Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 05:08

General

  • Target

    212b843f097d4bd86dec9e7f7b1a04e7_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    212b843f097d4bd86dec9e7f7b1a04e7

  • SHA1

    445af4de5bfb4d14d73df69b54a5fcf3004f6bd0

  • SHA256

    dd8d5c6163a7c86db68034ac5ff175c2ff268ed9c9665a1b7e95593b69711448

  • SHA512

    5991f039c0d6cbd47ca65c2ec31245320b8f7ee04274b09f1b704d5ab5cd2b414f3e3ab889732e064434bff3602693adc907b1b2f62224151af0e67438232845

  • SSDEEP

    3072:E3k/hPrdVfWM8RM/8KmwBErXXFefQmD8ampjE6ei55:T/FX8/KmwBEjXFeos8aCteo

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\212b843f097d4bd86dec9e7f7b1a04e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\212b843f097d4bd86dec9e7f7b1a04e7_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\ruaob.exe
      "C:\Users\Admin\ruaob.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\ruaob.exe

          Filesize

          132KB

          MD5

          ba83416159c12b8396767adc6833f9df

          SHA1

          762101f150e050911440c4b2e56e7853a6fb12a1

          SHA256

          3ad17ee938ab4f80e1eb3c5fef0d989e02e1543913bc779c24c9e32eef62118f

          SHA512

          413d56a77f6bc2d528acfbfb408423385bdd32ca8846bf2cc98d5b9ed6824bae7b6c001ded42ca84e34f57cab4a193e037579f276e14621437ca1ce6eb5307a4