Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 14:10

General

  • Target

    ab5504d2cfdc5a4debdb85b47644e9f6_JaffaCakes118.exe

  • Size

    212KB

  • MD5

    ab5504d2cfdc5a4debdb85b47644e9f6

  • SHA1

    d5b5f8b07f73455963abd0fdc82e96e70e0a29b8

  • SHA256

    7c6a50574bb4035eab64528d57533e48ba16337bbc4d2e5f028268d143c6712c

  • SHA512

    08028d6dfa0c558d137dd7b66e2ff7425636594efe14a4ec418fa4aa7dffed060b04eb1906158b2fd6c2e166b41d759688507183a15ff4645c53e71abc79cd17

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmv:dHp/urb4A1WdBfk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab5504d2cfdc5a4debdb85b47644e9f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ab5504d2cfdc5a4debdb85b47644e9f6_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4672
    • \??\c:\Program FilesCDJ6E2.exe
      "c:\Program FilesCDJ6E2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5000
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3872
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3872 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4140
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        PID:64
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:692

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6809OHQ0\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

          Filesize

          450B

          MD5

          e8ce9899f2974357d0d71d390c047924

          SHA1

          3206db45b787b104b942cd0e12e84add7c2c4936

          SHA256

          3cbecb3d93baf8f1dae47d09470948f0a9e98f13457a0267c0042163a78cf34d

          SHA512

          11a4a316578ace35b84bd6886ccbe4c359e4712576addc64abec126e16798dfcf25c8f7e5d1fe3f4b5c5aadc1524aaca339be8f4b88a638bd1762396630da2f9

        • \??\c:\Program FilesCDJ6E2.exe

          Filesize

          36KB

          MD5

          e79dc4d795499be83050f0844314dfe2

          SHA1

          4c80c2c79fb99792e22308781f1b960185050859

          SHA256

          0a18351dc613a9d35baf98a662003b588f5884adf2abbbdb7cca25ddd5aecde4

          SHA512

          d325eef6f955f534e9783b32fc128691ed5c56b986240fb7002c36fd12e96dcc514106eb1e256763dce0f7340020cb4de641fa796b867e293478bea768c8205b