Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 10:03

General

  • Target

    2fee92a443bc830f6c35c73063bae954_JaffaCakes118.exe

  • Size

    232KB

  • MD5

    2fee92a443bc830f6c35c73063bae954

  • SHA1

    00a98a203f0e4365f291711ea730df37c0559768

  • SHA256

    8209afd663e3c04c9be2c7d2fd4ce729462c4787ccb77763e4ca80152cfdc8a8

  • SHA512

    c9151c149b57803c48999f6f4956b95bc6d760b9945abc70d427439d414511510f1fddfef23b87b88e8781758b4bbc80110c3a973d67341aa22e6fa6478daa0e

  • SSDEEP

    6144:MI3PFKs78g2KyEOaWEqxF6snji81RUinKdNOAG:/Ph+mFQ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fee92a443bc830f6c35c73063bae954_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2fee92a443bc830f6c35c73063bae954_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\raono.exe
      "C:\Users\Admin\raono.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\raono.exe

    Filesize

    232KB

    MD5

    f28d4082053a8e2cde085c79b3b3a5bd

    SHA1

    af760fd7c81cc5c9e2b860e54871ce7b72d1d332

    SHA256

    c571d6093503278382ce8dac714bb20de39d34ee3a21aed02ce87602a9891645

    SHA512

    4a30b32743532be286e288d967bacfd89e1c1b9558781281387de0c757323af6f6bd8d41c3a52e290144a5f2e0155be82d59ca6bb4c7ac6a21512db7875b8214