Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 02:31

General

  • Target

    fe395ee88a726c379b17e9c56a812e69_JaffaCakes118.exe

  • Size

    208KB

  • MD5

    fe395ee88a726c379b17e9c56a812e69

  • SHA1

    51dc2b9ca3e219dc143e0b0425c146f5624f5371

  • SHA256

    c78f041509089f0a40ea3b8e58c719ced5a7eedd103fb5881feb9037d49af32d

  • SHA512

    2d431d0329177509f1fdd48bf20ef31e8964f6b6e20562d349792ce5c896ba8bc23d3f680fe63002ebded7106266039dad5171aa35bff0dd3c62ddd1a3906d8f

  • SSDEEP

    3072:nDMM1FlDK979aAqvxpDWDhQx9AhHp8NeqxEN1yy8p+uxs/Y:n5FEoA8pDqQx9AhJSRxiJ8jK/Y

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe395ee88a726c379b17e9c56a812e69_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe395ee88a726c379b17e9c56a812e69_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Users\Admin\raate.exe
      "C:\Users\Admin\raate.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1372

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\raate.exe

          Filesize

          208KB

          MD5

          5e38f5b6b1f1e621dc871882f5981ca6

          SHA1

          ca2169001da8c750afbf1d29774c0e18f002a362

          SHA256

          f799118d2a285a2e44b76b7b81599d6018427b72cd63aff8e14dc341ade82354

          SHA512

          27c38bdc629ce6cd8cff41a46af20249f0bb77fcdf2f29bcd743433e6aeffc7d8109dc0f74241afc739db3e2cbbc70ca8fffb38121dbec737583ba9bf6e7d832