Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 11:28

General

  • Target

    0de5f2d65473d0c4f01ea1fc979497ef_JaffaCakes118.exe

  • Size

    228KB

  • MD5

    0de5f2d65473d0c4f01ea1fc979497ef

  • SHA1

    9607ea6981311e757c14e54670e99cc70445658b

  • SHA256

    d1bc67ee8427ee3b78962be06eef59f4c53fa053d1288cc4e07e58b40fa69b46

  • SHA512

    d71a829696d72753d07899b5c602369d465ed52927d3dff9b9b39d0ca766f4d28d33bc764feef2c9070bc6ccacdd2e869d3e7a44252070184d916cbd3c461bf4

  • SSDEEP

    6144:q2apDuIqCHE28LuU4SDOZ+5H88EZeeSzbjnNu91uzqI/:qZDuxamSUDO4HfEZeeSLnA91

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0de5f2d65473d0c4f01ea1fc979497ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0de5f2d65473d0c4f01ea1fc979497ef_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\bigog.exe
      "C:\Users\Admin\bigog.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bigog.exe

    Filesize

    228KB

    MD5

    e5167755502fdc38b21dc853c273dd9c

    SHA1

    1f0e9bb3fe3d96d609b9d261fe67a7cce991f119

    SHA256

    014284858f77f7a9fdd652094fae7cba452a051e9601514b5b7189fd38728f6c

    SHA512

    e8df86864cd36844c662a57f2c68263f27913364e5dfb10422d1b48220926fa38602cecccf736306acc6a725eaa0640148c02d85998869573e0e9367c2750ca6