Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 19:13

General

  • Target

    0a58618654c795fa511b3d6070b5188c_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    0a58618654c795fa511b3d6070b5188c

  • SHA1

    2cdcf6e15603d9e3051f979944ce0c467d0eab30

  • SHA256

    8acdc34614a7f42cf7a6bc701de90849f377a985c4938fd091f592945df3f6fb

  • SHA512

    cda8138ba49076de1e69ca264d6d13a130cdd1b521ee2aa2529a260f5df6953c46eb0631335a67fd0647eb1af5078580401bfcbc78db9a0daa097e70ef636d74

  • SSDEEP

    6144:vEPG3PFKs7aaOKW8alhrEqxF6snji81RUinKGHgDSSr:vEPkPhvENPH6Su

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a58618654c795fa511b3d6070b5188c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a58618654c795fa511b3d6070b5188c_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\woeib.exe
      "C:\Users\Admin\woeib.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\woeib.exe

    Filesize

    228KB

    MD5

    87e1eba00e6fa17bff33670e2040271f

    SHA1

    739a3982ad31348bfb1e357c5ed989752d679494

    SHA256

    99492273e03585fcb0e24e64e9c17cd820e3050f14ebfe37124e2f46d91a1f38

    SHA512

    91cd8811d2f4eaeb5d70a81cc71bfd8844bd06d4747e7a473cabbc575ab65201eb0ea11eb9f18ee1dd8f8b709a1e6b25637f4f5b106da70e4fa89066ea4cf6e9