Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 12:08

General

  • Target

    1a0f1fc2b1faa536c39eeab4d13b919c_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    1a0f1fc2b1faa536c39eeab4d13b919c

  • SHA1

    b92665f4e1a69f4d48486a48d65b5dc97a0e8dc9

  • SHA256

    6e47aa32c1160f4c2db3640a8dc978f554ac0537a1067760d4060f4226ab835d

  • SHA512

    c9afd426b91b50eba016a66826043789a14a0b1a37c1aa405fa3621c7e0929dfb0d9120ec30a5fe6887d13e6f181a2c31112409c7d5c9e6318d481b5c8e047ac

  • SSDEEP

    1536:1pFCFTfeS6VOFaXGE2Mtf9oUrUQKiQg9F5tkV7pjuX5e6wTeU/60hQHy4ktlQ:JCNetVeW2MtF3lV9qThaylQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a0f1fc2b1faa536c39eeab4d13b919c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a0f1fc2b1faa536c39eeab4d13b919c_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\suxep.exe
      "C:\Users\Admin\suxep.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\suxep.exe

    Filesize

    120KB

    MD5

    22b0ef67600c66ea9787df5257ffc8ca

    SHA1

    7ac5b21ca5abbc8889c3ab1bfc37324c45981d47

    SHA256

    d78ce51329cef29d3567d8dcbddcc745caaca66a5a065633fa5b24cf09d8e5d3

    SHA512

    4b890e1461bdc90a23d7a5267c9a4d9ce84c2d6ce0f81894b53df885366ca047845ecbc67878553d2f45e99f32d2ff8470ffcdca589a0c7a92c94971d7d0dcaf