users\Admin\AppData\Local\Temp\cson.exe
      cson.exe
      2⤵
      • Executes dropped EXE
      PID:60
    • C:\Users\Admin\AppData\Local\Temp\cson.exe
      cson.exe
      2⤵
      • Executes dropped EXE
      PID:1608
    • C:\Users\Admin\AppData\Local\Temp\cson.exe
      cson.exe
      2⤵
      • Executes dropped EXE
      PID:4728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\AF6HG05X\fontawesome.min[1].css

          Filesize

          56KB

          MD5

          eeb705d0bdccfd645d3bbd46dd1fbab3

          SHA1

          066def290f42ed8c00860e573cc880bd46e9ced4

          SHA256

          d01a2ba2805c78957e15a2958135de0f3cb88e95159dd0f6c0a032bd76b1b0e9

          SHA512

          39d11741808e95d8ea504b2e30ab19463f771eddb741196121bf04fd7d2c6f066199ef1e530ea0f2aec077118929a91c05bbfbfbf3d7d067366ed7fb46ef1c64

        • C:\Users\Admin\AppData\Local\Temp\cson.exe

          Filesize

          20KB

          MD5

          7790bf073fc826ee9c137c6345baab98

          SHA1

          33c2530ef4c99e5b2abc8ff85093263ad5a3226e

          SHA256

          41c8cc5a288e79a1a9be2875152f8250282755a99841e3fa246b0b45c501a5cc

          SHA512

          3ead0b9023b5a9fc8390ca62da5d9bf99a47ed268888746d958dec20b138667250af0a1069f72e2d3f67cdca5b550016417ff94726a171b26659db66800c218b