Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 15:54

General

  • Target

    0f7a9273863e4ec38f080763d206c1e7_JaffaCakes118.exe

  • Size

    932KB

  • MD5

    0f7a9273863e4ec38f080763d206c1e7

  • SHA1

    1cdec76da9116737199d22856bdb07c30ecd4ed3

  • SHA256

    a34209ae6fe8961f8f5d5c76793ae43b2aa0f927b741017d67508b5281e7d67c

  • SHA512

    5fd3484886c40ab8c452e9a22c7ace6bbc26ec9c7afb1a158d904cd84ba674750520ba6380b61e17481785e5622acca6cbf8a8bdf94b92ff9953ad139b835fde

  • SSDEEP

    12288:l5Xe6gi+4Bb6uQa+qgYnEil+C/87dDEx+yppu5MOL9fTnxedGm97OmTxZpRqE/gt:pq4BbxLg6EiI7FY+QuaOL9f47OmlzR5c

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f7a9273863e4ec38f080763d206c1e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f7a9273863e4ec38f080763d206c1e7_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Installs/modifies Browser Helper Object
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\IDM\DwnlData\Admin\idmmbc_2\idmmbc_2.log

    Filesize

    356B

    MD5

    df692fd0f14e9162789df9746fa318e1

    SHA1

    6e4938567c0c98fd54077622c3f352931215f2e7

    SHA256

    db9cf3ddd173e7b9e759f943b8de982730ba29f23644f1441901cba083fdec43

    SHA512

    7b702a97ee9cff62fcda7e2b186e54ed6f5eac9de70533dbe0bbf887941912d2d4e815a949695c97201e41a7679edabb1d321fbc5ca934104850bf4c9f017e8a

  • C:\Users\Admin\AppData\Roaming\IDM\DwnlData\Admin\testing_1\testing_1.log

    Filesize

    887B

    MD5

    80a6051f9a6d813677c17980fc084c87

    SHA1

    c76b807932160d7d12bb2e229fe0402e4c3de3bf

    SHA256

    6c63bb58819520d2cb08c636ff0274b470a72eaaf58fa7cd5e90e1c48180db65

    SHA512

    bb063431fa319b47ad14f7200d72a160821577f789d460ec26cadb1b4b61e342a66016fe4de31925f06e0dd2a993a6a372d706dae2f6b24e578aec123d207410

  • C:\Users\Admin\AppData\Roaming\IDM\DwnlData\Admin\testing_1\testing_1.log

    Filesize

    298B

    MD5

    b720552533db150dc223a757ac3ebca6

    SHA1

    9fa6a51f49e56f9b994bea2dbafe6563b0e0967d

    SHA256

    0e8a2fe94a617783d9d6e1ce0949d5d3d62872c1b1d272119979a5b8a1f73892

    SHA512

    a12a850e3dbcb159e39177ee8f84337efaedefcd35e171c287be5498f8f9fbe2c96e756643fe057f94f640da9aab0f6bf81b04222b504c01d3fc6da3bf37c176

  • memory/704-74-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-77-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-53-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-1-0x0000000000830000-0x0000000000832000-memory.dmp

    Filesize

    8KB

  • memory/704-71-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-72-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-73-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-0-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-75-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-54-0x0000000000830000-0x0000000000832000-memory.dmp

    Filesize

    8KB

  • memory/704-78-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-80-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-81-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-82-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-83-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-84-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB

  • memory/704-85-0x0000000000400000-0x0000000000717000-memory.dmp

    Filesize

    3.1MB