Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 12:22

General

  • Target

    1b48ab33a0e239891360080ed8e15eff_JaffaCakes118.exe

  • Size

    272KB

  • MD5

    1b48ab33a0e239891360080ed8e15eff

  • SHA1

    d6def983b48027e1303f432bd0f62ac4395186ff

  • SHA256

    6127948f0a070bf5125b166c6a54bef362a73288340b0618184428c57c092f49

  • SHA512

    cfee9941816eb3e502f96c5fef5f589395fcf8632bed71a760c68e135ba8a32f38abc122e94718eec73f9cf3b2fb55dbecc1a90d316a9c38bd1fb3c166f8588e

  • SSDEEP

    6144:MjFsFrymU8iHOADP0UfV3SHWPIxXZgO+VeR8RUl:xFXUfJSj+R

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b48ab33a0e239891360080ed8e15eff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1b48ab33a0e239891360080ed8e15eff_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\zeepos.exe
      "C:\Users\Admin\zeepos.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zeepos.exe

          Filesize

          272KB

          MD5

          cf2e3ed16010d564e4deacc67f67c444

          SHA1

          f8e14324e6a3b9fff3c71a32c2c0932e8b2924a9

          SHA256

          9fd033356198c017da8be1db5ac4cd36e5dc2d6a03aab6f211d2ef4b858bc9be

          SHA512

          b0cc3556682cf8946c1910b46f12024a19782ae302d456873f23f10d38063288878adf1c6785436cb3d188dd58f58d78fce6427b5d561df023a3688351d1af18