Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 09:28

General

  • Target

    07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    07b43c6ebbe48ea3536181bba5c48f38

  • SHA1

    33bfdba8898e9369460e846836e53266c90654a7

  • SHA256

    00ec75d8d1475a53aecd87f1d7de98e6bb48d74f058771c52f1a1ab4b8b7ee91

  • SHA512

    d41211fba68d1f3bd94d4b8a811afb4dfea59e6f8993c17880bfe6fc319ca0bb0ae837baf998c2d4b446873a87d6cab1b38c3295a963423babd7876236a07680

  • SSDEEP

    1536:D2ef30zZ3NMsOfXu7Ke9TG4yMSmcUk6lCbQvmSTpJwuqCNQR6nkX5SADkPY+Gdtr:yA30ZTTG4yMZc9pJSTp63ZXP

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07b43c6ebbe48ea3536181bba5c48f38_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\haoayo.exe
      "C:\Users\Admin\haoayo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\haoayo.exe

    Filesize

    204KB

    MD5

    583f8336e6b4aedd7ed7f14f40a4632f

    SHA1

    2db82feafa58db9dd692cf75ac26fa0771a4ef70

    SHA256

    172317ebbf975dd7dc5be6fdd9ef2efb8125a72ee21412fdc0cf357a538016f6

    SHA512

    5892e35079874fcb330344b1df389b900ac2963529caaf60b171eb80691ccbb8f606ba6fd83874fb99d920c2323a1c83fc3cdc9c186a5c8bc35e0d8dda5ae433