Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 02:45

General

  • Target

    eeedd7fed36d232f5e82545efdf325fd_JaffaCakes118.dll

  • Size

    12KB

  • MD5

    eeedd7fed36d232f5e82545efdf325fd

  • SHA1

    38b702d057e148021e31b11e3cc03740da7c4202

  • SHA256

    33fb6bd1e4fb0b70a6498c923b37b0d5e40a3e625a123beea8b5fd2ca757f2f1

  • SHA512

    e5aff5746eee026433217ed552661b7cc2e67185ac0277c8544eb1b31bf0fe8d30abc419c89f45ef3f8c9213ff8cb949700ccc543814c0a325c980c6a61cc2ea

  • SSDEEP

    192:ELuHwPxde7dxnu6FYxjj48/T4xg6e51THKfXQtziprZ4wv5gq5Ca7FobeIHhk+yX:idPnennT8/0xC1D6XFZt5GyFwXBuN

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\eeedd7fed36d232f5e82545efdf325fd_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\eeedd7fed36d232f5e82545efdf325fd_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:3324
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1540
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4748
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:82946 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:148482 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:17414 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:17452 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2548
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:82966 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1628
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:82970 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D

    Filesize

    314B

    MD5

    d74dbb8f738c8c63fc8df859eb5286e9

    SHA1

    341ce22e9c4295715365dc50894235afbae1d120

    SHA256

    f8695c4f69b951ec278bdfae01ec88c757937995bbb183886232867f651791c4

    SHA512

    747d0a92db2c564298d4e0f1ba3bc5980f37e5c103dfaa2f000ac98852ea48d7ecc0d0e8698620919fd4185ee8d59c1e692c2c06e4291d0315354346742f7cb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D

    Filesize

    400B

    MD5

    8eb6c4b597b9e654db5b2f259e731f3e

    SHA1

    19cc9ddf00589a643f14ff3a9f185a5e26870e2c

    SHA256

    c90e066665c45b47e32ad338e1c063658bb9b94469e9eaeb9eb4418a9c4d9fad

    SHA512

    e1c88d54384bdaa6d187a35bce2f03c9d4d0938bae3c8d7718a322a31f73846295f6601102df7fa715b5f3e07d104b73a2325bd2f83e194693153e50bb2956bd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\au4xsoz\imagestore.dat

    Filesize

    4KB

    MD5

    d414f78b7939ae57f2d5de5a74105ae7

    SHA1

    c83e6c25f5771bb0eab4bf359978f77c3e0a3ce9

    SHA256

    d37db318d7d98e21dd7e5251061bce1bb41d3ec64eefb4c142e57ee813b50574

    SHA512

    957a10ed05fc917032ebd5b28b17f10fbcd45cc2fd14d8a22cdb9bd4f98a0e46f2574e576a75e297a438c63a37ff480d2b48d44f7d79d92e9cac69b9025c7fa2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0XI3G1SB\bullet[1]

    Filesize

    447B

    MD5

    26f971d87ca00e23bd2d064524aef838

    SHA1

    7440beff2f4f8fabc9315608a13bf26cabad27d9

    SHA256

    1d8e5fd3c1fd384c0a7507e7283c7fe8f65015e521b84569132a7eabedc9d41d

    SHA512

    c62eb51be301bb96c80539d66a73cd17ca2021d5d816233853a37db72e04050271e581cc99652f3d8469b390003ca6c62dad2a9d57164c620b7777ae99aa1b15

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0XI3G1SB\navcancl[1]

    Filesize

    2KB

    MD5

    4bcfe9f8db04948cddb5e31fe6a7f984

    SHA1

    42464c70fc16f3f361c2419751acd57d51613cdf

    SHA256

    bee0439fcf31de76d6e2d7fd377a24a34ac8763d5bf4114da5e1663009e24228

    SHA512

    bb0ef3d32310644285f4062ad5f27f30649c04c5a442361a5dbe3672bd8cb585160187070872a31d9f30b70397d81449623510365a371e73bda580e00eef0e4e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N27JXEQ0\httpErrorPagesScripts[1]

    Filesize

    11KB

    MD5

    9234071287e637f85d721463c488704c

    SHA1

    cca09b1e0fba38ba29d3972ed8dcecefdef8c152

    SHA256

    65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

    SHA512

    87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\N27JXEQ0\info_48[1]

    Filesize

    4KB

    MD5

    5565250fcc163aa3a79f0b746416ce69

    SHA1

    b97cc66471fcdee07d0ee36c7fb03f342c231f8f

    SHA256

    51129c6c98a82ea491f89857c31146ecec14c4af184517450a7a20c699c84859

    SHA512

    e60ea153b0fece4d311769391d3b763b14b9a140105a36a13dad23c2906735eaab9092236deb8c68ef078e8864d6e288bef7ef1731c1e9f1ad9b0170b95ac134

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WLXU5DI6\ErrorPageTemplate[1]

    Filesize

    2KB

    MD5

    f4fe1cb77e758e1ba56b8a8ec20417c5

    SHA1

    f4eda06901edb98633a686b11d02f4925f827bf0

    SHA256

    8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f

    SHA512

    62514ab345b6648c5442200a8e9530dfb88a0355e262069e0a694289c39a4a1c06c6143e5961074bfac219949102a416c09733f24e8468984b96843dc222b436

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WLXU5DI6\background_gradient[1]

    Filesize

    453B

    MD5

    20f0110ed5e4e0d5384a496e4880139b

    SHA1

    51f5fc61d8bf19100df0f8aadaa57fcd9c086255

    SHA256

    1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b

    SHA512

    5f52c117e346111d99d3b642926139178a80b9ec03147c00e27f07aab47fe38e9319fe983444f3e0e36def1e86dd7c56c25e44b14efdc3f13b45ededa064db5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZK5NPJWQ\errorPageStrings[1]

    Filesize

    4KB

    MD5

    d65ec06f21c379c87040b83cc1abac6b

    SHA1

    208d0a0bb775661758394be7e4afb18357e46c8b

    SHA256

    a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

    SHA512

    8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZK5NPJWQ\search[3].htm

    Filesize

    354KB

    MD5

    fff6973c33d04076cd1a46ed50341c9f

    SHA1

    66c40139c3e55d4d923733ee960dde04a3ae08a5

    SHA256

    ed63d20e7e32bfbdbb5262aab3a71b14baf9e16af6c4447daee556754084ee19

    SHA512

    936964faad54af900bac25ec3351c41a3d07656b9a585a022d47fda99dde032bbbef1de9d7993a7badbc5ce0989355bc108a89b4b68b0790e9d471cd6beabe0c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZK5NPJWQ\search[4].htm

    Filesize

    355KB

    MD5

    1588bbf92e30b65fa909157f300c4c24

    SHA1

    3ebd0152bf6d75bf11215bcad7228206373f2e10

    SHA256

    30a743392470a5280f7981e31f8f9335fe0854445707601f6b52c4b46a2cf2b2

    SHA512

    3665e43ad10ba0c57f3747e3d9e35f1a4a790d6bafa2076a8b82c455575a728d98babcc392d34815cce9fb34fdca041fb4eaa8cd855a2ddba294bb492587afe9

  • C:\Users\Admin\AppData\Local\Temp\~DF09BE10A75A1DE344.TMP

    Filesize

    16KB

    MD5

    98cd2e47d15bcace363753de1443f7b2

    SHA1

    973cbef8db21182ab79035e848224c3e761b49f0

    SHA256

    7ced90da54fcc3cc84d5c84ce24878adcc6942f47e610c967c22e14e2123c8a9

    SHA512

    4d94585c9ecf466cce1bea35c2194fa885dc04c23b69d969d74c16e0ed095021e0630ecc9b8d5c5f547b5578ea9be6b6c61d8aa7077f34ddce2dd9308f739b3c

  • memory/3324-0-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/3324-48-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/3324-1-0x0000000001410000-0x0000000001411000-memory.dmp

    Filesize

    4KB