Analysis

  • max time kernel
    147s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 10:01

General

  • Target

    a21c2c491c29501990ad54eea3488bbb_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    a21c2c491c29501990ad54eea3488bbb

  • SHA1

    dfe208e1864d4486d7cc25967a761283f42319ec

  • SHA256

    163960cec180e05f113d7cdca1acdcfb99e98c28aebccf375fdae15801b9c61b

  • SHA512

    06154ac412d04010dd5b3f35442b76660eb77e8e6c4a32ec2e8d72f764a67a132b8a5a7b1402457525d8f38f96e9c9acc0e368eb650491e8ba0611052a15bdfe

  • SSDEEP

    192:eAYgqgMchCCY7fSXLxnHjao/tubYe1kNVVahRAZqQ/1i8ACtvB2nDu4EqsW3wN:e8qUlZV/4bYgZAgcqe2nDu4EqsW3wN

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a21c2c491c29501990ad54eea3488bbb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a21c2c491c29501990ad54eea3488bbb_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ciucastelldefels.cat/images/carpas/asd/mac.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4408 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\0x76

    Filesize

    324B

    MD5

    3cc64023ea39999a132a2c997a292e0b

    SHA1

    0511dc8210298590d00be60493e4d428a6a8e5db

    SHA256

    1b022b8bd892e2744fbcb64fe8bb5f5919cb7f8110e08d3bc37869eaa567c9f7

    SHA512

    278be01f64efd4e125df9fd93ae58daf365641109e8a64a104f1aa124037d89a496b7840e5ea57817ec3793f031013e0f20384f9314db7c4713e2899a999cec9