Analysis

  • max time kernel
    138s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 01:32

General

  • Target

    a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe

  • Size

    296KB

  • MD5

    a4ddbfff974fc472175a18d7fd0df206

  • SHA1

    895edbdb653f601ecdaa26cae8a6b51a769e7049

  • SHA256

    5ea935f2a09ba5051e2ffeccbace52c5610103ad747bd16e16e4528b10bf6e95

  • SHA512

    76e2b349d6e2a36349d99f2fdbbf046c5f3830998205cab2868a6a432b89348f45f81541663aff1cf83df40a34b9aae1c0bb7168d38381bcab4e549aa27b1b4b

  • SSDEEP

    3072:3h41wuygp/teJIRB93zYbydTaDmvWljx5VJIgHpG2NpeYufV65vuerfJpkEBNXT7:u+G8M2OYFWm8zH4dEx+IG2xVyr

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a4ddbfff974fc472175a18d7fd0df206_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:100
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4272 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          c96e614eba353b508b28bc6db6f904fc

          SHA1

          927610445b4fa45b4a04edf375814e987d1b34a6

          SHA256

          810b4bff49dad46744697f352a924048cbd10336c0648779d2ff9fe99abc5bdc

          SHA512

          7f8929dcc59fc380d6ab2ff12faf0866c959bf754fd84f257e17cf186542edb54d29cd1f555f49d57a23f55f3148b22fb22a51ec1c6e1855022068508606ec1f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          467ac9528ee48e569b4692a794fe84e2

          SHA1

          944dc31c82b1947735d96690213a4502c1a164e3

          SHA256

          774ad915e5b4a05ad1a8ebc042aa91bc3b31575cae51b27353ae108cbeec4a96

          SHA512

          bf51f6ad0dd8630652cf148c6535ef2dc69087030c2927d4fc3e63d096e87002faa098517e6254408a80cbc78beadd4f9f30dc83da20a5a39a21deac704ba3e5

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T1CTRFUW\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • memory/100-2-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/100-4-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/100-5-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/100-6-0x00000000022B0000-0x00000000022FF000-memory.dmp

          Filesize

          316KB

        • memory/100-8-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB