Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2024 19:03

General

  • Target

    b0736073d2d699fefdc323cc031f912d_JaffaCakes118.exe

  • Size

    238KB

  • MD5

    b0736073d2d699fefdc323cc031f912d

  • SHA1

    b3abde1ff7b45dd88d39a059a82bed558ab684fd

  • SHA256

    ba3c8a4ea136a3c27a5f63d49558edc3eee9d76c0b2bdbaefa3edc1cc21e0ad6

  • SHA512

    329a4beb52672efe409fdaa0eea1dc1ba5bcd082c3a918a1c70d3b5e76e79e0f1383dccbe4122f2207dc5f2e5ebb6f724e3385c3db948331b4c5a617f369a95a

  • SSDEEP

    6144:o/JBlTb7kzQW7Xck6djCdtzie1PnzV4ikIicrB8GY:8P/k4kSjCzBlV4ikILB8GY

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0736073d2d699fefdc323cc031f912d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b0736073d2d699fefdc323cc031f912d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.455555.net/?an
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4984 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    064f0852c2c8b2305d305a7c35752c40

    SHA1

    2cc0c70401cba3db156121508676439f1e804d48

    SHA256

    4b07740f809b29f43f048c558ef309fd1983835c69b9e08014add366cfd82130

    SHA512

    3049f2e2d8f4c9305bb57cc69bd138f431d1c7db2d7a80846ea48f710dfc42af8d8d2ff891c9e4c8c9fdf809c86ab61b742b1ef94a55a3903cbdefc043ca5fb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    b47d8c017c152e0cd3537299627db237

    SHA1

    036169689b06ced452dc35c36353a73b9e80554e

    SHA256

    bc5b414f6727432c8acb046c641b9936cde4e71e3de04c25ee19ee72863a45aa

    SHA512

    dc7005619c7994550d77f90619a235fe36710c755621fc2c0701c6ff3d02428f264fec6d44b5394cb5f5cd2aa02aa788a2cf9109d6a15ceb3f78cd3ac10c3894

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\THHXO5RX\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/888-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/888-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/888-10-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB