Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 18:31

General

  • Target

    10145d4291d70e76c990f3df2c70b105_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    10145d4291d70e76c990f3df2c70b105

  • SHA1

    875d54922a25a7f945c5dca80ff49c805ecb4349

  • SHA256

    e41b5d008a4b4b25ae30088ceeeed2f66acee51c9bf1fe0659de6eb2185a04f4

  • SHA512

    ad802a9bbdeb09e101f5717c62b45770fb6ad4d707c4343d0ceea5019d49565f2c37d384bd2fad2a9f139bd070d042f63cc073082b460bf7e646d780572c64b1

  • SSDEEP

    1536:xBKUAfjncl5yQHmFB25xTX4yOH5XSaP+V9KOOUS5yUNE0BmLr55p/EK+CnJnOJ:xAU6n8Rm6vPk2Ps3E5jp/8CJn0

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 62 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10145d4291d70e76c990f3df2c70b105_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\10145d4291d70e76c990f3df2c70b105_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\arq.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\SysWOW64\reg.exe
        REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f
        3⤵
        • Disables RegEdit via registry modification
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:516
    • C:\Windows\SysWOW64\HideFyles\ctfmom.exe
      C:\Windows\system32\HideFyles\ctfmom.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3092
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4920
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4592 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    6de4427d02d49cee2c46a8fead1fafa8

    SHA1

    bee49bf0e4452ca72442face8e655bf4a8c3af17

    SHA256

    46d5cd7ff558e5c788807eb674587359c6a660cef091eb420676977e49833d53

    SHA512

    c80311bb92f9f49de96d06e9a76a3ef0310365999f00f401fd003d438b66744a88f093b5887e1723c6b8179798697ec24c4b2bda489323337f6cec6d28ef6434

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    16f9197f75b8750a7d8ccaf8fd922962

    SHA1

    2e95fc2faed5f09fe2b6fc3bc608d056017fbccf

    SHA256

    c42d363cdc3407b83813246b6ac83395de40a5ceaff07126484e6f50cbce33d4

    SHA512

    04c65081d583025726d3439a63fba625ef952e96a45daa083ce7c7ddca1f88f075816c22e0b3ce425ea96fc3d798a05c39a8c1a3a14f7350f21d4da4a0f9b66a

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver3004.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\uoyvico\imagestore.dat

    Filesize

    419KB

    MD5

    2cf6bcef8defbf767aacea5e650f71b3

    SHA1

    2f5848342c33e6763cc2b611aab3772c79e4e339

    SHA256

    2057dc0972e917aea45bac7046f96d86689caa81444afbc36a82970ff60cc284

    SHA512

    a986b1fb8f44ec273eba9b6196e2371ba3600e37504f9e66426b20d40207593bdf4bb31a63c0678d99bccfbcc50e422728143b57e3ae73b35bcd403b42487515

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2VX66VOV\iground1078[1].png

    Filesize

    419KB

    MD5

    6651272a7fe4b6547b5710e679df2f8d

    SHA1

    686a243dabe734db566aff6f44e4974de5669993

    SHA256

    97b27010e30ba6855fd1bb384066b28e2fb37b8d845808dd291929e032d010e7

    SHA512

    c4785885183f5c7701da8308ff766ead5ee604f33d123aa23a03f896ad1c3caba6f53725fec84b910e6bd2f9133ac51f4a6cb6d2f1cb52a45a4a04535b41c6c3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2VX66VOV\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Windows\SysWOW64\HideFyles\ctfmom.exe

    Filesize

    84KB

    MD5

    10145d4291d70e76c990f3df2c70b105

    SHA1

    875d54922a25a7f945c5dca80ff49c805ecb4349

    SHA256

    e41b5d008a4b4b25ae30088ceeeed2f66acee51c9bf1fe0659de6eb2185a04f4

    SHA512

    ad802a9bbdeb09e101f5717c62b45770fb6ad4d707c4343d0ceea5019d49565f2c37d384bd2fad2a9f139bd070d042f63cc073082b460bf7e646d780572c64b1

  • C:\Windows\SysWOW64\LogFilesHide04\05.log

    Filesize

    26B

    MD5

    5be20fa2500878b0789c20e7c4ee5114

    SHA1

    8ffa467281946fde01a5add82006146423302076

    SHA256

    b07fd4684ea337d49388fbf72a68c430851ede803e7eb48dc301c3d7085ffc3d

    SHA512

    9be58471ba2d22abbda9cacf78d8ca7e0facba105134700263d13c2c9138d08e09011e317c71f26df5b5318cbe2bfc69a6f5b65fb43bcb947868034fbcbcb44c

  • C:\Windows\SysWOW64\arq.bat

    Filesize

    119B

    MD5

    9f08b6d102fd194ec2f3ce202a2de949

    SHA1

    13520089e21c5793990e608a2471ec6743200449

    SHA256

    d57b5b62148a2dc2aae12fa74bd0d1d12e9fade7880c0e939ecb0fb0fc9d3024

    SHA512

    d559d9c1b54d83e1eb12bec5dd29cc7e07b22de83a722d0b4103014e39be5afac2f08c7bb5b24f25fe3ba65e38e8d438d00d8aa4a07ee3791b1641e0945a3403