Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 17:21

General

  • Target

    082b412dcd9df1e3aa2814bf0e833490_JaffaCakes118.exe

  • Size

    380KB

  • MD5

    082b412dcd9df1e3aa2814bf0e833490

  • SHA1

    0b70d0f800a9567619ca44a11142a9f80fd04906

  • SHA256

    3b002fb95e6c81b380ca991f81e63f2792c775a5ce9b778aa9b8a44163646924

  • SHA512

    a41df2324cc0d3d8ac7b5e9bd2006709dea9f1bcf0f74923ef35266bcb41770a67b17c095447255351b4f034866ccad429b686b5f547d8157c587bb71c1e339c

  • SSDEEP

    6144:5hE5fK1Zc/jWhvd0yTN8jT0M1zWyjYd/dm:PERKQeV0Ce0IzWfc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\082b412dcd9df1e3aa2814bf0e833490_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\082b412dcd9df1e3aa2814bf0e833490_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\daizu.exe
      "C:\Users\Admin\daizu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\daizu.exe

    Filesize

    380KB

    MD5

    9c163e313840a5d27cb3c4452745c98e

    SHA1

    f2a87b2f9d93c170495c204374b9792c46a693bb

    SHA256

    57bd0e10860b662a2606dc0923e09bb5342830278c8041f11796cb0ea600a238

    SHA512

    805d90add231a932241f5f2536d3ee43461e79bb59b7b5411761c834242ad0d572b42eaae98420d04d70a6a5c39d0f070008e7a0ef08a0771507d3cd0b64dd37