Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 07:54

General

  • Target

    195a7897bd3d5d1a1aa7683a10921909_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    195a7897bd3d5d1a1aa7683a10921909

  • SHA1

    e3adf808d5774a79f5857622951aa96f430ed2a5

  • SHA256

    4c75cc11f7d6c7755219d05c568e7a069612e770c6f8a26aa05fe240fffd1bc9

  • SHA512

    40c0e53dea4a4d41be3952708fe36aa0af60c4c15fe3e88b1ac616b7505fe1acd4322eeb16f13372b60645b0dc089f4d902b429772e0b930498ee4a0406df0c2

  • SSDEEP

    6144:kD07J6Y0d/RCH3erL/sLAsLPfc/UDgKJ1s4EWqZA7Q/DxoI3sDP4QtNINHKbhFJc:D7Jh0d/RCHOrL/sLAsLP9+AKtF3sDwnG

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\195a7897bd3d5d1a1aa7683a10921909_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\195a7897bd3d5d1a1aa7683a10921909_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Users\Admin\siwiy.exe
      "C:\Users\Admin\siwiy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\siwiy.exe

    Filesize

    248KB

    MD5

    9fbf371217d592cb119e68b2aac0cdda

    SHA1

    db29924086e6487cf3554a0efb09325d44c325ca

    SHA256

    9d04c9d31d686d4a26727e4521417b8ef1130e4360a190c546185f4243a83056

    SHA512

    99ea243aa62ddc060eda9f4e2c16816c44077daeadd6f303e3c48578aa131f4da0571afe75164190952ad23f445a574b4f4b6753515403bb337f48b660a38be8