Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:14

General

  • Target

    ead3eb6de7d677f153c6474c3a3c15d7_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    ead3eb6de7d677f153c6474c3a3c15d7

  • SHA1

    5dba4684172e3daeeb5c0602a2bd322143d23e8c

  • SHA256

    2bed7f8a0fc1f494815a26103b825e333591e3e721b750bec26384c790dc9182

  • SHA512

    0c98807ed68304349ae6e3cae41f1c637abe109d564b9651de90365c60baa9acabf513be65ec5fd362df708dea9192af4fc587e4e320f0ebd0209a88228347b1

  • SSDEEP

    768:/PIHJd3l7DSa2dnEvt8d39rMcuFAYwkqKpwjeKmRn1PZfwbC+ua5DW2CNKVsfA5c:/q7DSa2dnEvt8d39rMcuFAYDqKpwjeKq

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead3eb6de7d677f153c6474c3a3c15d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ead3eb6de7d677f153c6474c3a3c15d7_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3340
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3616
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4552 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    33bac9325241193616461afd5a0deb0c

    SHA1

    e78ed72996568bc9616f4d6b20403749252b4859

    SHA256

    cb0b78d15b774b91ab6f6ef315a14f301b85b40122a72622818753212538f5b7

    SHA512

    3054cbd1551e36a747fc4c7086d3cc484530ea13d44279b4f5f92d462d91d7e3322bb240edeedd517751c00949a6264b50322464e446290726fde18ac4eb2e2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    bf5e49b7d89a87d2bdf375cfc8ebd5c4

    SHA1

    41849eb3d99ad4a6501ebfa4ff86067cff2fa544

    SHA256

    b21fb55984716581baf860c16d533c5f100e0acc3df588dcafd8ad6f4854b608

    SHA512

    225ad1c0b66af1698c345817d090eac1ad38f6a54a1e4bab073a0aa33b103b2c6d9570d5ecd2655ab3ef71e3176baee8a516ab7dc9ed5775aa68241725fdb536

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8M42AOWL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee