Analysis

  • max time kernel
    149s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 20:59

General

  • Target

    295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    295511acd6dff88f23e4db56059e088e

  • SHA1

    4aecdb64d0d9afc9efd58e76db16d3c168181357

  • SHA256

    091ddc22680eaf4690c3b8499acfc2bc166aab1632b191f0613994d7f8167e4c

  • SHA512

    0d3e7f8ecd32190e967c313f9468f0a8827822755553e8bcc41578e6138028ee6d273654443125ef183c91e9bf6e5ff7f518121c53ed2ab9ada9f9f7e7fa84c1

  • SSDEEP

    1536:pRLXqgBYd6iTGuR6n2nlba/yToFmLrac1cWcZc+c5cNsZqbgDPkA:3TqKYdFd8gHqMDPv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\295511acd6dff88f23e4db56059e088e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Users\Admin\voobiar.exe
      "C:\Users\Admin\voobiar.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\voobiar.exe

    Filesize

    92KB

    MD5

    6a179f7dad823b7eaf372d9f74fda087

    SHA1

    aa40f1e85916935be9b184e519b8f91283f3611d

    SHA256

    f4df4ac22925b8352cf9d07df9b8ca7f1cc76af4917e4afbe8855657ac723ff5

    SHA512

    9e64d76459db6be6032e44e7707bf9a26b0af1744db47e1e70df412cb9cb8a015c0d231f14691efe110dc4dfcd0ecbde76d0f21fa1c99431182b7d6c4a1262c7