Analysis

  • max time kernel
    145s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 14:36

General

  • Target

    JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe

  • Size

    244KB

  • MD5

    8ac23acbc2511e0b4d46648faebbb7a8

  • SHA1

    1dee5f2bc0073d83b329fbd3961c0f7b0174ac49

  • SHA256

    f56407bc63e47ab020c06bd7f6de96dc60590a4fd274ec060d4283b471add83a

  • SHA512

    48ddb6a9a03b245c06b8bd6be2d86f0833b2c335ba8321b54d1e154e9d774f70db08ef41a939152fd03a537fb19b0457943ad540b8b3879d0d0abce7174edb46

  • SSDEEP

    6144:z3P2nGsTc9fNtHynneSaGBGu7Bj5bennnnnnnnnnn:TPWGfVSnneEBJFjB

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ac23acbc2511e0b4d46648faebbb7a8.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4728
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4748
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4748 CREDAT:17410 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

    Filesize

    471B

    MD5

    0c5ef9158dcdd3b41a7e84c5e760b59d

    SHA1

    9cb930588b30e4399d0fbf73a559b2d89373a6a9

    SHA256

    95c2b916d5668f7823fc9222d4cac008570c4f1866a3ef2b4175cb1ea5bbd9d9

    SHA512

    13cf19b192d4b6365ab09e13b5ffc6c26470ff51527d8e49fad7aa410df5a7bc6557e731d5b49fa7c19cd9b677764422d2f57c10d2578cdfdf91cd1120db9c4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

    Filesize

    412B

    MD5

    5908915e6c64c9ffde47876732f34d0f

    SHA1

    7ea2692b90c37312ee995c31fb87e7d29c665039

    SHA256

    4efa1b6affd7b05c44bc5101a8f935889f826d520528ecd2521e399f7191c655

    SHA512

    d11ba356b6f07272a9c1c7214913a2acd179f8adee656464688d6cc6d158aa5a0be7701d0cfc872b6f02ac26c72434a418592c0828f4c4cc08c88d7961d62ec7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\A0YW8B0D\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/4440-0-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/4440-6-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/4676-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4676-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4676-11-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4676-17-0x0000000002730000-0x000000000277E000-memory.dmp

    Filesize

    312KB

  • memory/4676-21-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4676-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4720-13-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4720-16-0x00000000020E0000-0x000000000212E000-memory.dmp

    Filesize

    312KB

  • memory/4720-22-0x00000000020E0000-0x000000000212E000-memory.dmp

    Filesize

    312KB

  • memory/4720-5-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4720-32-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/4720-3-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB