Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 08:40

General

  • Target

    26cb2881c11829b28aae91d14d477035_JaffaCakes118.exe

  • Size

    300KB

  • MD5

    26cb2881c11829b28aae91d14d477035

  • SHA1

    c57e06c140986a50430b19543ccc34db8268ec3e

  • SHA256

    e364d33be72785c5542811b19255745132ba9ea7a4cc943a2c12733c1b317ee6

  • SHA512

    49edbd3f295aae3ac0eb51dba0833666f9ec226295015176dbbde2385c9f9bb3c7160feb681158bb34effbd36d953797afc02c5bebc22b3c6e5c1424e3bc5538

  • SSDEEP

    3072:AMIAnfifD4gfGWKdbKsQOO19obSp0xl6EPpc4VpJzNDdlcjBP2Y:ABcfib4gfGWcmsQCbG0xlfPpndiVPN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26cb2881c11829b28aae91d14d477035_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26cb2881c11829b28aae91d14d477035_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\jaocin.exe
      "C:\Users\Admin\jaocin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jaocin.exe

    Filesize

    300KB

    MD5

    8e7588a5120453bf90dbe11115807897

    SHA1

    ca5cb917c0c53234ceca16611ce7889f0c7ffa8d

    SHA256

    ff8bd4a9038aa2ce85f2c2a6878b60f61783ca5262dc994fa63c71aed316f713

    SHA512

    a35026fbaec0f9aacf6d4855dc38d15940722cac49f178bce27218527824c11a3c70883869727fe7f6979b24645ad7109f391209e267df875ba80b8ecd7c83c8