Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 16:01

General

  • Target

    14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    14054c005497c4dd0335ecc5a8c3f1e2

  • SHA1

    a22ab5315217be24b00123c0d054cbcf98da20b5

  • SHA256

    b9eaf38b83f065ad428fd3e31f8a41a13a6eeac6ecfb1c789ea6b3ccfb3e1a63

  • SHA512

    e8a425e3b2b6f500855dcc1ae33237c1118f9f751c4fc549d7798c68b4711caa5584690f13d3bf5552230319d62981fd7281a7830ddca4ff6181ec37671a306a

  • SSDEEP

    768:cslwGVFfiRx536uukAX/s7MInl11uVZnm4kH7W:cQVFfiRjqupAvs7MInZk84ka

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\14054c005497c4dd0335ecc5a8c3f1e2_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer Protected Mode
      PID:3540
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4632
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4572
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4060
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:17414 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2248

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          db7c83e09ebc4317f2bf2df7f66b8513

          SHA1

          29d58ef43f72ce7cf79ce6109d038a6c9b4873f0

          SHA256

          1ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8

          SHA512

          6eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          7d4e77d77e712da5d8ca95ce27c2ea6d

          SHA1

          2fdd796257b972340a365cc6fef58ae2703038f0

          SHA256

          0a05d0716df287c119227579748f5fcb423fefb45ac2a3a97c33a5f5d3e6fe06

          SHA512

          dc227661ec0086953aed3a26617e78f456e5170239670fd6a87297e0ddf4f95aac839353354c62d44f6fbd819623faef1711f79a2b37b88031aa16ae22f278b9

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver38FD.tmp

          Filesize

          15KB

          MD5

          1a545d0052b581fbb2ab4c52133846bc

          SHA1

          62f3266a9b9925cd6d98658b92adec673cbe3dd3

          SHA256

          557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

          SHA512

          bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H9MX5QVK\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\temp.bat

          Filesize

          260B

          MD5

          aff00af40ddd7efb88fad968fc118013

          SHA1

          027aedacf56d9c4ee54db9aee594403dd10d2436

          SHA256

          0a6aabec1e7549aac05cdff7e6df7ac868dcfc279587d23bc216c0e86103d862

          SHA512

          79e26ef5deb6faa4234e4f1c5de99c6b9d5dfb27a2e613c61bf5c8349b734d19c3fe53fec86e59fee076355b4be84abb6ec40c1c7b96b196294dee36ce5c8eb4

        • C:\Windows\SysWOW64\n.ini

          Filesize

          20B

          MD5

          44aac816f3e097103ebe14a6f4a90852

          SHA1

          ac33c4d946333ce1ef36673c61c1931410c057c1

          SHA256

          83a26a1569bff2aa9969e717db71a6b60a13c3512cd365294b7f0e04e26e9de5

          SHA512

          87187570f956ca03090dbc7431e7f4378de4e03f4f4984a7d453d0f9273e2a9472a1d0335d9b374a7a6a74f19072bd7398fe4a6aed46a940ecbf416ed1f1940c

        • C:\Windows\SysWOW64\n2.ini

          Filesize

          20B

          MD5

          65799aa53366ad6f54257eccb53cc051

          SHA1

          7118905027b23352b0b8c9133355ecbce2902ee3

          SHA256

          c9379b158b4e29752b010ddf800ed21ee7251cc041f207b40dfeffe3030ef3f9

          SHA512

          1170842be1759e8fcf1fc75696b63b7a12a68fa4c3ff53ba9e667281dd5c1bced01ce68353ee0401ab04cfa10350f47d63b451ad046386c0942d5562b84d5a04

        • C:\Windows\SysWOW64\n2.ini

          Filesize

          56B

          MD5

          3ae0085c48ab921004505c7db351312f

          SHA1

          29cba48e6476c7029e027c81d7ad49ff1f08cbb6

          SHA256

          291a7969ad3106e6213df7e2ccda140a7a781c55c7105ada998a1aa6390da82b

          SHA512

          a2faac330b8ab69c95afac9f57dbb7092ca1bf734c7cce7ab50c76dd2e7b31254a605e91ac59706db9f0716d520ea896cb192aed9497bfe428550d5b201d8aa2

        • C:\Windows\SysWOW64\n2.ini

          Filesize

          99B

          MD5

          b3f7f39dd65771dc062faf7e02567321

          SHA1

          82d5b3985217a0f1792740eb14c4ce314b16a913

          SHA256

          3f4b9626d09d854257de1d33361f97401da5a935f2ea336a8400a574b2d88edb

          SHA512

          530431dd37d1733ae00bbd953eb250b68b8600a943f817e49bb60effa5c28db948b126aabedb74fbae758a16f36194e7e371e1d696a8d9ba4bf77bb871e0da4b

        • C:\Windows\svchost.exe

          Filesize

          33KB

          MD5

          14054c005497c4dd0335ecc5a8c3f1e2

          SHA1

          a22ab5315217be24b00123c0d054cbcf98da20b5

          SHA256

          b9eaf38b83f065ad428fd3e31f8a41a13a6eeac6ecfb1c789ea6b3ccfb3e1a63

          SHA512

          e8a425e3b2b6f500855dcc1ae33237c1118f9f751c4fc549d7798c68b4711caa5584690f13d3bf5552230319d62981fd7281a7830ddca4ff6181ec37671a306a

        • memory/3260-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/3260-22-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/3260-1-0x0000000002160000-0x0000000002161000-memory.dmp

          Filesize

          4KB

        • memory/3540-21-0x00000000005B0000-0x00000000005B1000-memory.dmp

          Filesize

          4KB

        • memory/3540-170-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB