Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 17:49

General

  • Target

    25ad519b6d35bba5fa1b6dbbd4b407ac_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    25ad519b6d35bba5fa1b6dbbd4b407ac

  • SHA1

    417afb384770be4338021b0b0fd68507bf9890e5

  • SHA256

    4593e934ff07d1635d69fd8e6d633963477ca693fe5cff2f9c95b7e084c36d89

  • SHA512

    eed977826293dbf1fc6eb59f559d69855073aacc85e869f2e342052d90e7938e8d6e0609697adc47aada1a55afbdb91797e109dfd032ced130a35a971754fdcf

  • SSDEEP

    3072:1MhcPIDHQXftsa01SOq1RY4uJr/I5fEKcpGJsXS9K:OcPIDd+JleGJ99

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25ad519b6d35bba5fa1b6dbbd4b407ac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25ad519b6d35bba5fa1b6dbbd4b407ac_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Users\Admin\hezov.exe
      "C:\Users\Admin\hezov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4132

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\hezov.exe

          Filesize

          260KB

          MD5

          39b378b4fcb03cb67af6362d8e568978

          SHA1

          ea4a88f72a71b04bad1ba00ac2b74bc21a4fd1ee

          SHA256

          8d7b93957bab4e54bf46568105dd2c62209b77b185fae77bc44b2a9cdd47485c

          SHA512

          352efb846e7d411ae35cf1b2673d21b2f72a49ceff903d0cd71952860c3ae9a57f9b880937e7ef02f5427d6ba84e51fd00e8918dcbfc670c090da637d506a670