Analysis

  • max time kernel
    149s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 19:13

General

  • Target

    0a58618654c795fa511b3d6070b5188c_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    0a58618654c795fa511b3d6070b5188c

  • SHA1

    2cdcf6e15603d9e3051f979944ce0c467d0eab30

  • SHA256

    8acdc34614a7f42cf7a6bc701de90849f377a985c4938fd091f592945df3f6fb

  • SHA512

    cda8138ba49076de1e69ca264d6d13a130cdd1b521ee2aa2529a260f5df6953c46eb0631335a67fd0647eb1af5078580401bfcbc78db9a0daa097e70ef636d74

  • SSDEEP

    6144:vEPG3PFKs7aaOKW8alhrEqxF6snji81RUinKGHgDSSr:vEPkPhvENPH6Su

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a58618654c795fa511b3d6070b5188c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a58618654c795fa511b3d6070b5188c_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\heewee.exe
      "C:\Users\Admin\heewee.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\heewee.exe

    Filesize

    228KB

    MD5

    e0115fb5e62eaf60d71a8e846236994c

    SHA1

    bc6bb61671c553085c299ff1ce02db5a30c1a452

    SHA256

    ad200a1c888f992b1b4ad13fd97cc242a76240095ec8c975ff7eb696dbc47ced

    SHA512

    9909a5787e1bba44b3504b3e700b861e8b732215a0073081c7424fc3e322b2adaec544336592263e6c5d7b95dfccad26ace9694f76eb126f9fe6e830603ace9e