Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 06:53

General

  • Target

    ecd4809e431ba3b6bd9054f0e3ba0bc9_JaffaCakes118.exe

  • Size

    168KB

  • MD5

    ecd4809e431ba3b6bd9054f0e3ba0bc9

  • SHA1

    88edffb8fdc6e9b10d9c77456bef503e35cd888a

  • SHA256

    3d7960459775c79f56b75ad912ab2c77955e50ab09e958c8a54b59ea355ec48c

  • SHA512

    1bcf95395abe1240faaedd6465dbd5d763ccf99e961e91cf4fb3ca11e4193e66b4687ce2bed886116a4549f02b6c27fc7f3e6f1bd5915205e9547a4ae9570f9c

  • SSDEEP

    768:Dx3k9S4pbU2xegyvWvg0hv4ZZs9y01+OkEHS8+nUnmfFB5R11dXcSv7U1aM:DgpbU2Igk0hvp9bwfFB5R1bcGQX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ecd4809e431ba3b6bd9054f0e3ba0bc9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ecd4809e431ba3b6bd9054f0e3ba0bc9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\lizit.exe
      "C:\Users\Admin\lizit.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2792

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\lizit.exe

          Filesize

          168KB

          MD5

          c901537e9dd4a335b83787ae69f3cfa4

          SHA1

          f2cc2301e2f491f5ee8d14a4ce6e18c4315c3338

          SHA256

          e0f979625a75e941cf575233f8f0e69b1b3ef035624c459f81a689d0e50b10ab

          SHA512

          d3914aaa8d9217cb4347de9c4790aae7309acf38afa66eff734a61fdd7e898ae421610d84010005025e8693bfe0651f579e9f20507c43a14d968f98777b73c77