Analysis

  • max time kernel
    149s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 18:34

General

  • Target

    e822dd2bc198be6c9fac9dc844db7204_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    e822dd2bc198be6c9fac9dc844db7204

  • SHA1

    82a744cff38a2cb91d17d5e301aafec8bf1d83b2

  • SHA256

    482960618566c30ebac983171319188059c7a0727316b9422baaa7a658ba953d

  • SHA512

    af043f52dc920ec84e6ee492f81b3d216d14e344145bf564de6aecf8628ef470cb2066c6f74e57be54404e8f040b8c3d84e4c57c1753f818f03a2ef961167b97

  • SSDEEP

    3072:MBd1FE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANK/E5j4oQ/j:OdXE2R7Qvb4tQTaCeFP4Abdsj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e822dd2bc198be6c9fac9dc844db7204_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e822dd2bc198be6c9fac9dc844db7204_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Users\Admin\taiuc.exe
      "C:\Users\Admin\taiuc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\taiuc.exe

    Filesize

    156KB

    MD5

    f47893ceac58e7920818857f0795c50d

    SHA1

    f809da5c203625eb3b43221a9dd81726af6fd0ac

    SHA256

    98649a06c74e8224a3a5c1cb9fdc1bb871f7904f3972aedbe5f4f9e001596df7

    SHA512

    ac2046662092cb53dce7ec1fd7580201382c1f46ad665653e38882c24a90a6c1d6f01644ec4330e6facde189e083403cb9dd259c66b57d4651ec18936e54d3e8