Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:26

General

  • Target

    81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe

  • Size

    29KB

  • MD5

    81c79662b312b4349fed69de7d38d109

  • SHA1

    7906f1d2abba4816493554977522ab9bcfcc8c60

  • SHA256

    ab99d5f2146ee8393d58ddc5a089a836c2d67625558abe093a08a8f95ea15d5a

  • SHA512

    b550bc43757b69beb54baab4526732c7dfb7cf624ff88e4de7adf5e87b18b59b57a4c14de10e4385c77cf6c796b8faf8ba570cd7b5344affce6a25d6b1c7ea04

  • SSDEEP

    768:STYszelexSsoDLzV/1EeeYRDKJVLVo0CF:SFelUOLzh4VC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5016
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\QktZITmBj.js" "C:\Users\Admin\AppData\Local\Temp\81c79662b312b4349fed69de7d38d109_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4092
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3044
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3812 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3132
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3812 CREDAT:82946 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5IZW3AAO\favicon[1].htm

    Filesize

    291B

    MD5

    b73189024a094989653a1002fb6a790b

    SHA1

    0c44f096cd1fec253c1fe2fcfcd3c58fe05c402d

    SHA256

    014c471c07b2bc1b90cf5b46eb8eb60abe3ac278e43cd8fcc7c4e6c8950c592d

    SHA512

    1bca726835d33847812060c968e5306535f513429de5c90d66942155fd42ff75508dba97da8ca36c6d6e6a8df5a2602fe3be047bb5612ad4e367c6c00e1e50a3

  • C:\Users\Admin\AppData\Local\Temp\QktZITmBj.js

    Filesize

    4KB

    MD5

    508dac3231a3b5280f7a0f2c101e52f8

    SHA1

    146aefe775f7368526b3dac8db52db8d566531cd

    SHA256

    c247cf2930f4262d590aea3987c3c679f851e6573b37e64758100b27321a1dd7

    SHA512

    682dc85c20b04c8bfdc708a972dac57b476892916dd2102f4c1351c0c75591653a5ff2ee96dff749c76ac794d8e4ca4cf7db01b94f02d1e82a47bbbfdab38a5b

  • memory/5016-0-0x0000000000010000-0x0000000000029000-memory.dmp

    Filesize

    100KB

  • memory/5016-3-0x0000000000010000-0x0000000000029000-memory.dmp

    Filesize

    100KB

  • memory/5016-4-0x0000000000010000-0x0000000000029000-memory.dmp

    Filesize

    100KB