Analysis

  • max time kernel
    149s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 15:33

General

  • Target

    1689eed56edc4d03c2d9b2d8eae18366_JaffaCakes118.exe

  • Size

    176KB

  • MD5

    1689eed56edc4d03c2d9b2d8eae18366

  • SHA1

    3770295fec085065cf47135af543250d699ec213

  • SHA256

    f1c6633404b0d410512d859089e5d728d757cf72a0541fc1cd34953803f1a7d7

  • SHA512

    e1320f69a46cf0c290e6bf074a09e407766fbbaa0becf4a345a241709c3713eec877000da4902dde27f087e1770a9e35be6f16947fbbb4fd18c87a722b66ea53

  • SSDEEP

    3072:wfXeCdKZCsJB/pAYsmyCMuKnvmb7/D26ADS6eS6EjzXLG47JTmcoiBuAZdE:yuCkCsJB/pxKnvmb7/D26Ae6eS6wzXLQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1689eed56edc4d03c2d9b2d8eae18366_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1689eed56edc4d03c2d9b2d8eae18366_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Admin\fouegu.exe
      "C:\Users\Admin\fouegu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\fouegu.exe

    Filesize

    176KB

    MD5

    d89322ef46b7d6491a7c4a43720ddd6d

    SHA1

    cefb0559357ae971065bf31db01bc650be6a0ab1

    SHA256

    c9931df0b04dfcc58fab92d74f8a1cb626413fae61372f45b68a412dfd2ba670

    SHA512

    b4991fe3dfce4af866ea276eaa62626d01aa65b38a6d96f32a05343653b177c1edd2e0ea2fc82b85b14d0861d4b9db9aa131ec4960770ce47191f44dee63341b