Analysis

  • max time kernel
    95s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 12:35

General

  • Target

    de4de19f80d0afd56b39001115bd583b_JaffaCakes118.exe

  • Size

    161KB

  • MD5

    de4de19f80d0afd56b39001115bd583b

  • SHA1

    f2a8182d64e18d8a1669d49c6ef41400e1ffe519

  • SHA256

    724b6e591bd87ed59bf1e3023d09d8a40c839cfe444db8f7c5b9d7ebfef68789

  • SHA512

    ec248014810fc0b04f184e5ea98c94346e8d8700e29420f0036478a43ece3d18f556a8c5bea6993f5cfe9ab08a5d186cb7e1631747ff71178ec3b3d119773e9c

  • SSDEEP

    3072:dqnyWt+C25wRXv1fasgttOWHD44lU9guWg5Mcau:xr5wRpadHj7gjL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de4de19f80d0afd56b39001115bd583b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de4de19f80d0afd56b39001115bd583b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:3280
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\disclaim.html

      Filesize

      2KB

      MD5

      ac13abc23d0a7e60750933b08bc95698

      SHA1

      8546be5e416f54b1ebe84237744b70e6e8662ba0

      SHA256

      df365f84b1b4643d88e1b5526331480dc5f0e46fb555097373808e70a86de49b

      SHA512

      5eb53f8ba1297f171f9e75497f2c27b0700d047e0e8cba6e9de9f6d4da3338bc055298a59f4927f6e0f3bcb8309056b12e0ad5d56a3ea5c6a62203e45d555f30

    • C:\Users\Admin\AppData\Local\Temp\index.html

      Filesize

      7KB

      MD5

      98c45cca9bee3a206a2aa669559bed0f

      SHA1

      bd8f11d1f758816e065ffe46add6ce6b9932784a

      SHA256

      fb7836167c59cb32c533c9a88f5280250f2c453ef5ded0bb87c2543992784005

      SHA512

      4fac1716f814862339a1c660c3d23de0e3bf787205bb0aa4007bf722278c9afb152306f21690d9368ec7f77e48ad944bbcc58313fe1014d4ddb8ad32844244b0