Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 05:10

General

  • Target

    24bd6a6a8a271247ad6a0d6f606ad8ec_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    24bd6a6a8a271247ad6a0d6f606ad8ec

  • SHA1

    60f1e3d876a59d960bd52f91d7408cf8ac294931

  • SHA256

    aa29b14fcfca0e3cfeb25fbd58e9b06d9400b9bc7da8a97ccac0e71141b946cd

  • SHA512

    3fc8c6f6165dbf9dd15669dd1bf090bfd5107221cbb71d220abddeadc9aa84aff5b3deef90030e14667037d88ce5533ecd43277765454983ca07bbd1e12a6cef

  • SSDEEP

    1536:Ch88iAuismywsd0sLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfpNIjnZYB:NP/KLOM5iCn2B

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24bd6a6a8a271247ad6a0d6f606ad8ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\24bd6a6a8a271247ad6a0d6f606ad8ec_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\wiuebam.exe
      "C:\Users\Admin\wiuebam.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wiuebam.exe

    Filesize

    100KB

    MD5

    03dea71c31719ddd2c47073dc85f9cc5

    SHA1

    f14c47f14662a2e7c9ce712d0c7ca6b7b4588608

    SHA256

    4e341b9bdde00ada8e888834e7488b07fedabd9a436a3811e02c7a3237b7751d

    SHA512

    0b52557ba3762cbd3aec0889bcd012234fb5470e7e52486964d18f6f51185ba45468f2bb14ee20d4b397c2f2f157923592d2f553c0e1f3d77e3b9157c0dad121