Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 17:46

General

  • Target

    1bed779a7acd627ecf562093e0edbbd1_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    1bed779a7acd627ecf562093e0edbbd1

  • SHA1

    448a7e252d102d69f2e442070de5ff63a14321ab

  • SHA256

    ac01f94e69ef83ac63853e7ee54c94b49cf123dec1ae945711041f388e008f95

  • SHA512

    71b760da145ab6ef12f0657f0038ec1457aec0c3ee553adfaaf992bc9a335d5862cd7733ec969a246c3a2f74b8580393dbf84e3f2ef28257d5ce6356c89a54e2

  • SSDEEP

    1536:4pcu2OaEaaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2mb8:lOhW3kCFrWsF2eLbqx2ruFs89x

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bed779a7acd627ecf562093e0edbbd1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1bed779a7acd627ecf562093e0edbbd1_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Users\Admin\meioveg.exe
      "C:\Users\Admin\meioveg.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\meioveg.exe

    Filesize

    192KB

    MD5

    91d3d99475fc3aa0192dcf03483af174

    SHA1

    abcc4439c9539e571f43e5788362c659a6aebe1d

    SHA256

    2b7e850569de546eb49c32945b61c884a80cb1a1ab557e5678be2f5d025252d3

    SHA512

    47c60f3e20f8519c32da19e1a5e712c79780686c0ecd6a0d50825b8c02bf00225cd95c7ca9622edaa9855ae44766c8f59c697d891f369859d8a927cbbd302e80