Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 21:14

General

  • Target

    f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    f1f095c8a62f0ae8f3be60bad82b0e9b

  • SHA1

    49fcceb8da2940c2606fc794633c79bfbd52d52c

  • SHA256

    ed81bb0f07899cdd3c9545937f50ab505a7ec8e85785be9ce1e2c03345a854cb

  • SHA512

    7b2ea7fa7b73eb9d182b14dd8ac34b289097804eb206f057dc3882ccd9207e986030aaee1fb33939bd3528cba0d7aa4f3102a417ca17860955040bd2d5cdaf54

  • SSDEEP

    3072:/iFiQh4mRpDGq7At/yRWr2wA36nbMUq8hFOdhIk4oQZiE6W:KFdh96F90Wf7nJPwdzWp

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1f095c8a62f0ae8f3be60bad82b0e9b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\xobov.exe
      "C:\Users\Admin\xobov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\xobov.exe

    Filesize

    148KB

    MD5

    8a936a8ed927288a14cf1b0ece922376

    SHA1

    729f3036a1ace7b335c959a4be618886f7be8754

    SHA256

    2312bfea77ff2858987ac56033a5c5ac9982eb65c16d30da2ad9346207821187

    SHA512

    ebe9907a2ac0743bac1e0e07b598f564750de2470d7ee357e6f7508c35b6d03e14c44dce3ebdb9d02ef660a2bee407d66f6a60f84189f3c73f9f89844772c87a