Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 13:20

General

  • Target

    2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    2c80fa493d09712299f73e7b2378aa6b

  • SHA1

    07c0be92b2534c07df134cf2773e336c0a91fd7e

  • SHA256

    68fa5eea43aa47d93f67c5ab7c24f5452e6d8370a8807c37325d07e09361b18f

  • SHA512

    21a50ce5e667c3340fa5d8c3c78b6204a8691d7c1e7e1e36b11dbac757cc488c8079b201c9bb1f53f7baec0c1bf8572aa1b20583840dbf299ed5bef181638a27

  • SSDEEP

    1536:uHAaD30zZ3NMsOfXu7Ke9TG4yMSmcUk6lCbQvmSTpJwuqCNQR6nkX5SADkPY+GdB:kp30ZTTG4yMZc9pJSTp63Zc4t

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c80fa493d09712299f73e7b2378aa6b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\riiakid.exe
      "C:\Users\Admin\riiakid.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\riiakid.exe

          Filesize

          204KB

          MD5

          0a38047c719a2f70c8cbf7d5dd86ccf6

          SHA1

          886aa032216f762febc1053269ede8e7575faed1

          SHA256

          e8589f480d1e805f7eaacb3b3fa349b0b09c1dff85ed3c6f252f107bb8e2eadb

          SHA512

          c4b4494bd015bae27fcff23f1afb37352bcf4e06ca50a831525ccc6374cfef94ef5b1ce3fd60b2254f9ec152b39d660b42a5564b1bd7aa8393cce07805fa6e3a