Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 07:11

General

  • Target

    0d29140ace82b46d0d75c8ede0a0c982_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    0d29140ace82b46d0d75c8ede0a0c982

  • SHA1

    2080e50ee135aaa9b5ba64367c7477f8c523fc7e

  • SHA256

    d3d9c00a181c0febf1f7f4914450133485d5d5483a24d0ee0c9b7a02a0b466a1

  • SHA512

    12a9b5a28d58778c91d9600ccc9cfa9db9fc6fdd0b217b59b0b2001d33ccf019f8dd8138e76427a13cc0ff84f25f571871347124785a33a682f1fe034e55c7d6

  • SSDEEP

    1536:esEAhwRCzuBxeDtMYHa27J14ltxporZ45igNeG0hQ:fEAhwR8keV6gJ1uCt456Q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d29140ace82b46d0d75c8ede0a0c982_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d29140ace82b46d0d75c8ede0a0c982_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\nkviol.exe
      "C:\Users\Admin\nkviol.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\nkviol.exe

    Filesize

    124KB

    MD5

    62cc06183c81509425fea56cfa02edf5

    SHA1

    566f3391a723285e178fa931b916e47c8c8eff0f

    SHA256

    4708c3b22caec9afd508a457a1d932bb98efcdc2afc501c15cbfca9bc49edcfa

    SHA512

    7ad4565702d6c62b4e10e23a1d85d8f1e083326b0ec393bf2cb325bd30afabfb6821f00fa10798dcc92e88133f6fff18040fcaeb78b51d47e54c00196b2a8d02