Analysis

  • max time kernel
    149s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 13:04

General

  • Target

    f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    f5d5c793fa07ff2f0db10277b3caf020

  • SHA1

    813b5427add51a73395d75ab4c2dfc217e8753e1

  • SHA256

    7db6d83a30937c8ea11c35fbab1e2065c201137e978774f44ba43f2be38feff1

  • SHA512

    63698d0300f139045de2228fa340c55e3bc033daebd223c509a3a655af1748205ca882ce2313fa73f14fa3cf09122758262fcbc636ae65d5074b50a364faadac

  • SSDEEP

    3072:SWVg+CWoYTzCh46Knvmb7/D26ytQlw/Lg5q69srijEIS3A:IGpz6LKnvmb7/D26yQlw/Lg5qosri/Sw

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5d5c793fa07ff2f0db10277b3caf020_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\jqbuev.exe
      "C:\Users\Admin\jqbuev.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4596

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\jqbuev.exe

          Filesize

          184KB

          MD5

          72352d435efae43610025e2d66a3479e

          SHA1

          0c2d496b6c49b7e3d0b97dcbf41dfbf01eb6f1f1

          SHA256

          892949736c50134f8f18bfdd066c3f150164dc1f33c96e34a4c22d6ed90a9253

          SHA512

          2b48ea09ee855ff96dca44c088dfc75d98515fdc627e35d92c2ab56ebcdb7aa88a84ab847f6d90fd49882e2ccf449ef36782d1adb89c53d825e2c9e7c9223a56