Analysis

  • max time kernel
    125s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 07:46

General

  • Target

    ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe

  • Size

    98KB

  • MD5

    ddfbff326a2ab9980e7727f229781b7d

  • SHA1

    5fec191c0f19440840d5b5de192608abc44344ab

  • SHA256

    d80bef1f46615840f43eadae64c78177686274850b0754548b226999ebd69064

  • SHA512

    bff757ba1771d9f1c87dad125521e384a5dc8d912dc1981fd7ae1fd01c105a01e27d1beb37612e0e16d4d9636f392018b8af4936933e29fc5dd6550329ccfb45

  • SSDEEP

    3072:2ne8xI6Gy0XlTutN1nFaWNCJmfZfLfptTFrFrDGHMd:m0XBulnFaPJWLjTFrF+sd

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ddfbff326a2ab9980e7727f229781b7d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start iexplore -embedding
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1004
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1004 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4888
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\gOE50AB.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:512
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 520
      2⤵
      • Program crash
      PID:2576
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:8
    1⤵
      PID:1956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 928 -ip 928
      1⤵
        PID:3212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        2f8846f8a108fd0d20fee7d431aa16f0

        SHA1

        b14aa84a60e9d582a2332d085938efba97193eec

        SHA256

        97de568fb14eb627a9999cb64dfae568cdd6fadf1718ec67b14082588445f531

        SHA512

        c718a566b155af6d078f45c632184d8cfed5d2a42e633f6b22dbbb02d887c539cdcf78baec47d9d99e0905b4c6a60fa57f3edc3deaf1389a37f9d63bda1322f8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        dcd51586b4cf93a3c92354c6b460dfa4

        SHA1

        ea80f5349930089e35c91f6ebeae0fdaaa81eb8d

        SHA256

        023648ff474d9a22de80b25179fafcd94e58de1aebf44a48c1e946ebca4cf650

        SHA512

        265fb832bcd561c32350c9baf6ec50667443142d497589868a2d8e261204caa9abb37afcd5d527896f0fa884cbb69ac9ad37154023d887cbffb962b7efdd9f9b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NCPU4OJ5\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Temp\gOE50AB.bat

        Filesize

        188B

        MD5

        0baf2521f72b26cf1a3402706b6efdb6

        SHA1

        af86758e14e6b606f09ad35739ff1dacc4a2c541

        SHA256

        6c28c6d93641799af729bd0fe51ac1cd5073fccb07e9206a6ed18d050d172f5e

        SHA512

        c3db0089eca71921565195872a51ed767240f6937a928646520c287ed0dcb9f1003ce429a6944b4741ef1bba5f43dc61aad738571ba2ce1bd38949e19fb7059c

      • C:\Users\Admin\AppData\Local\Temp\gOE50AB.tmp

        Filesize

        80KB

        MD5

        d683a293e2c9835b59739695780052d5

        SHA1

        6f582acf697fe48e4aa1cb41b506c9e978b7eecf

        SHA256

        e552b60cb48adb8f5d529b5f778bef741ff1580438fc77e03daf999ec0bb65bf

        SHA512

        d68d6ac62d17a1ff9359c59d010b0a3d5fbe6f6734fd04a732d52b9ace641128027519b2cf693206a7de92af6d6aa2e9d2f3cc462077989f9723c9f99da20ed5