Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 19:45

General

  • Target

    0f4c907ab82311c294c7513c6bbe2c1a_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    0f4c907ab82311c294c7513c6bbe2c1a

  • SHA1

    1a1d7f83682fa836675af8a7d72882225b2fa13d

  • SHA256

    c35dec9ed8b1c738e633ca67e0f3d48440a855923ab750d8dda8ba5491941e33

  • SHA512

    53d6c4509da56870c41212842e54c3000880bcbe38590df15dd16dfaa2bfde17c4fd040feb92058bb6104a89e427c528c7f55f3c9612c24c73e4ec28bff38cf1

  • SSDEEP

    1536:zvtGn82NTzwDMGAc4ohrPXo+73Rez8b0SyuNIjnZq:0wWurPX7CuCnY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f4c907ab82311c294c7513c6bbe2c1a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f4c907ab82311c294c7513c6bbe2c1a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\yoixuq.exe
      "C:\Users\Admin\yoixuq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yoixuq.exe

    Filesize

    100KB

    MD5

    541f9034659ddd1959139bbc29f4b962

    SHA1

    e8d0d4a0d3e46cbddc9363e980e4a5b3066b0500

    SHA256

    97b3369a0204a55de7ca9699d9896beece5b4eaca5994d462cf42df8bee4ad7e

    SHA512

    95418d71d027778363990f428d4c4b4cebe59f194a2ccf6659962f4a73d19fcabad61a014cb8a91b1d19cfbda5de4c2397544ab73fa754cbe16b9effa5f65f68