Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 18:16

General

  • Target

    fd58310db091214755f0183e4ea7f0f0_JaffaCakes118.exe

  • Size

    104KB

  • MD5

    fd58310db091214755f0183e4ea7f0f0

  • SHA1

    92808b6da975a9e17a7b08ae5b9a6de9b5481cd4

  • SHA256

    012fd0492436be7af0390c3fa8858cd15d1fb6090c1c8e94e3e0b4e3a0f64f52

  • SHA512

    4dd5e1b3ed55670be5fefcddf6f98a2a5069fbc2b908e114c72b456926c1fd6d24065f9ca0ad1c1049697ac9d613f9d60d7bfeba974754b72eef06e6ddc50a68

  • SSDEEP

    1536:J7wL/lgjJ8iKk71tycDEJfNOPcDGwmgRouYmvqwMewT/0Xu+b5krpNIjnZVO:MNivtyccm/3iu+b8CnXO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd58310db091214755f0183e4ea7f0f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd58310db091214755f0183e4ea7f0f0_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\naeigod.exe
      "C:\Users\Admin\naeigod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\naeigod.exe

          Filesize

          104KB

          MD5

          30878ada3fae456e61dc7929cdfba674

          SHA1

          8993afd196727918e55cde2756beca1ed6c0fb82

          SHA256

          f84401d39dec29a45d606c434d4e752bea7a964915c083f25f8eb78d2358b6e4

          SHA512

          37d324e616982bafecd9e2436a618036a4613efe3f086f4f9a52ebde0249892e747616d14742bff4eb77b1a5136141bb25a34371d224601ad926ff6a6e67a880