Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 16:25

General

  • Target

    07b71a3e7009db24c30ddf554b399b8b_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    07b71a3e7009db24c30ddf554b399b8b

  • SHA1

    6d37a979dd732b1e8ac0f147b8141ff98c194f89

  • SHA256

    0096e2281b590ea7db46ff8a1650c329ae317436f24563ffb53c0104cb418afe

  • SHA512

    9fcb28cc05298ed67a6c1bc4de1df736800628d06f0390022353981cba64b18653e4c98cd66ba6e79057ecc5a51ffdb4674c673ad16f5f7b2807756fea89bcf1

  • SSDEEP

    6144:P3aElQxchRdjLmtrBuMrdekUH63u+X5sc57W:CxxGLTuPL5

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07b71a3e7009db24c30ddf554b399b8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07b71a3e7009db24c30ddf554b399b8b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Users\Admin\boiowih.exe
      "C:\Users\Admin\boiowih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2848
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4228,i,3833046924978547022,12404847742964713612,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:8
    1⤵
      PID:4736

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\boiowih.exe

            Filesize

            272KB

            MD5

            dd3412f6bc89c77193b7abe32817137d

            SHA1

            6d5f89b60039601b4eed3496cf2e91114931b12e

            SHA256

            e9bfb85afb95b6d71d1783c91fc965d86c66b8bc8d84d51aa4fe6129c01bcf63

            SHA512

            54cb73c217d83304d7f68432062bd257728b9591dfdad900abfb9ff8545a668bfbf0acaaea5af4e4e8bf391ad5b292b5ff6d13202fa90be992725297be2ecea4