Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 03:09

General

  • Target

    ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe

  • Size

    317KB

  • MD5

    ba1fc8a1073bf0547d3d14a3a464152b

  • SHA1

    af179884275df3b482223c9807d947fb8bce6395

  • SHA256

    331154d6f9e7734f5eaebc970dfc7c3616c983f72d411da110a418a4d7cacb0c

  • SHA512

    b95b3a9d32c777978520556cb5e23fb518f91893ffca836cb03f2937591ca6e909ecabcef51276673d9d188703d490e59d5f172e2b37614c6aa132a690f7238f

  • SSDEEP

    6144:aA3xt2BoRpY4oEspnVDgF7zSuJvINP9LoOQVxrrbzum4LpMGMe:aA72BoRGFEuDgYTLuH/u

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ba1fc8a1073bf0547d3d14a3a464152b_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\Regsvr32.exe
      Regsvr32.exe /s C:\WINDOWS\Media\media-update.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.url

          Filesize

          105B

          MD5

          af66b7930455743a072e5955010a52b4

          SHA1

          e025ad5313895ae6ae506f7cf396198823c34ea0

          SHA256

          dac8b3f6736854281bfc48508047dec2bbf1f2114293574fd3ccb1d1b64e0c5d

          SHA512

          1e0f92866341a33ffc3f9a6b61d9b64d119f8cc0f50eddfc41c1292ac1824b507f90839a258d79e0f3a82834718975a3aef4e416d419d76a2cf6fd814d38adee

        • C:\WINDOWS\Media\media-update.dll

          Filesize

          562KB

          MD5

          f495a9f34124164aca59b54d8f901b4d

          SHA1

          9b903cd369e72b451eefff0a7005e70283312ff1

          SHA256

          5abac7348ce80c115c2333ed4eaf766d37ad3fe2fd7f46281e381e05cdc73cfa

          SHA512

          175d4656a93cf81fad9befadce2ea619a8fa2094007de446eb55a0c4c084d62c48403606551e903ecf1f2d5e79176892db3b029945c3f77773a939babc2f786d

        • memory/1908-12-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB