Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 12:57

General

  • Target

    30764c57031bb1ec0db8399a74e7109a_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    30764c57031bb1ec0db8399a74e7109a

  • SHA1

    651512776882e788795e542b1fb7791f2d061a13

  • SHA256

    fb4b8d1ceea7e61cc9149cdaef4437e130b30a67fab3ad334147b73df2b79889

  • SHA512

    5ebb60c24207ac07dec0c4fd34d39db6a12323cd1d9a3e7196706cbfb0229274b1b5002863058f380d6a9950e842829f409b54dd8ffc2c799ade918ff52b0246

  • SSDEEP

    1536:gzWUcX220mQaCGXxJKIRGWcOUP7vXArnY1ZqAefzyes5NIjnZMx:wkQamNAfzyeuCnix

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30764c57031bb1ec0db8399a74e7109a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\30764c57031bb1ec0db8399a74e7109a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\xaifo.exe
      "C:\Users\Admin\xaifo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xaifo.exe

    Filesize

    100KB

    MD5

    592f28dcfd49e325e4be2df8f7c8d8d9

    SHA1

    614e68298e16a1539ba0898c165c54fd63ceacd4

    SHA256

    43a0fabd4ecf7302d215df042dfb2253cf665fecaa2da4b017888308ea7fe9ee

    SHA512

    b94fdf036a090b7299975051aa9f51fb6a4b847366b43c34af9ae0ad2d93c491235e1b1cbeec978fe64056283f2783d0e27fc3d14c12cc0d9a0b49a8ac070b68