Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 10:52

General

  • Target

    95ca811952cd61f9d46c46383d98143c_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    95ca811952cd61f9d46c46383d98143c

  • SHA1

    b60fb03e9886e946400ac2f203bfd326617d99d5

  • SHA256

    079f4448507e2236bf53cc9f3f23f0e773c74c6f6f77ca459bbab16d0f27102a

  • SHA512

    1b9b1d0baf4812b6daa9ae91e30bea9cb691ae06a07693a3b3ee3bed881f40c89c7a074b79510b93dd5ef29ea443fd1f137f5ecb7dea6e917d0da886d815f1a4

  • SSDEEP

    3072:2tybd59fYRw/BoDWfwpsjrSc3XzfMHX7/RzviC0RsOspWqgzGB:gyxKgayg8Sc3DUHr/RzviC0Ibgm

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 43 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95ca811952cd61f9d46c46383d98143c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\95ca811952cd61f9d46c46383d98143c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Roaming\sampe.tmp
      C:\Users\Admin\AppData\Roaming\sampe.tmp
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3688
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2788
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zmzzmzwbd12.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\1.bat
        3⤵
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\PROGRA~1\INTERN~1\iexplore.exe
          C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4168
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4168 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:904
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\1.inf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3788
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\PROGRA~1\FREERA~1\2.bat
          4⤵
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4408
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            PID:2748
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?r"" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            PID:5064
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?r"" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5024
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:3412
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\PROGRA~1\FREERA~1\3.bat""" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:1840
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h C:\PROGRA~1\FREERA~1\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
            5⤵
            • Sets file to hidden
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:2044
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h C:\PROGRA~1\FREERA~1\tmp
            5⤵
            • Sets file to hidden
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:740
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\PROGRA~1\FREERA~1\2.inf
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3492
            • C:\Windows\SysWOW64\runonce.exe
              "C:\Windows\system32\runonce.exe" -r
              6⤵
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:1208
              • C:\Windows\SysWOW64\grpconv.exe
                "C:\Windows\System32\grpconv.exe" -o
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2696
      • C:\Users\Admin\AppData\Roaming\smap.tmp
        C:\Users\Admin\AppData\Roaming\smap.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Roaming\smap.tmp > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1628
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\PROGRA~1\FreeRapid\resd.bin,MainLoad
        3⤵
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:4228
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\95CA81~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\FREERA~1\1.bat

    Filesize

    3KB

    MD5

    2b99b7f66b8ebba3071330bcbaccc022

    SHA1

    1a79cdcdd4dd3c9e22b45acdbc20a51da5f23e52

    SHA256

    3ed44f8ec4dd76cadb989353a1ed4a578d93fbba2eb0997443000384e2fb7f09

    SHA512

    03671ec8fbe45df652bddf47141fd017cfd86b25c034608be23eb82035b3e7504765d4fdc9c42e1bbb3de4b132476a5e7156d83fe1982be283c9ea51e9cc8671

  • C:\PROGRA~1\FREERA~1\1.inf

    Filesize

    478B

    MD5

    4725d77ff3bf9bff49eaeece2bce6f64

    SHA1

    4c4f59f914f18b57bd65bf8269b1fe9a422ebd0a

    SHA256

    f7a5b23de9ec24d53b1b2847a2de9c2940a56c0bff8e5b292b24373bd1dde4ea

    SHA512

    66782f65c373dd0f270d044a844359e1417ee5251eaeac19c0cd37206be295dc4c87eada8a8d72011cc2e31c077cd90118bbd766e6459f7bae058b0345730fcd

  • C:\PROGRA~1\FREERA~1\2.bat

    Filesize

    3KB

    MD5

    66255a9ad2f8d7deaa5577ca57942871

    SHA1

    8003fcd6cf3edd5b053b2765c7178ae90832f370

    SHA256

    553e76f0372969152c699aa8f02d0610114492cf1a0386cd425a6b6e861aa197

    SHA512

    895951abacd29c28e2970096db9e694626952791f4ff84a77c4f584baae80eb9ef7206fa501d671c6983c9c08cce9016a6a572b65d79fc9f5da39cea9e2d4a04

  • C:\PROGRA~1\FREERA~1\2.inf

    Filesize

    230B

    MD5

    f6dcb2862f6e7f9e69fb7d18668c59f1

    SHA1

    bb23dbba95d8af94ecc36a7d2dd4888af2856737

    SHA256

    c68fe97c64b68f00b3cc853ae6a6d324b470a558df57eac2593487978592eb2c

    SHA512

    eefe630b776d2144df39e9c385824374b3d546e30293d7efe10cc2d6bf6f2c932162bf80add1c8ca58afcc868ad02b3ffc104c0f111f3827f4385ee9f26f5e75

  • C:\PROGRA~1\FREERA~1\4.bat

    Filesize

    5.8MB

    MD5

    5fea36134540a5beaa31590b2a3a53d8

    SHA1

    c8949bde6ea96bee78acbb5ace24372f644dc832

    SHA256

    ee155d8f83edec0c99a6439e10b8d63b255779db3975be1e2ce04fbd6c82564d

    SHA512

    72ee4074b066c5879083a200fbbe115d395de2242fe0deba99fcccfbf2fb977561a603212e7d9d57e342849b1fd47b6f1b781bdf6c4b9fee970f32936ef8b2cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BRZNMQLE\favicon[1].htm

    Filesize

    802B

    MD5

    b4f7d6a0d3f6605440a1f5574f90a30c

    SHA1

    9d91801562174d73d77f1f10a049c594f969172a

    SHA256

    e3b1510526757baa753c916ababce951be64146e04f74c631c6503531d83c6cd

    SHA512

    c852ff3b51db00184bcfb0d6609a2791cb81efdb0d8d5aaed1c5b9e576b17b19804affe6ea7b5db575179c166543db5dcd828b3fcbd90e8baabb47c166da7c3f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BRZNMQLE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

    Filesize

    2KB

    MD5

    0540cd83dcfe13fc8873e80ee631218c

    SHA1

    bd7f0d1bd11dc2f4f579f0c8c728e609d3df7126

    SHA256

    3e2d56e382961a72e8f0ec73f9cd914d46baba5d70fbb753a911c73900731f26

    SHA512

    bd4eee174e4abe8097920c548a8dbeb37c02d0b4550ad72b2f4e70dd2d30504ef7f741a6db05161bdfd12d42f7ab620c8215acaf31bde6e44e1ddf6d5300f25a

  • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

    Filesize

    631B

    MD5

    0b92bb1f3b9141d221dfedfcc5a59527

    SHA1

    8d0a11d39776442b53436490284dc460137d3e7a

    SHA256

    5ad1f9cc4cff9a7d07bf72edc9ce2ccb0e75a6bb8038ab92a27a54914d560a99

    SHA512

    e3472c917c7ac2657f4ceb3bf8d1cdabca72bc0090ce2d33b3c334d86ad4cb8b68e109d936f6d99b38dd8d44bcd2e2e152d3292c10c77461e79bb13b2db04205

  • C:\Users\Admin\AppData\Local\Temp\zmzzmzwbd12.bat

    Filesize

    150B

    MD5

    3d7ee8e51d09d54e8efe7b4699f8dde4

    SHA1

    4d397727078e6e1dcf190730a6ccca2e0317cdec

    SHA256

    3e5ea12a32fd172f1fb119b3b59a6e589765903f45191dc99aa1b37b42b184f9

    SHA512

    7653dbb3b4b8fa2e3307519fac16eaf1a592400ff1657bd2b7734fe3ef8b07ab28f385acfb5eb0fcd0a270d22141e96b67c728c180ebe6dde1fc66bf7766c40c

  • C:\Users\Admin\AppData\Roaming\sampe.tmp

    Filesize

    89KB

    MD5

    b5b4b1321360fbceac935d215a0db480

    SHA1

    dc54405e1506d866ef1ff2e0617f3618fedb257b

    SHA256

    787585a9ec9cabc69b459f44b6bc583ea41534a471e9926e03af354360e8eec4

    SHA512

    067ca0b4e4d7981073a5a40268658b651d2ab03da41b609eb48cae55e8d2fd3d957c58e868b04dcf835ee186168a924a1bde5ce66ece56a4e4c2809c8382df06

  • memory/860-123-0x0000000000AD0000-0x0000000000AD9000-memory.dmp

    Filesize

    36KB

  • memory/3680-41-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3680-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/4168-95-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-125-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-122-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-121-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-116-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-113-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-111-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-110-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-108-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-106-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-103-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-101-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-100-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-99-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-97-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-96-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-112-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-93-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-91-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-88-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-87-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-84-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-83-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-114-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-128-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-129-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-131-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-104-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-132-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-138-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-134-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-92-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-142-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-148-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-146-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-145-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-143-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-144-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-89-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-171-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-177-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-176-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-175-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-173-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-172-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-90-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4168-86-0x00007FF9A8860000-0x00007FF9A88CE000-memory.dmp

    Filesize

    440KB

  • memory/4228-242-0x0000000074E50000-0x0000000074E5A000-memory.dmp

    Filesize

    40KB