Analysis

  • max time kernel
    149s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 09:27

General

  • Target

    2bd0aa185ab8d96edf9dcd5f7f916725_JaffaCakes118.exe

  • Size

    80KB

  • MD5

    2bd0aa185ab8d96edf9dcd5f7f916725

  • SHA1

    2900e1c9971cbcff86c55e86b0f4d9adf7123fcd

  • SHA256

    f92dfbc60d9784a27f7897bca3c6a43a87bb5d87d4ba1ff591f40b86b36414f8

  • SHA512

    930a883ee785a7a97b564580af5d4d0874b3d4027cc97c07b5b1d2a4c04defb1598f67b7c3633897f1a86119479b3382835d834d246003ec38ecfdf0a483f6b9

  • SSDEEP

    768:URL/eaqxW8O3NBp/pc8epC7/I1t12/y/scRH4bax/Ww5vOZrsg9:URH1NBVYkQt1ymscRH4Zw5Ssi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bd0aa185ab8d96edf9dcd5f7f916725_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2bd0aa185ab8d96edf9dcd5f7f916725_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\vouguu.exe
      "C:\Users\Admin\vouguu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 788
      2⤵
      • Program crash
      PID:572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\vouguu.exe

    Filesize

    80KB

    MD5

    0b719e2b00ae8d7520b34f405401aba2

    SHA1

    1ce56adf922cd78deb8c531f2c8ddbbf0b53398e

    SHA256

    6ea730dbb0ba85a2133af2473d0d35e8cbb541b9c428bb9aca0aa40af07aa040

    SHA512

    b35d0652b67c4466b89f6dbe51a5f0cac717816f9845158d25b926d9141f135539834227e1e8fd27517309b6747bbd4153d7c2fa60ef8bc9567dc90556b4e4c7