Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 09:33

General

  • Target

    9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    9586c32fe33b206b8c2581a866aab907

  • SHA1

    43df59353cdf933293eac9c938edea40c0d93ac6

  • SHA256

    c2af5b117cc3c807c48a2fb45120901ab89b7bdb82b0882065aa12656ef5c638

  • SHA512

    227d1fd215ed496067daf264dbdc410330da8be527ebd089ee3a9c2742f49694b7e1e6409a129876e1a32e3dc20b40b0d82a3c209774a905537786a04bead416

  • SSDEEP

    6144:Ulw1vZKBR9qBgFJc5GkNLbqDBFqWZFKkFFJc5QBR9qBzw1vZk:UlMkQBmJc5pNbaUebLJc50QBzMa

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 28 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9586c32fe33b206b8c2581a866aab907_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of SetWindowsHookEx
    PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5r4i2p4s.default-release\prefs.js

    Filesize

    47KB

    MD5

    6ddfb5dd4352d335c52b35c0fd74ef8f

    SHA1

    884b8d5352d1311151157e0bf58429536e66e525

    SHA256

    de72ca6f107a11aebbc94ef7d015b6d10f1a46b4bf9d3b80a3ca5d47aae67f04

    SHA512

    40214af52fc466580e923d7d1812e05d7a8a14bb88e4f98dfc96d8db52df6a129342fc8c3c8b69fcf1b9b0a4ddad149d0314db17fe4e15dcd2d954826d99447c

  • C:\Windows\SysWOW64\default.htm

    Filesize

    5KB

    MD5

    72d6fc61efc8ece2704f4b1e8b07a530

    SHA1

    c46afb6ff6e74dd5d509a55fda74f6dd936db8bc

    SHA256

    4a167e40cb7ef9fa08d71f65da31631353b524c43f1b44c89a34b4fb0a5c11a8

    SHA512

    8adacae90b2d64dd1bf7b22241b4c5a7e458c0215ee5810312077892a25467258cdf69364953de42a94defaa3b5edf16ab4245bdb8e09350f1db123008986b14

  • C:\Windows\SysWOW64\default_files\css.css

    Filesize

    6KB

    MD5

    1e8c198ce9ef1f453c2932bcc9a0c70e

    SHA1

    df5d474b9667b9c9f49ec87de2e822e0297b0b5b

    SHA256

    5445c6e6b836a1f38c9e41b948e8c3c965d0149eb55c26a38ad5af0b3672a9f2

    SHA512

    78de4091771250fa139563c9d44fa92fbfbeec1da21ea779c82ad22565398979c218d95b5801d145ab188966ebc610a9970858d73bfb899c788b7ccea58922ab

  • C:\Windows\SysWOW64\default_files\ga.js

    Filesize

    20KB

    MD5

    acc15c6f123bbc8d62892ace3c6d8d7f

    SHA1

    d7189f5ff4cc0445422d47759fe0a030efee609a

    SHA256

    c22136a5bc7a62cbd6b88ebe4e321d4f640b0345d1f28ff946f5fe5abacc0cbd

    SHA512

    b916b174343e0017831c6a1cbbf7beaed896c8aab64ad0c5d4790cf7f5785bbe49bbf3b31884a74849de9592606ae85ef521ce3fa144243fd38080b46fe0cd70

  • C:\Windows\SysWOW64\default_files\top.JPG

    Filesize

    22KB

    MD5

    61aff6344059d2455fd72df54c6c383e

    SHA1

    b26480075c75d8e8a08de511c6ac4e6b7294389c

    SHA256

    68acc1c4efea0374bc619b5543eb1b93460f47177ab92ab030aa5fed4481f3e8

    SHA512

    f78e8362950a2812ebb0ce16e3af0dbe556cbc4e325e9cd8f5e33a4028c27c786633829b11ab3f9fffca2cbb2bedd16552e3e884708f82e5e6ee15a695b409d0

  • F:\autorun.inf

    Filesize

    120B

    MD5

    1c32c1204746b858602374cb36cdad9c

    SHA1

    e86bb8c935af0fc87db9b9908617ec442bc3d2f8

    SHA256

    e30d9e4e70060b4798b59ca5f5b3cd51c995799b84d0221b201afec264cb24ad

    SHA512

    a99ce65e8899f2f9a7b89106c93f6bfe633e42918658bff57ceed3f4251e77c4860add6b0657a74bc75eadbc317e8927d5cd0bf068f0f068e46ac3812099d5e9