Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 19:19

General

  • Target

    0a5f71b360f68f03d5643f94e3fa5907_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    0a5f71b360f68f03d5643f94e3fa5907

  • SHA1

    069cb6071376adc86092f054f4b26e50ae161fb6

  • SHA256

    cb0ea9ee103ce800a35f42d65832781a41c15c5ff93b98d5b01be7e9bd6b4599

  • SHA512

    f13c2e7e30c3071d935c6ce1cfbec4bb2fa0388943ac1e10e74e43b79d122b6555fdb3929ad116f2adabeb23d136604c0947f9b34e30dc7232d5e39bdb27c5b9

  • SSDEEP

    1536:P2KeSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZJ3a:4Ss0G0mZ0K

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a5f71b360f68f03d5643f94e3fa5907_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a5f71b360f68f03d5643f94e3fa5907_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\xaaago.exe
      "C:\Users\Admin\xaaago.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xaaago.exe

    Filesize

    88KB

    MD5

    f75afe3e44e406fa658790c21f93fb6c

    SHA1

    55e6cf7355b291954a719e6f8f0a60eba8e380ce

    SHA256

    ec4cb1edbb3eca356f721ceb12b52c5b956c3f278a28ae2716267c8a307c1f85

    SHA512

    9f96788bf5a56f674516febe4690b7d777bc3103ba349ba30c0971579d8fa4e4273da7646a3ee6516bcb7cadce3cb4cf6517dbf1cc8f7b193d96bf2917d2e0c1