Analysis

  • max time kernel
    78s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 03:24

General

  • Target

    8d1e661d98f20dd483d0e0578fa10601_JaffaCakes118.exe

  • Size

    89KB

  • MD5

    8d1e661d98f20dd483d0e0578fa10601

  • SHA1

    812760a66560521dc48f712b0af046b6f9e270ef

  • SHA256

    e5e86b8f783358643f77fdb5556b006a53253313f4586655f96afcb08ccfe56f

  • SHA512

    572c09c6ae5551b8e49dc32af19f14e42ca74d591001f8ac5103dae781d65f5b7052ce45f88123e4258f1113db3917e823c370d465c2ebcd096e23d821569e28

  • SSDEEP

    1536:lCI7bgk5TUVaRIZTAwP0Kuf/cAAYtW9oXTKuLMwnW3qvZRk+lRR9U6OX3KcNk:0I7Uk5TU8iz4Es0ofKEDk+T9UrC

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d1e661d98f20dd483d0e0578fa10601_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d1e661d98f20dd483d0e0578fa10601_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3828 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\myDelm.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JACP9GNT\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Windows\mywinsys.ini

    Filesize

    279B

    MD5

    0ac9d292fdd0452e5eae29450ad8f459

    SHA1

    dfe7e30099fe0826484a93c5f7e6888fd77637a7

    SHA256

    c1d217b5659547c4f6ee9bfdaa45ff2510f0ee985acaf2e148dba2c12b7b5846

    SHA512

    c5a156bd3a020c196f40f95a542b5c8e65e1db205cf8274f779c66948b176b9d286064feb639e6c6495d48f98e1958ed7c3768e1bf594dd39723c1443cc3ce16

  • \??\c:\myDelm.bat

    Filesize

    212B

    MD5

    cdd3ff04b9cc0993616b089bd47b6470

    SHA1

    a2c6462a2106c49a44eb6bf42760623d663cce91

    SHA256

    36380f4f506a4121925f60bcc77bbe97274102ca85be5058fdd2a344081567a1

    SHA512

    45ab12a5a02976498c5b7e085c332266cf00e215a44707276cd67aab00b982850e5263174ef3ab66b372ace0a04d64819da4c174581df2f9f9724837cc317f7d