Analysis

  • max time kernel
    149s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2024, 23:25

General

  • Target

    2a285658b1fe8a572b22081b538dda72_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    2a285658b1fe8a572b22081b538dda72

  • SHA1

    cf9b51945707d2b6fb6d2b2ea475b224d80ff881

  • SHA256

    a085d5607ac92b73be8daad2d5e89727e067684dcb9d4bf0601dbda12de00152

  • SHA512

    58f722497fb409607d66713e32c2d1884017b51791b29adf0c136cf8be1bdb655538ab77d29585261228b3f66746bdb203f8fd7e46e3d368818a97232d0566ee

  • SSDEEP

    1536:JJ18iAuismyWsYJciNRw0wF9MGM9K/lKtNgCMbATbL3N+NM5EfbNIjP:PYdNtTLOM5sCP

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a285658b1fe8a572b22081b538dda72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a285658b1fe8a572b22081b538dda72_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\miogeal.exe
      "C:\Users\Admin\miogeal.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\miogeal.exe

    Filesize

    100KB

    MD5

    913b6805e65bae35e7125df9e1096c93

    SHA1

    95d33e3c569c9c0e2401f11a29c5c2537a87c0d7

    SHA256

    958f9116add090657a468180d79273328769c2d6af3b3c0b32cccde803aa8a17

    SHA512

    8fd5ea4e694e549037cd9a31015912d810804d3c51c7e5616e758993421ded83c08fda88f8f879cd15b3462cc28d1af92519f5678820ea648e526ce9198d2768