Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 11:19

General

  • Target

    222fbb3ebfa5c1a8c8f00302bc07aecc_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    222fbb3ebfa5c1a8c8f00302bc07aecc

  • SHA1

    c50060c093428fd3993f81e4ba743a35877ed0e8

  • SHA256

    c61411664fe3c54d80a78e3da5c3b37c92f0f0e8965e1319bb857565a9087a90

  • SHA512

    a93826c56c781c3cfa6845976e9ffd812bd135c6720014b5797b4d2d8811ae6560f54098d9a8d3d31443480226e091706373028d31f2837903ffec48dc8902ef

  • SSDEEP

    1536:xqEBhwRTxuBxeDtMYHa27J14ltxporZ45igHNeG0hQ:MEBhwRTxkeV6gJ1uCt45VgQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\222fbb3ebfa5c1a8c8f00302bc07aecc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\222fbb3ebfa5c1a8c8f00302bc07aecc_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\noiur.exe
      "C:\Users\Admin\noiur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\noiur.exe

    Filesize

    124KB

    MD5

    4a125143e52c5f63d699a1fe752d5d56

    SHA1

    dbe04e2b636f0b650c96695480d9d559aae9220a

    SHA256

    68631750dd67d8d5ffee0ddecfcf2e6341f878a3d7240a45362e922d3394b51f

    SHA512

    3e9ec7bb702cedd5fda36316c946b66be06084f002020eb02c91e74aa380efca694059f6d0e06ccf6afa64b0c5d76610c4f6c227f167e0e69c5eff1d2b944284