Analysis

  • max time kernel
    125s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 13:17

General

  • Target

    fa78dfb5defbdfb64fca51ced276e71d_JaffaCakes118.exe

  • Size

    546KB

  • MD5

    fa78dfb5defbdfb64fca51ced276e71d

  • SHA1

    d9dc26e6e88283eded8acdfb2413bf42482ae102

  • SHA256

    44a73a20262350b4a326f71ae3009d3d30bdb7128869c1e21d0edc0c45f69a05

  • SHA512

    c2ddcb93212d09e5f00eaf7483e16981c718754ab3b1b0f66ae6fadd65938aea86f5b725b5c678db6f92125dd6831f85fd7558ca33d69d9e3daed11a6397b1a3

  • SSDEEP

    12288:w4fmuV/2SlI1MCAHab5I0WozQsmknY87Z1EPclMkc9A7Z2y:w42DMCA6b5fWQmknY87LEPcl9nlX

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa78dfb5defbdfb64fca51ced276e71d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa78dfb5defbdfb64fca51ced276e71d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:872
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1292,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=1296 /prefetch:8
    1⤵
      PID:3500

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\DLG\initWindow\noconnection.html

            Filesize

            2KB

            MD5

            a0ee32dc4ffc79fdef2dc0467da538c5

            SHA1

            15d78592ac2c313a52d3c22783aae9bb4c787182

            SHA256

            b4508b7dcc08b2b93cd64bee68bd5174fe48f48280e59f9a81d4861c3ef0431d

            SHA512

            e7c02d6211878466d1fb77d2d96a79615f3e85cc9579fb6f54001639902eaa106d734a9c7ef07278c5014e7dc8d28d7b2ee28f677f362d80dfd3d26e59a976e8

          • memory/872-0-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

            Filesize

            4KB

          • memory/872-16-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

            Filesize

            4KB